Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
299s -
max time network
308s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral16/memory/668-1-0x00000000003D0000-0x000000000043C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 13 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1612 Client.exe 2532 Client.exe 3212 Client.exe 1528 Client.exe 1924 Client.exe 2176 Client.exe 2508 Client.exe 2324 Client.exe 3216 Client.exe 1524 Client.exe 2740 Client.exe 4324 Client.exe 2104 Client.exe -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 api.ipify.org 13 ip-api.com 19 ip-api.com 33 ip-api.com 15 ip-api.com 17 ip-api.com 21 ip-api.com 29 ip-api.com 2 ip-api.com 27 ip-api.com 11 ip-api.com 23 ip-api.com 25 ip-api.com 31 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1200 1612 WerFault.exe Client.exe 684 2532 WerFault.exe Client.exe 3696 3212 WerFault.exe Client.exe 2292 1528 WerFault.exe Client.exe 752 1924 WerFault.exe Client.exe 1048 2176 WerFault.exe Client.exe 4464 2508 WerFault.exe Client.exe 2184 2324 WerFault.exe Client.exe 1596 3216 WerFault.exe Client.exe 3692 1524 WerFault.exe Client.exe 1600 2740 WerFault.exe Client.exe 3276 4324 WerFault.exe Client.exe 2560 2104 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3332 schtasks.exe 4344 schtasks.exe 3816 schtasks.exe 1648 schtasks.exe 3264 schtasks.exe 3436 schtasks.exe 4280 schtasks.exe 3756 SCHTASKS.exe 4460 schtasks.exe 468 schtasks.exe 1352 schtasks.exe 4368 schtasks.exe 4672 schtasks.exe 4260 schtasks.exe 2948 schtasks.exe -
Runs ping.exe 1 TTPs 13 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3176 PING.EXE 3296 PING.EXE 1048 PING.EXE 3752 PING.EXE 4484 PING.EXE 3252 PING.EXE 2540 PING.EXE 3396 PING.EXE 1996 PING.EXE 4688 PING.EXE 4516 PING.EXE 1396 PING.EXE 2088 PING.EXE -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Token: SeDebugPrivilege 1612 Client.exe Token: SeDebugPrivilege 2532 Client.exe Token: SeDebugPrivilege 3212 Client.exe Token: SeDebugPrivilege 1528 Client.exe Token: SeDebugPrivilege 1924 Client.exe Token: SeDebugPrivilege 2176 Client.exe Token: SeDebugPrivilege 2508 Client.exe Token: SeDebugPrivilege 2324 Client.exe Token: SeDebugPrivilege 3216 Client.exe Token: SeDebugPrivilege 1524 Client.exe Token: SeDebugPrivilege 2740 Client.exe Token: SeDebugPrivilege 4324 Client.exe Token: SeDebugPrivilege 2104 Client.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1612 Client.exe 2532 Client.exe 3212 Client.exe 1528 Client.exe 1924 Client.exe 2176 Client.exe 2508 Client.exe 2324 Client.exe 3216 Client.exe 1524 Client.exe 2740 Client.exe 4324 Client.exe 2104 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 668 wrote to memory of 4672 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 668 wrote to memory of 4672 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 668 wrote to memory of 4672 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 668 wrote to memory of 1612 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 668 wrote to memory of 1612 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 668 wrote to memory of 1612 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe Client.exe PID 668 wrote to memory of 3756 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 668 wrote to memory of 3756 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 668 wrote to memory of 3756 668 Uni - Copy (101) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 1612 wrote to memory of 3332 1612 Client.exe schtasks.exe PID 1612 wrote to memory of 3332 1612 Client.exe schtasks.exe PID 1612 wrote to memory of 3332 1612 Client.exe schtasks.exe PID 1612 wrote to memory of 4444 1612 Client.exe cmd.exe PID 1612 wrote to memory of 4444 1612 Client.exe cmd.exe PID 1612 wrote to memory of 4444 1612 Client.exe cmd.exe PID 4444 wrote to memory of 4064 4444 cmd.exe chcp.com PID 4444 wrote to memory of 4064 4444 cmd.exe chcp.com PID 4444 wrote to memory of 4064 4444 cmd.exe chcp.com PID 4444 wrote to memory of 3752 4444 cmd.exe PING.EXE PID 4444 wrote to memory of 3752 4444 cmd.exe PING.EXE PID 4444 wrote to memory of 3752 4444 cmd.exe PING.EXE PID 4444 wrote to memory of 2532 4444 cmd.exe Client.exe PID 4444 wrote to memory of 2532 4444 cmd.exe Client.exe PID 4444 wrote to memory of 2532 4444 cmd.exe Client.exe PID 2532 wrote to memory of 4460 2532 Client.exe schtasks.exe PID 2532 wrote to memory of 4460 2532 Client.exe schtasks.exe PID 2532 wrote to memory of 4460 2532 Client.exe schtasks.exe PID 2532 wrote to memory of 4496 2532 Client.exe cmd.exe PID 2532 wrote to memory of 4496 2532 Client.exe cmd.exe PID 2532 wrote to memory of 4496 2532 Client.exe cmd.exe PID 4496 wrote to memory of 1436 4496 cmd.exe chcp.com PID 4496 wrote to memory of 1436 4496 cmd.exe chcp.com PID 4496 wrote to memory of 1436 4496 cmd.exe chcp.com PID 4496 wrote to memory of 4484 4496 cmd.exe PING.EXE PID 4496 wrote to memory of 4484 4496 cmd.exe PING.EXE PID 4496 wrote to memory of 4484 4496 cmd.exe PING.EXE PID 4496 wrote to memory of 3212 4496 cmd.exe Client.exe PID 4496 wrote to memory of 3212 4496 cmd.exe Client.exe PID 4496 wrote to memory of 3212 4496 cmd.exe Client.exe PID 3212 wrote to memory of 468 3212 Client.exe schtasks.exe PID 3212 wrote to memory of 468 3212 Client.exe schtasks.exe PID 3212 wrote to memory of 468 3212 Client.exe schtasks.exe PID 3212 wrote to memory of 696 3212 Client.exe cmd.exe PID 3212 wrote to memory of 696 3212 Client.exe cmd.exe PID 3212 wrote to memory of 696 3212 Client.exe cmd.exe PID 696 wrote to memory of 964 696 cmd.exe chcp.com PID 696 wrote to memory of 964 696 cmd.exe chcp.com PID 696 wrote to memory of 964 696 cmd.exe chcp.com PID 696 wrote to memory of 3176 696 cmd.exe PING.EXE PID 696 wrote to memory of 3176 696 cmd.exe PING.EXE PID 696 wrote to memory of 3176 696 cmd.exe PING.EXE PID 696 wrote to memory of 1528 696 cmd.exe Client.exe PID 696 wrote to memory of 1528 696 cmd.exe Client.exe PID 696 wrote to memory of 1528 696 cmd.exe Client.exe PID 1528 wrote to memory of 4344 1528 Client.exe schtasks.exe PID 1528 wrote to memory of 4344 1528 Client.exe schtasks.exe PID 1528 wrote to memory of 4344 1528 Client.exe schtasks.exe PID 1528 wrote to memory of 4308 1528 Client.exe cmd.exe PID 1528 wrote to memory of 4308 1528 Client.exe cmd.exe PID 1528 wrote to memory of 4308 1528 Client.exe cmd.exe PID 4308 wrote to memory of 2020 4308 cmd.exe chcp.com PID 4308 wrote to memory of 2020 4308 cmd.exe chcp.com PID 4308 wrote to memory of 2020 4308 cmd.exe chcp.com PID 4308 wrote to memory of 4516 4308 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0x5joxHlCqVV.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XJPraGapisO6.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\n6MFRNeXTjbA.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ypFTtt9KRmMp.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B3IW5cGC5m0Q.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FkZIxeQM0CNH.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HwgE2TzSFfqE.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zwmagWzaBBQc.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\m1PBzWVn4PNS.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DPsM4WqzyjWo.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yQlRVJ0RR4n6.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ECioMR49Cv0A.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\icyjECafc3rQ.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 223627⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 109225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 167223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 223221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 222419⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 171611⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 22489⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 10927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 17125⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 21683⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (101) - Copy - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1612 -ip 16121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2532 -ip 25321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3212 -ip 32121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1528 -ip 15281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1924 -ip 19241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2176 -ip 21761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2508 -ip 25081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2324 -ip 23241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3216 -ip 32161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1524 -ip 15241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2740 -ip 27401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4324 -ip 43241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2104 -ip 21041⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0x5joxHlCqVV.batFilesize
207B
MD54beb6dee80ab1abc098e90b516ec08b9
SHA1bab20e13a31bd316bf46b4756813e306e2650597
SHA256cfc5058ee2d15867ee8901a5c9c9434cdbc5210fe923f4c9faaff743a65c386a
SHA51238a12aa6129e1c5b9767d59f06c3030e7b546c28cc4feaa3d766817931cd07406151177f89e00e851fbaa7d74ec7844592b29e80ac1c6be07ee115acf9d6df94
-
C:\Users\Admin\AppData\Local\Temp\B3IW5cGC5m0Q.batFilesize
207B
MD5ec2ce785ef4ab3ad4451bbd2dcabdbd5
SHA1768e1af55c4b61f63ff6f1321fa35fd43bcdad69
SHA2567455cdce04496fa56179a418f06bf6d47d6e06678531536f8a9ea71181c04d1e
SHA512aa7f70c508e162044547def239ccc9a430f6638bc6ba0051d54a6f6fc0e6216e6131472a70c9f07d7d47988b9c3c8eb91aa8aed8450558d20d7d1e7b915b17b7
-
C:\Users\Admin\AppData\Local\Temp\DPsM4WqzyjWo.batFilesize
207B
MD5c756be32784b680e8b4ad79318721425
SHA1a98a6ce6e19cc5c6614d51ddd8c848cffaa10289
SHA256d87b2a27d666c2b387facbe69dc3eae3898121f661aefdb79d82a554468ea0ac
SHA512998043321987fdb472fa100036991a1cf76e1f4561f374073ea99963fcbaeeb8b0bb147819d1922f96a8d2dc8a03ef71316d9fa3ea6c367d28df885f42081025
-
C:\Users\Admin\AppData\Local\Temp\ECioMR49Cv0A.batFilesize
207B
MD54f4b605ac3f2c26d5dcaf12a7aaff4e8
SHA1c7d6a8feb232ad241cb04c89eb79cfd283c78713
SHA25653540f9fe5dc61513cb06420a76672ffe28df690d25c5776361b8b3997cadb42
SHA512426376081e899822d5dba778a3f7751a04f5d724cc5e10ab7716031d6d505ee880daae1702f462c393193432a2bcfbee5e52e1cb2f71a895d576a33c44d313b9
-
C:\Users\Admin\AppData\Local\Temp\FkZIxeQM0CNH.batFilesize
207B
MD592cbaa9b8e8d663b121e2fac9f122370
SHA19c2ac770303033e423f28de882325981670dc4ba
SHA25633caed065c269817ecbd55555e256b145aa4068baf09d0f31ec8ed1597afbfae
SHA51201a448a40f1d7473203635925aea95e72d1c8e60e799d6d5509beabc7b3f43e71c9b8399bb7d18ea8f2d6803f8592e6e04bf60706ec9b8a76c31725c852c4947
-
C:\Users\Admin\AppData\Local\Temp\HwgE2TzSFfqE.batFilesize
207B
MD578edd38cb38f65b435c271cb698e2e74
SHA129bd5a5fe8f3e091c89463931b17a395a1deda7c
SHA2560e26338d3e7f40bcd5a058d52a64a0b7694a91c531f125f6ab49f755e31fd408
SHA5125b350f0c12f14830c9bbd2ed0c575c6c36c922d0074868bb47198464f19058ea0a84b051cf5f95aeb04a8eac6ada6593cfc82abba07c2b560b879488d29bcad1
-
C:\Users\Admin\AppData\Local\Temp\XJPraGapisO6.batFilesize
207B
MD5f2dd482bae72240ee0dc674cf17cd086
SHA1b410b37ead2465a39432635d478600daeb4572bf
SHA256940b38e2911b3defe0720ec19c017e62ba42c4f68d84e438e9f1f6e8b7560dc6
SHA5123ee9d2b1c774636382adca64db4648c502ff4f933aef7d27f40b62eec398433e7662358904969e400b10e5260b2c7ca298d413e80231b21748c3be4cafc04710
-
C:\Users\Admin\AppData\Local\Temp\icyjECafc3rQ.batFilesize
207B
MD501fdaf7fb57a5763e4949f67d8f686a7
SHA19272402704cfa0188352786da9a70aba849437db
SHA2565acbcae6975aaa8cb22bbaabae73a8b1b199a4518f0e2808198e906338238c81
SHA51232d14f55a67d90286d818067a2866f09f3bbd540fc3233e1e4d35e1ce10785ba9f091ffcdebc4b8479340041384764621dfb70b17408a98161c9a96bfc0f9433
-
C:\Users\Admin\AppData\Local\Temp\m1PBzWVn4PNS.batFilesize
207B
MD5f042b2cb8c61b250a4379e400fc53e16
SHA1532241a0a3940247a6b0ed21af11d85f86959b20
SHA256eaf20787c96e6b6a0cba53a21016de9beee8360ea0f6dfacbecb7ce1524e847e
SHA51251ecd965465e8507a52b618b8bb199db81011abfb1163d846f8db7025eac3352e92ab8fdcba95d091d41c3ae1e23ec0e88e84d3dfc42af331da95a38fcbf9de3
-
C:\Users\Admin\AppData\Local\Temp\n6MFRNeXTjbA.batFilesize
207B
MD5307f60da95d85b0fb9e6f10729560e59
SHA1e9bf601e0c48435d0d19c71b4bfca3cfa3dab3ef
SHA256e1a2e4bcb69fd5519afde67135538192e5a1b9d4219353a82bb6f3336c4657bb
SHA512e112b0cfb377eb527bd66b1d3af3b4331006d7ffcb96078ea547be2fea97548244275cf47d6e10ffb392f1e6143c020037b998127504af9e4c28afdc8720bcab
-
C:\Users\Admin\AppData\Local\Temp\yQlRVJ0RR4n6.batFilesize
207B
MD51578f08e2076eb282cbafc0fb915f6ff
SHA1d8a3d8bb3043d82c4167ea79fd598a8118393d4a
SHA256e2e4118314bd1aaa7d9b15fc0bbb14030c96850e677e30bd0e88d81d1e298911
SHA51242e434b3f228ac6e252054c92007fad96240c92d1ac9ffa146a315e6493488918864e434735470b8ce6f9fe8c631492c18313369ef3f8baab8b315f81d417533
-
C:\Users\Admin\AppData\Local\Temp\ypFTtt9KRmMp.batFilesize
207B
MD58eaaa9f6c07631f24ea66a1556857fdf
SHA1fd3638ef176622dd8a90d6f39723e9041455f265
SHA25661eb34a9a08fa694685c3c162dc167d1472967f8877242fc26a324b8c68ac301
SHA512f7c6f8634b126e5a6f74108a5acca305d31f55b1c259c4bd0eb7ac22470d59e8d12344014c014dc3a95228e368d6ba5d8a89ed64cad1517bee90577cfe33abe2
-
C:\Users\Admin\AppData\Local\Temp\zwmagWzaBBQc.batFilesize
207B
MD51fd373f384a065341381881a6d4c3174
SHA1c544d17338c036fce830c96069708da41182d961
SHA25604bbbcc607a97561ffb5df4a60ed3bdb752051e628c4866eaf0b8368abaf1318
SHA5124fa875ed0676c2ed7553bbb3db124d726900129db5f652e48da315089c2d2bafcb0efb4971afaaf7b1371a543ca7411b94a747b0456aed9a1e59a5e877324747
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5ecb2fa9c54a822f3015c0b60b5b8ae24
SHA140d65e45866867d96ff15f8cc50c16ae5f4f6cfe
SHA256a13f8cd3919e85eab682a0a4f57748c38d1ba37fd283db05aab8f41c3de88006
SHA512af3cc52d6a4705c834915d9f46ac02c8e51bfa575e52af952aecf6785de9f2052912930b165233f4c8e48c28e973a94f2108aab4864ffb98e07a755a8445d38e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD568387b8096e87d234ad55a61fd404163
SHA16421a198e8c331684bca6a735d579df45ad11dbe
SHA25604b139c7f3e8a3c0d71c596d949441a81b4bbe450aa930fca3dfb572a84d2b1a
SHA5128b5244aa0a200b8e909e25e48b3a8d343bdee3b644b67c7a2becb9cb958fcbe852010ac16b600eaabd4d57bb7b957d3e039ddf4032ccb0bed47b3a96a9d3a522
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/668-6-0x0000000005B10000-0x0000000005B22000-memory.dmpFilesize
72KB
-
memory/668-1-0x00000000003D0000-0x000000000043C000-memory.dmpFilesize
432KB
-
memory/668-4-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/668-3-0x0000000004E10000-0x0000000004EA2000-memory.dmpFilesize
584KB
-
memory/668-0-0x000000007518E000-0x000000007518F000-memory.dmpFilesize
4KB
-
memory/668-16-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/668-5-0x0000000004EB0000-0x0000000004F16000-memory.dmpFilesize
408KB
-
memory/668-2-0x0000000005310000-0x00000000058B4000-memory.dmpFilesize
5.6MB
-
memory/668-8-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/668-7-0x000000007518E000-0x000000007518F000-memory.dmpFilesize
4KB
-
memory/1612-17-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1612-15-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB
-
memory/1612-19-0x0000000005F20000-0x0000000005F2A000-memory.dmpFilesize
40KB
-
memory/1612-24-0x0000000075180000-0x0000000075930000-memory.dmpFilesize
7.7MB