Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
296s -
max time network
299s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:30
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (10) - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral5/memory/2596-1-0x00000000003E0000-0x000000000044C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral5/memory/2968-12-0x0000000000130000-0x000000000019C000-memory.dmp family_quasar behavioral5/memory/2124-29-0x00000000010D0000-0x000000000113C000-memory.dmp family_quasar behavioral5/memory/1740-41-0x00000000010D0000-0x000000000113C000-memory.dmp family_quasar behavioral5/memory/2552-53-0x0000000001360000-0x00000000013CC000-memory.dmp family_quasar -
Executes dropped EXE 4 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exepid process 2968 Client.exe 2124 Client.exe 1740 Client.exe 2552 Client.exe -
Loads dropped DLL 4 IoCs
Processes:
Uni - Copy (10) - Copy.execmd.execmd.execmd.exepid process 2596 Uni - Copy (10) - Copy.exe 2312 cmd.exe 1884 cmd.exe 2696 cmd.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 17 api.ipify.org 23 api.ipify.org 27 ip-api.com 29 api.ipify.org 6 api.ipify.org 8 ip-api.com 11 api.ipify.org 15 ip-api.com 21 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2564 schtasks.exe 2176 SCHTASKS.exe 2984 schtasks.exe 1776 schtasks.exe 1428 schtasks.exe 1032 schtasks.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 2264 PING.EXE 1348 PING.EXE 2236 PING.EXE 2796 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uni - Copy (10) - Copy.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2596 Uni - Copy (10) - Copy.exe Token: SeDebugPrivilege 2968 Client.exe Token: SeDebugPrivilege 2124 Client.exe Token: SeDebugPrivilege 1740 Client.exe Token: SeDebugPrivilege 2552 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2596 wrote to memory of 2564 2596 Uni - Copy (10) - Copy.exe schtasks.exe PID 2596 wrote to memory of 2564 2596 Uni - Copy (10) - Copy.exe schtasks.exe PID 2596 wrote to memory of 2564 2596 Uni - Copy (10) - Copy.exe schtasks.exe PID 2596 wrote to memory of 2564 2596 Uni - Copy (10) - Copy.exe schtasks.exe PID 2596 wrote to memory of 2968 2596 Uni - Copy (10) - Copy.exe Client.exe PID 2596 wrote to memory of 2968 2596 Uni - Copy (10) - Copy.exe Client.exe PID 2596 wrote to memory of 2968 2596 Uni - Copy (10) - Copy.exe Client.exe PID 2596 wrote to memory of 2968 2596 Uni - Copy (10) - Copy.exe Client.exe PID 2596 wrote to memory of 2968 2596 Uni - Copy (10) - Copy.exe Client.exe PID 2596 wrote to memory of 2968 2596 Uni - Copy (10) - Copy.exe Client.exe PID 2596 wrote to memory of 2968 2596 Uni - Copy (10) - Copy.exe Client.exe PID 2596 wrote to memory of 2176 2596 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 2596 wrote to memory of 2176 2596 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 2596 wrote to memory of 2176 2596 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 2596 wrote to memory of 2176 2596 Uni - Copy (10) - Copy.exe SCHTASKS.exe PID 2968 wrote to memory of 2984 2968 Client.exe schtasks.exe PID 2968 wrote to memory of 2984 2968 Client.exe schtasks.exe PID 2968 wrote to memory of 2984 2968 Client.exe schtasks.exe PID 2968 wrote to memory of 2984 2968 Client.exe schtasks.exe PID 2968 wrote to memory of 2312 2968 Client.exe cmd.exe PID 2968 wrote to memory of 2312 2968 Client.exe cmd.exe PID 2968 wrote to memory of 2312 2968 Client.exe cmd.exe PID 2968 wrote to memory of 2312 2968 Client.exe cmd.exe PID 2312 wrote to memory of 660 2312 cmd.exe chcp.com PID 2312 wrote to memory of 660 2312 cmd.exe chcp.com PID 2312 wrote to memory of 660 2312 cmd.exe chcp.com PID 2312 wrote to memory of 660 2312 cmd.exe chcp.com PID 2312 wrote to memory of 2264 2312 cmd.exe PING.EXE PID 2312 wrote to memory of 2264 2312 cmd.exe PING.EXE PID 2312 wrote to memory of 2264 2312 cmd.exe PING.EXE PID 2312 wrote to memory of 2264 2312 cmd.exe PING.EXE PID 2312 wrote to memory of 2124 2312 cmd.exe Client.exe PID 2312 wrote to memory of 2124 2312 cmd.exe Client.exe PID 2312 wrote to memory of 2124 2312 cmd.exe Client.exe PID 2312 wrote to memory of 2124 2312 cmd.exe Client.exe PID 2312 wrote to memory of 2124 2312 cmd.exe Client.exe PID 2312 wrote to memory of 2124 2312 cmd.exe Client.exe PID 2312 wrote to memory of 2124 2312 cmd.exe Client.exe PID 2124 wrote to memory of 1776 2124 Client.exe schtasks.exe PID 2124 wrote to memory of 1776 2124 Client.exe schtasks.exe PID 2124 wrote to memory of 1776 2124 Client.exe schtasks.exe PID 2124 wrote to memory of 1776 2124 Client.exe schtasks.exe PID 2124 wrote to memory of 1884 2124 Client.exe cmd.exe PID 2124 wrote to memory of 1884 2124 Client.exe cmd.exe PID 2124 wrote to memory of 1884 2124 Client.exe cmd.exe PID 2124 wrote to memory of 1884 2124 Client.exe cmd.exe PID 1884 wrote to memory of 684 1884 cmd.exe chcp.com PID 1884 wrote to memory of 684 1884 cmd.exe chcp.com PID 1884 wrote to memory of 684 1884 cmd.exe chcp.com PID 1884 wrote to memory of 684 1884 cmd.exe chcp.com PID 1884 wrote to memory of 1348 1884 cmd.exe PING.EXE PID 1884 wrote to memory of 1348 1884 cmd.exe PING.EXE PID 1884 wrote to memory of 1348 1884 cmd.exe PING.EXE PID 1884 wrote to memory of 1348 1884 cmd.exe PING.EXE PID 1884 wrote to memory of 1740 1884 cmd.exe Client.exe PID 1884 wrote to memory of 1740 1884 cmd.exe Client.exe PID 1884 wrote to memory of 1740 1884 cmd.exe Client.exe PID 1884 wrote to memory of 1740 1884 cmd.exe Client.exe PID 1884 wrote to memory of 1740 1884 cmd.exe Client.exe PID 1884 wrote to memory of 1740 1884 cmd.exe Client.exe PID 1884 wrote to memory of 1740 1884 cmd.exe Client.exe PID 1740 wrote to memory of 1428 1740 Client.exe schtasks.exe PID 1740 wrote to memory of 1428 1740 Client.exe schtasks.exe PID 1740 wrote to memory of 1428 1740 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lAbHXfnYWsdk.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BzuWSwnYT3bx.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\21Nk98jxbuxT.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ewMc4VcVOWmt.bat" "9⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\21Nk98jxbuxT.batFilesize
207B
MD5fafe9f4e19f9ca6ac7d069bf5e7f7c43
SHA1e5509c78dc9730def371dc41ab7f326b6513d53a
SHA2561752c7dc1a00d772bf3a218249b8c359c49c4bec43ec3b81b5293d37e1710522
SHA51237f06908ffd3b7aa12f15d4d81da4f128ba61ec121dd255d02613eae6ae24c16c089e33b615d871c1ef9638e0067459f2f2f10f4017a380e5f03b426870f14a9
-
C:\Users\Admin\AppData\Local\Temp\BzuWSwnYT3bx.batFilesize
207B
MD5d03d4df13ef004c7dea80f7b500d2730
SHA1df3c15d6471f9454e0f3bdb9fc7d882760821b45
SHA25630ef6a408585b31a0f3d4e7f49b8a5cb047f039fef6131a17bcb47744697f1ed
SHA512e60e0e71361695e31e5bdc4e84eec15540c25cfcc4048bdd0fa230c5f28a2216f52e38cf75d0d0b2762c61c540de3d53dcc988aabdec4064950fe2ff3dd419e2
-
C:\Users\Admin\AppData\Local\Temp\ewMc4VcVOWmt.batFilesize
207B
MD578da848d298ab17f8a0fe38554e282c1
SHA180a998fba81f8271425165364f59c4f3fe9a68d6
SHA256549fe0521be9bd60974d7fafc2ea8c3edfe8eeeca1684961aa01e508a35e2dde
SHA5125e7b9a2d2ba6ffa48268bc7a0957233be9cd2b83fd85244a6331a7b6461a836e794ba77617faff5822b9699b6f4429d8d137513e806d7ee5b1de028fc3ce9047
-
C:\Users\Admin\AppData\Local\Temp\lAbHXfnYWsdk.batFilesize
207B
MD5d54347591da8913b485a3618f8c2fb5c
SHA1328c80544107a70ee30796dfbc0548bc895addb9
SHA2560236691709d47da4680c4afb5ece1c45c8e0c2a94b4d0a44cecf3225146cb1ba
SHA5125f688f8bf46dfa910e83f7dedecec0803472713feb8a04edc494dbb7c25f9ef4a25e0dc4fa8a814577ace7bfa289950e25a1db0fd1b6a406a7c3de503e3f1dea
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1740-41-0x00000000010D0000-0x000000000113C000-memory.dmpFilesize
432KB
-
memory/2124-29-0x00000000010D0000-0x000000000113C000-memory.dmpFilesize
432KB
-
memory/2552-53-0x0000000001360000-0x00000000013CC000-memory.dmpFilesize
432KB
-
memory/2596-3-0x000000007440E000-0x000000007440F000-memory.dmpFilesize
4KB
-
memory/2596-15-0x0000000074400000-0x0000000074AEE000-memory.dmpFilesize
6.9MB
-
memory/2596-0-0x000000007440E000-0x000000007440F000-memory.dmpFilesize
4KB
-
memory/2596-4-0x0000000074400000-0x0000000074AEE000-memory.dmpFilesize
6.9MB
-
memory/2596-2-0x0000000074400000-0x0000000074AEE000-memory.dmpFilesize
6.9MB
-
memory/2596-1-0x00000000003E0000-0x000000000044C000-memory.dmpFilesize
432KB
-
memory/2968-14-0x0000000074400000-0x0000000074AEE000-memory.dmpFilesize
6.9MB
-
memory/2968-26-0x0000000074400000-0x0000000074AEE000-memory.dmpFilesize
6.9MB
-
memory/2968-16-0x0000000074400000-0x0000000074AEE000-memory.dmpFilesize
6.9MB
-
memory/2968-13-0x0000000074400000-0x0000000074AEE000-memory.dmpFilesize
6.9MB
-
memory/2968-12-0x0000000000130000-0x000000000019C000-memory.dmpFilesize
432KB