Analysis
-
max time kernel
25s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
18e63d7b0fc6a6dca0d1b8ff8657d9a7d319dc5118309db1d69dc11bc10a7c59_NeikiAnalytics.dll
Resource
win7-20240419-en
General
-
Target
18e63d7b0fc6a6dca0d1b8ff8657d9a7d319dc5118309db1d69dc11bc10a7c59_NeikiAnalytics.dll
-
Size
120KB
-
MD5
1e780fa39773470b975a00ae19e9cba0
-
SHA1
297e703f82720d898c24cfee969fc24a53097d6b
-
SHA256
18e63d7b0fc6a6dca0d1b8ff8657d9a7d319dc5118309db1d69dc11bc10a7c59
-
SHA512
393e58e57b71bbe43879cb011627927f8885dc11949ca26ea9c7b66d7c0c978482396cac3c6bdd1913f4ecb61eede28a63b0ecfc58553353b0dae1c6ed2c8977
-
SSDEEP
1536:+ybxmzXHfDmrbVBN0YwU9lkrxekG3f3a9ZCj4HigcWmE+uQMHZMujj:BxWX6bVB2faOxePau4CJWmTM5Mu
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
f762868.exef760cae.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f762868.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f762868.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f760cae.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f760cae.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f760cae.exe -
Processes:
f760cae.exef762868.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762868.exe -
Processes:
f762868.exef760cae.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762868.exe -
Executes dropped EXE 3 IoCs
Processes:
f760cae.exef760e62.exef762868.exepid process 2464 f760cae.exe 2648 f760e62.exe 1736 f762868.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exepid process 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe -
Processes:
resource yara_rule behavioral1/memory/2464-17-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-22-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-24-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-20-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-23-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-21-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-15-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-19-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-18-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-16-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-63-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-64-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-65-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-67-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-66-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-69-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-70-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-83-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-86-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-87-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-105-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-106-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-123-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/2464-154-0x0000000000620000-0x00000000016DA000-memory.dmp upx behavioral1/memory/1736-175-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/1736-208-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
Processes:
f760cae.exef762868.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f760cae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f762868.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f762868.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f760cae.exe -
Processes:
f760cae.exef762868.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762868.exe -
Enumerates connected drives 3 TTPs 16 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f760cae.exef762868.exedescription ioc process File opened (read-only) \??\T: f760cae.exe File opened (read-only) \??\E: f762868.exe File opened (read-only) \??\E: f760cae.exe File opened (read-only) \??\I: f760cae.exe File opened (read-only) \??\L: f760cae.exe File opened (read-only) \??\M: f760cae.exe File opened (read-only) \??\N: f760cae.exe File opened (read-only) \??\S: f760cae.exe File opened (read-only) \??\Q: f760cae.exe File opened (read-only) \??\G: f760cae.exe File opened (read-only) \??\P: f760cae.exe File opened (read-only) \??\R: f760cae.exe File opened (read-only) \??\H: f760cae.exe File opened (read-only) \??\J: f760cae.exe File opened (read-only) \??\K: f760cae.exe File opened (read-only) \??\O: f760cae.exe -
Drops file in Windows directory 3 IoCs
Processes:
f760cae.exef762868.exedescription ioc process File created C:\Windows\f760cfc f760cae.exe File opened for modification C:\Windows\SYSTEM.INI f760cae.exe File created C:\Windows\f765d5c f762868.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
f760cae.exef762868.exepid process 2464 f760cae.exe 2464 f760cae.exe 1736 f762868.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
f760cae.exef762868.exedescription pid process Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 2464 f760cae.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe Token: SeDebugPrivilege 1736 f762868.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
rundll32.exerundll32.exef760cae.exef762868.exedescription pid process target process PID 2052 wrote to memory of 2324 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 2324 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 2324 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 2324 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 2324 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 2324 2052 rundll32.exe rundll32.exe PID 2052 wrote to memory of 2324 2052 rundll32.exe rundll32.exe PID 2324 wrote to memory of 2464 2324 rundll32.exe f760cae.exe PID 2324 wrote to memory of 2464 2324 rundll32.exe f760cae.exe PID 2324 wrote to memory of 2464 2324 rundll32.exe f760cae.exe PID 2324 wrote to memory of 2464 2324 rundll32.exe f760cae.exe PID 2464 wrote to memory of 1112 2464 f760cae.exe taskhost.exe PID 2464 wrote to memory of 1172 2464 f760cae.exe Dwm.exe PID 2464 wrote to memory of 1212 2464 f760cae.exe Explorer.EXE PID 2464 wrote to memory of 1760 2464 f760cae.exe DllHost.exe PID 2464 wrote to memory of 2052 2464 f760cae.exe rundll32.exe PID 2464 wrote to memory of 2324 2464 f760cae.exe rundll32.exe PID 2464 wrote to memory of 2324 2464 f760cae.exe rundll32.exe PID 2324 wrote to memory of 2648 2324 rundll32.exe f760e62.exe PID 2324 wrote to memory of 2648 2324 rundll32.exe f760e62.exe PID 2324 wrote to memory of 2648 2324 rundll32.exe f760e62.exe PID 2324 wrote to memory of 2648 2324 rundll32.exe f760e62.exe PID 2324 wrote to memory of 1736 2324 rundll32.exe f762868.exe PID 2324 wrote to memory of 1736 2324 rundll32.exe f762868.exe PID 2324 wrote to memory of 1736 2324 rundll32.exe f762868.exe PID 2324 wrote to memory of 1736 2324 rundll32.exe f762868.exe PID 2464 wrote to memory of 1112 2464 f760cae.exe taskhost.exe PID 2464 wrote to memory of 1172 2464 f760cae.exe Dwm.exe PID 2464 wrote to memory of 1212 2464 f760cae.exe Explorer.EXE PID 2464 wrote to memory of 2648 2464 f760cae.exe f760e62.exe PID 2464 wrote to memory of 2648 2464 f760cae.exe f760e62.exe PID 2464 wrote to memory of 1736 2464 f760cae.exe f762868.exe PID 2464 wrote to memory of 1736 2464 f760cae.exe f762868.exe PID 1736 wrote to memory of 1112 1736 f762868.exe taskhost.exe PID 1736 wrote to memory of 1172 1736 f762868.exe Dwm.exe PID 1736 wrote to memory of 1212 1736 f762868.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
f760cae.exef762868.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f760cae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f762868.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18e63d7b0fc6a6dca0d1b8ff8657d9a7d319dc5118309db1d69dc11bc10a7c59_NeikiAnalytics.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18e63d7b0fc6a6dca0d1b8ff8657d9a7d319dc5118309db1d69dc11bc10a7c59_NeikiAnalytics.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f760cae.exeC:\Users\Admin\AppData\Local\Temp\f760cae.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\f760e62.exeC:\Users\Admin\AppData\Local\Temp\f760e62.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f762868.exeC:\Users\Admin\AppData\Local\Temp\f762868.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f760cae.exeFilesize
97KB
MD54505cd2142c15dec99db268a11dbf60c
SHA1071fde03004b546939e48ceaa499f780fdb35902
SHA2566def2c041278768190a966cf89f5dd41a01fb313834a6ba3fe097502fde8913e
SHA5120c2ab9ceb51d5b0d644ac82dba03a015fc1cdcfc67663cb829a89f436c01a4af3daa0c5aae24bf6168f93c065bb911eb40741c6c8292692d151b096c7bb60701
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5e6e9c71fae99d316bb2ef64d9285b002
SHA1bfaee4662ce3bd88c1c0f7d516fdc62e3597c605
SHA2569eb2882918efe591c5a0e38e19479daf28789793e341dd58d28aa3b58c79d275
SHA512c853a93996ea92ecb9f4b2001033770600964db75a9a344c01ce5665369f0ecedc214d4698ce12fac7d66b0b3847fbd06ede0938534b7ae6afca507087ca3833
-
memory/1112-30-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1736-208-0x0000000000920000-0x00000000019DA000-memory.dmpFilesize
16.7MB
-
memory/1736-101-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/1736-82-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-104-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/1736-209-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1736-175-0x0000000000920000-0x00000000019DA000-memory.dmpFilesize
16.7MB
-
memory/1736-102-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2324-60-0x0000000000240000-0x0000000000252000-memory.dmpFilesize
72KB
-
memory/2324-5-0x00000000001C0000-0x00000000001D2000-memory.dmpFilesize
72KB
-
memory/2324-2-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2324-39-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2324-38-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/2324-11-0x00000000001C0000-0x00000000001D2000-memory.dmpFilesize
72KB
-
memory/2324-61-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/2324-47-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2324-57-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/2324-1-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2464-16-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-87-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-15-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-19-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-18-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-12-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2464-23-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-63-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-64-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-65-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-67-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-66-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-69-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-70-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-20-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-83-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-86-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-21-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-17-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-24-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-105-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-106-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-48-0x0000000003D20000-0x0000000003D21000-memory.dmpFilesize
4KB
-
memory/2464-50-0x0000000002FC0000-0x0000000002FC2000-memory.dmpFilesize
8KB
-
memory/2464-59-0x0000000002FC0000-0x0000000002FC2000-memory.dmpFilesize
8KB
-
memory/2464-22-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-123-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2464-153-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2464-154-0x0000000000620000-0x00000000016DA000-memory.dmpFilesize
16.7MB
-
memory/2648-158-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2648-95-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/2648-62-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2648-96-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB
-
memory/2648-103-0x0000000000360000-0x0000000000362000-memory.dmpFilesize
8KB