Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
47282eca6d814c3808d4f5c113e22180_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
47282eca6d814c3808d4f5c113e22180_NeikiAnalytics.dll
-
Size
120KB
-
MD5
47282eca6d814c3808d4f5c113e22180
-
SHA1
4d1d77383f9cad8acfbf970733079cacb1a44677
-
SHA256
669e7700a0b7459b52a5add16a6773812792958f0cf6f77628a4f7e1195fc2c8
-
SHA512
01f7aa6c744ad14e927f9d0327522b5493e4b386b48f9e9f1fab0f439635627ba7d03ac7890cfc6842d57627c6409e546117b09fa49d1769405ebc0f28dacb4e
-
SSDEEP
1536:kG+KlIOCVPHcxphmtuPSYbCjwgOK3KQHqBZvDlEVHi2MAI0x7xyZWOFK7TzWhO:knKAHcxTr+jwgOrDUVCfZ0x7cZbO
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f76144c.exef7630ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76144c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76144c.exe -
Processes:
f76144c.exef7630ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7630ff.exe -
Processes:
f76144c.exef7630ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76144c.exe -
Executes dropped EXE 3 IoCs
Processes:
f76144c.exef7615e1.exef7630ff.exepid process 2872 f76144c.exe 2568 f7615e1.exe 2764 f7630ff.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2872-14-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-23-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-15-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-20-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-16-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-19-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-22-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-18-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-17-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-21-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-61-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-62-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-63-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-64-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-65-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-67-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-81-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-83-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-84-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-103-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-104-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-105-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-108-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2872-148-0x00000000006F0000-0x00000000017AA000-memory.dmp upx behavioral1/memory/2764-165-0x0000000000A80000-0x0000000001B3A000-memory.dmp upx behavioral1/memory/2764-202-0x0000000000A80000-0x0000000001B3A000-memory.dmp upx -
Processes:
f76144c.exef7630ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7630ff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76144c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7630ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7630ff.exe -
Processes:
f76144c.exef7630ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7630ff.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f76144c.exef7630ff.exedescription ioc process File opened (read-only) \??\L: f76144c.exe File opened (read-only) \??\R: f76144c.exe File opened (read-only) \??\G: f7630ff.exe File opened (read-only) \??\K: f76144c.exe File opened (read-only) \??\P: f76144c.exe File opened (read-only) \??\Q: f76144c.exe File opened (read-only) \??\J: f76144c.exe File opened (read-only) \??\G: f76144c.exe File opened (read-only) \??\I: f76144c.exe File opened (read-only) \??\M: f76144c.exe File opened (read-only) \??\O: f76144c.exe File opened (read-only) \??\E: f7630ff.exe File opened (read-only) \??\E: f76144c.exe File opened (read-only) \??\N: f76144c.exe File opened (read-only) \??\H: f76144c.exe -
Drops file in Windows directory 3 IoCs
Processes:
f76144c.exef7630ff.exedescription ioc process File created C:\Windows\f76149a f76144c.exe File opened for modification C:\Windows\SYSTEM.INI f76144c.exe File created C:\Windows\f76646e f7630ff.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f76144c.exef7630ff.exepid process 2872 f76144c.exe 2872 f76144c.exe 2764 f7630ff.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f76144c.exef7630ff.exedescription pid process Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2872 f76144c.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe Token: SeDebugPrivilege 2764 f7630ff.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef76144c.exef7630ff.exedescription pid process target process PID 2172 wrote to memory of 2348 2172 rundll32.exe rundll32.exe PID 2172 wrote to memory of 2348 2172 rundll32.exe rundll32.exe PID 2172 wrote to memory of 2348 2172 rundll32.exe rundll32.exe PID 2172 wrote to memory of 2348 2172 rundll32.exe rundll32.exe PID 2172 wrote to memory of 2348 2172 rundll32.exe rundll32.exe PID 2172 wrote to memory of 2348 2172 rundll32.exe rundll32.exe PID 2172 wrote to memory of 2348 2172 rundll32.exe rundll32.exe PID 2348 wrote to memory of 2872 2348 rundll32.exe f76144c.exe PID 2348 wrote to memory of 2872 2348 rundll32.exe f76144c.exe PID 2348 wrote to memory of 2872 2348 rundll32.exe f76144c.exe PID 2348 wrote to memory of 2872 2348 rundll32.exe f76144c.exe PID 2872 wrote to memory of 1044 2872 f76144c.exe Dwm.exe PID 2872 wrote to memory of 1060 2872 f76144c.exe taskhost.exe PID 2872 wrote to memory of 1112 2872 f76144c.exe Explorer.EXE PID 2872 wrote to memory of 1316 2872 f76144c.exe DllHost.exe PID 2872 wrote to memory of 2172 2872 f76144c.exe rundll32.exe PID 2872 wrote to memory of 2348 2872 f76144c.exe rundll32.exe PID 2872 wrote to memory of 2348 2872 f76144c.exe rundll32.exe PID 2348 wrote to memory of 2568 2348 rundll32.exe f7615e1.exe PID 2348 wrote to memory of 2568 2348 rundll32.exe f7615e1.exe PID 2348 wrote to memory of 2568 2348 rundll32.exe f7615e1.exe PID 2348 wrote to memory of 2568 2348 rundll32.exe f7615e1.exe PID 2348 wrote to memory of 2764 2348 rundll32.exe f7630ff.exe PID 2348 wrote to memory of 2764 2348 rundll32.exe f7630ff.exe PID 2348 wrote to memory of 2764 2348 rundll32.exe f7630ff.exe PID 2348 wrote to memory of 2764 2348 rundll32.exe f7630ff.exe PID 2872 wrote to memory of 1044 2872 f76144c.exe Dwm.exe PID 2872 wrote to memory of 1060 2872 f76144c.exe taskhost.exe PID 2872 wrote to memory of 1112 2872 f76144c.exe Explorer.EXE PID 2872 wrote to memory of 2568 2872 f76144c.exe f7615e1.exe PID 2872 wrote to memory of 2568 2872 f76144c.exe f7615e1.exe PID 2872 wrote to memory of 2764 2872 f76144c.exe f7630ff.exe PID 2872 wrote to memory of 2764 2872 f76144c.exe f7630ff.exe PID 2764 wrote to memory of 1044 2764 f7630ff.exe Dwm.exe PID 2764 wrote to memory of 1060 2764 f7630ff.exe taskhost.exe PID 2764 wrote to memory of 1112 2764 f7630ff.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f76144c.exef7630ff.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76144c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7630ff.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47282eca6d814c3808d4f5c113e22180_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47282eca6d814c3808d4f5c113e22180_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f76144c.exeC:\Users\Admin\AppData\Local\Temp\f76144c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f7615e1.exeC:\Users\Admin\AppData\Local\Temp\f7615e1.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f7630ff.exeC:\Users\Admin\AppData\Local\Temp\f7630ff.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5731a5f706a4b360afad5a0d80ba3505c
SHA18cf24600730beb0cf9d53671abe50bb4dddf3bc4
SHA256b0b871fc1a38a23dfe3c92864b6cb8ff4ae88d0aafd371d9ac83453571d880b5
SHA512d8aafba5414596aba43f1a2c9191372697de54d71c5795f3d6ff112dd8aae03f5da10223b0e115d9d08623696e764463d1664449db610fd7198f6b198ff76b48
-
\Users\Admin\AppData\Local\Temp\f76144c.exeFilesize
97KB
MD562c2721038c58f9c947ea7bad3afe5d0
SHA114ab26722c293a0822507f377f04b2bb49d7b984
SHA256bf4aa0000a5d181ea9a5bfbab5af477027b5abc05e89b4b463005e17c4d4ec84
SHA512493e9bfe29b6c7e005f90c4040ddde2ce702403d735f85bbc67e55e78bc22d90f0f20c482172f383da7cbd1d96b0ec28e846e53593ea0d8c4ce083e4d75e03d2
-
memory/1044-24-0x0000000000340000-0x0000000000342000-memory.dmpFilesize
8KB
-
memory/2348-79-0x0000000000100000-0x0000000000102000-memory.dmpFilesize
8KB
-
memory/2348-9-0x0000000000100000-0x0000000000112000-memory.dmpFilesize
72KB
-
memory/2348-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2348-32-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2348-75-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/2348-49-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/2348-51-0x00000000002C0000-0x00000000002D2000-memory.dmpFilesize
72KB
-
memory/2348-52-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/2348-10-0x0000000000100000-0x0000000000112000-memory.dmpFilesize
72KB
-
memory/2348-31-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/2348-40-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2568-92-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2568-53-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2568-159-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2568-100-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2568-93-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2764-80-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2764-203-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2764-202-0x0000000000A80000-0x0000000001B3A000-memory.dmpFilesize
16.7MB
-
memory/2764-165-0x0000000000A80000-0x0000000001B3A000-memory.dmpFilesize
16.7MB
-
memory/2764-101-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/2764-98-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2764-99-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/2872-81-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-59-0x0000000000570000-0x0000000000572000-memory.dmpFilesize
8KB
-
memory/2872-63-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-64-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-65-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-67-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-15-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-23-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-61-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-19-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-83-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-84-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-21-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-14-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-60-0x0000000000570000-0x0000000000572000-memory.dmpFilesize
8KB
-
memory/2872-62-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-17-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-18-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-103-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-104-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-105-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-108-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-147-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2872-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2872-148-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-20-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-41-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/2872-22-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB
-
memory/2872-16-0x00000000006F0000-0x00000000017AA000-memory.dmpFilesize
16.7MB