Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
307s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1960-1-0x0000000000990000-0x00000000009FC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral1/memory/2188-13-0x0000000000D80000-0x0000000000DEC000-memory.dmp family_quasar behavioral1/memory/1560-29-0x0000000000D80000-0x0000000000DEC000-memory.dmp family_quasar -
Executes dropped EXE 4 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exepid process 2188 Client.exe 1560 Client.exe 3004 Client.exe 3036 Client.exe -
Loads dropped DLL 4 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.execmd.execmd.execmd.exepid process 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe 2824 cmd.exe 1204 cmd.exe 1904 cmd.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip-api.com 11 api.ipify.org 15 ip-api.com 21 ip-api.com 2 ip-api.com 6 api.ipify.org 27 ip-api.com 29 api.ipify.org 17 api.ipify.org 23 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1660 SCHTASKS.exe 636 schtasks.exe 1084 schtasks.exe 340 schtasks.exe 2768 schtasks.exe 2964 schtasks.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 908 PING.EXE 1520 PING.EXE 2612 PING.EXE 1912 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2188 Client.exe Token: SeDebugPrivilege 1560 Client.exe Token: SeDebugPrivilege 3004 Client.exe Token: SeDebugPrivilege 3036 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 1960 wrote to memory of 2964 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 1960 wrote to memory of 2964 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 1960 wrote to memory of 2964 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 1960 wrote to memory of 2964 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 1960 wrote to memory of 2188 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1960 wrote to memory of 2188 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1960 wrote to memory of 2188 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1960 wrote to memory of 2188 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1960 wrote to memory of 2188 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1960 wrote to memory of 2188 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1960 wrote to memory of 2188 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1960 wrote to memory of 1660 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 1960 wrote to memory of 1660 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 1960 wrote to memory of 1660 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 1960 wrote to memory of 1660 1960 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 2188 wrote to memory of 636 2188 Client.exe schtasks.exe PID 2188 wrote to memory of 636 2188 Client.exe schtasks.exe PID 2188 wrote to memory of 636 2188 Client.exe schtasks.exe PID 2188 wrote to memory of 636 2188 Client.exe schtasks.exe PID 2188 wrote to memory of 2824 2188 Client.exe cmd.exe PID 2188 wrote to memory of 2824 2188 Client.exe cmd.exe PID 2188 wrote to memory of 2824 2188 Client.exe cmd.exe PID 2188 wrote to memory of 2824 2188 Client.exe cmd.exe PID 2824 wrote to memory of 2296 2824 cmd.exe chcp.com PID 2824 wrote to memory of 2296 2824 cmd.exe chcp.com PID 2824 wrote to memory of 2296 2824 cmd.exe chcp.com PID 2824 wrote to memory of 2296 2824 cmd.exe chcp.com PID 2824 wrote to memory of 1912 2824 cmd.exe PING.EXE PID 2824 wrote to memory of 1912 2824 cmd.exe PING.EXE PID 2824 wrote to memory of 1912 2824 cmd.exe PING.EXE PID 2824 wrote to memory of 1912 2824 cmd.exe PING.EXE PID 2824 wrote to memory of 1560 2824 cmd.exe Client.exe PID 2824 wrote to memory of 1560 2824 cmd.exe Client.exe PID 2824 wrote to memory of 1560 2824 cmd.exe Client.exe PID 2824 wrote to memory of 1560 2824 cmd.exe Client.exe PID 2824 wrote to memory of 1560 2824 cmd.exe Client.exe PID 2824 wrote to memory of 1560 2824 cmd.exe Client.exe PID 2824 wrote to memory of 1560 2824 cmd.exe Client.exe PID 1560 wrote to memory of 1084 1560 Client.exe schtasks.exe PID 1560 wrote to memory of 1084 1560 Client.exe schtasks.exe PID 1560 wrote to memory of 1084 1560 Client.exe schtasks.exe PID 1560 wrote to memory of 1084 1560 Client.exe schtasks.exe PID 1560 wrote to memory of 1204 1560 Client.exe cmd.exe PID 1560 wrote to memory of 1204 1560 Client.exe cmd.exe PID 1560 wrote to memory of 1204 1560 Client.exe cmd.exe PID 1560 wrote to memory of 1204 1560 Client.exe cmd.exe PID 1204 wrote to memory of 328 1204 cmd.exe chcp.com PID 1204 wrote to memory of 328 1204 cmd.exe chcp.com PID 1204 wrote to memory of 328 1204 cmd.exe chcp.com PID 1204 wrote to memory of 328 1204 cmd.exe chcp.com PID 1204 wrote to memory of 908 1204 cmd.exe PING.EXE PID 1204 wrote to memory of 908 1204 cmd.exe PING.EXE PID 1204 wrote to memory of 908 1204 cmd.exe PING.EXE PID 1204 wrote to memory of 908 1204 cmd.exe PING.EXE PID 1204 wrote to memory of 3004 1204 cmd.exe Client.exe PID 1204 wrote to memory of 3004 1204 cmd.exe Client.exe PID 1204 wrote to memory of 3004 1204 cmd.exe Client.exe PID 1204 wrote to memory of 3004 1204 cmd.exe Client.exe PID 1204 wrote to memory of 3004 1204 cmd.exe Client.exe PID 1204 wrote to memory of 3004 1204 cmd.exe Client.exe PID 1204 wrote to memory of 3004 1204 cmd.exe Client.exe PID 3004 wrote to memory of 340 3004 Client.exe schtasks.exe PID 3004 wrote to memory of 340 3004 Client.exe schtasks.exe PID 3004 wrote to memory of 340 3004 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1v4RbBfQT5Oe.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\So7CPf0BqA2R.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DoxxWNcywPz9.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RXbaSYjP3A8A.bat" "9⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1v4RbBfQT5Oe.batFilesize
207B
MD5db24efd58b9853703a91011ed246b6a3
SHA171da8f8bcfeff49707b45a1f88a4bc1cb12fe812
SHA256ad55c1bc89182fddff78d9186db257bc541ab74b6802908b866ee83ed74cc5d8
SHA51213bc425ac7e7c5734eecebdee8f3fa5b7595f3455facf2adbeb17201bc8260d1b8e24389f58edb01b51b13dfa3cf8337d445b016654957237e0269f7ad0b527c
-
C:\Users\Admin\AppData\Local\Temp\DoxxWNcywPz9.batFilesize
207B
MD54f6b583276a13cd067e6986cea85d6d0
SHA186207f43867efcd2be57dc58a40c80979ff2b082
SHA2569421c127132df0f3cf176ff3e16ec57991d5d7c6458b0778fdab1cdcbdb6c4e8
SHA512591916fa4d377a8445173fde7d6bf7dee1a57fb88c9bfccd7482d479acbc75143e30edec7a9381f58db592baeef2ad0955fa8a44601983487262ffa526a789f6
-
C:\Users\Admin\AppData\Local\Temp\RXbaSYjP3A8A.batFilesize
207B
MD578d4c2a464eca7dd54a1db6a17abff1d
SHA14197b7cf298f1f13d027dfb116d25fa8a97906ed
SHA256a6812f4e2b25f1f106220c9ddd52bab20ea9f81b196c76cababc6228700534eb
SHA51238396bef3e8859061c088fbab1f572e51dbd7d1606c4d12059e1c883107bc4ad44cb49ea1503ac5683ddf1065613a9c5c1ff14be3759a038c20d0b1006414592
-
C:\Users\Admin\AppData\Local\Temp\So7CPf0BqA2R.batFilesize
207B
MD560d823b3c008cedb9fae7396cbdccf41
SHA10fcb9f6feef72baf3b69a6f33c983078c60725ff
SHA256417e2619a92509fff1e35a18626627887728a5c4ceb5e4be0e9befd358ca6b13
SHA512f0998e988dfcbf9c1b82e8a84ed2b642fb802fb67abe8ac036a9aed2d61eab5569c53b5f465d284ff891416b1465ccd271411513b133248d37ef07f5cfeed656
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1560-29-0x0000000000D80000-0x0000000000DEC000-memory.dmpFilesize
432KB
-
memory/1960-1-0x0000000000990000-0x00000000009FC000-memory.dmpFilesize
432KB
-
memory/1960-2-0x0000000074760000-0x0000000074E4E000-memory.dmpFilesize
6.9MB
-
memory/1960-3-0x000000007476E000-0x000000007476F000-memory.dmpFilesize
4KB
-
memory/1960-4-0x0000000074760000-0x0000000074E4E000-memory.dmpFilesize
6.9MB
-
memory/1960-0-0x000000007476E000-0x000000007476F000-memory.dmpFilesize
4KB
-
memory/1960-15-0x0000000074760000-0x0000000074E4E000-memory.dmpFilesize
6.9MB
-
memory/2188-14-0x0000000074760000-0x0000000074E4E000-memory.dmpFilesize
6.9MB
-
memory/2188-25-0x0000000074760000-0x0000000074E4E000-memory.dmpFilesize
6.9MB
-
memory/2188-16-0x0000000074760000-0x0000000074E4E000-memory.dmpFilesize
6.9MB
-
memory/2188-13-0x0000000000D80000-0x0000000000DEC000-memory.dmpFilesize
432KB
-
memory/2188-12-0x0000000074760000-0x0000000074E4E000-memory.dmpFilesize
6.9MB