Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
305s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral25/memory/2060-1-0x0000000001090000-0x00000000010FC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral25/memory/2036-12-0x0000000000030000-0x000000000009C000-memory.dmp family_quasar behavioral25/memory/1936-29-0x0000000000800000-0x000000000086C000-memory.dmp family_quasar behavioral25/memory/788-41-0x00000000009E0000-0x0000000000A4C000-memory.dmp family_quasar behavioral25/memory/2600-53-0x0000000001270000-0x00000000012DC000-memory.dmp family_quasar -
Executes dropped EXE 4 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exepid process 2036 Client.exe 1936 Client.exe 788 Client.exe 2600 Client.exe -
Loads dropped DLL 4 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.execmd.execmd.execmd.exepid process 2060 Uni - Copy (103) - Copy - Copy - Copy.exe 2240 cmd.exe 316 cmd.exe 1132 cmd.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 8 ip-api.com 11 api.ipify.org 21 ip-api.com 23 api.ipify.org 6 api.ipify.org 15 ip-api.com 17 api.ipify.org 27 ip-api.com 29 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2952 schtasks.exe 1608 SCHTASKS.exe 1432 schtasks.exe 3068 schtasks.exe 1568 schtasks.exe 2988 schtasks.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 2872 PING.EXE 1252 PING.EXE 1840 PING.EXE 1260 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2036 Client.exe Token: SeDebugPrivilege 1936 Client.exe Token: SeDebugPrivilege 788 Client.exe Token: SeDebugPrivilege 2600 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (103) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 2060 wrote to memory of 2952 2060 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2060 wrote to memory of 2952 2060 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2060 wrote to memory of 2952 2060 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2060 wrote to memory of 2952 2060 Uni - Copy (103) - Copy - Copy - Copy.exe schtasks.exe PID 2060 wrote to memory of 2036 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2060 wrote to memory of 2036 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2060 wrote to memory of 2036 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2060 wrote to memory of 2036 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2060 wrote to memory of 2036 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2060 wrote to memory of 2036 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2060 wrote to memory of 2036 2060 Uni - Copy (103) - Copy - Copy - Copy.exe Client.exe PID 2060 wrote to memory of 1608 2060 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2060 wrote to memory of 1608 2060 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2060 wrote to memory of 1608 2060 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2060 wrote to memory of 1608 2060 Uni - Copy (103) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2036 wrote to memory of 1432 2036 Client.exe schtasks.exe PID 2036 wrote to memory of 1432 2036 Client.exe schtasks.exe PID 2036 wrote to memory of 1432 2036 Client.exe schtasks.exe PID 2036 wrote to memory of 1432 2036 Client.exe schtasks.exe PID 2036 wrote to memory of 2240 2036 Client.exe cmd.exe PID 2036 wrote to memory of 2240 2036 Client.exe cmd.exe PID 2036 wrote to memory of 2240 2036 Client.exe cmd.exe PID 2036 wrote to memory of 2240 2036 Client.exe cmd.exe PID 2240 wrote to memory of 1932 2240 cmd.exe chcp.com PID 2240 wrote to memory of 1932 2240 cmd.exe chcp.com PID 2240 wrote to memory of 1932 2240 cmd.exe chcp.com PID 2240 wrote to memory of 1932 2240 cmd.exe chcp.com PID 2240 wrote to memory of 2872 2240 cmd.exe PING.EXE PID 2240 wrote to memory of 2872 2240 cmd.exe PING.EXE PID 2240 wrote to memory of 2872 2240 cmd.exe PING.EXE PID 2240 wrote to memory of 2872 2240 cmd.exe PING.EXE PID 2240 wrote to memory of 1936 2240 cmd.exe Client.exe PID 2240 wrote to memory of 1936 2240 cmd.exe Client.exe PID 2240 wrote to memory of 1936 2240 cmd.exe Client.exe PID 2240 wrote to memory of 1936 2240 cmd.exe Client.exe PID 2240 wrote to memory of 1936 2240 cmd.exe Client.exe PID 2240 wrote to memory of 1936 2240 cmd.exe Client.exe PID 2240 wrote to memory of 1936 2240 cmd.exe Client.exe PID 1936 wrote to memory of 3068 1936 Client.exe schtasks.exe PID 1936 wrote to memory of 3068 1936 Client.exe schtasks.exe PID 1936 wrote to memory of 3068 1936 Client.exe schtasks.exe PID 1936 wrote to memory of 3068 1936 Client.exe schtasks.exe PID 1936 wrote to memory of 316 1936 Client.exe cmd.exe PID 1936 wrote to memory of 316 1936 Client.exe cmd.exe PID 1936 wrote to memory of 316 1936 Client.exe cmd.exe PID 1936 wrote to memory of 316 1936 Client.exe cmd.exe PID 316 wrote to memory of 1884 316 cmd.exe chcp.com PID 316 wrote to memory of 1884 316 cmd.exe chcp.com PID 316 wrote to memory of 1884 316 cmd.exe chcp.com PID 316 wrote to memory of 1884 316 cmd.exe chcp.com PID 316 wrote to memory of 1252 316 cmd.exe PING.EXE PID 316 wrote to memory of 1252 316 cmd.exe PING.EXE PID 316 wrote to memory of 1252 316 cmd.exe PING.EXE PID 316 wrote to memory of 1252 316 cmd.exe PING.EXE PID 316 wrote to memory of 788 316 cmd.exe Client.exe PID 316 wrote to memory of 788 316 cmd.exe Client.exe PID 316 wrote to memory of 788 316 cmd.exe Client.exe PID 316 wrote to memory of 788 316 cmd.exe Client.exe PID 316 wrote to memory of 788 316 cmd.exe Client.exe PID 316 wrote to memory of 788 316 cmd.exe Client.exe PID 316 wrote to memory of 788 316 cmd.exe Client.exe PID 788 wrote to memory of 1568 788 Client.exe schtasks.exe PID 788 wrote to memory of 1568 788 Client.exe schtasks.exe PID 788 wrote to memory of 1568 788 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IhsH40olLSYM.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uAwkq2Vpi7EM.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\iAaElUHvLAty.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8zuTglHvIMrB.bat" "9⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (103) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8zuTglHvIMrB.batFilesize
207B
MD57ee78f4a2ddea9e19f8eb50ace237883
SHA1c94eab1e4ede4d8b9d286f29a03345c280f00641
SHA2566d1c84edd5003073a16fc29a4051b9c6417af6674201b29be4c44307976c5269
SHA5129f29830a80a24985f304f0c49e6e5e780475ca3d221212a1325d3d19d7e028c9467a6f2544ccba66254702de76334a2fb08fb21abbee6179e7067ca0f656287e
-
C:\Users\Admin\AppData\Local\Temp\IhsH40olLSYM.batFilesize
207B
MD553f407d16a558393d2e2acd088c1b1ef
SHA1dc0b8277ade2b34a1a822835cff97bd986ddd421
SHA2566f0e870cb5f2e30cc47632f00480f9fd958bc8ab81a05c0256b00d394ab5972f
SHA512c5101000000f9c2feba4256a86b2601f592441c286b0272cb871f5310391dbc34630fc2111acbb37049262771caf5761556e92a87ca135c022302ab852bdbe2b
-
C:\Users\Admin\AppData\Local\Temp\iAaElUHvLAty.batFilesize
207B
MD5da5b7b89f973b4446021b81cdb527573
SHA16ccbde21e73bd303facf91529bc7c7cc9761ce87
SHA25649809953abe132c177e9cc1457a3efd6a4fcb2474cd4e5de891176ef561e9edb
SHA5120af8d44aa14d88a24073bdd829a0aea90bac2a400334af3d7ad1ea02994d8ee3ff56625ed1e9701772abfb809bcc87df1d9fbb5fdf9a6336a5d0dce1f2567dab
-
C:\Users\Admin\AppData\Local\Temp\uAwkq2Vpi7EM.batFilesize
207B
MD56750e905b70526d7b731bbf0082f3363
SHA1ca1b8ea51437fbe7f86d93ac3daf1dac4f893f52
SHA25635ca458f252100d83203b67f2c5cf52f18d4e3d5d93d32032701fdb9039d69bc
SHA512cac426711907b6decc93bdf86dd304e6d1dbdf7dc1ee3e64bd827a8dbb870a2cab4d08626a93a900bb32a40d0c2acb051b4583559be3804e277501ca5fac19f1
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/788-41-0x00000000009E0000-0x0000000000A4C000-memory.dmpFilesize
432KB
-
memory/1936-29-0x0000000000800000-0x000000000086C000-memory.dmpFilesize
432KB
-
memory/2036-25-0x0000000074820000-0x0000000074F0E000-memory.dmpFilesize
6.9MB
-
memory/2036-13-0x0000000074820000-0x0000000074F0E000-memory.dmpFilesize
6.9MB
-
memory/2036-16-0x0000000074820000-0x0000000074F0E000-memory.dmpFilesize
6.9MB
-
memory/2036-14-0x0000000074820000-0x0000000074F0E000-memory.dmpFilesize
6.9MB
-
memory/2036-12-0x0000000000030000-0x000000000009C000-memory.dmpFilesize
432KB
-
memory/2060-15-0x0000000074820000-0x0000000074F0E000-memory.dmpFilesize
6.9MB
-
memory/2060-0-0x000000007482E000-0x000000007482F000-memory.dmpFilesize
4KB
-
memory/2060-4-0x0000000074820000-0x0000000074F0E000-memory.dmpFilesize
6.9MB
-
memory/2060-3-0x000000007482E000-0x000000007482F000-memory.dmpFilesize
4KB
-
memory/2060-2-0x0000000074820000-0x0000000074F0E000-memory.dmpFilesize
6.9MB
-
memory/2060-1-0x0000000001090000-0x00000000010FC000-memory.dmpFilesize
432KB
-
memory/2600-53-0x0000000001270000-0x00000000012DC000-memory.dmpFilesize
432KB