Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
296s -
max time network
296s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:30
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (11) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral9/memory/1716-1-0x00000000012E0000-0x000000000134C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral9/memory/3000-12-0x00000000008D0000-0x000000000093C000-memory.dmp family_quasar behavioral9/memory/2112-29-0x00000000008D0000-0x000000000093C000-memory.dmp family_quasar behavioral9/memory/112-41-0x00000000001A0000-0x000000000020C000-memory.dmp family_quasar behavioral9/memory/2836-53-0x0000000001060000-0x00000000010CC000-memory.dmp family_quasar -
Executes dropped EXE 4 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exepid process 3000 Client.exe 2112 Client.exe 112 Client.exe 2836 Client.exe -
Loads dropped DLL 4 IoCs
Processes:
Uni - Copy (11) - Copy - Copy.execmd.execmd.execmd.exepid process 1716 Uni - Copy (11) - Copy - Copy.exe 1816 cmd.exe 2916 cmd.exe 2724 cmd.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 ip-api.com 2 ip-api.com 11 api.ipify.org 21 ip-api.com 23 api.ipify.org 29 api.ipify.org 6 api.ipify.org 8 ip-api.com 15 ip-api.com 17 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exepid process 1752 schtasks.exe 2632 schtasks.exe 2168 schtasks.exe 3040 schtasks.exe 1244 SCHTASKS.exe 1064 schtasks.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 1224 PING.EXE 568 PING.EXE 2560 PING.EXE 2452 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uni - Copy (11) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1716 Uni - Copy (11) - Copy - Copy.exe Token: SeDebugPrivilege 3000 Client.exe Token: SeDebugPrivilege 2112 Client.exe Token: SeDebugPrivilege 112 Client.exe Token: SeDebugPrivilege 2836 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (11) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 1716 wrote to memory of 3040 1716 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 1716 wrote to memory of 3040 1716 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 1716 wrote to memory of 3040 1716 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 1716 wrote to memory of 3040 1716 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 1716 wrote to memory of 3000 1716 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1716 wrote to memory of 3000 1716 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1716 wrote to memory of 3000 1716 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1716 wrote to memory of 3000 1716 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1716 wrote to memory of 3000 1716 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1716 wrote to memory of 3000 1716 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1716 wrote to memory of 3000 1716 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1716 wrote to memory of 1244 1716 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 1716 wrote to memory of 1244 1716 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 1716 wrote to memory of 1244 1716 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 1716 wrote to memory of 1244 1716 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 3000 wrote to memory of 1064 3000 Client.exe schtasks.exe PID 3000 wrote to memory of 1064 3000 Client.exe schtasks.exe PID 3000 wrote to memory of 1064 3000 Client.exe schtasks.exe PID 3000 wrote to memory of 1064 3000 Client.exe schtasks.exe PID 3000 wrote to memory of 1816 3000 Client.exe cmd.exe PID 3000 wrote to memory of 1816 3000 Client.exe cmd.exe PID 3000 wrote to memory of 1816 3000 Client.exe cmd.exe PID 3000 wrote to memory of 1816 3000 Client.exe cmd.exe PID 1816 wrote to memory of 2876 1816 cmd.exe chcp.com PID 1816 wrote to memory of 2876 1816 cmd.exe chcp.com PID 1816 wrote to memory of 2876 1816 cmd.exe chcp.com PID 1816 wrote to memory of 2876 1816 cmd.exe chcp.com PID 1816 wrote to memory of 1224 1816 cmd.exe PING.EXE PID 1816 wrote to memory of 1224 1816 cmd.exe PING.EXE PID 1816 wrote to memory of 1224 1816 cmd.exe PING.EXE PID 1816 wrote to memory of 1224 1816 cmd.exe PING.EXE PID 1816 wrote to memory of 2112 1816 cmd.exe Client.exe PID 1816 wrote to memory of 2112 1816 cmd.exe Client.exe PID 1816 wrote to memory of 2112 1816 cmd.exe Client.exe PID 1816 wrote to memory of 2112 1816 cmd.exe Client.exe PID 1816 wrote to memory of 2112 1816 cmd.exe Client.exe PID 1816 wrote to memory of 2112 1816 cmd.exe Client.exe PID 1816 wrote to memory of 2112 1816 cmd.exe Client.exe PID 2112 wrote to memory of 1752 2112 Client.exe schtasks.exe PID 2112 wrote to memory of 1752 2112 Client.exe schtasks.exe PID 2112 wrote to memory of 1752 2112 Client.exe schtasks.exe PID 2112 wrote to memory of 1752 2112 Client.exe schtasks.exe PID 2112 wrote to memory of 2916 2112 Client.exe cmd.exe PID 2112 wrote to memory of 2916 2112 Client.exe cmd.exe PID 2112 wrote to memory of 2916 2112 Client.exe cmd.exe PID 2112 wrote to memory of 2916 2112 Client.exe cmd.exe PID 2916 wrote to memory of 864 2916 cmd.exe chcp.com PID 2916 wrote to memory of 864 2916 cmd.exe chcp.com PID 2916 wrote to memory of 864 2916 cmd.exe chcp.com PID 2916 wrote to memory of 864 2916 cmd.exe chcp.com PID 2916 wrote to memory of 568 2916 cmd.exe PING.EXE PID 2916 wrote to memory of 568 2916 cmd.exe PING.EXE PID 2916 wrote to memory of 568 2916 cmd.exe PING.EXE PID 2916 wrote to memory of 568 2916 cmd.exe PING.EXE PID 2916 wrote to memory of 112 2916 cmd.exe Client.exe PID 2916 wrote to memory of 112 2916 cmd.exe Client.exe PID 2916 wrote to memory of 112 2916 cmd.exe Client.exe PID 2916 wrote to memory of 112 2916 cmd.exe Client.exe PID 2916 wrote to memory of 112 2916 cmd.exe Client.exe PID 2916 wrote to memory of 112 2916 cmd.exe Client.exe PID 2916 wrote to memory of 112 2916 cmd.exe Client.exe PID 112 wrote to memory of 2632 112 Client.exe schtasks.exe PID 112 wrote to memory of 2632 112 Client.exe schtasks.exe PID 112 wrote to memory of 2632 112 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\C101uY7YVhan.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Eey2peKRn1tc.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5gRGXqGrvrE8.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VVkWS7Gqs3DL.bat" "9⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (11) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5gRGXqGrvrE8.batFilesize
207B
MD53f284a66b77442ebd86af36751347ebd
SHA1b82702802a2cd98e901ccb1afb75a4f06da2ddd4
SHA256ac179e251b7e418304e894377ab56ffcdd30192ce03caa76683dd28cd20ab0b3
SHA512f83d3a7d3a677569badc1809d1f10d7e57dee7aded7751906928a8b768b687d35e06b941c8201cb987591b72b9e230147211509b28005ceba1753d19e304edb1
-
C:\Users\Admin\AppData\Local\Temp\C101uY7YVhan.batFilesize
207B
MD524a27471386de5a8d44e2364821bff6c
SHA1e64d903ed088e153e31b36c7e0a431ad89a48546
SHA2562f6c07ee54bb86e45bddfb1c794be10e55ed600241e7752ced8852659cf00b4a
SHA5124c51991f88987d9711323d391afb778bfa08f0eb4e1e4b9ff2534c71dd140c4802fa4144cf72bc333030163f00976316c0f7f4584526aee02b56d78c71deee44
-
C:\Users\Admin\AppData\Local\Temp\Eey2peKRn1tc.batFilesize
207B
MD5b578c1a2adf65a4f0d17d2d07a27870a
SHA195ab2dc419df6d2df83386845c19baf685fe2049
SHA2565b87f25434c929d2bbe4ce404c48a0312e55bdf6243d6682263e6af82262eac1
SHA512465711dc11a69748027f547016fc2c3416ef95e2bac80a896b97a57bf84bec9ade6cdf1beb600cbdda3e5a84b0e9efac3a213e00cd1e3d85702571d84abbcf28
-
C:\Users\Admin\AppData\Local\Temp\VVkWS7Gqs3DL.batFilesize
207B
MD5c8e361b50a194f9c96b3523100730aab
SHA126c8ef409f7eea129fb3b3d4a66bcfa2216f1854
SHA256085b1869ec64c915fbbbd270d0d02acf293af24ca63fcfaac80358ca9a78d9b2
SHA512256c4ea7202baab74bb446829016464ad1c7db11474176c247fb36c92259a1f640c23ab04ba70cf6feee19ed1bce72272bb15cf36d8c070b65c98b0cfa6c677a
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/112-41-0x00000000001A0000-0x000000000020C000-memory.dmpFilesize
432KB
-
memory/1716-3-0x0000000074A2E000-0x0000000074A2F000-memory.dmpFilesize
4KB
-
memory/1716-0-0x0000000074A2E000-0x0000000074A2F000-memory.dmpFilesize
4KB
-
memory/1716-15-0x0000000074A20000-0x000000007510E000-memory.dmpFilesize
6.9MB
-
memory/1716-4-0x0000000074A20000-0x000000007510E000-memory.dmpFilesize
6.9MB
-
memory/1716-2-0x0000000074A20000-0x000000007510E000-memory.dmpFilesize
6.9MB
-
memory/1716-1-0x00000000012E0000-0x000000000134C000-memory.dmpFilesize
432KB
-
memory/2112-29-0x00000000008D0000-0x000000000093C000-memory.dmpFilesize
432KB
-
memory/2836-53-0x0000000001060000-0x00000000010CC000-memory.dmpFilesize
432KB
-
memory/3000-14-0x0000000074A20000-0x000000007510E000-memory.dmpFilesize
6.9MB
-
memory/3000-25-0x0000000074A20000-0x000000007510E000-memory.dmpFilesize
6.9MB
-
memory/3000-16-0x0000000074A20000-0x000000007510E000-memory.dmpFilesize
6.9MB
-
memory/3000-12-0x00000000008D0000-0x000000000093C000-memory.dmpFilesize
432KB
-
memory/3000-13-0x0000000074A20000-0x000000007510E000-memory.dmpFilesize
6.9MB