Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:30
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (12) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 5 IoCs
Processes:
resource yara_rule behavioral15/memory/108-1-0x00000000010B0000-0x000000000111C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral15/memory/672-28-0x0000000001260000-0x00000000012CC000-memory.dmp family_quasar behavioral15/memory/1452-40-0x0000000001260000-0x00000000012CC000-memory.dmp family_quasar behavioral15/memory/2452-52-0x0000000001260000-0x00000000012CC000-memory.dmp family_quasar -
Executes dropped EXE 4 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exepid process 2904 Client.exe 672 Client.exe 1452 Client.exe 2452 Client.exe -
Loads dropped DLL 4 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.execmd.execmd.execmd.exepid process 108 Uni - Copy (12) - Copy - Copy.exe 2884 cmd.exe 928 cmd.exe 2732 cmd.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 11 api.ipify.org 15 ip-api.com 17 api.ipify.org 21 ip-api.com 23 api.ipify.org 6 api.ipify.org 8 ip-api.com 27 ip-api.com 29 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1624 SCHTASKS.exe 2100 schtasks.exe 1604 schtasks.exe 2544 schtasks.exe 2392 schtasks.exe 2892 schtasks.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 1936 PING.EXE 2320 PING.EXE 2988 PING.EXE 2780 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 108 Uni - Copy (12) - Copy - Copy.exe Token: SeDebugPrivilege 2904 Client.exe Token: SeDebugPrivilege 672 Client.exe Token: SeDebugPrivilege 1452 Client.exe Token: SeDebugPrivilege 2452 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 108 wrote to memory of 2892 108 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 108 wrote to memory of 2892 108 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 108 wrote to memory of 2892 108 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 108 wrote to memory of 2892 108 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 108 wrote to memory of 2904 108 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 108 wrote to memory of 2904 108 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 108 wrote to memory of 2904 108 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 108 wrote to memory of 2904 108 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 108 wrote to memory of 2904 108 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 108 wrote to memory of 2904 108 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 108 wrote to memory of 2904 108 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 108 wrote to memory of 1624 108 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 108 wrote to memory of 1624 108 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 108 wrote to memory of 1624 108 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 108 wrote to memory of 1624 108 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 2904 wrote to memory of 2100 2904 Client.exe schtasks.exe PID 2904 wrote to memory of 2100 2904 Client.exe schtasks.exe PID 2904 wrote to memory of 2100 2904 Client.exe schtasks.exe PID 2904 wrote to memory of 2100 2904 Client.exe schtasks.exe PID 2904 wrote to memory of 2884 2904 Client.exe cmd.exe PID 2904 wrote to memory of 2884 2904 Client.exe cmd.exe PID 2904 wrote to memory of 2884 2904 Client.exe cmd.exe PID 2904 wrote to memory of 2884 2904 Client.exe cmd.exe PID 2884 wrote to memory of 2412 2884 cmd.exe chcp.com PID 2884 wrote to memory of 2412 2884 cmd.exe chcp.com PID 2884 wrote to memory of 2412 2884 cmd.exe chcp.com PID 2884 wrote to memory of 2412 2884 cmd.exe chcp.com PID 2884 wrote to memory of 1936 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 1936 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 1936 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 1936 2884 cmd.exe PING.EXE PID 2884 wrote to memory of 672 2884 cmd.exe Client.exe PID 2884 wrote to memory of 672 2884 cmd.exe Client.exe PID 2884 wrote to memory of 672 2884 cmd.exe Client.exe PID 2884 wrote to memory of 672 2884 cmd.exe Client.exe PID 2884 wrote to memory of 672 2884 cmd.exe Client.exe PID 2884 wrote to memory of 672 2884 cmd.exe Client.exe PID 2884 wrote to memory of 672 2884 cmd.exe Client.exe PID 672 wrote to memory of 1604 672 Client.exe schtasks.exe PID 672 wrote to memory of 1604 672 Client.exe schtasks.exe PID 672 wrote to memory of 1604 672 Client.exe schtasks.exe PID 672 wrote to memory of 1604 672 Client.exe schtasks.exe PID 672 wrote to memory of 928 672 Client.exe cmd.exe PID 672 wrote to memory of 928 672 Client.exe cmd.exe PID 672 wrote to memory of 928 672 Client.exe cmd.exe PID 672 wrote to memory of 928 672 Client.exe cmd.exe PID 928 wrote to memory of 736 928 cmd.exe chcp.com PID 928 wrote to memory of 736 928 cmd.exe chcp.com PID 928 wrote to memory of 736 928 cmd.exe chcp.com PID 928 wrote to memory of 736 928 cmd.exe chcp.com PID 928 wrote to memory of 2320 928 cmd.exe PING.EXE PID 928 wrote to memory of 2320 928 cmd.exe PING.EXE PID 928 wrote to memory of 2320 928 cmd.exe PING.EXE PID 928 wrote to memory of 2320 928 cmd.exe PING.EXE PID 928 wrote to memory of 1452 928 cmd.exe Client.exe PID 928 wrote to memory of 1452 928 cmd.exe Client.exe PID 928 wrote to memory of 1452 928 cmd.exe Client.exe PID 928 wrote to memory of 1452 928 cmd.exe Client.exe PID 928 wrote to memory of 1452 928 cmd.exe Client.exe PID 928 wrote to memory of 1452 928 cmd.exe Client.exe PID 928 wrote to memory of 1452 928 cmd.exe Client.exe PID 1452 wrote to memory of 2544 1452 Client.exe schtasks.exe PID 1452 wrote to memory of 2544 1452 Client.exe schtasks.exe PID 1452 wrote to memory of 2544 1452 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\74cDYAeB5dSk.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\t8CTZ4bjcl52.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CvtFurH6WKfS.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mLjI31YZczax.bat" "9⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (12) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\74cDYAeB5dSk.batFilesize
207B
MD58e224ba1d43f65d40f4372c0b66078f0
SHA1b0d6d87be60505ddfa0e1367a75eff975d44eaaf
SHA25681daba5d9982d7054fd1f6c5fc372baef57b27dc58d34860299f11774ffbe74d
SHA512deeccea9deaa1a6d03ddd24732236d6741caa4eee63efbdf039c1060626ee99979440acffa9a14c779e5f560c7871eb9f821a4e5989d38ea38b5a892854578b1
-
C:\Users\Admin\AppData\Local\Temp\CvtFurH6WKfS.batFilesize
207B
MD54dd5e64d09c6e76e4067db83f56ca86c
SHA17ddfd15f52564a4a7bff62e8a07f700a0cf79649
SHA256051d704b172e438277eba4fb3568b61d6e2ec0a1224bc28e0a1ed95ad30a5775
SHA51216ed73e1d8c1382733f1ec83c5314817f8e972ca669820545d2b3e1b0a4f85a057670e055fc10f8afff7fcaae1eb30e65d67ebed860ad9bda85bba2c667dd14d
-
C:\Users\Admin\AppData\Local\Temp\mLjI31YZczax.batFilesize
207B
MD52be9e42319d703ac8ddf3b70f64f6abe
SHA1eb9b3c9ef052b0c5dfcefe27d2a4bbfb9bad7b5f
SHA25670bcc8c9c1d48ab2a51bdf4e095e29eaac7799a10a61b4572b1e842b4264e4d1
SHA512b3a6babf41bec0d46ac2141b92d5041e2a9fe83148a561827fb63c8f65058b74fa50491057c48f64ce4c81552fd59febc57577a3379375248269e3e076390342
-
C:\Users\Admin\AppData\Local\Temp\t8CTZ4bjcl52.batFilesize
207B
MD58684f15775bf60c2f7b50a6c1c8884e0
SHA1290a2b23edacb492d9e4aeb41b7deefa4a176d4e
SHA25681e79aebfbd7120088f9d071471ef47176655f14b82aafda1700b41da5179230
SHA5126b8ba1d21019e63676f61c3a28a99ff0ee52814d6ebe64d5cc08b0a1dd585520c42ef240b797bd10e0667daf71a4118a7d2aaf65bd2147f89c5ba0d62e98dc3a
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/108-14-0x0000000074CA0000-0x000000007538E000-memory.dmpFilesize
6.9MB
-
memory/108-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmpFilesize
4KB
-
memory/108-4-0x0000000074CA0000-0x000000007538E000-memory.dmpFilesize
6.9MB
-
memory/108-3-0x0000000074CAE000-0x0000000074CAF000-memory.dmpFilesize
4KB
-
memory/108-2-0x0000000074CA0000-0x000000007538E000-memory.dmpFilesize
6.9MB
-
memory/108-1-0x00000000010B0000-0x000000000111C000-memory.dmpFilesize
432KB
-
memory/672-28-0x0000000001260000-0x00000000012CC000-memory.dmpFilesize
432KB
-
memory/1452-40-0x0000000001260000-0x00000000012CC000-memory.dmpFilesize
432KB
-
memory/2452-52-0x0000000001260000-0x00000000012CC000-memory.dmpFilesize
432KB
-
memory/2904-12-0x0000000074CA0000-0x000000007538E000-memory.dmpFilesize
6.9MB
-
memory/2904-13-0x0000000074CA0000-0x000000007538E000-memory.dmpFilesize
6.9MB
-
memory/2904-15-0x0000000074CA0000-0x000000007538E000-memory.dmpFilesize
6.9MB
-
memory/2904-25-0x0000000074CA0000-0x000000007538E000-memory.dmpFilesize
6.9MB