Analysis
-
max time kernel
2s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe
Resource
win7-20240508-en
General
-
Target
87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe
-
Size
3.0MB
-
MD5
6850a8c541b310a2f4a5cd88352856a3
-
SHA1
372ff19e90cec46e37797b343fe6f537116b4aae
-
SHA256
87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95
-
SHA512
924d20cd368e797a771cf8b27b5e8994c62139a85a92ca068b64b0ac65598475b2225a81d08abb2aab9ad87f08d261f950219c16cee1b6d2e21c4b0c95eee4fa
-
SSDEEP
49152:g97jAtnr1ky+cFvVnJxuw9APD764uBxsPqlRJiM4C/d7Nch8zmOqYmlMH9TLi:g9otJOc/Jxuw9g764ssPqlbiM46ch8z6
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1252172365647974441/4gQlLrJt2VtCn71LmsFuTifq4qn3SRnlOC0k8H5iaa8g2BlP4YuRr9feLLYTpIHpdtxd
Extracted
xworm
5.0
127.0.0.1:28223
unknown-sunglasses.gl.at.ply.gg:28223
rVUJpGK3xHCE778M
-
Install_directory
%AppData%
-
install_file
svchost.exe
Signatures
-
Detect Umbral payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2424-29-0x00000000002F0000-0x0000000000330000-memory.dmp family_umbral C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe family_umbral -
Detect Xworm Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1880-61-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm behavioral1/memory/1880-60-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm behavioral1/memory/1880-59-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm behavioral1/memory/1880-56-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm behavioral1/memory/1880-54-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm -
XMRig Miner payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2444-166-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2444-167-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2444-165-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2444-163-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2444-164-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2444-161-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2444-160-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2632 powershell.exe 1752 powershell.exe 1716 powershell.exe 1604 powershell.exe 3032 powershell.exe 2272 powershell.exe 2572 powershell.exe 1912 powershell.exe 2644 powershell.exe 2292 powershell.exe -
Creates new service(s) 2 TTPs
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/1856-47-0x0000000001360000-0x0000000001548000-memory.dmp net_reactor C:\Users\Admin\AppData\Local\Temp\Nursultan.exe net_reactor -
Processes:
resource yara_rule behavioral1/memory/2444-157-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-166-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-167-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-165-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-163-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-164-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-161-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-160-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-159-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-155-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-158-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-156-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2444-174-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid process 1676 powercfg.exe 2240 powercfg.exe 2196 powercfg.exe 2176 powercfg.exe 912 powercfg.exe 876 powercfg.exe 1620 powercfg.exe 1924 powercfg.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1868 sc.exe 2336 sc.exe 1424 sc.exe 1420 sc.exe 2212 sc.exe 1524 sc.exe 1992 sc.exe 576 sc.exe 1536 sc.exe 1812 sc.exe 1824 sc.exe 2084 sc.exe 1504 sc.exe 2076 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exedescription pid process target process PID 2164 wrote to memory of 2272 2164 87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe powershell.exe PID 2164 wrote to memory of 2272 2164 87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe powershell.exe PID 2164 wrote to memory of 2272 2164 87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe powershell.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe"C:\Users\Admin\AppData\Local\Temp\87fdd3337325634e35611a0cf9a9a4de31d4630dada6eeea83f261be5fbcaa95.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exe'2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exe"2⤵
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "XMRKNZQC"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "XMRKNZQC" binpath= "C:\ProgramData\scppqqgespxv\jqvljmboayxs.exe" start= "auto"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "XMRKNZQC"3⤵
- Launches sc.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe'2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe"C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe"2⤵
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe'3⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exe" && pause3⤵
-
C:\Windows\system32\PING.EXEping localhost4⤵
- Runs ping.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Nursultan.exe'2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'4⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'4⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵
-
C:\ProgramData\scppqqgespxv\jqvljmboayxs.exeC:\ProgramData\scppqqgespxv\jqvljmboayxs.exe1⤵
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {E3AD2D07-DE2F-4A6D-92F1-B00B34649A3A} S-1-5-21-3691908287-3775019229-3534252667-1000:UOTHCPHQ\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exeFilesize
102KB
MD5c137c5f5287d73a94d55bc18df238303
SHA195b4b01775bea14feaaa462c98d969eb81696d2c
SHA256d294856177658df0159cfe937e5ea95a8ee8a2ca85754d897aea3bb5d0d962c0
SHA512ba595d185ae98152658ce95964fd6bcce7e970896b0b1c674a142d126cf0433094debcd25527d9b4f5a6568cc5a8a42aeaef536166748eea3973f8b694564aa5
-
C:\Users\Admin\AppData\Local\Temp\Nursultan Setup.exeFilesize
2.5MB
MD5a1d8db2a1ff742bc73dd5617083f5fde
SHA1957b182d82efb40a36099dd886ad581977880838
SHA256d715e599815190df86069fae7220db64b5999207f77fb6e41cfe318d34c7399a
SHA5120c5407f5707e5f2808cf1d85d71815ca67d45edc8bd8a83cc424dc927afcbad6ced5a826fff81549e5684ca0ece039513c3351ce7bf231e37885f7ed04dc513f
-
C:\Users\Admin\AppData\Local\Temp\Nursultan.exeFilesize
1.9MB
MD50df0a039309525fd27e1b5e056c92b6a
SHA17551c27a9123cb56c4218647966a753794ac2961
SHA256a29379238f93fa6301dd390e635b0c1f53d9197c68adc0f00cbc52bb4311a23f
SHA5122c00ea216368e254167bd5f2562cbc93953b9c4756765f4504aaae7e9dc45e5584fef1ddb174b651a9a090c7217424e5b80dec58f6f2493c54704f46c35fede6
-
C:\Users\Admin\AppData\Local\Temp\Запустить Nursultan.exeFilesize
229KB
MD5f0b33cc162bfd36a995b8c90cd8ebff1
SHA1ca1ddef08d47fc15a44a2d651b61e3decce8ebc6
SHA2566363305dc75b8bf7aa2a8b31b0b0f38022fb0139f809ecba42e5cfe7530830e0
SHA5121426cd246662adfd9aba4434586dc3bd54d31d395d9fafdcb15e785461a466567bff62e85085c36043cca047f951a96e5fc359c5cbf1000ff3121bba6b2905d0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WBQGIKRMSH1GXMZEJG8S.tempFilesize
7KB
MD5171e4596826b2ad10e319469ecb1b8cf
SHA12e423d08e9e4b88dc34f9753b69e86f294f9e28d
SHA256811d2032058427b5847c128645a6928932213596163288fd88dcfb05e2fb9438
SHA512474d3efb94f35ed851fc5a9d9c7b94c71dd4371dd4d6980de86d32aec4c6c5d56049787cae365b73d40b7a9e2a3df10992271903e13b23fbc4b4be607d49cd59
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD54a5887281298574ed5243753fd6f3d15
SHA1be4f930dc2b31fece3e8b5afdbdeca328e7d1439
SHA25640a090399f5e0b09f05f55a694ec2c35b6786dd261dfd4e2d8b1d8650f25a0c3
SHA51276945f3617e6b63ae39cc1a4e5be75dff0cad15b33d3d4ac7c5d7fb15c3d80e62d391a3ddea00eed629ae1cf2fb7cad032248d5b1ba0b28fbfb027ecd43defb9
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Roaming\svchost.exeFilesize
255KB
MD59af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
memory/476-94-0x0000000001E90000-0x0000000001E98000-memory.dmpFilesize
32KB
-
memory/1584-75-0x0000000001DF0000-0x0000000001DF8000-memory.dmpFilesize
32KB
-
memory/1584-74-0x000000001B620000-0x000000001B902000-memory.dmpFilesize
2.9MB
-
memory/1656-147-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1656-146-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1656-150-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1656-148-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1656-153-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1656-149-0x0000000140000000-0x000000014000E000-memory.dmpFilesize
56KB
-
memory/1752-67-0x000000001B6D0000-0x000000001B9B2000-memory.dmpFilesize
2.9MB
-
memory/1752-68-0x0000000001D30000-0x0000000001D38000-memory.dmpFilesize
32KB
-
memory/1856-47-0x0000000001360000-0x0000000001548000-memory.dmpFilesize
1.9MB
-
memory/1856-49-0x0000000005A20000-0x0000000005AD6000-memory.dmpFilesize
728KB
-
memory/1880-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1880-60-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1880-52-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1880-54-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1880-56-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1880-58-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1880-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1880-51-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2164-0-0x000007FEF5193000-0x000007FEF5194000-memory.dmpFilesize
4KB
-
memory/2164-1-0x000000013FE50000-0x0000000140150000-memory.dmpFilesize
3.0MB
-
memory/2272-6-0x0000000002D90000-0x0000000002E10000-memory.dmpFilesize
512KB
-
memory/2272-8-0x0000000002720000-0x0000000002728000-memory.dmpFilesize
32KB
-
memory/2272-7-0x000000001B6A0000-0x000000001B982000-memory.dmpFilesize
2.9MB
-
memory/2292-144-0x0000000019F60000-0x000000001A242000-memory.dmpFilesize
2.9MB
-
memory/2292-145-0x0000000000A20000-0x0000000000A28000-memory.dmpFilesize
32KB
-
memory/2424-29-0x00000000002F0000-0x0000000000330000-memory.dmpFilesize
256KB
-
memory/2444-156-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-158-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-167-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-165-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-163-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-164-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-161-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-162-0x00000000001B0000-0x00000000001D0000-memory.dmpFilesize
128KB
-
memory/2444-160-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-159-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-155-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-166-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-157-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2444-174-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2616-173-0x0000000000FA0000-0x0000000000FE0000-memory.dmpFilesize
256KB
-
memory/2632-23-0x0000000001D10000-0x0000000001D18000-memory.dmpFilesize
32KB
-
memory/2632-22-0x000000001B690000-0x000000001B972000-memory.dmpFilesize
2.9MB
-
memory/2976-170-0x0000000000C70000-0x0000000000CB0000-memory.dmpFilesize
256KB
-
memory/2988-107-0x000000001B6C0000-0x000000001B9A2000-memory.dmpFilesize
2.9MB
-
memory/2988-108-0x0000000002790000-0x0000000002798000-memory.dmpFilesize
32KB
-
memory/3032-137-0x000000001B580000-0x000000001B862000-memory.dmpFilesize
2.9MB
-
memory/3032-138-0x0000000001D40000-0x0000000001D48000-memory.dmpFilesize
32KB