Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
aada959766d24edf8e193760580435b0_NeikiAnalytics.dll
Resource
win7-20240419-en
General
-
Target
aada959766d24edf8e193760580435b0_NeikiAnalytics.dll
-
Size
120KB
-
MD5
aada959766d24edf8e193760580435b0
-
SHA1
654f9d5e48a41655d8b3f5939cf8823c95c36e4c
-
SHA256
94f09fcb9d7f4606c51ccb7e414d83855f9569e7b7f39f8b7221e4e3d48117dc
-
SHA512
929aa4a1fbeb866c170a894f4b3fd4f3a7b8cffaa9c15db6b1548dd3e63eca2df5aa7bdac0af7675ee0f31420a242e4494cd40bb7680815b20c6da084b913b85
-
SSDEEP
3072:fjof1brr1qBQyiD9+7WR+nCx6PiEW9ZMUxIIJ:MNrsU+VnJPiEaiwII
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
e575e6c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e575e6c.exe -
Processes:
e575e6c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575e6c.exe -
Processes:
e575e6c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575e6c.exe -
Executes dropped EXE 3 IoCs
Processes:
e575e6c.exee575fd3.exee578722.exepid process 2136 e575e6c.exe 2020 e575fd3.exe 5060 e578722.exe -
Processes:
resource yara_rule behavioral2/memory/2136-8-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-10-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-12-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-20-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-18-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-13-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-19-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-11-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-9-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-30-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-36-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-37-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-38-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-39-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-40-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-59-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-60-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-62-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-64-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-65-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-66-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-69-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-71-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-74-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-75-0x0000000000840000-0x00000000018FA000-memory.dmp upx behavioral2/memory/2136-79-0x0000000000840000-0x00000000018FA000-memory.dmp upx -
Processes:
e575e6c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e575e6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e575e6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e575e6c.exe -
Processes:
e575e6c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575e6c.exe -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e575e6c.exedescription ioc process File opened (read-only) \??\H: e575e6c.exe File opened (read-only) \??\I: e575e6c.exe File opened (read-only) \??\J: e575e6c.exe File opened (read-only) \??\L: e575e6c.exe File opened (read-only) \??\M: e575e6c.exe File opened (read-only) \??\N: e575e6c.exe File opened (read-only) \??\E: e575e6c.exe File opened (read-only) \??\K: e575e6c.exe File opened (read-only) \??\O: e575e6c.exe File opened (read-only) \??\G: e575e6c.exe -
Drops file in Program Files directory 3 IoCs
Processes:
e575e6c.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe e575e6c.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e575e6c.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e575e6c.exe -
Drops file in Windows directory 2 IoCs
Processes:
e575e6c.exedescription ioc process File created C:\Windows\e575eaa e575e6c.exe File opened for modification C:\Windows\SYSTEM.INI e575e6c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e575e6c.exepid process 2136 e575e6c.exe 2136 e575e6c.exe 2136 e575e6c.exe 2136 e575e6c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
e575e6c.exedescription pid process Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe Token: SeDebugPrivilege 2136 e575e6c.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
rundll32.exerundll32.exee575e6c.exedescription pid process target process PID 4584 wrote to memory of 512 4584 rundll32.exe rundll32.exe PID 4584 wrote to memory of 512 4584 rundll32.exe rundll32.exe PID 4584 wrote to memory of 512 4584 rundll32.exe rundll32.exe PID 512 wrote to memory of 2136 512 rundll32.exe e575e6c.exe PID 512 wrote to memory of 2136 512 rundll32.exe e575e6c.exe PID 512 wrote to memory of 2136 512 rundll32.exe e575e6c.exe PID 2136 wrote to memory of 784 2136 e575e6c.exe fontdrvhost.exe PID 2136 wrote to memory of 792 2136 e575e6c.exe fontdrvhost.exe PID 2136 wrote to memory of 388 2136 e575e6c.exe dwm.exe PID 2136 wrote to memory of 2452 2136 e575e6c.exe sihost.exe PID 2136 wrote to memory of 2464 2136 e575e6c.exe svchost.exe PID 2136 wrote to memory of 2632 2136 e575e6c.exe taskhostw.exe PID 2136 wrote to memory of 3388 2136 e575e6c.exe Explorer.EXE PID 2136 wrote to memory of 3596 2136 e575e6c.exe svchost.exe PID 2136 wrote to memory of 3852 2136 e575e6c.exe DllHost.exe PID 2136 wrote to memory of 3992 2136 e575e6c.exe StartMenuExperienceHost.exe PID 2136 wrote to memory of 4056 2136 e575e6c.exe RuntimeBroker.exe PID 2136 wrote to memory of 2676 2136 e575e6c.exe SearchApp.exe PID 2136 wrote to memory of 4140 2136 e575e6c.exe RuntimeBroker.exe PID 2136 wrote to memory of 4456 2136 e575e6c.exe RuntimeBroker.exe PID 2136 wrote to memory of 804 2136 e575e6c.exe TextInputHost.exe PID 2136 wrote to memory of 4584 2136 e575e6c.exe rundll32.exe PID 2136 wrote to memory of 512 2136 e575e6c.exe rundll32.exe PID 2136 wrote to memory of 512 2136 e575e6c.exe rundll32.exe PID 512 wrote to memory of 2020 512 rundll32.exe e575fd3.exe PID 512 wrote to memory of 2020 512 rundll32.exe e575fd3.exe PID 512 wrote to memory of 2020 512 rundll32.exe e575fd3.exe PID 512 wrote to memory of 5060 512 rundll32.exe e578722.exe PID 512 wrote to memory of 5060 512 rundll32.exe e578722.exe PID 512 wrote to memory of 5060 512 rundll32.exe e578722.exe PID 2136 wrote to memory of 784 2136 e575e6c.exe fontdrvhost.exe PID 2136 wrote to memory of 792 2136 e575e6c.exe fontdrvhost.exe PID 2136 wrote to memory of 388 2136 e575e6c.exe dwm.exe PID 2136 wrote to memory of 2452 2136 e575e6c.exe sihost.exe PID 2136 wrote to memory of 2464 2136 e575e6c.exe svchost.exe PID 2136 wrote to memory of 2632 2136 e575e6c.exe taskhostw.exe PID 2136 wrote to memory of 3388 2136 e575e6c.exe Explorer.EXE PID 2136 wrote to memory of 3596 2136 e575e6c.exe svchost.exe PID 2136 wrote to memory of 3852 2136 e575e6c.exe DllHost.exe PID 2136 wrote to memory of 3992 2136 e575e6c.exe StartMenuExperienceHost.exe PID 2136 wrote to memory of 4056 2136 e575e6c.exe RuntimeBroker.exe PID 2136 wrote to memory of 2676 2136 e575e6c.exe SearchApp.exe PID 2136 wrote to memory of 4140 2136 e575e6c.exe RuntimeBroker.exe PID 2136 wrote to memory of 4456 2136 e575e6c.exe RuntimeBroker.exe PID 2136 wrote to memory of 804 2136 e575e6c.exe TextInputHost.exe PID 2136 wrote to memory of 4584 2136 e575e6c.exe rundll32.exe PID 2136 wrote to memory of 2020 2136 e575e6c.exe e575fd3.exe PID 2136 wrote to memory of 2020 2136 e575e6c.exe e575fd3.exe PID 2136 wrote to memory of 5060 2136 e575e6c.exe e578722.exe PID 2136 wrote to memory of 5060 2136 e575e6c.exe e578722.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
e575e6c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e575e6c.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aada959766d24edf8e193760580435b0_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aada959766d24edf8e193760580435b0_NeikiAnalytics.dll,#13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e575e6c.exeC:\Users\Admin\AppData\Local\Temp\e575e6c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\e575fd3.exeC:\Users\Admin\AppData\Local\Temp\e575fd3.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e578722.exeC:\Users\Admin\AppData\Local\Temp\e578722.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e575e6c.exeFilesize
97KB
MD55f78a24779147a601cac764ea098f00a
SHA1053b281ec7e4b05065d6d26ea7beac748712aa67
SHA2561206327027d767a59c6fca746c75e6035b5eb91abdd239e05d77c26a58b36d87
SHA512a16fd4584a7d5cdedeb753cd2615de5aaf62b7f35cfff43eb9f49a5079f2479a1c8a018d561563d443fc976a6f0b45aa2dd762162ae4bb05c11347abab48e4fe
-
memory/512-21-0x0000000001150000-0x0000000001152000-memory.dmpFilesize
8KB
-
memory/512-3-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/512-45-0x0000000001150000-0x0000000001152000-memory.dmpFilesize
8KB
-
memory/512-14-0x0000000001150000-0x0000000001152000-memory.dmpFilesize
8KB
-
memory/512-33-0x0000000001150000-0x0000000001152000-memory.dmpFilesize
8KB
-
memory/512-15-0x00000000011E0000-0x00000000011E1000-memory.dmpFilesize
4KB
-
memory/2020-98-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2020-56-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2020-51-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2020-54-0x00000000001E0000-0x00000000001E2000-memory.dmpFilesize
8KB
-
memory/2020-35-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2136-39-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-69-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-19-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-11-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-9-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-17-0x0000000003FB0000-0x0000000003FB1000-memory.dmpFilesize
4KB
-
memory/2136-18-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-34-0x0000000003520000-0x0000000003522000-memory.dmpFilesize
8KB
-
memory/2136-30-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-36-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-37-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-38-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-4-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2136-40-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-20-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-8-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-79-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-23-0x0000000003520000-0x0000000003522000-memory.dmpFilesize
8KB
-
memory/2136-12-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-94-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2136-82-0x0000000003520000-0x0000000003522000-memory.dmpFilesize
8KB
-
memory/2136-10-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-59-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-60-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-62-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-64-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-65-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-66-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-13-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-71-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-74-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/2136-75-0x0000000000840000-0x00000000018FA000-memory.dmpFilesize
16.7MB
-
memory/5060-57-0x00000000001C0000-0x00000000001C2000-memory.dmpFilesize
8KB
-
memory/5060-49-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5060-55-0x00000000001C0000-0x00000000001C2000-memory.dmpFilesize
8KB
-
memory/5060-53-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/5060-102-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB