Malware Analysis Report

2024-08-06 11:23

Sample ID 240615-24cfaaycng
Target c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe
SHA256 7074ba04d9224b5b634c83510e09c9a3824eca919984186d897b62a47cbab32e
Tags
rocket quasar persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7074ba04d9224b5b634c83510e09c9a3824eca919984186d897b62a47cbab32e

Threat Level: Known bad

The file c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

rocket quasar persistence spyware trojan

Quasar family

Quasar payload

Quasar RAT

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Looks up external IP address via web service

Drops file in System32 directory

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-15 23:07

Signatures

Quasar family

quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 23:07

Reported

2024-06-15 23:10

Platform

win7-20240611-en

Max time kernel

148s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kernel32 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe\"" C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A
File opened for modification C:\Windows\SysWOW64\WinDataCenter C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2000 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\schtasks.exe
PID 2000 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\schtasks.exe
PID 2000 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\schtasks.exe
PID 2000 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\schtasks.exe
PID 2000 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe
PID 2000 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe
PID 2000 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe
PID 2000 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe
PID 2652 wrote to memory of 2680 N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Windows\SysWOW64\schtasks.exe
PID 2652 wrote to memory of 2680 N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Windows\SysWOW64\schtasks.exe
PID 2652 wrote to memory of 2680 N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Windows\SysWOW64\schtasks.exe
PID 2652 wrote to memory of 2680 N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "Kernel32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe" /rl HIGHEST /f

C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe

"C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "Kernel32" /sc ONLOGON /tr "C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe" /rl HIGHEST /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 pelopeloso-28110.portmap.host udp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp

Files

memory/2000-0-0x000000007418E000-0x000000007418F000-memory.dmp

memory/2000-1-0x00000000012B0000-0x000000000130E000-memory.dmp

memory/2000-2-0x0000000074180000-0x000000007486E000-memory.dmp

\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe

MD5 c15c7a39a36c7934a34a21bf0fb61d60
SHA1 b2a852d1ab8d615a2148a0966ac431e7979ded24
SHA256 7074ba04d9224b5b634c83510e09c9a3824eca919984186d897b62a47cbab32e
SHA512 426c17406e2c0c39f44d6873a6e7f04b9023d8b6043e8709f44e2fbbffba616f0b54518881218796be5f61a1347494d4ac39706d3187142289aa08eec53ac362

memory/2652-10-0x0000000000070000-0x00000000000CE000-memory.dmp

memory/2652-11-0x0000000074180000-0x000000007486E000-memory.dmp

memory/2652-12-0x0000000074180000-0x000000007486E000-memory.dmp

memory/2000-13-0x0000000074180000-0x000000007486E000-memory.dmp

memory/2652-15-0x0000000074180000-0x000000007486E000-memory.dmp

memory/2652-16-0x0000000074180000-0x000000007486E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 23:07

Reported

2024-06-15 23:10

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A
File opened for modification C:\Windows\SysWOW64\WinDataCenter C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A
File created C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "Kernel32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe" /rl HIGHEST /f

C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe

"C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "Kernel32" /sc ONLOGON /tr "C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe" /rl HIGHEST /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 pelopeloso-28110.portmap.host udp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
US 8.8.8.8:53 98.58.20.217.in-addr.arpa udp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
DE 193.161.193.99:28110 pelopeloso-28110.portmap.host tcp
US 8.8.8.8:53 26.73.42.20.in-addr.arpa udp

Files

memory/3700-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

memory/3700-1-0x0000000000DB0000-0x0000000000E0E000-memory.dmp

memory/3700-2-0x0000000005CA0000-0x0000000006244000-memory.dmp

memory/3700-3-0x0000000005810000-0x00000000058A2000-memory.dmp

memory/3700-4-0x0000000074E40000-0x00000000755F0000-memory.dmp

memory/3700-5-0x00000000058B0000-0x0000000005916000-memory.dmp

memory/3700-6-0x00000000064F0000-0x0000000006502000-memory.dmp

memory/3700-7-0x0000000006A30000-0x0000000006A6C000-memory.dmp

C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe

MD5 c15c7a39a36c7934a34a21bf0fb61d60
SHA1 b2a852d1ab8d615a2148a0966ac431e7979ded24
SHA256 7074ba04d9224b5b634c83510e09c9a3824eca919984186d897b62a47cbab32e
SHA512 426c17406e2c0c39f44d6873a6e7f04b9023d8b6043e8709f44e2fbbffba616f0b54518881218796be5f61a1347494d4ac39706d3187142289aa08eec53ac362

memory/5100-15-0x0000000074E40000-0x00000000755F0000-memory.dmp

memory/3700-14-0x0000000074E40000-0x00000000755F0000-memory.dmp

memory/5100-16-0x0000000074E40000-0x00000000755F0000-memory.dmp

memory/5100-18-0x0000000006310000-0x000000000631A000-memory.dmp

memory/5100-19-0x0000000074E40000-0x00000000755F0000-memory.dmp

memory/5100-20-0x0000000074E40000-0x00000000755F0000-memory.dmp