Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 21:29
Behavioral task
behavioral1
Sample
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
060c16ffab2baf7d36ce23605c8433f0
-
SHA1
912093cdd6e04b4269a014208e8c1a603a006845
-
SHA256
72cebf37d27ac7210a756eb9f6180a9bb6153b9cf887550e303f17e6b9573f13
-
SHA512
bf63034bb9f94d0b51c44c13c281517b42988d232b01a80981d8fddc8f5e23581bfdfbecafff70a30696fb4212cdfa6bcd966d35cc8fb6a2f76b9b75c7e85902
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMHI+rMUx+N43XVZpFy/my:E5aIwC+Agr6StVEnmcI+2zTy/h
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4356-16-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exepid process 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe Token: SeTcbPrivilege 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exepid process 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exedescription pid process target process PID 4356 wrote to memory of 1140 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe PID 4356 wrote to memory of 1140 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe PID 4356 wrote to memory of 1140 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exeFilesize
1.1MB
MD5060c16ffab2baf7d36ce23605c8433f0
SHA1912093cdd6e04b4269a014208e8c1a603a006845
SHA25672cebf37d27ac7210a756eb9f6180a9bb6153b9cf887550e303f17e6b9573f13
SHA512bf63034bb9f94d0b51c44c13c281517b42988d232b01a80981d8fddc8f5e23581bfdfbecafff70a30696fb4212cdfa6bcd966d35cc8fb6a2f76b9b75c7e85902
-
C:\Users\Admin\AppData\Roaming\WinSocket\settings.iniFilesize
38KB
MD5030b2b1b67f22fe9256a2161ebb84e15
SHA1393a4862f069bd8891867584b570082f462f4217
SHA256b8f9a18bfb1107d224b29ed448c2820ff4ba7e897a788f5a754240de48339486
SHA51219143a9b7e8ce9cd8813e421dc70b51f4b9ff090a8fcaedfa93b2a0505e336058e8457df9465b982607600e5e0c6950d63438b5005237f0bd47bfbc9dbe91794
-
memory/1140-35-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-31-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-40-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1140-28-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-37-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-41-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1140-27-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-29-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-30-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-52-0x0000000003060000-0x000000000311E000-memory.dmpFilesize
760KB
-
memory/1140-32-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-33-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-34-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-36-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1140-53-0x0000000003120000-0x00000000033E9000-memory.dmpFilesize
2.8MB
-
memory/1140-26-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/2156-51-0x0000021A6A050000-0x0000021A6A051000-memory.dmpFilesize
4KB
-
memory/2156-46-0x0000000010000000-0x000000001001E000-memory.dmpFilesize
120KB
-
memory/2156-47-0x0000000010000000-0x000000001001E000-memory.dmpFilesize
120KB
-
memory/2656-58-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-69-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-72-0x0000000000421000-0x0000000000422000-memory.dmpFilesize
4KB
-
memory/2656-73-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2656-59-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-60-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-61-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-62-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-63-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-64-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-65-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-66-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-67-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/2656-68-0x0000000000EB0000-0x0000000000EB1000-memory.dmpFilesize
4KB
-
memory/4356-18-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4356-15-0x0000000000421000-0x0000000000422000-memory.dmpFilesize
4KB
-
memory/4356-13-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-12-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-11-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-10-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-9-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-6-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-2-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-16-0x0000000002200000-0x0000000002229000-memory.dmpFilesize
164KB
-
memory/4356-8-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-7-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-5-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-4-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-3-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4356-14-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB