Analysis
-
max time kernel
20s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe
Resource
win10v2004-20240226-en
General
-
Target
795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe
-
Size
4.2MB
-
MD5
7fcc0c82ca8eeeb80276807af89b3f47
-
SHA1
b218f631c1bd0bc2370fa629eeb5153a7a129e59
-
SHA256
795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693
-
SHA512
47d1b2dd22a25aac77f4ee476fc57eaaf7a102def7018ac45288e47c8af444ed2342388b35054fe31a4c02a177f7761a761bec82b96cc1acd9b809014d203c6d
-
SSDEEP
98304:OFDX2D7KpLLzZSxNcqBsKAQPNaC1l72v7lGIQS:YyOpLXMxNjBsKAgF1kz8IN
Malware Config
Signatures
-
Glupteba payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/380-2-0x0000000006560000-0x0000000006E4B000-memory.dmp family_glupteba behavioral1/memory/380-23-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/380-51-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/380-55-0x0000000006560000-0x0000000006E4B000-memory.dmp family_glupteba behavioral1/memory/380-56-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4400-106-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4400-156-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-223-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-256-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-257-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-261-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-267-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-269-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-271-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-273-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4324-275-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 228 netsh.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral1/memory/1356-266-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3392-268-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3392-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5080 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4408 4400 WerFault.exe 795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 708 schtasks.exe 416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 3248 powershell.exe 3248 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3248 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exedescription pid process target process PID 380 wrote to memory of 3248 380 795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe powershell.exe PID 380 wrote to memory of 3248 380 795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe powershell.exe PID 380 wrote to memory of 3248 380 795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe"C:\Users\Admin\AppData\Local\Temp\795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe"C:\Users\Admin\AppData\Local\Temp\795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693.exe"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 8003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4400 -ip 44001⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4120 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_or4yo3lz.hp0.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5efdef3e6df36a9aa1954ca049fde97ec
SHA127c1f73ddf281d4eea88257f9fe4617ec92b099d
SHA25637c4109505b63fc12f020848cbc921b979bf60e512398843d3614e51419ae227
SHA512330bdc9f0579dccb2618dd2d1297f59524d648fe0801ee537de5c4c5fc03fbdddcbb43a50b7fd4a496cd107e966b1e91df7ad45a36d37e7759b2b831fb2265f6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5efff908e97921347613bde31c2447b7e
SHA17454deb93de6b3851a6a7abaa04b3b13c0cfdb32
SHA256457cea740b52f6a97a220fb9f96427a288364ae09734a2ffa8651f70d7c489a2
SHA512d1baca7721775bdb8bd536458e343adf2f37b2c946d1d8082b85a908ca705e94cd2ec2283978adbd876f1582ca16cce884fbd5b448d03e88a05e313df551cccb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5142a8b7c8e25fde335fb1f567db36791
SHA188d4b9619588dedb4efbb1707444d9736cc76929
SHA256ffa4cc337daf2a9bfcc215709e0924f8125b16c3202bef7f8a810878d6f30084
SHA51205aa266dd0f73b69f8159059a097627485ac989127c8600d9c19cc8d6fab77192b3907ff38ecfe92a3d9d3215e1d4243737d218505a100d4bd73a27aa77575cb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5dfaff93d17c15e69ced507fec8b92f1d
SHA126f461f48c2fbb4e781497ba28666e8d1b5c1ed4
SHA256999888dea1f3dc959160118a98c3d925edcb2a87639241d146c0db94ce77f65f
SHA512f4d98f0800bd936ea64b886e9de7e06c738231d721ce33ba7ea5212447162b4bd3580b7fd4e039cd0d8bd5c51bc40d055d45192f993b3c343dfe63352eea8a04
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD59529b0da073499ddbabcaed15f4430e7
SHA1c45044d668bd3c6fcce28f336bf84810766f0938
SHA256c82adea40639d155c46a425172df7fabedd7236d243a6e4e76551dd236d830a2
SHA5128050165c69c7f5c0aa52478fa5ac4273cc2cea6fcaf4092502f9645bfbdbe85dc1eae4e094a2444e6c87cba727af5e0181197a47690c297406691482fb6fe551
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD57fcc0c82ca8eeeb80276807af89b3f47
SHA1b218f631c1bd0bc2370fa629eeb5153a7a129e59
SHA256795fa896d54c6eed1eeb58c955e5a85a458d5fd85ccb1c7579998144360c5693
SHA51247d1b2dd22a25aac77f4ee476fc57eaaf7a102def7018ac45288e47c8af444ed2342388b35054fe31a4c02a177f7761a761bec82b96cc1acd9b809014d203c6d
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
memory/380-51-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/380-2-0x0000000006560000-0x0000000006E4B000-memory.dmpFilesize
8.9MB
-
memory/380-56-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/380-46-0x00000000049B0000-0x0000000004DB5000-memory.dmpFilesize
4.0MB
-
memory/380-1-0x00000000049B0000-0x0000000004DB5000-memory.dmpFilesize
4.0MB
-
memory/380-23-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/380-55-0x0000000006560000-0x0000000006E4B000-memory.dmpFilesize
8.9MB
-
memory/1300-109-0x00000000706F0000-0x000000007073C000-memory.dmpFilesize
304KB
-
memory/1300-94-0x0000000004E90000-0x0000000004EA0000-memory.dmpFilesize
64KB
-
memory/1300-92-0x00000000747F0000-0x0000000074FA0000-memory.dmpFilesize
7.7MB
-
memory/1300-122-0x00000000747F0000-0x0000000074FA0000-memory.dmpFilesize
7.7MB
-
memory/1300-110-0x0000000070EB0000-0x0000000071204000-memory.dmpFilesize
3.3MB
-
memory/1300-111-0x000000007F020000-0x000000007F030000-memory.dmpFilesize
64KB
-
memory/1300-93-0x0000000004E90000-0x0000000004EA0000-memory.dmpFilesize
64KB
-
memory/1300-104-0x0000000005BB0000-0x0000000005F04000-memory.dmpFilesize
3.3MB
-
memory/1300-107-0x0000000004E90000-0x0000000004EA0000-memory.dmpFilesize
64KB
-
memory/1356-266-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/3232-137-0x0000000005100000-0x0000000005110000-memory.dmpFilesize
64KB
-
memory/3232-135-0x0000000005F40000-0x0000000006294000-memory.dmpFilesize
3.3MB
-
memory/3232-138-0x00000000706F0000-0x000000007073C000-memory.dmpFilesize
304KB
-
memory/3232-125-0x0000000005100000-0x0000000005110000-memory.dmpFilesize
64KB
-
memory/3232-124-0x0000000005100000-0x0000000005110000-memory.dmpFilesize
64KB
-
memory/3232-123-0x00000000747F0000-0x0000000074FA0000-memory.dmpFilesize
7.7MB
-
memory/3232-139-0x0000000070B10000-0x0000000070E64000-memory.dmpFilesize
3.3MB
-
memory/3232-150-0x00000000747F0000-0x0000000074FA0000-memory.dmpFilesize
7.7MB
-
memory/3248-41-0x0000000007B50000-0x0000000007B6E000-memory.dmpFilesize
120KB
-
memory/3248-26-0x0000000008050000-0x00000000086CA000-memory.dmpFilesize
6.5MB
-
memory/3248-3-0x0000000074750000-0x0000000074F00000-memory.dmpFilesize
7.7MB
-
memory/3248-4-0x0000000005120000-0x0000000005130000-memory.dmpFilesize
64KB
-
memory/3248-5-0x0000000004FF0000-0x0000000005026000-memory.dmpFilesize
216KB
-
memory/3248-6-0x0000000005760000-0x0000000005D88000-memory.dmpFilesize
6.2MB
-
memory/3248-7-0x0000000005620000-0x0000000005642000-memory.dmpFilesize
136KB
-
memory/3248-8-0x0000000005D90000-0x0000000005DF6000-memory.dmpFilesize
408KB
-
memory/3248-14-0x0000000005F70000-0x0000000005FD6000-memory.dmpFilesize
408KB
-
memory/3248-19-0x0000000006060000-0x00000000063B4000-memory.dmpFilesize
3.3MB
-
memory/3248-20-0x0000000006670000-0x000000000668E000-memory.dmpFilesize
120KB
-
memory/3248-21-0x0000000006720000-0x000000000676C000-memory.dmpFilesize
304KB
-
memory/3248-22-0x00000000069E0000-0x0000000006A24000-memory.dmpFilesize
272KB
-
memory/3248-24-0x0000000005120000-0x0000000005130000-memory.dmpFilesize
64KB
-
memory/3248-25-0x0000000006C10000-0x0000000006C86000-memory.dmpFilesize
472KB
-
memory/3248-50-0x0000000007E90000-0x0000000007E98000-memory.dmpFilesize
32KB
-
memory/3248-49-0x0000000007EA0000-0x0000000007EBA000-memory.dmpFilesize
104KB
-
memory/3248-48-0x0000000007DB0000-0x0000000007DC4000-memory.dmpFilesize
80KB
-
memory/3248-47-0x0000000007D10000-0x0000000007D1E000-memory.dmpFilesize
56KB
-
memory/3248-45-0x0000000007CD0000-0x0000000007CE1000-memory.dmpFilesize
68KB
-
memory/3248-44-0x0000000007DD0000-0x0000000007E66000-memory.dmpFilesize
600KB
-
memory/3248-27-0x0000000006CD0000-0x0000000006CEA000-memory.dmpFilesize
104KB
-
memory/3248-43-0x0000000007CC0000-0x0000000007CCA000-memory.dmpFilesize
40KB
-
memory/3248-54-0x0000000074750000-0x0000000074F00000-memory.dmpFilesize
7.7MB
-
memory/3248-42-0x0000000007BB0000-0x0000000007C53000-memory.dmpFilesize
652KB
-
memory/3248-31-0x0000000070770000-0x0000000070AC4000-memory.dmpFilesize
3.3MB
-
memory/3248-30-0x00000000705F0000-0x000000007063C000-memory.dmpFilesize
304KB
-
memory/3248-29-0x0000000007B70000-0x0000000007BA2000-memory.dmpFilesize
200KB
-
memory/3248-28-0x000000007F510000-0x000000007F520000-memory.dmpFilesize
64KB
-
memory/3392-272-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/3392-268-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/4324-269-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-223-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-273-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-277-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-271-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-256-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-257-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-261-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-275-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4324-267-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4400-106-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4400-58-0x0000000004990000-0x0000000004D97000-memory.dmpFilesize
4.0MB
-
memory/4400-156-0x0000000000400000-0x0000000004428000-memory.dmpFilesize
64.2MB
-
memory/4400-108-0x0000000004990000-0x0000000004D97000-memory.dmpFilesize
4.0MB
-
memory/4696-74-0x00000000706F0000-0x000000007073C000-memory.dmpFilesize
304KB
-
memory/4696-61-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/4696-60-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/4696-59-0x00000000747F0000-0x0000000074FA0000-memory.dmpFilesize
7.7MB
-
memory/4696-67-0x0000000005D70000-0x00000000060C4000-memory.dmpFilesize
3.3MB
-
memory/4696-72-0x0000000006450000-0x000000000649C000-memory.dmpFilesize
304KB
-
memory/4696-73-0x0000000004F40000-0x0000000004F50000-memory.dmpFilesize
64KB
-
memory/4696-75-0x0000000070E90000-0x00000000711E4000-memory.dmpFilesize
3.3MB
-
memory/4696-85-0x00000000075E0000-0x0000000007683000-memory.dmpFilesize
652KB
-
memory/4696-86-0x0000000007900000-0x0000000007911000-memory.dmpFilesize
68KB
-
memory/4696-87-0x0000000007950000-0x0000000007964000-memory.dmpFilesize
80KB
-
memory/4696-90-0x00000000747F0000-0x0000000074FA0000-memory.dmpFilesize
7.7MB