Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
296s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:30
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral31/memory/1464-1-0x0000000000B70000-0x0000000000BDC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral31/memory/2164-12-0x0000000000D80000-0x0000000000DEC000-memory.dmp family_quasar behavioral31/memory/2172-29-0x0000000000100000-0x000000000016C000-memory.dmp family_quasar behavioral31/memory/2080-41-0x0000000000C70000-0x0000000000CDC000-memory.dmp family_quasar behavioral31/memory/2692-53-0x0000000000120000-0x000000000018C000-memory.dmp family_quasar -
Executes dropped EXE 4 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exepid process 2164 Client.exe 2172 Client.exe 2080 Client.exe 2692 Client.exe -
Loads dropped DLL 4 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.execmd.execmd.execmd.exepid process 1464 Uni - Copy (15) - Copy - Copy - Copy.exe 1604 cmd.exe 2268 cmd.exe 2860 cmd.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 api.ipify.org 2 ip-api.com 6 api.ipify.org 8 ip-api.com 15 ip-api.com 17 api.ipify.org 27 ip-api.com 11 api.ipify.org 21 ip-api.com 23 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exepid process 1568 schtasks.exe 316 schtasks.exe 2640 schtasks.exe 1948 SCHTASKS.exe 348 schtasks.exe 2916 schtasks.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 1192 PING.EXE 2064 PING.EXE 2984 PING.EXE 1168 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2164 Client.exe Token: SeDebugPrivilege 2172 Client.exe Token: SeDebugPrivilege 2080 Client.exe Token: SeDebugPrivilege 2692 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 1464 wrote to memory of 2640 1464 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 1464 wrote to memory of 2640 1464 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 1464 wrote to memory of 2640 1464 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 1464 wrote to memory of 2640 1464 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 1464 wrote to memory of 2164 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 1464 wrote to memory of 2164 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 1464 wrote to memory of 2164 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 1464 wrote to memory of 2164 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 1464 wrote to memory of 2164 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 1464 wrote to memory of 2164 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 1464 wrote to memory of 2164 1464 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 1464 wrote to memory of 1948 1464 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1464 wrote to memory of 1948 1464 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1464 wrote to memory of 1948 1464 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1464 wrote to memory of 1948 1464 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2164 wrote to memory of 348 2164 Client.exe schtasks.exe PID 2164 wrote to memory of 348 2164 Client.exe schtasks.exe PID 2164 wrote to memory of 348 2164 Client.exe schtasks.exe PID 2164 wrote to memory of 348 2164 Client.exe schtasks.exe PID 2164 wrote to memory of 1604 2164 Client.exe cmd.exe PID 2164 wrote to memory of 1604 2164 Client.exe cmd.exe PID 2164 wrote to memory of 1604 2164 Client.exe cmd.exe PID 2164 wrote to memory of 1604 2164 Client.exe cmd.exe PID 1604 wrote to memory of 1672 1604 cmd.exe chcp.com PID 1604 wrote to memory of 1672 1604 cmd.exe chcp.com PID 1604 wrote to memory of 1672 1604 cmd.exe chcp.com PID 1604 wrote to memory of 1672 1604 cmd.exe chcp.com PID 1604 wrote to memory of 1192 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 1192 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 1192 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 1192 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 2172 1604 cmd.exe Client.exe PID 1604 wrote to memory of 2172 1604 cmd.exe Client.exe PID 1604 wrote to memory of 2172 1604 cmd.exe Client.exe PID 1604 wrote to memory of 2172 1604 cmd.exe Client.exe PID 1604 wrote to memory of 2172 1604 cmd.exe Client.exe PID 1604 wrote to memory of 2172 1604 cmd.exe Client.exe PID 1604 wrote to memory of 2172 1604 cmd.exe Client.exe PID 2172 wrote to memory of 2916 2172 Client.exe schtasks.exe PID 2172 wrote to memory of 2916 2172 Client.exe schtasks.exe PID 2172 wrote to memory of 2916 2172 Client.exe schtasks.exe PID 2172 wrote to memory of 2916 2172 Client.exe schtasks.exe PID 2172 wrote to memory of 2268 2172 Client.exe cmd.exe PID 2172 wrote to memory of 2268 2172 Client.exe cmd.exe PID 2172 wrote to memory of 2268 2172 Client.exe cmd.exe PID 2172 wrote to memory of 2268 2172 Client.exe cmd.exe PID 2268 wrote to memory of 1508 2268 cmd.exe chcp.com PID 2268 wrote to memory of 1508 2268 cmd.exe chcp.com PID 2268 wrote to memory of 1508 2268 cmd.exe chcp.com PID 2268 wrote to memory of 1508 2268 cmd.exe chcp.com PID 2268 wrote to memory of 2064 2268 cmd.exe PING.EXE PID 2268 wrote to memory of 2064 2268 cmd.exe PING.EXE PID 2268 wrote to memory of 2064 2268 cmd.exe PING.EXE PID 2268 wrote to memory of 2064 2268 cmd.exe PING.EXE PID 2268 wrote to memory of 2080 2268 cmd.exe Client.exe PID 2268 wrote to memory of 2080 2268 cmd.exe Client.exe PID 2268 wrote to memory of 2080 2268 cmd.exe Client.exe PID 2268 wrote to memory of 2080 2268 cmd.exe Client.exe PID 2268 wrote to memory of 2080 2268 cmd.exe Client.exe PID 2268 wrote to memory of 2080 2268 cmd.exe Client.exe PID 2268 wrote to memory of 2080 2268 cmd.exe Client.exe PID 2080 wrote to memory of 1568 2080 Client.exe schtasks.exe PID 2080 wrote to memory of 1568 2080 Client.exe schtasks.exe PID 2080 wrote to memory of 1568 2080 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8BWfZR7KO5KE.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DNO19vI4mGBW.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BzZIIHMdYmnR.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RDMkzf4AMVoM.bat" "9⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (15) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8BWfZR7KO5KE.batFilesize
207B
MD556470d6a6ee78ae6fbeb6de24d219480
SHA11c23c028a2b95a9928b950833112eea9466f1143
SHA256c3d242be6f6a0b4c83219b60b564102bbf330570aaf4f1e12cf7001920aa447a
SHA512a2c7f354aa1f60804c11043ec62d1e25e6209d7ad3d65e32b645de464797ebf59a563a16b13021f6f3cc6293eb162d239658f868efd9d6d17773d6006dec078d
-
C:\Users\Admin\AppData\Local\Temp\BzZIIHMdYmnR.batFilesize
207B
MD5571e08c4773f95068daa5bed92a8b128
SHA187e3a2472b9f027776a952a93640448167bcaeba
SHA256afd9a8f882b76426c2a9a3161a34208ba7a3ecf33b974df63fe8390eb23bf489
SHA5124b0ed697661f8f1b995d80216c9c648867d988b030f1a20e0fcbb2ada5d72fc0207091bf906e8c233b1399330209443b564c389d5926eac52219497c09c8b9b5
-
C:\Users\Admin\AppData\Local\Temp\DNO19vI4mGBW.batFilesize
207B
MD587fa842b487ef824db2110421e00656d
SHA12d0a5731f5df2435035335525725e0ac47776a41
SHA256d79e1ad43f71646f98d7b20f44548e948233eb4c7bec14ece815bbeac3396af0
SHA51211845d358148755291be173df084cfe1b59ec30e09cc60b740c187012763041b9c3b2c8b6a08e60ba754a5cb8ca20eb86ea744bf3ac35d69cc1f27f53da097a8
-
C:\Users\Admin\AppData\Local\Temp\RDMkzf4AMVoM.batFilesize
207B
MD5b15e0856cc19accfeba7362a0ec189ea
SHA13324697b9f2ae4a2fb9d5b4a5f2cc5cc9b58ed82
SHA256c0f4cf0970bb6796e564c75ed70967cac93cfb89f6526217c89c4aa320a89d4c
SHA5127201f157614af31b484227e0af616ea69259bdcff5151bd0b6690d827b82c74c0a773dfbcea99f55a69565531bcb11c096db305166f0335394330827871d2a9d
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1464-1-0x0000000000B70000-0x0000000000BDC000-memory.dmpFilesize
432KB
-
memory/1464-2-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/1464-3-0x000000007414E000-0x000000007414F000-memory.dmpFilesize
4KB
-
memory/1464-4-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/1464-0-0x000000007414E000-0x000000007414F000-memory.dmpFilesize
4KB
-
memory/1464-15-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2080-41-0x0000000000C70000-0x0000000000CDC000-memory.dmpFilesize
432KB
-
memory/2164-14-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2164-25-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2164-16-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2164-13-0x0000000074140000-0x000000007482E000-memory.dmpFilesize
6.9MB
-
memory/2164-12-0x0000000000D80000-0x0000000000DEC000-memory.dmpFilesize
432KB
-
memory/2172-29-0x0000000000100000-0x000000000016C000-memory.dmpFilesize
432KB
-
memory/2692-53-0x0000000000120000-0x000000000018C000-memory.dmpFilesize
432KB