Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
776b10a023d300f6f129459cd84f08a0_NeikiAnalytics.dll
Resource
win7-20240508-en
General
-
Target
776b10a023d300f6f129459cd84f08a0_NeikiAnalytics.dll
-
Size
120KB
-
MD5
776b10a023d300f6f129459cd84f08a0
-
SHA1
a91fea3dc600b2058d97c1f14eb6ff1e1f1812bd
-
SHA256
4ab14a8c61755a132fdf1a913b06d38e58a5c8f37764d4a6faafe861d6471e0a
-
SHA512
22547c20ddbf927f8267eb55cbb72db8dd05a2b6e4dc860e42f1c8386953d28376816ec64cad33937fd0b984d227f9790c05596af10d607505ba5ab287760866
-
SSDEEP
3072:MqynuJTHe6nwN+AnvgC2VpamgPaJs4yb1p:Mqyc+q/XPpGevy
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f761d50.exef761ef6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f761d50.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f761d50.exe -
Processes:
f761d50.exef761ef6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761ef6.exe -
Processes:
f761d50.exef761ef6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761ef6.exe -
Executes dropped EXE 3 IoCs
Processes:
f761d50.exef761ef6.exef76390a.exepid process 2656 f761d50.exe 2456 f761ef6.exe 2120 f76390a.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 1852 rundll32.exe 1852 rundll32.exe 1852 rundll32.exe 1852 rundll32.exe 1852 rundll32.exe 1852 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2656-13-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-18-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-20-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-22-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-21-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-17-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-23-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-16-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-15-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-19-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-63-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-62-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-64-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-66-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-65-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-68-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-69-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-82-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-84-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-86-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-104-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-106-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2656-147-0x00000000005B0000-0x000000000166A000-memory.dmp upx behavioral1/memory/2456-160-0x0000000000A80000-0x0000000001B3A000-memory.dmp upx behavioral1/memory/2456-182-0x0000000000A80000-0x0000000001B3A000-memory.dmp upx -
Processes:
f761ef6.exef761d50.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f761ef6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761ef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761d50.exe -
Processes:
f761d50.exef761ef6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761ef6.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f761d50.exedescription ioc process File opened (read-only) \??\L: f761d50.exe File opened (read-only) \??\T: f761d50.exe File opened (read-only) \??\E: f761d50.exe File opened (read-only) \??\J: f761d50.exe File opened (read-only) \??\N: f761d50.exe File opened (read-only) \??\P: f761d50.exe File opened (read-only) \??\M: f761d50.exe File opened (read-only) \??\S: f761d50.exe File opened (read-only) \??\H: f761d50.exe File opened (read-only) \??\I: f761d50.exe File opened (read-only) \??\O: f761d50.exe File opened (read-only) \??\Q: f761d50.exe File opened (read-only) \??\R: f761d50.exe File opened (read-only) \??\G: f761d50.exe File opened (read-only) \??\K: f761d50.exe -
Drops file in Windows directory 3 IoCs
Processes:
f761d50.exef761ef6.exedescription ioc process File created C:\Windows\f761dcd f761d50.exe File opened for modification C:\Windows\SYSTEM.INI f761d50.exe File created C:\Windows\f766d63 f761ef6.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f761d50.exef761ef6.exepid process 2656 f761d50.exe 2656 f761d50.exe 2456 f761ef6.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f761d50.exef761ef6.exedescription pid process Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2656 f761d50.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe Token: SeDebugPrivilege 2456 f761ef6.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef761d50.exef761ef6.exedescription pid process target process PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1852 wrote to memory of 2656 1852 rundll32.exe f761d50.exe PID 1852 wrote to memory of 2656 1852 rundll32.exe f761d50.exe PID 1852 wrote to memory of 2656 1852 rundll32.exe f761d50.exe PID 1852 wrote to memory of 2656 1852 rundll32.exe f761d50.exe PID 2656 wrote to memory of 1040 2656 f761d50.exe taskhost.exe PID 2656 wrote to memory of 1148 2656 f761d50.exe Dwm.exe PID 2656 wrote to memory of 1192 2656 f761d50.exe Explorer.EXE PID 2656 wrote to memory of 2376 2656 f761d50.exe DllHost.exe PID 2656 wrote to memory of 1904 2656 f761d50.exe rundll32.exe PID 2656 wrote to memory of 1852 2656 f761d50.exe rundll32.exe PID 2656 wrote to memory of 1852 2656 f761d50.exe rundll32.exe PID 1852 wrote to memory of 2456 1852 rundll32.exe f761ef6.exe PID 1852 wrote to memory of 2456 1852 rundll32.exe f761ef6.exe PID 1852 wrote to memory of 2456 1852 rundll32.exe f761ef6.exe PID 1852 wrote to memory of 2456 1852 rundll32.exe f761ef6.exe PID 1852 wrote to memory of 2120 1852 rundll32.exe f76390a.exe PID 1852 wrote to memory of 2120 1852 rundll32.exe f76390a.exe PID 1852 wrote to memory of 2120 1852 rundll32.exe f76390a.exe PID 1852 wrote to memory of 2120 1852 rundll32.exe f76390a.exe PID 2656 wrote to memory of 1040 2656 f761d50.exe taskhost.exe PID 2656 wrote to memory of 1148 2656 f761d50.exe Dwm.exe PID 2656 wrote to memory of 1192 2656 f761d50.exe Explorer.EXE PID 2656 wrote to memory of 2456 2656 f761d50.exe f761ef6.exe PID 2656 wrote to memory of 2456 2656 f761d50.exe f761ef6.exe PID 2656 wrote to memory of 2120 2656 f761d50.exe f76390a.exe PID 2656 wrote to memory of 2120 2656 f761d50.exe f76390a.exe PID 2456 wrote to memory of 1040 2456 f761ef6.exe taskhost.exe PID 2456 wrote to memory of 1148 2456 f761ef6.exe Dwm.exe PID 2456 wrote to memory of 1192 2456 f761ef6.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f761d50.exef761ef6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761d50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761ef6.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\776b10a023d300f6f129459cd84f08a0_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\776b10a023d300f6f129459cd84f08a0_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f761d50.exeC:\Users\Admin\AppData\Local\Temp\f761d50.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f761ef6.exeC:\Users\Admin\AppData\Local\Temp\f761ef6.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f76390a.exeC:\Users\Admin\AppData\Local\Temp\f76390a.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
256B
MD59fc7dfd3c0e5fc0a5b9a8e2f14cbbd8a
SHA13df46da92812847136da0121657de7532f8d7bd8
SHA25642742fc223e240493a6ab4b4bec8f61ccb4c4fa686c247b6c68a9683ca8f6819
SHA512ec29b01827c9a1ff1e5dcf737938ee346d2002dd9745df91318242ef1e3ffadbfb414cd073dad7f7a6c3275dcf7ba91f237b9d9cb8606cfc05b508f46d31d617
-
\Users\Admin\AppData\Local\Temp\f761d50.exeFilesize
97KB
MD59ea8570363df5fcb6526430d26daefb2
SHA1f50e4a0f11f222a597952a3beff37dfc147687f9
SHA2565bdff8f11396093c9ed82c9d6d9a8f005385fa002b495dd458b9962e49019f20
SHA51239f05a20b7e645281e7df1df511a8bb063decb7e0fcdf725f45f7c539058c43f03b39baaed16f3258bf7ca70d207a2454ab0f61938b8cf27b733a39327a21533
-
memory/1040-24-0x00000000021B0000-0x00000000021B2000-memory.dmpFilesize
8KB
-
memory/1852-0-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/1852-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1852-10-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1852-57-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1852-2-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/1852-31-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1852-32-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1852-41-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1852-55-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1852-59-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1852-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2120-100-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2120-81-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2120-186-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2120-103-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2120-101-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2456-181-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2456-182-0x0000000000A80000-0x0000000001B3A000-memory.dmpFilesize
16.7MB
-
memory/2456-160-0x0000000000A80000-0x0000000001B3A000-memory.dmpFilesize
16.7MB
-
memory/2456-102-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/2456-93-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2456-94-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/2656-16-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-13-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-63-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-62-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-64-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-66-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-65-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-68-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-69-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-15-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-82-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-84-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-86-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-56-0x0000000000470000-0x0000000000472000-memory.dmpFilesize
8KB
-
memory/2656-18-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-19-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-20-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-23-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-22-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-104-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-106-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-122-0x0000000000470000-0x0000000000472000-memory.dmpFilesize
8KB
-
memory/2656-147-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-148-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2656-12-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2656-43-0x0000000000480000-0x0000000000481000-memory.dmpFilesize
4KB
-
memory/2656-17-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-21-0x00000000005B0000-0x000000000166A000-memory.dmpFilesize
16.7MB
-
memory/2656-60-0x0000000000470000-0x0000000000472000-memory.dmpFilesize
8KB