Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
862c887e24b533c22fa126f1e9c3b400_NeikiAnalytics.dll
Resource
win7-20240221-en
General
-
Target
862c887e24b533c22fa126f1e9c3b400_NeikiAnalytics.dll
-
Size
120KB
-
MD5
862c887e24b533c22fa126f1e9c3b400
-
SHA1
5a296016452b31f643ec127b745253e35973759f
-
SHA256
21f43010db740c67226fd3200e0ab0f42dc7c00a3bc841fe799076acf443ad89
-
SHA512
7b43c326bdd38c02ca734cc70a5d671f5d0b4b966b7d4f164d5e10e303387367459ebd855ed1de2dc77cfcdfe57eaf3c12b247203892b4f672172e4e02467f5d
-
SSDEEP
3072:kOD+x/dlsq+hy1xQH2CH3NYmZghzlqe6/tERJhz:kODidlL9QW88lbRT
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f7623f5.exef764846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f764846.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f764846.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f764846.exe -
Processes:
f7623f5.exef764846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f764846.exe -
Processes:
f764846.exef7623f5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7623f5.exe -
Executes dropped EXE 3 IoCs
Processes:
f7623f5.exef7625d8.exef764846.exepid process 2404 f7623f5.exe 2584 f7625d8.exe 2776 f764846.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2336 rundll32.exe 2336 rundll32.exe 2336 rundll32.exe 2336 rundll32.exe 2336 rundll32.exe 2336 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2404-19-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-15-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-22-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-26-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-24-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-23-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-21-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-20-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-18-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-17-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-25-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-57-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-56-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-66-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-67-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-68-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-70-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-71-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-72-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-73-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-75-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-90-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-100-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-127-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2404-163-0x00000000006C0000-0x000000000177A000-memory.dmp upx behavioral1/memory/2776-175-0x0000000000930000-0x00000000019EA000-memory.dmp upx behavioral1/memory/2776-222-0x0000000000930000-0x00000000019EA000-memory.dmp upx -
Processes:
f7623f5.exef764846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7623f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7623f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f764846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f764846.exe -
Processes:
f7623f5.exef764846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f764846.exe -
Enumerates connected drives 3 TTPs 19 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f7623f5.exef764846.exedescription ioc process File opened (read-only) \??\K: f7623f5.exe File opened (read-only) \??\P: f7623f5.exe File opened (read-only) \??\R: f7623f5.exe File opened (read-only) \??\T: f7623f5.exe File opened (read-only) \??\I: f764846.exe File opened (read-only) \??\E: f7623f5.exe File opened (read-only) \??\G: f7623f5.exe File opened (read-only) \??\E: f764846.exe File opened (read-only) \??\N: f7623f5.exe File opened (read-only) \??\O: f7623f5.exe File opened (read-only) \??\G: f764846.exe File opened (read-only) \??\J: f7623f5.exe File opened (read-only) \??\L: f7623f5.exe File opened (read-only) \??\M: f7623f5.exe File opened (read-only) \??\Q: f7623f5.exe File opened (read-only) \??\S: f7623f5.exe File opened (read-only) \??\H: f764846.exe File opened (read-only) \??\H: f7623f5.exe File opened (read-only) \??\I: f7623f5.exe -
Drops file in Windows directory 3 IoCs
Processes:
f7623f5.exef764846.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI f7623f5.exe File created C:\Windows\f76755f f764846.exe File created C:\Windows\f762481 f7623f5.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f7623f5.exef764846.exepid process 2404 f7623f5.exe 2404 f7623f5.exe 2776 f764846.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f7623f5.exef764846.exedescription pid process Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2404 f7623f5.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe Token: SeDebugPrivilege 2776 f764846.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef7623f5.exef764846.exedescription pid process target process PID 2752 wrote to memory of 2336 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2336 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2336 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2336 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2336 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2336 2752 rundll32.exe rundll32.exe PID 2752 wrote to memory of 2336 2752 rundll32.exe rundll32.exe PID 2336 wrote to memory of 2404 2336 rundll32.exe f7623f5.exe PID 2336 wrote to memory of 2404 2336 rundll32.exe f7623f5.exe PID 2336 wrote to memory of 2404 2336 rundll32.exe f7623f5.exe PID 2336 wrote to memory of 2404 2336 rundll32.exe f7623f5.exe PID 2404 wrote to memory of 1116 2404 f7623f5.exe taskhost.exe PID 2404 wrote to memory of 1172 2404 f7623f5.exe Dwm.exe PID 2404 wrote to memory of 1200 2404 f7623f5.exe Explorer.EXE PID 2404 wrote to memory of 1964 2404 f7623f5.exe DllHost.exe PID 2404 wrote to memory of 2752 2404 f7623f5.exe rundll32.exe PID 2404 wrote to memory of 2336 2404 f7623f5.exe rundll32.exe PID 2404 wrote to memory of 2336 2404 f7623f5.exe rundll32.exe PID 2336 wrote to memory of 2584 2336 rundll32.exe f7625d8.exe PID 2336 wrote to memory of 2584 2336 rundll32.exe f7625d8.exe PID 2336 wrote to memory of 2584 2336 rundll32.exe f7625d8.exe PID 2336 wrote to memory of 2584 2336 rundll32.exe f7625d8.exe PID 2336 wrote to memory of 2776 2336 rundll32.exe f764846.exe PID 2336 wrote to memory of 2776 2336 rundll32.exe f764846.exe PID 2336 wrote to memory of 2776 2336 rundll32.exe f764846.exe PID 2336 wrote to memory of 2776 2336 rundll32.exe f764846.exe PID 2404 wrote to memory of 1116 2404 f7623f5.exe taskhost.exe PID 2404 wrote to memory of 1172 2404 f7623f5.exe Dwm.exe PID 2404 wrote to memory of 1200 2404 f7623f5.exe Explorer.EXE PID 2404 wrote to memory of 2584 2404 f7623f5.exe f7625d8.exe PID 2404 wrote to memory of 2584 2404 f7623f5.exe f7625d8.exe PID 2404 wrote to memory of 2776 2404 f7623f5.exe f764846.exe PID 2404 wrote to memory of 2776 2404 f7623f5.exe f764846.exe PID 2776 wrote to memory of 1116 2776 f764846.exe taskhost.exe PID 2776 wrote to memory of 1172 2776 f764846.exe Dwm.exe PID 2776 wrote to memory of 1200 2776 f764846.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f7623f5.exef764846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7623f5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f764846.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\862c887e24b533c22fa126f1e9c3b400_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\862c887e24b533c22fa126f1e9c3b400_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f7623f5.exeC:\Users\Admin\AppData\Local\Temp\f7623f5.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f7625d8.exeC:\Users\Admin\AppData\Local\Temp\f7625d8.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f764846.exeC:\Users\Admin\AppData\Local\Temp\f764846.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f7623f5.exeFilesize
97KB
MD5901b9c139880852fa647ba07ca29e913
SHA10af1cf802875f64944964533fca60fc4ce452953
SHA256a63487925ac935443e113a4d42d3bee9a62ff22afa7ed66cd8867398e05648f5
SHA51283ffdc3cff2373a10212990cfd215900fa46d5965a7808343d13c27f845fa87961a3a64123a7be44619f486b3809256ad29bc32526743fdef16f748deb402bbe
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5d6b56c0d08e9a565e76f36f49fe950dd
SHA16faafa557cde4d041ec2338ddef2aa4c361b705f
SHA256bded5927579a7128634f8961b9ae1adb0d833af2e3aa960da54ab9aba90a6c9f
SHA51296309941b4fd893c8fe58319b228ad133c806f11990b22bc202e5f7d0559783cbdff0642bd589bb90522993d76e901ee3dfd46511bbfb0860b579a643ea33c8a
-
memory/1116-32-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2336-63-0x0000000000230000-0x0000000000242000-memory.dmpFilesize
72KB
-
memory/2336-40-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/2336-3-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2336-13-0x0000000000180000-0x0000000000192000-memory.dmpFilesize
72KB
-
memory/2336-12-0x0000000000180000-0x0000000000192000-memory.dmpFilesize
72KB
-
memory/2336-2-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2336-62-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/2336-87-0x0000000000180000-0x0000000000182000-memory.dmpFilesize
8KB
-
memory/2336-0-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2336-64-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/2336-55-0x0000000000230000-0x0000000000242000-memory.dmpFilesize
72KB
-
memory/2336-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2336-43-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/2336-41-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/2404-100-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-71-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-26-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-24-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-23-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-21-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-20-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-18-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-17-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-25-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-57-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-51-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/2404-14-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2404-19-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-49-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/2404-66-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-67-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-68-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-70-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-52-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/2404-72-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-73-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-75-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-15-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-22-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-90-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-162-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2404-163-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-139-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/2404-127-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2404-56-0x00000000006C0000-0x000000000177A000-memory.dmpFilesize
16.7MB
-
memory/2584-113-0x0000000000270000-0x0000000000272000-memory.dmpFilesize
8KB
-
memory/2584-103-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2584-192-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2776-112-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2776-114-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2776-88-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2776-175-0x0000000000930000-0x00000000019EA000-memory.dmpFilesize
16.7MB
-
memory/2776-222-0x0000000000930000-0x00000000019EA000-memory.dmpFilesize
16.7MB
-
memory/2776-221-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB