Analysis
-
max time kernel
169s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-10-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe
Resource
win10v2004-20220812-en
General
-
Target
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe
-
Size
652KB
-
MD5
bc6cba1924615d3419b578ec0dacb52a
-
SHA1
e52ac072219ef95fd4594b6c882642fa1791eeb6
-
SHA256
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c
-
SHA512
8212bf03afad0cd7c4ca1cb519baf36798d04a81dfce000b29f8e47ac4297628633fe35fbdfe9fca2cf75df77c53e5a9f57c8244761ba729990a4d6acb9a2483
-
SSDEEP
12288:PIgegV1Ye7I9Kjj7D+pbAqmNlV2NCM3vHoFN6WtljaElI5w:Po41YKIGnqmNlkvHoFN6WtljaEy5w
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1364-68-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet behavioral1/memory/1364-74-0x0000000000400000-0x0000000000567000-memory.dmp unk_chinese_botnet -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\vlMOSo.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\vlMOSo.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\vlMOSo.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\vlMOSo.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
vlMOSo.exepid process 480 vlMOSo.exe -
Loads dropped DLL 2 IoCs
Processes:
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exepid process 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exedescription ioc process File opened (read-only) \??\K: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\O: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\S: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\T: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\W: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\X: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\Z: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\E: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\F: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\L: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\M: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\Y: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\B: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\H: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\I: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\N: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\Q: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\U: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\V: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\G: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\J: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\P: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe File opened (read-only) \??\R: 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
vlMOSo.exedescription ioc process File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe vlMOSo.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe vlMOSo.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE vlMOSo.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe vlMOSo.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe vlMOSo.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE vlMOSo.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe vlMOSo.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe vlMOSo.exe File opened for modification C:\Program Files\Windows Mail\wab.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe vlMOSo.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe vlMOSo.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe vlMOSo.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe vlMOSo.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe vlMOSo.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe vlMOSo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE vlMOSo.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe vlMOSo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exepid process 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exepid process 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exevlMOSo.exedescription pid process target process PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe vlMOSo.exe PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe vlMOSo.exe PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe vlMOSo.exe PID 1364 wrote to memory of 480 1364 7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe vlMOSo.exe PID 480 wrote to memory of 680 480 vlMOSo.exe cmd.exe PID 480 wrote to memory of 680 480 vlMOSo.exe cmd.exe PID 480 wrote to memory of 680 480 vlMOSo.exe cmd.exe PID 480 wrote to memory of 680 480 vlMOSo.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe"C:\Users\Admin\AppData\Local\Temp\7a044ca76c573b140d38e91b51a49fea69be0016d979d875030928b99ccd6d4c.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vlMOSo.exeC:\Users\Admin\AppData\Local\Temp\vlMOSo.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0c46278b.bat" "3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0c46278b.batFilesize
187B
MD5b340f493a350e96bcf2908e84deee539
SHA15ea614d9506906059b2dfd6dc87abcd925996ed0
SHA2561ef7fa6adbf06b56fcd56fdb19fc47f32f1d3e26a860ebd377297fbaff5d6249
SHA512c96a7bafe092ca3de3204de55e41100446552427f82cf984aa1b5974a03a5810c022618e3a7581a87dce5348d9dfe044fd29bdbde27fa8f57206717b25172ffb
-
C:\Users\Admin\AppData\Local\Temp\vlMOSo.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
C:\Users\Admin\AppData\Local\Temp\vlMOSo.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
\Users\Admin\AppData\Local\Temp\vlMOSo.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
\Users\Admin\AppData\Local\Temp\vlMOSo.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
memory/480-65-0x0000000000270000-0x0000000000279000-memory.dmpFilesize
36KB
-
memory/480-57-0x0000000000000000-mapping.dmp
-
memory/480-72-0x0000000000270000-0x0000000000279000-memory.dmpFilesize
36KB
-
memory/680-71-0x0000000000000000-mapping.dmp
-
memory/1364-64-0x0000000000330000-0x0000000000339000-memory.dmpFilesize
36KB
-
memory/1364-63-0x0000000000330000-0x0000000000339000-memory.dmpFilesize
36KB
-
memory/1364-66-0x0000000000310000-0x0000000000313000-memory.dmpFilesize
12KB
-
memory/1364-67-0x00000000002F0000-0x00000000002F6000-memory.dmpFilesize
24KB
-
memory/1364-68-0x0000000010000000-0x0000000010018000-memory.dmpFilesize
96KB
-
memory/1364-54-0x0000000075281000-0x0000000075283000-memory.dmpFilesize
8KB
-
memory/1364-62-0x0000000000260000-0x000000000029F000-memory.dmpFilesize
252KB
-
memory/1364-61-0x0000000000400000-0x0000000000567000-memory.dmpFilesize
1.4MB
-
memory/1364-74-0x0000000000400000-0x0000000000567000-memory.dmpFilesize
1.4MB
-
memory/1364-75-0x0000000000330000-0x0000000000339000-memory.dmpFilesize
36KB