Malware Analysis Report

2024-08-06 14:12

Sample ID 240618-jfj64stcma
Target 27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
SHA256 4e897284a3dc4ab168f225a5977c2f3105186f887fa08fbc288ee5fa85dbc493
Tags
modiloader persistence trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4e897284a3dc4ab168f225a5977c2f3105186f887fa08fbc288ee5fa85dbc493

Threat Level: Known bad

The file 27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

modiloader persistence trojan upx

ModiLoader, DBatLoader

ModiLoader Second Stage

Loads dropped DLL

Executes dropped EXE

UPX packed file

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 07:36

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 07:36

Reported

2024-06-18 07:39

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 3548 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 2904 wrote to memory of 3316 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 3316 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 3316 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 3316 wrote to memory of 4644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3316 wrote to memory of 4644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3316 wrote to memory of 4644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2904 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2904 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2904 wrote to memory of 4512 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4972 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4512 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PRMKM.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
BE 2.17.107.115:443 www.bing.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 115.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
IE 52.111.236.22:443 tcp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/3548-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/3548-5-0x0000000002A40000-0x0000000002A42000-memory.dmp

memory/2904-6-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3548-4-0x0000000002A30000-0x0000000002A32000-memory.dmp

memory/2904-8-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3548-10-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2904-11-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\PRMKM.txt

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 30a127c1ea0d4b3c8d54d8b0b0f7c209
SHA1 4a3de2575c8959668293ca6d72139dcc57991f7b
SHA256 49c20c64b89a39799423202ec104127432541b926404e770f0a893a31e7438c4
SHA512 bd0ba6ffbde471ee808764be58565ecfc8cd161612451ebdd2a115626502d50dbb3a1d4074ceb7aef5b17282107c23497eab3e7dcfba31e224ca00d4c10c92ea

memory/4512-35-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4560-46-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4512-45-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4560-49-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4560-53-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2904-56-0x0000000000400000-0x000000000040B000-memory.dmp

memory/4560-57-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2904-54-0x0000000000410000-0x00000000004D9000-memory.dmp

memory/4560-52-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4972-58-0x0000000000400000-0x000000000040B000-memory.dmp

memory/4560-59-0x0000000000400000-0x0000000000414000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 07:36

Reported

2024-06-18 07:39

Platform

win7-20240611-en

Max time kernel

149s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 840 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe
PID 264 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 264 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 264 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 264 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2844 wrote to memory of 1612 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2844 wrote to memory of 1612 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2844 wrote to memory of 1612 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2844 wrote to memory of 1612 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 264 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 264 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 264 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 264 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1348 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1232 wrote to memory of 1124 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\27c7600ebdcd3464a03f6292a9987e30_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\NBCXT.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/840-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-3-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/840-5-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/840-15-0x0000000000270000-0x0000000000271000-memory.dmp

memory/840-96-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-87-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-86-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-85-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-84-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-83-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-82-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-80-0x0000000000690000-0x0000000000692000-memory.dmp

memory/840-79-0x0000000000400000-0x0000000000453000-memory.dmp

memory/840-71-0x0000000000670000-0x0000000000671000-memory.dmp

memory/840-61-0x00000000003F0000-0x00000000003F1000-memory.dmp

memory/840-59-0x0000000000404000-0x0000000000405000-memory.dmp

memory/840-97-0x0000000002540000-0x0000000002593000-memory.dmp

memory/840-40-0x00000000003B0000-0x00000000003B1000-memory.dmp

memory/840-28-0x0000000000290000-0x0000000000291000-memory.dmp

memory/840-25-0x0000000000400000-0x0000000000453000-memory.dmp

memory/264-110-0x0000000000400000-0x000000000040B000-memory.dmp

memory/264-113-0x0000000000400000-0x000000000040B000-memory.dmp

memory/840-112-0x0000000000400000-0x0000000000453000-memory.dmp

memory/264-106-0x0000000000400000-0x000000000040B000-memory.dmp

memory/264-108-0x0000000000400000-0x000000000040B000-memory.dmp

memory/264-102-0x0000000000400000-0x000000000040B000-memory.dmp

memory/264-104-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/264-100-0x0000000000400000-0x000000000040B000-memory.dmp

memory/264-98-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\NBCXT.bat

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 c7e92ac9af058cc2e255d8fa573fbc8a
SHA1 2888a07534c45a758ad973e4a7cbcc5f7c69e662
SHA256 f07a6692c6386496429493dc81316eed02a8bd4a7f2fd2110c8bb2af69f23639
SHA512 00feb57d03b22cfe16da2dcdbe2967b5bb55016ef5ce3f0bc987a4bb9490ee5fcd04447f41c6bcd42b65faa2db91216a260f346f01418c4f841306f6302ea1e1

memory/1232-157-0x0000000000400000-0x0000000000453000-memory.dmp

memory/264-156-0x0000000002AC0000-0x0000000002B13000-memory.dmp

memory/264-155-0x0000000002AC0000-0x0000000002B13000-memory.dmp

memory/264-154-0x0000000002AB0000-0x0000000002B03000-memory.dmp

memory/264-140-0x0000000002AB0000-0x0000000002B03000-memory.dmp

memory/264-160-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1232-163-0x0000000000270000-0x0000000000271000-memory.dmp

memory/1232-228-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1232-184-0x0000000000330000-0x0000000000331000-memory.dmp

memory/1232-173-0x0000000000290000-0x0000000000291000-memory.dmp

memory/1348-238-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1124-255-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1232-254-0x0000000000400000-0x0000000000453000-memory.dmp

memory/264-258-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1348-268-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1124-269-0x0000000000400000-0x0000000000414000-memory.dmp