Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
a56de2fb2d9303f10fbc3a8c7b377e80_NeikiAnalytics.dll
Resource
win7-20240611-en
General
-
Target
a56de2fb2d9303f10fbc3a8c7b377e80_NeikiAnalytics.dll
-
Size
120KB
-
MD5
a56de2fb2d9303f10fbc3a8c7b377e80
-
SHA1
6e32a8495f54fd7dc93eff43a3789a41dc3aa1b8
-
SHA256
3260b196ac825355fc18daf4364fc7814110a44540783aa535e89c13e1a0ebaf
-
SHA512
d44fbd10a3fdaf934f5acfee093f5f0f86cdcc2d1cca9535695c1e636c6328bf78989cc41b3bed03c786e3afb9d4d77c5871cf8ebc233fb1b5b818efa3668b1a
-
SSDEEP
1536:MnZXtYuhcVAPx+wP4JMBDQV93Jon93N0AiVComHbszJanjFl636BIZmYo:Y1tYkc+J+wlK5A9+y7BjK3FZm
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
f761c28.exef763ca3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f761c28.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f761c28.exe -
Processes:
f761c28.exef763ca3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f763ca3.exe -
Processes:
f761c28.exef763ca3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f763ca3.exe -
Executes dropped EXE 3 IoCs
Processes:
f761c28.exef761d9e.exef763ca3.exepid process 2180 f761c28.exe 2716 f761d9e.exe 2896 f763ca3.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2180-12-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-20-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-21-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-16-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-15-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-22-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-23-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-19-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-18-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-17-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-59-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-60-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-65-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-66-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-69-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-70-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-71-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-72-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-88-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2180-89-0x00000000006A0000-0x000000000175A000-memory.dmp upx behavioral1/memory/2896-160-0x0000000000950000-0x0000000001A0A000-memory.dmp upx behavioral1/memory/2896-204-0x0000000000950000-0x0000000001A0A000-memory.dmp upx -
Processes:
f761c28.exef763ca3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f763ca3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f763ca3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f763ca3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f761c28.exe -
Processes:
f761c28.exef763ca3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f763ca3.exe -
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f761c28.exef763ca3.exedescription ioc process File opened (read-only) \??\R: f761c28.exe File opened (read-only) \??\S: f761c28.exe File opened (read-only) \??\H: f761c28.exe File opened (read-only) \??\K: f761c28.exe File opened (read-only) \??\L: f761c28.exe File opened (read-only) \??\Q: f761c28.exe File opened (read-only) \??\I: f761c28.exe File opened (read-only) \??\J: f761c28.exe File opened (read-only) \??\N: f761c28.exe File opened (read-only) \??\P: f761c28.exe File opened (read-only) \??\T: f761c28.exe File opened (read-only) \??\E: f763ca3.exe File opened (read-only) \??\G: f763ca3.exe File opened (read-only) \??\H: f763ca3.exe File opened (read-only) \??\E: f761c28.exe File opened (read-only) \??\G: f761c28.exe File opened (read-only) \??\M: f761c28.exe File opened (read-only) \??\O: f761c28.exe -
Drops file in Windows directory 3 IoCs
Processes:
f761c28.exef763ca3.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI f761c28.exe File created C:\Windows\f766c5a f763ca3.exe File created C:\Windows\f761c76 f761c28.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f761c28.exef763ca3.exepid process 2180 f761c28.exe 2180 f761c28.exe 2896 f763ca3.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f761c28.exef763ca3.exedescription pid process Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2180 f761c28.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe Token: SeDebugPrivilege 2896 f763ca3.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef761c28.exef763ca3.exedescription pid process target process PID 2480 wrote to memory of 2264 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2264 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2264 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2264 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2264 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2264 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 2264 2480 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2180 2264 rundll32.exe f761c28.exe PID 2264 wrote to memory of 2180 2264 rundll32.exe f761c28.exe PID 2264 wrote to memory of 2180 2264 rundll32.exe f761c28.exe PID 2264 wrote to memory of 2180 2264 rundll32.exe f761c28.exe PID 2180 wrote to memory of 1284 2180 f761c28.exe taskhost.exe PID 2180 wrote to memory of 1356 2180 f761c28.exe Dwm.exe PID 2180 wrote to memory of 1392 2180 f761c28.exe Explorer.EXE PID 2180 wrote to memory of 2032 2180 f761c28.exe DllHost.exe PID 2180 wrote to memory of 2480 2180 f761c28.exe rundll32.exe PID 2180 wrote to memory of 2264 2180 f761c28.exe rundll32.exe PID 2180 wrote to memory of 2264 2180 f761c28.exe rundll32.exe PID 2264 wrote to memory of 2716 2264 rundll32.exe f761d9e.exe PID 2264 wrote to memory of 2716 2264 rundll32.exe f761d9e.exe PID 2264 wrote to memory of 2716 2264 rundll32.exe f761d9e.exe PID 2264 wrote to memory of 2716 2264 rundll32.exe f761d9e.exe PID 2264 wrote to memory of 2896 2264 rundll32.exe f763ca3.exe PID 2264 wrote to memory of 2896 2264 rundll32.exe f763ca3.exe PID 2264 wrote to memory of 2896 2264 rundll32.exe f763ca3.exe PID 2264 wrote to memory of 2896 2264 rundll32.exe f763ca3.exe PID 2180 wrote to memory of 1284 2180 f761c28.exe taskhost.exe PID 2180 wrote to memory of 1356 2180 f761c28.exe Dwm.exe PID 2180 wrote to memory of 1392 2180 f761c28.exe Explorer.EXE PID 2180 wrote to memory of 2716 2180 f761c28.exe f761d9e.exe PID 2180 wrote to memory of 2716 2180 f761c28.exe f761d9e.exe PID 2180 wrote to memory of 2896 2180 f761c28.exe f763ca3.exe PID 2180 wrote to memory of 2896 2180 f761c28.exe f763ca3.exe PID 2896 wrote to memory of 1284 2896 f763ca3.exe taskhost.exe PID 2896 wrote to memory of 1356 2896 f763ca3.exe Dwm.exe PID 2896 wrote to memory of 1392 2896 f763ca3.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f761c28.exef763ca3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f761c28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f763ca3.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a56de2fb2d9303f10fbc3a8c7b377e80_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a56de2fb2d9303f10fbc3a8c7b377e80_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f761c28.exeC:\Users\Admin\AppData\Local\Temp\f761c28.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f761d9e.exeC:\Users\Admin\AppData\Local\Temp\f761d9e.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f763ca3.exeC:\Users\Admin\AppData\Local\Temp\f763ca3.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
257B
MD51591e1e6ee4dcf817c1d589491b8be41
SHA1106611eadc09677de1f24bf745c698b468d42621
SHA256ee4df479d775fa565940ec3f94503b3ff56913728160a9e17b8b5602107ddb0e
SHA512dafeb4e8f6a6a2abebfb47a4e348315709ecb9fd14cff8c3c99327c0f68dce8ae4063b49292091d4a3155d982ad4613ba0bf8f5f715424a95258e79f622d4bad
-
\Users\Admin\AppData\Local\Temp\f761c28.exeFilesize
97KB
MD5a023f93ff35f19c330b03d1607ae4ebc
SHA11f81c7767a772467237be96205716662381405aa
SHA256b75a87dec85f1f65389969923c931a8ef265553e33ce240e664c0d3baa3c398f
SHA51207255ed31bbd217575c4479a4f1308b5366007e46c154b0602cffb54bf3f7025ea1715cc1fc3e5ba99d08a8eac2a3a16183d63b43351771494d78aa80ed37db9
-
memory/1284-25-0x0000000000310000-0x0000000000312000-memory.dmpFilesize
8KB
-
memory/2180-60-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-16-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-13-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2180-12-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-20-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2180-50-0x00000000002B0000-0x00000000002B2000-memory.dmpFilesize
8KB
-
memory/2180-89-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-48-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2180-88-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-21-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-72-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-71-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-61-0x00000000002B0000-0x00000000002B2000-memory.dmpFilesize
8KB
-
memory/2180-15-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-22-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-23-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-19-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-18-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-17-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-59-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-70-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-69-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-65-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2180-66-0x00000000006A0000-0x000000000175A000-memory.dmpFilesize
16.7MB
-
memory/2264-8-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2264-63-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/2264-62-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB
-
memory/2264-38-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/2264-9-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2264-7-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2264-37-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/2264-57-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/2264-79-0x0000000000340000-0x0000000000352000-memory.dmpFilesize
72KB
-
memory/2264-47-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/2716-97-0x00000000003E0000-0x00000000003E2000-memory.dmpFilesize
8KB
-
memory/2716-96-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2716-105-0x00000000003E0000-0x00000000003E2000-memory.dmpFilesize
8KB
-
memory/2716-175-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2716-64-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2896-85-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2896-104-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2896-103-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2896-106-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/2896-205-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2896-160-0x0000000000950000-0x0000000001A0A000-memory.dmpFilesize
16.7MB
-
memory/2896-204-0x0000000000950000-0x0000000001A0A000-memory.dmpFilesize
16.7MB