Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
305s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral3/memory/1724-1-0x0000000000C60000-0x0000000000CCC000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral3/memory/2136-12-0x0000000000F70000-0x0000000000FDC000-memory.dmp family_quasar behavioral3/memory/1420-29-0x00000000013B0000-0x000000000141C000-memory.dmp family_quasar behavioral3/memory/3044-41-0x0000000000340000-0x00000000003AC000-memory.dmp family_quasar behavioral3/memory/2488-53-0x0000000000890000-0x00000000008FC000-memory.dmp family_quasar -
Executes dropped EXE 4 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exepid process 2136 Client.exe 1420 Client.exe 3044 Client.exe 2488 Client.exe -
Loads dropped DLL 4 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy.execmd.execmd.execmd.exepid process 1724 Uni - Copy (10) - Copy - Copy - Copy.exe 1964 cmd.exe 552 cmd.exe 2312 cmd.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.ipify.org 21 ip-api.com 23 api.ipify.org 2 ip-api.com 11 api.ipify.org 15 ip-api.com 29 api.ipify.org 6 api.ipify.org 8 ip-api.com 27 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exepid process 1504 schtasks.exe 2744 schtasks.exe 2068 schtasks.exe 2356 SCHTASKS.exe 1188 schtasks.exe 1904 schtasks.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 2148 PING.EXE 1736 PING.EXE 1620 PING.EXE 2832 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2136 Client.exe Token: SeDebugPrivilege 1420 Client.exe Token: SeDebugPrivilege 3044 Client.exe Token: SeDebugPrivilege 2488 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.exedescription pid process target process PID 1724 wrote to memory of 2068 1724 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 1724 wrote to memory of 2068 1724 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 1724 wrote to memory of 2068 1724 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 1724 wrote to memory of 2068 1724 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 1724 wrote to memory of 2136 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 1724 wrote to memory of 2136 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 1724 wrote to memory of 2136 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 1724 wrote to memory of 2136 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 1724 wrote to memory of 2136 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 1724 wrote to memory of 2136 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 1724 wrote to memory of 2136 1724 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 1724 wrote to memory of 2356 1724 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1724 wrote to memory of 2356 1724 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1724 wrote to memory of 2356 1724 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1724 wrote to memory of 2356 1724 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2136 wrote to memory of 1188 2136 Client.exe schtasks.exe PID 2136 wrote to memory of 1188 2136 Client.exe schtasks.exe PID 2136 wrote to memory of 1188 2136 Client.exe schtasks.exe PID 2136 wrote to memory of 1188 2136 Client.exe schtasks.exe PID 2136 wrote to memory of 1964 2136 Client.exe cmd.exe PID 2136 wrote to memory of 1964 2136 Client.exe cmd.exe PID 2136 wrote to memory of 1964 2136 Client.exe cmd.exe PID 2136 wrote to memory of 1964 2136 Client.exe cmd.exe PID 1964 wrote to memory of 1932 1964 cmd.exe chcp.com PID 1964 wrote to memory of 1932 1964 cmd.exe chcp.com PID 1964 wrote to memory of 1932 1964 cmd.exe chcp.com PID 1964 wrote to memory of 1932 1964 cmd.exe chcp.com PID 1964 wrote to memory of 2148 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 2148 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 2148 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 2148 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 1420 1964 cmd.exe Client.exe PID 1964 wrote to memory of 1420 1964 cmd.exe Client.exe PID 1964 wrote to memory of 1420 1964 cmd.exe Client.exe PID 1964 wrote to memory of 1420 1964 cmd.exe Client.exe PID 1964 wrote to memory of 1420 1964 cmd.exe Client.exe PID 1964 wrote to memory of 1420 1964 cmd.exe Client.exe PID 1964 wrote to memory of 1420 1964 cmd.exe Client.exe PID 1420 wrote to memory of 1904 1420 Client.exe schtasks.exe PID 1420 wrote to memory of 1904 1420 Client.exe schtasks.exe PID 1420 wrote to memory of 1904 1420 Client.exe schtasks.exe PID 1420 wrote to memory of 1904 1420 Client.exe schtasks.exe PID 1420 wrote to memory of 552 1420 Client.exe cmd.exe PID 1420 wrote to memory of 552 1420 Client.exe cmd.exe PID 1420 wrote to memory of 552 1420 Client.exe cmd.exe PID 1420 wrote to memory of 552 1420 Client.exe cmd.exe PID 552 wrote to memory of 2844 552 cmd.exe chcp.com PID 552 wrote to memory of 2844 552 cmd.exe chcp.com PID 552 wrote to memory of 2844 552 cmd.exe chcp.com PID 552 wrote to memory of 2844 552 cmd.exe chcp.com PID 552 wrote to memory of 1736 552 cmd.exe PING.EXE PID 552 wrote to memory of 1736 552 cmd.exe PING.EXE PID 552 wrote to memory of 1736 552 cmd.exe PING.EXE PID 552 wrote to memory of 1736 552 cmd.exe PING.EXE PID 552 wrote to memory of 3044 552 cmd.exe Client.exe PID 552 wrote to memory of 3044 552 cmd.exe Client.exe PID 552 wrote to memory of 3044 552 cmd.exe Client.exe PID 552 wrote to memory of 3044 552 cmd.exe Client.exe PID 552 wrote to memory of 3044 552 cmd.exe Client.exe PID 552 wrote to memory of 3044 552 cmd.exe Client.exe PID 552 wrote to memory of 3044 552 cmd.exe Client.exe PID 3044 wrote to memory of 1504 3044 Client.exe schtasks.exe PID 3044 wrote to memory of 1504 3044 Client.exe schtasks.exe PID 3044 wrote to memory of 1504 3044 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RmjAHMXzf5he.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\naEgPtNf5Syy.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ANjCXQDLWqGH.bat" "7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FabX8uO5v17Z.bat" "9⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ANjCXQDLWqGH.batFilesize
207B
MD53c6e004c8edfd551bbbbea5f1cd114e2
SHA1c41c8f35ec9eeb652f58aad97645c9b3672769c0
SHA256d825bc510b6c47717ed7e313e6eeeedbe174aa846735de6e78172b3330dc9222
SHA51215ab70e77f5a0ca1c55901aa06827edc9cee31918bca8763ba99a0ffbf10e20a7d6f11991a3f8735b49169290e04cc5036ff408d0cc28bf50ac5a17f4f7d1c61
-
C:\Users\Admin\AppData\Local\Temp\FabX8uO5v17Z.batFilesize
207B
MD595bc1ca9db7298fe2f2b91ab8af20f20
SHA1f08c0a624a478ef3ac7d2a6f1dfef7076920be20
SHA256e9bfdfee5bd10dd39ee17f184262369c8db1a62040e670eaed40da5c275738a8
SHA512792171272e4ba4f61803cafdadf25d5b8c398303c82aa91998388c2729295fcc7b54eded02e0aee9e354f9aed2e6b1d0490c2a34788b3029e1ab7db50e1798a8
-
C:\Users\Admin\AppData\Local\Temp\RmjAHMXzf5he.batFilesize
207B
MD5bff54bb6f4c3f42a1555c04e2d4e8ce0
SHA114fddbfef7d62760e43e9cc76d36bf164e80d8ab
SHA256056b7fd75497d47c536963d8504884b01c090800c4895620776ce8ba86af3a52
SHA512df0f738c842188d7d3102f4030065daa7db20755cb84867ac53aaaf261fe61da49ae8e9dc1f945b46795abd7172a6114a23cc6aff71116f585d10d185ad5c9cf
-
C:\Users\Admin\AppData\Local\Temp\naEgPtNf5Syy.batFilesize
207B
MD5fc58e7b7fdecfd102a5e437bd886edbb
SHA1a23a6bde7d03285cfeb08b4bf9d55343c894bef7
SHA256deb13e13e71de4fc9b68bac2baab4ab11a0a0fa191bce818804b79e5ef1eb028
SHA51239da5716962bda55b39538e40df896b62ba8b99f99c55e7a080f9fb74f3a80c71dbd72edb8046293c20a67714c7a7e395d5189bec0ec5d82f4bfab9ae347432d
-
\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1420-29-0x00000000013B0000-0x000000000141C000-memory.dmpFilesize
432KB
-
memory/1724-1-0x0000000000C60000-0x0000000000CCC000-memory.dmpFilesize
432KB
-
memory/1724-2-0x00000000743B0000-0x0000000074A9E000-memory.dmpFilesize
6.9MB
-
memory/1724-3-0x00000000743BE000-0x00000000743BF000-memory.dmpFilesize
4KB
-
memory/1724-4-0x00000000743B0000-0x0000000074A9E000-memory.dmpFilesize
6.9MB
-
memory/1724-0-0x00000000743BE000-0x00000000743BF000-memory.dmpFilesize
4KB
-
memory/1724-15-0x00000000743B0000-0x0000000074A9E000-memory.dmpFilesize
6.9MB
-
memory/2136-14-0x00000000743B0000-0x0000000074A9E000-memory.dmpFilesize
6.9MB
-
memory/2136-25-0x00000000743B0000-0x0000000074A9E000-memory.dmpFilesize
6.9MB
-
memory/2136-16-0x00000000743B0000-0x0000000074A9E000-memory.dmpFilesize
6.9MB
-
memory/2136-13-0x00000000743B0000-0x0000000074A9E000-memory.dmpFilesize
6.9MB
-
memory/2136-12-0x0000000000F70000-0x0000000000FDC000-memory.dmpFilesize
432KB
-
memory/2488-53-0x0000000000890000-0x00000000008FC000-memory.dmpFilesize
432KB
-
memory/3044-41-0x0000000000340000-0x00000000003AC000-memory.dmpFilesize
432KB