Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
aada959766d24edf8e193760580435b0_NeikiAnalytics.dll
Resource
win7-20240419-en
General
-
Target
aada959766d24edf8e193760580435b0_NeikiAnalytics.dll
-
Size
120KB
-
MD5
aada959766d24edf8e193760580435b0
-
SHA1
654f9d5e48a41655d8b3f5939cf8823c95c36e4c
-
SHA256
94f09fcb9d7f4606c51ccb7e414d83855f9569e7b7f39f8b7221e4e3d48117dc
-
SHA512
929aa4a1fbeb866c170a894f4b3fd4f3a7b8cffaa9c15db6b1548dd3e63eca2df5aa7bdac0af7675ee0f31420a242e4494cd40bb7680815b20c6da084b913b85
-
SSDEEP
3072:fjof1brr1qBQyiD9+7WR+nCx6PiEW9ZMUxIIJ:MNrsU+VnJPiEaiwII
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f76058c.exef762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76058c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76058c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f762146.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f762146.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f762146.exe -
Processes:
f76058c.exef762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762146.exe -
Processes:
f76058c.exef762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762146.exe -
Executes dropped EXE 3 IoCs
Processes:
f76058c.exef7606f3.exef762146.exepid process 1736 f76058c.exe 2712 f7606f3.exe 1728 f762146.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2496 rundll32.exe 2496 rundll32.exe 2496 rundll32.exe 2496 rundll32.exe 2496 rundll32.exe 2496 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/1736-14-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-16-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-18-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-17-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-21-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-19-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-13-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-22-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-20-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-15-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-60-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-61-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-62-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-64-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-63-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-66-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-67-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-81-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-83-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-85-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-103-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-104-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1736-146-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1728-165-0x0000000000A80000-0x0000000001B3A000-memory.dmp upx behavioral1/memory/1728-202-0x0000000000A80000-0x0000000001B3A000-memory.dmp upx -
Processes:
f76058c.exef762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76058c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76058c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762146.exe -
Processes:
f76058c.exef762146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76058c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762146.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f76058c.exef762146.exedescription ioc process File opened (read-only) \??\Q: f76058c.exe File opened (read-only) \??\S: f76058c.exe File opened (read-only) \??\E: f762146.exe File opened (read-only) \??\I: f76058c.exe File opened (read-only) \??\J: f76058c.exe File opened (read-only) \??\K: f76058c.exe File opened (read-only) \??\O: f76058c.exe File opened (read-only) \??\P: f76058c.exe File opened (read-only) \??\E: f76058c.exe File opened (read-only) \??\G: f76058c.exe File opened (read-only) \??\R: f76058c.exe File opened (read-only) \??\T: f76058c.exe File opened (read-only) \??\G: f762146.exe File opened (read-only) \??\H: f76058c.exe File opened (read-only) \??\L: f76058c.exe File opened (read-only) \??\M: f76058c.exe File opened (read-only) \??\N: f76058c.exe -
Drops file in Windows directory 3 IoCs
Processes:
f76058c.exef762146.exedescription ioc process File created C:\Windows\f7605ea f76058c.exe File opened for modification C:\Windows\SYSTEM.INI f76058c.exe File created C:\Windows\f76560c f762146.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f76058c.exef762146.exepid process 1736 f76058c.exe 1736 f76058c.exe 1728 f762146.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f76058c.exef762146.exedescription pid process Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1736 f76058c.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe Token: SeDebugPrivilege 1728 f762146.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef76058c.exef762146.exedescription pid process target process PID 1044 wrote to memory of 2496 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2496 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2496 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2496 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2496 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2496 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2496 1044 rundll32.exe rundll32.exe PID 2496 wrote to memory of 1736 2496 rundll32.exe f76058c.exe PID 2496 wrote to memory of 1736 2496 rundll32.exe f76058c.exe PID 2496 wrote to memory of 1736 2496 rundll32.exe f76058c.exe PID 2496 wrote to memory of 1736 2496 rundll32.exe f76058c.exe PID 1736 wrote to memory of 1100 1736 f76058c.exe taskhost.exe PID 1736 wrote to memory of 1164 1736 f76058c.exe Dwm.exe PID 1736 wrote to memory of 1200 1736 f76058c.exe Explorer.EXE PID 1736 wrote to memory of 1864 1736 f76058c.exe DllHost.exe PID 1736 wrote to memory of 1044 1736 f76058c.exe rundll32.exe PID 1736 wrote to memory of 2496 1736 f76058c.exe rundll32.exe PID 1736 wrote to memory of 2496 1736 f76058c.exe rundll32.exe PID 2496 wrote to memory of 2712 2496 rundll32.exe f7606f3.exe PID 2496 wrote to memory of 2712 2496 rundll32.exe f7606f3.exe PID 2496 wrote to memory of 2712 2496 rundll32.exe f7606f3.exe PID 2496 wrote to memory of 2712 2496 rundll32.exe f7606f3.exe PID 2496 wrote to memory of 1728 2496 rundll32.exe f762146.exe PID 2496 wrote to memory of 1728 2496 rundll32.exe f762146.exe PID 2496 wrote to memory of 1728 2496 rundll32.exe f762146.exe PID 2496 wrote to memory of 1728 2496 rundll32.exe f762146.exe PID 1736 wrote to memory of 1100 1736 f76058c.exe taskhost.exe PID 1736 wrote to memory of 1164 1736 f76058c.exe Dwm.exe PID 1736 wrote to memory of 1200 1736 f76058c.exe Explorer.EXE PID 1736 wrote to memory of 2712 1736 f76058c.exe f7606f3.exe PID 1736 wrote to memory of 2712 1736 f76058c.exe f7606f3.exe PID 1736 wrote to memory of 1728 1736 f76058c.exe f762146.exe PID 1736 wrote to memory of 1728 1736 f76058c.exe f762146.exe PID 1728 wrote to memory of 1100 1728 f762146.exe taskhost.exe PID 1728 wrote to memory of 1164 1728 f762146.exe Dwm.exe PID 1728 wrote to memory of 1200 1728 f762146.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f762146.exef76058c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76058c.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aada959766d24edf8e193760580435b0_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aada959766d24edf8e193760580435b0_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f76058c.exeC:\Users\Admin\AppData\Local\Temp\f76058c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f7606f3.exeC:\Users\Admin\AppData\Local\Temp\f7606f3.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f762146.exeC:\Users\Admin\AppData\Local\Temp\f762146.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
256B
MD57684b00ab6caa0a4303abf4fbb358253
SHA187c6736ebe1531b7411f5b9752337efe8f7ed6c0
SHA2565c8340db603296a5acfcf421816b1a35cc035f0b75ce3ebdd822243278620806
SHA5127632cdb5340b7e31331825c6573ed697f452d6c0b6649dd70db86dc3e8ed831cd6358c43986c245cd4b354cbdd76e476dc8ad71fba8076eebabe4ecb707a69ea
-
\Users\Admin\AppData\Local\Temp\f76058c.exeFilesize
97KB
MD55f78a24779147a601cac764ea098f00a
SHA1053b281ec7e4b05065d6d26ea7beac748712aa67
SHA2561206327027d767a59c6fca746c75e6035b5eb91abdd239e05d77c26a58b36d87
SHA512a16fd4584a7d5cdedeb753cd2615de5aaf62b7f35cfff43eb9f49a5079f2479a1c8a018d561563d443fc976a6f0b45aa2dd762162ae4bb05c11347abab48e4fe
-
memory/1100-28-0x00000000002E0000-0x00000000002E2000-memory.dmpFilesize
8KB
-
memory/1728-201-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1728-202-0x0000000000A80000-0x0000000001B3A000-memory.dmpFilesize
16.7MB
-
memory/1728-165-0x0000000000A80000-0x0000000001B3A000-memory.dmpFilesize
16.7MB
-
memory/1728-102-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/1728-99-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1728-100-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/1728-80-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-62-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-46-0x0000000000520000-0x0000000000521000-memory.dmpFilesize
4KB
-
memory/1736-21-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-10-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-14-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-16-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-146-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-147-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-48-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/1736-19-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-13-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-22-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-20-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-15-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-60-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-61-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-121-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/1736-64-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-63-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-66-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-67-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-104-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-103-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-18-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-81-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-83-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-85-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/1736-17-0x0000000000640000-0x00000000016FA000-memory.dmpFilesize
16.7MB
-
memory/2496-45-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2496-55-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/2496-9-0x00000000001F0000-0x0000000000202000-memory.dmpFilesize
72KB
-
memory/2496-75-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/2496-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2496-78-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/2496-37-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2496-36-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/2496-58-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/2496-57-0x0000000000240000-0x0000000000252000-memory.dmpFilesize
72KB
-
memory/2712-101-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2712-151-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2712-95-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2712-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2712-94-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB