Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
4c5425d5da842fb0bc0d5b57f90c0f30_NeikiAnalytics.dll
Resource
win7-20240611-en
General
-
Target
4c5425d5da842fb0bc0d5b57f90c0f30_NeikiAnalytics.dll
-
Size
120KB
-
MD5
4c5425d5da842fb0bc0d5b57f90c0f30
-
SHA1
03b1a202396766923d508264deea91ac425694d4
-
SHA256
f63aef243017a4480ac7b20283a20fad920d71475a7d5fae39c542cb0b83aa73
-
SHA512
13e17d8fa5a6a868effa51958cae990727fdccb2f22d94215f042c48dfde8d3e0b3a7cd6576d97827348b780bc98e724a0763135a4e3fc3f13309087b3c73b7e
-
SSDEEP
3072:eN0vTEzyIoViA/o6acUI9aDWnCH9tDCZ7eI5:7AxL6XeWCHbDCoI5
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
f762848.exef760c8e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f762848.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f762848.exe -
Processes:
f760c8e.exef762848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762848.exe -
Processes:
f760c8e.exef762848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762848.exe -
Executes dropped EXE 3 IoCs
Processes:
f760c8e.exef760e14.exef762848.exepid process 2132 f760c8e.exe 2736 f760e14.exe 2196 f762848.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 1524 rundll32.exe 1524 rundll32.exe 1524 rundll32.exe 1524 rundll32.exe 1524 rundll32.exe 1524 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2132-12-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-16-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-14-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-19-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-18-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-20-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-22-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-21-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-17-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-15-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-60-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-61-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-62-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-63-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-64-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-78-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-79-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-80-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-100-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-104-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-105-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-106-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2132-148-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2196-156-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2196-203-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Processes:
f762848.exef760c8e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760c8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762848.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f762848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760c8e.exe -
Processes:
f760c8e.exef762848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762848.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f760c8e.exef762848.exedescription ioc process File opened (read-only) \??\E: f760c8e.exe File opened (read-only) \??\L: f760c8e.exe File opened (read-only) \??\N: f760c8e.exe File opened (read-only) \??\H: f760c8e.exe File opened (read-only) \??\M: f760c8e.exe File opened (read-only) \??\E: f762848.exe File opened (read-only) \??\O: f760c8e.exe File opened (read-only) \??\Q: f760c8e.exe File opened (read-only) \??\G: f762848.exe File opened (read-only) \??\G: f760c8e.exe File opened (read-only) \??\I: f760c8e.exe File opened (read-only) \??\J: f760c8e.exe File opened (read-only) \??\K: f760c8e.exe File opened (read-only) \??\P: f760c8e.exe -
Drops file in Windows directory 3 IoCs
Processes:
f760c8e.exef762848.exedescription ioc process File created C:\Windows\f760cec f760c8e.exe File opened for modification C:\Windows\SYSTEM.INI f760c8e.exe File created C:\Windows\f765d7b f762848.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f760c8e.exef762848.exepid process 2132 f760c8e.exe 2132 f760c8e.exe 2196 f762848.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f760c8e.exef762848.exedescription pid process Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2132 f760c8e.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe Token: SeDebugPrivilege 2196 f762848.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef760c8e.exef762848.exedescription pid process target process PID 1316 wrote to memory of 1524 1316 rundll32.exe rundll32.exe PID 1316 wrote to memory of 1524 1316 rundll32.exe rundll32.exe PID 1316 wrote to memory of 1524 1316 rundll32.exe rundll32.exe PID 1316 wrote to memory of 1524 1316 rundll32.exe rundll32.exe PID 1316 wrote to memory of 1524 1316 rundll32.exe rundll32.exe PID 1316 wrote to memory of 1524 1316 rundll32.exe rundll32.exe PID 1316 wrote to memory of 1524 1316 rundll32.exe rundll32.exe PID 1524 wrote to memory of 2132 1524 rundll32.exe f760c8e.exe PID 1524 wrote to memory of 2132 1524 rundll32.exe f760c8e.exe PID 1524 wrote to memory of 2132 1524 rundll32.exe f760c8e.exe PID 1524 wrote to memory of 2132 1524 rundll32.exe f760c8e.exe PID 2132 wrote to memory of 1120 2132 f760c8e.exe taskhost.exe PID 2132 wrote to memory of 1184 2132 f760c8e.exe Dwm.exe PID 2132 wrote to memory of 1212 2132 f760c8e.exe Explorer.EXE PID 2132 wrote to memory of 1996 2132 f760c8e.exe DllHost.exe PID 2132 wrote to memory of 1316 2132 f760c8e.exe rundll32.exe PID 2132 wrote to memory of 1524 2132 f760c8e.exe rundll32.exe PID 2132 wrote to memory of 1524 2132 f760c8e.exe rundll32.exe PID 1524 wrote to memory of 2736 1524 rundll32.exe f760e14.exe PID 1524 wrote to memory of 2736 1524 rundll32.exe f760e14.exe PID 1524 wrote to memory of 2736 1524 rundll32.exe f760e14.exe PID 1524 wrote to memory of 2736 1524 rundll32.exe f760e14.exe PID 1524 wrote to memory of 2196 1524 rundll32.exe f762848.exe PID 1524 wrote to memory of 2196 1524 rundll32.exe f762848.exe PID 1524 wrote to memory of 2196 1524 rundll32.exe f762848.exe PID 1524 wrote to memory of 2196 1524 rundll32.exe f762848.exe PID 2132 wrote to memory of 1120 2132 f760c8e.exe taskhost.exe PID 2132 wrote to memory of 1184 2132 f760c8e.exe Dwm.exe PID 2132 wrote to memory of 1212 2132 f760c8e.exe Explorer.EXE PID 2132 wrote to memory of 2736 2132 f760c8e.exe f760e14.exe PID 2132 wrote to memory of 2736 2132 f760c8e.exe f760e14.exe PID 2132 wrote to memory of 2196 2132 f760c8e.exe f762848.exe PID 2132 wrote to memory of 2196 2132 f760c8e.exe f762848.exe PID 2196 wrote to memory of 1120 2196 f762848.exe taskhost.exe PID 2196 wrote to memory of 1184 2196 f762848.exe Dwm.exe PID 2196 wrote to memory of 1212 2196 f762848.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f760c8e.exef762848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760c8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762848.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c5425d5da842fb0bc0d5b57f90c0f30_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c5425d5da842fb0bc0d5b57f90c0f30_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f760c8e.exeC:\Users\Admin\AppData\Local\Temp\f760c8e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f760e14.exeC:\Users\Admin\AppData\Local\Temp\f760e14.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f762848.exeC:\Users\Admin\AppData\Local\Temp\f762848.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
257B
MD52f0bdc48af79cf9a49d393879161d1ee
SHA1a53811e10e4a9d72ae2bafe8bdd4c685b25f322e
SHA256c77450da2004ad6d68eaa985536517b04e43e3f5e582cc7fb759b51757fc7e15
SHA512ed24d3cfc8512822a7c117cf0ea8abbf3bbac0b57e64d56f6f0ab1bacd0a80954bc388c76846a8b8f24ff400a94529ddd85d35784811ccfb381a48dae4c33c87
-
\Users\Admin\AppData\Local\Temp\f760c8e.exeFilesize
105KB
MD5e478fb14e2dca6528a64b68ea1cbea82
SHA1e6e92a7c571d7a635c6aa1405ea46f00b2647b87
SHA25677c8ccd21ca51da9b267319c1167c65bbae14cac529db0b1bc49ee48a2fe3895
SHA5126b0fdea83e586bdb67aeed835d2fef16a9941fce6d9a4b796d5d8d32cfd969e025db8927397007688ab366bd1c43381411837128e3eab865e5803fc248d8ab75
-
memory/1120-28-0x0000000002010000-0x0000000002012000-memory.dmpFilesize
8KB
-
memory/1524-58-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/1524-9-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/1524-73-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/1524-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/1524-35-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/1524-36-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1524-44-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1524-54-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/1524-57-0x0000000000440000-0x0000000000459000-memory.dmpFilesize
100KB
-
memory/2132-61-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-79-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-47-0x0000000000520000-0x0000000000522000-memory.dmpFilesize
8KB
-
memory/2132-56-0x0000000000520000-0x0000000000522000-memory.dmpFilesize
8KB
-
memory/2132-22-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-45-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/2132-20-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-21-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-18-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-19-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-14-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-17-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-15-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-60-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-16-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-62-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-63-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-64-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-10-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2132-12-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-78-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-148-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-80-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-147-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2132-109-0x0000000000520000-0x0000000000522000-memory.dmpFilesize
8KB
-
memory/2132-106-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-105-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-104-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2132-100-0x0000000000650000-0x000000000170A000-memory.dmpFilesize
16.7MB
-
memory/2196-96-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2196-97-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2196-99-0x00000000001B0000-0x00000000001B2000-memory.dmpFilesize
8KB
-
memory/2196-76-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2196-156-0x0000000000920000-0x00000000019DA000-memory.dmpFilesize
16.7MB
-
memory/2196-203-0x0000000000920000-0x00000000019DA000-memory.dmpFilesize
16.7MB
-
memory/2196-202-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2736-98-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/2736-89-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2736-90-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/2736-59-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2736-152-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB