Analysis
-
max time kernel
206s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2023 17:07
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20230220-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
5ddcc9baa65b17926f2262a9fe530b93
-
SHA1
6fa7fd0df2a9928b6c063fc03b10bdcd84e26008
-
SHA256
9ce882116ae23f4d32f4937f2b61ca8deea0c476be41fdd3158dadc14335a45f
-
SHA512
79fd0d0ff6115972017fef2c6feeddaf26db86bb69437ca431abd2ba35d4b6c249c7150f3969fd589006b2d3defa674c589610caee5a1585e50f027b06f6aa06
-
SSDEEP
49152:+vaY52fyaSZOrPWluWBuGG5g5hPbRJ6KbR3LoGd/THHB72eh2NT:+vv52fyaSZOrPWluWBDG5g5hPbRJ6k
Malware Config
Extracted
quasar
1.4.1
Office04
127.0.0.1:4782
57af6279-a68f-4f70-9b6b-439dccca1ff4
-
encryption_key
1B9C51B90AB1DE21D6A313176E631A6295A0C2E6
-
install_name
Memes.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
memes
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2704-133-0x0000000000E00000-0x0000000001124000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Memes.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Memes.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
Memes.exepid process 4236 Memes.exe -
Drops file in System32 directory 11 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 2 IoCs
Processes:
firefox.exemspaint.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid process 1284 mspaint.exe 1284 mspaint.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 5088 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Client-built.exeMemes.exefirefox.exedescription pid process Token: SeDebugPrivilege 2704 Client-built.exe Token: SeDebugPrivilege 4236 Memes.exe Token: SeDebugPrivilege 3332 firefox.exe Token: SeDebugPrivilege 3332 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 3332 firefox.exe 3332 firefox.exe 3332 firefox.exe 3332 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 3332 firefox.exe 3332 firefox.exe 3332 firefox.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
Memes.exefirefox.exemspaint.exeOpenWith.exepid process 4236 Memes.exe 3332 firefox.exe 1284 mspaint.exe 5088 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Client-built.exeMemes.exefirefox.exefirefox.exedescription pid process target process PID 2704 wrote to memory of 840 2704 Client-built.exe schtasks.exe PID 2704 wrote to memory of 840 2704 Client-built.exe schtasks.exe PID 2704 wrote to memory of 4236 2704 Client-built.exe Memes.exe PID 2704 wrote to memory of 4236 2704 Client-built.exe Memes.exe PID 4236 wrote to memory of 1760 4236 Memes.exe schtasks.exe PID 4236 wrote to memory of 1760 4236 Memes.exe schtasks.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3680 wrote to memory of 3332 3680 firefox.exe firefox.exe PID 3332 wrote to memory of 4840 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 4840 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe PID 3332 wrote to memory of 2360 3332 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "memes" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Memes.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Memes.exe"C:\Users\Admin\AppData\Roaming\SubDir\Memes.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "memes" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Memes.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.0.1010923652\1124953976" -parentBuildID 20221007134813 -prefsHandle 1836 -prefMapHandle 1828 -prefsLen 20890 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7440f319-8316-46f1-b0f0-3eb7d2d1b9c5} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 1916 242ffe17158 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.1.548287571\1663703092" -parentBuildID 20221007134813 -prefsHandle 2304 -prefMapHandle 2300 -prefsLen 20926 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {301e35a8-5dff-4b28-a315-3f4cbae3db4a} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 2316 24287d53258 socket3⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.2.1925865828\2096536925" -childID 1 -isForBrowser -prefsHandle 2856 -prefMapHandle 3048 -prefsLen 21009 -prefMapSize 232675 -jsInitHandle 1476 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {de89acf3-10c7-4555-9831-c3c1692b9487} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 2916 2428a4f1858 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.3.447062748\113240061" -childID 2 -isForBrowser -prefsHandle 1228 -prefMapHandle 3604 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1476 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2196bc14-f80b-4662-95e8-421294380457} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 1436 2428b22b658 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.4.386026547\918881428" -childID 3 -isForBrowser -prefsHandle 4092 -prefMapHandle 4084 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1476 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {de59b2a5-21ec-4305-b04f-d7db2384d0c9} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 4108 2428b937c58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.5.1635314901\476481024" -childID 4 -isForBrowser -prefsHandle 5068 -prefMapHandle 5044 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1476 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b8702ce-c9c4-4645-8973-16384ea189d2} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 5092 2428ceb7f58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.7.2140532343\1595007464" -childID 6 -isForBrowser -prefsHandle 5444 -prefMapHandle 5448 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1476 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e257c63-60f6-47f5-8602-04bfa22f0c3b} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 5436 2428dc5d458 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3332.6.674197116\1550905206" -childID 5 -isForBrowser -prefsHandle 5252 -prefMapHandle 5256 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1476 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8623cef0-41f2-4ece-9e33-c5d55ddee289} 3332 "\\.\pipe\gecko-crash-server-pipe.3332" 5244 2428ceb6458 tab3⤵
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\FormatStop.jpeg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bozzcyfh.default-release\activity-stream.discovery_stream.json.tmpFilesize
149KB
MD5df30ce0494c4872d45bc7280e774dfaa
SHA1b32762e83a202559d605d7db3f82d9169128ed09
SHA2563f1d61e7a5f6f1ed07554160459aa84dc1f39abcf3b73b15b9e189ed9c8055b2
SHA512ea973381a8a0b170c5434149848aedbeb874f8c7eccdb22e57fe7b33c1f48fe7dd759438291531eb25717978ccd432a1cb5144ff97f9aec680c33f56a1e0780d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs-1.jsFilesize
6KB
MD5c2d453758fe7be6745c3bf72c95867d4
SHA1b06f31da3e3c00fc19e7f5138f7e42f2e2a7717a
SHA256c53012df950fa49fa4541ebba24a595ad7db4a046ebdb62033ce05dc30e60bd8
SHA512e7e21a5ec10d8ba91cea064bf7b2526f91fa68a6be871613c2be0a5d7384df35da2c0d8499345abdc9d64532f86f0c6b7274ae80ee8fa4158a53aa6483a149d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs.jsFilesize
6KB
MD5fcd5f37e5e4066f7cffe8eb106b6ce19
SHA1b0a1c4d3d5c96271429fb09cb71055d177c13402
SHA25638dbdb91f24f8e138803d71d0f7e4758fbb78e7f657208325fe30a501e225c67
SHA512afdf7697bc784c3c85f30a8a1e4caa32459cf7f19c1ffacde04f62f089218ff1899ffe69fc465677d719546c8f91bea0d04807b13d58096f79aeba8eef0a0a15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\sessionstore.jsonlz4Filesize
883B
MD5b03d4171e778727285d345ab0d624092
SHA137fc8b12347d23ba4056e835216e5ce99e5637ec
SHA2569a109b6e98d109e36d079f1080686034788fb64511bb8d6a882309cb03e2b9dd
SHA5120e4f564ada31532e5c823cf209a34138db9e81f3373248610be5f3b84de053eca66a03fa380b9b1d4a7edce7480bd7bc84ade9b1831bd125d2d7bcd8e41ed611
-
C:\Users\Admin\AppData\Roaming\SubDir\Memes.exeFilesize
3.1MB
MD55ddcc9baa65b17926f2262a9fe530b93
SHA16fa7fd0df2a9928b6c063fc03b10bdcd84e26008
SHA2569ce882116ae23f4d32f4937f2b61ca8deea0c476be41fdd3158dadc14335a45f
SHA51279fd0d0ff6115972017fef2c6feeddaf26db86bb69437ca431abd2ba35d4b6c249c7150f3969fd589006b2d3defa674c589610caee5a1585e50f027b06f6aa06
-
C:\Users\Admin\AppData\Roaming\SubDir\Memes.exeFilesize
3.1MB
MD55ddcc9baa65b17926f2262a9fe530b93
SHA16fa7fd0df2a9928b6c063fc03b10bdcd84e26008
SHA2569ce882116ae23f4d32f4937f2b61ca8deea0c476be41fdd3158dadc14335a45f
SHA51279fd0d0ff6115972017fef2c6feeddaf26db86bb69437ca431abd2ba35d4b6c249c7150f3969fd589006b2d3defa674c589610caee5a1585e50f027b06f6aa06
-
memory/2704-134-0x000000001BD20000-0x000000001BD30000-memory.dmpFilesize
64KB
-
memory/2704-133-0x0000000000E00000-0x0000000001124000-memory.dmpFilesize
3.1MB
-
memory/4236-142-0x000000001C750000-0x000000001C7A0000-memory.dmpFilesize
320KB
-
memory/4236-144-0x00000000031A0000-0x00000000031B0000-memory.dmpFilesize
64KB
-
memory/4236-143-0x000000001C860000-0x000000001C912000-memory.dmpFilesize
712KB
-
memory/4236-141-0x00000000031A0000-0x00000000031B0000-memory.dmpFilesize
64KB
-
memory/4780-407-0x000002574AF90000-0x000002574AFA0000-memory.dmpFilesize
64KB
-
memory/4780-411-0x000002574B860000-0x000002574B870000-memory.dmpFilesize
64KB
-
memory/4780-418-0x0000025753B20000-0x0000025753B21000-memory.dmpFilesize
4KB
-
memory/4780-420-0x0000025753BA0000-0x0000025753BA1000-memory.dmpFilesize
4KB
-
memory/4780-422-0x0000025753BA0000-0x0000025753BA1000-memory.dmpFilesize
4KB
-
memory/4780-423-0x0000025753C30000-0x0000025753C31000-memory.dmpFilesize
4KB
-
memory/4780-424-0x0000025753C30000-0x0000025753C31000-memory.dmpFilesize
4KB
-
memory/4780-425-0x0000025753C40000-0x0000025753C41000-memory.dmpFilesize
4KB
-
memory/4780-426-0x0000025753C40000-0x0000025753C41000-memory.dmpFilesize
4KB