Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe
Resource
win10v2004-20240611-en
General
-
Target
be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe
-
Size
3.3MB
-
MD5
2b80cc4925eaebd7cb3a1132ea7be088
-
SHA1
aa4bdf17a70359c1070842d60460fb9c04cb9849
-
SHA256
be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1
-
SHA512
95b6e348d5f77fa4027d1d971b96a5a05f0f11f7e30d9248d167099cf2973b2a6aec0f39e794399836cdd816748a4774802eaf27258370ef7daf8090b7500d80
-
SSDEEP
98304:QX+OnvyuIWiWz50twHM2EEFYHx5gNmutfdS:QX+i1IRcdEESssue
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3052 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
Logo1_.exebe9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe360huabaosetup.exepid process 1980 Logo1_.exe 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 2564 360huabaosetup.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exebe9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exepid process 3052 cmd.exe 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
360huabaosetup.exedescription ioc process File opened for modification \??\PhysicalDrive0 360huabaosetup.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
Logo1_.exebe9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exedescription ioc process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe File created C:\Windows\Logo1_.exe be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Logo1_.exepid process 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe 1980 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exeLogo1_.execmd.exenet.exebe9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exedescription pid process target process PID 2176 wrote to memory of 3052 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe cmd.exe PID 2176 wrote to memory of 3052 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe cmd.exe PID 2176 wrote to memory of 3052 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe cmd.exe PID 2176 wrote to memory of 3052 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe cmd.exe PID 2176 wrote to memory of 1980 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe Logo1_.exe PID 2176 wrote to memory of 1980 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe Logo1_.exe PID 2176 wrote to memory of 1980 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe Logo1_.exe PID 2176 wrote to memory of 1980 2176 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe Logo1_.exe PID 1980 wrote to memory of 2592 1980 Logo1_.exe net.exe PID 1980 wrote to memory of 2592 1980 Logo1_.exe net.exe PID 1980 wrote to memory of 2592 1980 Logo1_.exe net.exe PID 1980 wrote to memory of 2592 1980 Logo1_.exe net.exe PID 3052 wrote to memory of 2640 3052 cmd.exe be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe PID 3052 wrote to memory of 2640 3052 cmd.exe be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe PID 3052 wrote to memory of 2640 3052 cmd.exe be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe PID 3052 wrote to memory of 2640 3052 cmd.exe be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe PID 2592 wrote to memory of 2572 2592 net.exe net1.exe PID 2592 wrote to memory of 2572 2592 net.exe net1.exe PID 2592 wrote to memory of 2572 2592 net.exe net1.exe PID 2592 wrote to memory of 2572 2592 net.exe net1.exe PID 2640 wrote to memory of 2564 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 360huabaosetup.exe PID 2640 wrote to memory of 2564 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 360huabaosetup.exe PID 2640 wrote to memory of 2564 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 360huabaosetup.exe PID 2640 wrote to memory of 2564 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 360huabaosetup.exe PID 2640 wrote to memory of 2564 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 360huabaosetup.exe PID 2640 wrote to memory of 2564 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 360huabaosetup.exe PID 2640 wrote to memory of 2564 2640 be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe 360huabaosetup.exe PID 1980 wrote to memory of 1400 1980 Logo1_.exe Explorer.EXE PID 1980 wrote to memory of 1400 1980 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe"C:\Users\Admin\AppData\Local\Temp\be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1890.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe"C:\Users\Admin\AppData\Local\Temp\be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\360hb_tmp\3.0.10.0\360huabaosetup.exe"C:\Users\Admin\AppData\Local\Temp\360hb_tmp\3.0.10.0\360huabaosetup.exe" --user /exename:be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exeFilesize
251KB
MD5d7b36bcccef62ac305e49753cbc017ba
SHA1d53e4a562284d0bdc20184bb7d747659b541b884
SHA256ce000420ca282db03c8c61cc6f1cf934f4f197006f0bd35466e23f69b4e1d047
SHA512c1cb9b1101f178b1bcd35aa86ad206ce11f41f70acda244b275b22f86622f583eba6eb54e3656c024259ddc6baae87e6fd47b493c6cee859aa2b5c3be5a502ea
-
C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exeFilesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
C:\Users\Admin\AppData\Local\Temp\$$a1890.batFilesize
722B
MD5c438d7f14e112a124e6ea8035960a142
SHA18bc7a37ca8524023cfa4190aa8155fc596078ecb
SHA25628feb3466ed43ee862a15e9a0cb2e3e6739e8a7400f0c1efa5bad858331a5724
SHA512a2a02160ebea01cdbb1ff82ecaf2e9fdc2f4fac2451d2f161442b220ce1b1d20e94fa637bba2a9b89dfe52ce709747730c7ddb8f5605c12d1de4e84a2cf704ca
-
C:\Users\Admin\AppData\Local\Temp\be9db367e1444751d6246db1eda8b6ce5008d11d9a2200d096a2b9fe3cff80c1.exe.exeFilesize
3.2MB
MD5d01efed5bafe637dccb745c10d38432b
SHA1cc1ea124caac205d46a00451b9d443382f4a6668
SHA256d4af02aa7a1990986cbaf378cea2e13a280a652e34aa198dff287c0d5e9dc6b5
SHA512898a880cd43509a60aa463200f717d6f90f91164dec2698740889be8f3a3e2702a102ae0b202d8c516a7c64c4d2d427e350dcca95082a9f9474e304e28257fc4
-
C:\Windows\Logo1_.exeFilesize
26KB
MD55447ba4d55a8623e8f9fb7002d9abf4a
SHA15fa8892f2aab33101e9a1b44c0f6c93bd1382eeb
SHA2569af3df2d3fcda5ab774308add79d773b449989eb0d2ff7a799d1e05123ea183b
SHA512dd047a27ce8d399734eed5ca6b9fe71ae28ef1dbe1bc0bbca4a8873755e30cb55858b3b382a77107a5b470adc1242faa301a20c0be24e1acc1d0a9c30067e185
-
F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\_desktop.iniFilesize
9B
MD54b66be111b497cdd28c15afccbbd2620
SHA143ffb36014883f201e76464ded7ec69f2973d43b
SHA256483e991549f8cb58e18e7a79a14cf6065e121f897e73b6f4edff227432a733dc
SHA51232fddfbca04f67fdb0e865862e6f29b06cd079ddba416d801ceedcba8ed88b8dda77663fc8bd5bdd0224f722cd337c9d58edfc2e97e4fab73fa56f6f6198bb21
-
\Users\Admin\AppData\Local\Temp\360hb_tmp\3.0.10.0\360huabaosetup.exeFilesize
2.3MB
MD5c7524e765c77e36b2a935f990578d3a7
SHA1c7b4a04953166d0fed8aa6f34199e8551cec5eb5
SHA2567994265911f918435f58f40edf4576f61fd6fadd3bb35913a55567c8b94ad704
SHA512ef53d27bc5ab8ccb818b29fa7986a9d6dba2d4bf9cca7c6b9b2e8d39798032ac907432cb555f106aa4e43d594dbb8ec91dec6cca3d7d8bdcedac5539558062c7
-
memory/1400-39-0x0000000003CF0000-0x0000000003CF1000-memory.dmpFilesize
4KB
-
memory/1980-49-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-42-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-55-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-101-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-107-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-586-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-1860-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-1910-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-18-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1980-3320-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2176-0-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2176-16-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB