Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21-06-2024 01:36

General

  • Target

    2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.9MB

  • MD5

    b2be1386ba28a14a1f7f8180c97af4fe

  • SHA1

    fcdd4d082c71a4659e6d28984f5035e56d06d972

  • SHA256

    56dfc01814e7c7bdbdd81479ca40e78c06cd17683643cac21d659d5841ba53f9

  • SHA512

    82c1d4ac3cd226c54295efc4242a73566c7487706d6fb7327dc57e7b4084081a9365b7723fefbc96831350b2cecc9d2ef47900d0f92687e527653423752a673e

  • SSDEEP

    98304:kPrrcBpddfE0pZVg56utgpPFotBER/mQ32lUa:i0BM56utgpPF8u/7a

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 21 IoCs
  • UPX dump on OEP (original entry point) 59 IoCs
  • XMRig Miner payload 64 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 59 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-21_b2be1386ba28a14a1f7f8180c97af4fe_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\System\nULzwrD.exe
      C:\Windows\System\nULzwrD.exe
      2⤵
      • Executes dropped EXE
      PID:2992
    • C:\Windows\System\SCWeHXf.exe
      C:\Windows\System\SCWeHXf.exe
      2⤵
      • Executes dropped EXE
      PID:2984
    • C:\Windows\System\SRJTwov.exe
      C:\Windows\System\SRJTwov.exe
      2⤵
      • Executes dropped EXE
      PID:1940
    • C:\Windows\System\sofUqKr.exe
      C:\Windows\System\sofUqKr.exe
      2⤵
      • Executes dropped EXE
      PID:2552
    • C:\Windows\System\fpmtZnq.exe
      C:\Windows\System\fpmtZnq.exe
      2⤵
      • Executes dropped EXE
      PID:2664
    • C:\Windows\System\gdPJxCe.exe
      C:\Windows\System\gdPJxCe.exe
      2⤵
      • Executes dropped EXE
      PID:2744
    • C:\Windows\System\OxUDfqu.exe
      C:\Windows\System\OxUDfqu.exe
      2⤵
      • Executes dropped EXE
      PID:3036
    • C:\Windows\System\fczQVQG.exe
      C:\Windows\System\fczQVQG.exe
      2⤵
      • Executes dropped EXE
      PID:2792
    • C:\Windows\System\XcvzPEg.exe
      C:\Windows\System\XcvzPEg.exe
      2⤵
      • Executes dropped EXE
      PID:2624
    • C:\Windows\System\lqAyVbH.exe
      C:\Windows\System\lqAyVbH.exe
      2⤵
      • Executes dropped EXE
      PID:2452
    • C:\Windows\System\YqzfisS.exe
      C:\Windows\System\YqzfisS.exe
      2⤵
      • Executes dropped EXE
      PID:2536
    • C:\Windows\System\cmzVgHl.exe
      C:\Windows\System\cmzVgHl.exe
      2⤵
      • Executes dropped EXE
      PID:2940
    • C:\Windows\System\eYOanaX.exe
      C:\Windows\System\eYOanaX.exe
      2⤵
      • Executes dropped EXE
      PID:2956
    • C:\Windows\System\yeKxVrs.exe
      C:\Windows\System\yeKxVrs.exe
      2⤵
      • Executes dropped EXE
      PID:2812
    • C:\Windows\System\mgNUSVL.exe
      C:\Windows\System\mgNUSVL.exe
      2⤵
      • Executes dropped EXE
      PID:1192
    • C:\Windows\System\DXnEuKX.exe
      C:\Windows\System\DXnEuKX.exe
      2⤵
      • Executes dropped EXE
      PID:2832
    • C:\Windows\System\Vnthxen.exe
      C:\Windows\System\Vnthxen.exe
      2⤵
      • Executes dropped EXE
      PID:2936
    • C:\Windows\System\vLiEsEt.exe
      C:\Windows\System\vLiEsEt.exe
      2⤵
      • Executes dropped EXE
      PID:1956
    • C:\Windows\System\xdthrvK.exe
      C:\Windows\System\xdthrvK.exe
      2⤵
      • Executes dropped EXE
      PID:1688
    • C:\Windows\System\nZuLhBn.exe
      C:\Windows\System\nZuLhBn.exe
      2⤵
      • Executes dropped EXE
      PID:1616
    • C:\Windows\System\CWkQHzg.exe
      C:\Windows\System\CWkQHzg.exe
      2⤵
      • Executes dropped EXE
      PID:1204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\DXnEuKX.exe
    Filesize

    5.9MB

    MD5

    a3cd559c73256ca98fb24c336c86c00d

    SHA1

    22f3ad808573fc56ab2f6f718756b086cff265e3

    SHA256

    84c6508bdf92e675fb53e5829783b5e007053986775867264017166717faf638

    SHA512

    2972fcd47c229f3e8b5ed85169fadd52a22ea3716a23369625aa63d41dee1308e8412fd1efccf8a40f0ab58e5632e5601b1c42fb8c41ae1cb002c4dd8a498714

  • C:\Windows\system\OxUDfqu.exe
    Filesize

    5.9MB

    MD5

    3b41d49db473e4a68f18324362e90df8

    SHA1

    2e3679b59351deb52ea8fc2ca768917e0885d621

    SHA256

    4ce2560c37f8fc76bae034531d1a41e0531494d7d59970b3788e462cbbe2c426

    SHA512

    bb151aa8a980d6756bdac428acc7223d0831000d5f370d961b6d764277624fdb488d4f391901c0df4898e1f07cbfc6efc46ce8d835f35a976eb94892c56a725c

  • C:\Windows\system\SRJTwov.exe
    Filesize

    5.9MB

    MD5

    e2d168c29981513209264e1272fdd695

    SHA1

    2b0840766f38e9a42e294f60d1145cf444f5e027

    SHA256

    d8ff2e84d40ef0a2ae8ee3eb6c4d40b71af77bcd82e455210478c8e992394063

    SHA512

    512e646ba73a862547a2a1a1fab6efa58e0fa02b97c2456206dfe66fdd38d03dbce83435b8d627aba6d362915f6a7134b9687aaa386404237b41b248bfc9a569

  • C:\Windows\system\Vnthxen.exe
    Filesize

    5.9MB

    MD5

    7c8a962124f2663ab520b43917f17aa9

    SHA1

    38ca8d9eaf612b92c9619c9a2b24828a1db9a5cd

    SHA256

    0bac200e3d6e60b9eb97450f2d442c8e2e8b0cb61131bc017d7477e29237e9be

    SHA512

    bc7ec0753f7d702e5a512967ee87a6b4463f57a3b0d21220625ecb5a0e5b12d590fbe770cd5a1cf584ff3d0b6d67360800dcbd22efba3fa3036a7746ece7d153

  • C:\Windows\system\XcvzPEg.exe
    Filesize

    5.9MB

    MD5

    5cdf9c01b98fe2af086fe4b3ec4a0ac2

    SHA1

    c5029abb3dd19f0e47cb6dcdd38fa7ffca134961

    SHA256

    1a7f5dbe78b26f3e832999d4eab497b3d6f27f596ffa38a669e7753c1e23de96

    SHA512

    132d763d6604b03dc5b6d9c00e342b73efadaa1741d3db05bbcbb8b01a2a4a4a1070007d1b8ebe5347ac81861e41ac31e7fcd0d303b80fdb8d191fa728fdb6eb

  • C:\Windows\system\YqzfisS.exe
    Filesize

    5.9MB

    MD5

    89c4f75335c8a7045671efb82d13ccf8

    SHA1

    ce535489e137298ae334e14d4bf7fb5de2dcf75c

    SHA256

    1482a5ee74bdacfdbb92cda6c55cda56d2fbd327ceeb2d5133931f0ffc6ba4d5

    SHA512

    30544c9b25a7d6228e0ecf477a9a5f2f00541b0c3a73f29117e2645b0544ce7db282a4f2477800824a52a9c88be8c000ae566ecbead72a24d4ab059d7b7d7a64

  • C:\Windows\system\cmzVgHl.exe
    Filesize

    5.9MB

    MD5

    4da1a038a3abf73953cff1343e5459cf

    SHA1

    01ef5d9a3f890853085c0531d48648c10e00c6f4

    SHA256

    6dc33d97bf81e4f8b25c26025d0d5d9822fc3bde470fa6a44a104d57ca835902

    SHA512

    9d18e096b91834308a0e19402bf63de151e6f928d759f68723ecf0d0b229af5624776ca2d8fbeba46f9605225fdaf34fa5f721f86ff58af504605c13b01eca97

  • C:\Windows\system\eYOanaX.exe
    Filesize

    5.9MB

    MD5

    1539e39756ae79c527c43a777fb014c9

    SHA1

    ca72c32935021feb31b6fdbe70cc52cf5d02578e

    SHA256

    183200d0dee75e4aa94cbe9db7a345ed4ab2927362494021876b33b5d006212e

    SHA512

    1308c167a46346680b560e88ae6b014f91c9dbda3030e0ddadfc9bc4be26193f28db884c430db89519cd8aed52396078f7055d78e36a008e9b50ddb35b040209

  • C:\Windows\system\gdPJxCe.exe
    Filesize

    5.9MB

    MD5

    2ebf76c31731bb8441281fe65df888ce

    SHA1

    2751dc8c6b0c2984c2e62f6e5ee5ee710940ed37

    SHA256

    568633dedac88ca85dd2170769cc3ebe3b86c6145fbcbaf7a25a15e2fedf7d1e

    SHA512

    398dcfd800aaa182fc1676a55251e444643d33fa6b90fc610cdabe64876d04c076219bcfe01cd7abe4fcb10b69c6d69e679f3bcc360fcc14c29d777771e95f94

  • C:\Windows\system\lqAyVbH.exe
    Filesize

    5.9MB

    MD5

    2dd23647b01d77dfbee269729c72f13c

    SHA1

    c01d59b461dd76de9055f3523e7108b35fa8cae3

    SHA256

    36f3ea89b9aeafcf5b2abb072a2f99537f921eb4add670453d11d0d8c19fc16a

    SHA512

    406469b1fbd6559e66df6c6346571259d8f2242168c1d713138ee1527ec048e1918b6a4c856a95dc8cf67d9fe5fc391eff552891ee2ac47eb4112669cef7451f

  • C:\Windows\system\mgNUSVL.exe
    Filesize

    5.9MB

    MD5

    17a7de3940f3e3b44c6667dcdbb62136

    SHA1

    3649a88fd22d1845ade606c851b98107839365b1

    SHA256

    bf902d28b900209d3802bb33d590c8248378a830bd3b0bfccd31f366fdb48137

    SHA512

    1db4446176ff555a56438a333b3033a1da6ac5dc85b3244dfb76eb04a38652e6f1cbc6443bf0cff1d840bee189e83b5548310d9a84d6ba743ccf0049940eb4fc

  • C:\Windows\system\nZuLhBn.exe
    Filesize

    5.9MB

    MD5

    ad786f6e1836609ff6707bd5ee8ff443

    SHA1

    5c36ec578cbac3eb51d8575d87e268f48dbdc370

    SHA256

    bc6bd781b70e66af5061a0ee856a2e9a27e3246102ca8920e0a2d9776e1f49aa

    SHA512

    2e95cbf79775ab83720717a84c112e64bdb2533470865fc4ab500559ba76d588a023a14f4c64cdc8252e5b37d24f99cf86c654d4b976410baf4e9f7e8a7890fd

  • C:\Windows\system\sofUqKr.exe
    Filesize

    5.9MB

    MD5

    de89208acdab77a5c0adb6bc9c8f4128

    SHA1

    b71c52685667d52a30e7fed6bfbec17199591a8b

    SHA256

    c2320b3f671470610e82deeae0123bdb4f0644170adcb85ccec8ba81694792c7

    SHA512

    df2ff599083978f65e62ba208abc90ff9162163bdf17e5c7dc7951edc3fea6c386f251f1c9b770e73307e07ff32820e91c9903e39610e000fdb15280f4ab231e

  • C:\Windows\system\vLiEsEt.exe
    Filesize

    5.9MB

    MD5

    d0e83a06bb48bb01912f9e790ab39e31

    SHA1

    c5db61e2985e8ab9dc071183e86216b0c09cec38

    SHA256

    4c0be562a9060668b83e4069ce1fa6cb43227bf59224026a89c82a5030936c06

    SHA512

    115159529ca626d2eec9f964c6851b990de9c1a2379e08ccf2badc0975cc94f6135de48ef5eabf680c0b2973490f358ebb41ca2ce2e23b4f98551463afbaf47c

  • C:\Windows\system\xdthrvK.exe
    Filesize

    5.9MB

    MD5

    e2a5d2a19286967b5a191f30b400d0e5

    SHA1

    ca0bd25e4e7ad4ff3ba18c9cbf974a08f7115849

    SHA256

    dcba4bb931027ee13cd3b47d1d5a6bb7aeadb9e7c1dd410d8a45400030cbbdfe

    SHA512

    4617eab9b319413ea98e160612e87955a360d67f8d53387f0c026ea2b4732e9721df3dcfbf39caf97ffe946ed39e867e3dfb38f6446f9bf6ac104ba5b188e2cb

  • C:\Windows\system\yeKxVrs.exe
    Filesize

    5.9MB

    MD5

    19bc362cf89d2b3a4b2ca15ab4c000e5

    SHA1

    f091a6595ebcbd185717693144d9def4f1def97b

    SHA256

    347c81fa864a5adb5a965e9f013501144db85504fd0f4204606bc6032a11acc4

    SHA512

    334a00f39565e7f4913861e559fcb40922b413351782960eee6d03b8bc03d84766d3efaa368b420ca4e6d9ee4986b1bf9cd1baeb942263d90e96eb35009d9fe3

  • \Windows\system\CWkQHzg.exe
    Filesize

    5.9MB

    MD5

    e6b1ab9b366fd73080e64637fb4c8221

    SHA1

    7994b9209d27c8559762ca8e512c0d7d5cee6e75

    SHA256

    089613cfc5d1dedb48183b745ded1f50327a9e1a4ed7664840a18863c7bfb968

    SHA512

    0dfd2834683ca7ed6d13659faed604adac772e0d947faea8241eab9516ba34f93708bbcd656a68229ac2fd14160c7ed0bc901d210901b77891b2d882265e8333

  • \Windows\system\SCWeHXf.exe
    Filesize

    5.9MB

    MD5

    ffa2412dfa428865dd5e5ee04bb371cd

    SHA1

    bec1bb0ef4f453476650185a8ea24e140b43f5ed

    SHA256

    0852a094a96cce90620317dbf01e89480c8412be72d5897ba2f4ab2f6ed38809

    SHA512

    679f47c2be5b74d8662b8c66c6c507014547d00ab6aef9ff859417b9f05f16cdaf5386e0c1e2be1188bd684ca9e01c536db814cdfa6f41b8b33b3191221de84d

  • \Windows\system\fczQVQG.exe
    Filesize

    5.9MB

    MD5

    3acebc991b05a3c34309d7419c57ca29

    SHA1

    edc05ad5a2d44966106cf2201129c21486fac967

    SHA256

    c5dc65d71fd75d938142bc65765615f1235960935c54298280125b95c1c96458

    SHA512

    d3164f36c7f0f1004e28089cab6240153819c014b2709b284b497325c5d29e2ae6d1018af4970a8e150f9259d1172d2f7f12cec590e40499a6f42fd67be6cc46

  • \Windows\system\fpmtZnq.exe
    Filesize

    5.9MB

    MD5

    97887263ba7041d490736913d1de2e22

    SHA1

    246bfad6b27cece6d533186143274dfeba645472

    SHA256

    0663fc8cbc0b31a3c6d13c468b0ad4915591ebe0d460f26c536e2458afd68e9e

    SHA512

    161ab963c1dbb9699f1ebac2adc509ff1c7b28596c89fb699bca6d7f0adb9f6922a5675b9f9489db97ce0814bbff8f1c064e15296b44d1503df193ff991a6d4d

  • \Windows\system\nULzwrD.exe
    Filesize

    5.9MB

    MD5

    c9757740a5d098729a2672faed77b7be

    SHA1

    3062add4ebc529d45f6b109ecfdde41fba7b51c0

    SHA256

    4bc2db89d0a8ed13fc8e281688a9e8ea9dec1c5b7312d8f048230ad89125d829

    SHA512

    53c09508bd0aad7a0db953047118dcad3eb185231d97a9bb8f52239efe63ef4b4f86d275b9a87662989830e7e408f8dcb23248c8980b57b84e286020cf1597e7

  • memory/1940-83-0x000000013F2C0000-0x000000013F614000-memory.dmp
    Filesize

    3.3MB

  • memory/1940-21-0x000000013F2C0000-0x000000013F614000-memory.dmp
    Filesize

    3.3MB

  • memory/1940-150-0x000000013F2C0000-0x000000013F614000-memory.dmp
    Filesize

    3.3MB

  • memory/2452-71-0x000000013FB10000-0x000000013FE64000-memory.dmp
    Filesize

    3.3MB

  • memory/2452-140-0x000000013FB10000-0x000000013FE64000-memory.dmp
    Filesize

    3.3MB

  • memory/2452-157-0x000000013FB10000-0x000000013FE64000-memory.dmp
    Filesize

    3.3MB

  • memory/2536-78-0x000000013FD20000-0x0000000140074000-memory.dmp
    Filesize

    3.3MB

  • memory/2536-158-0x000000013FD20000-0x0000000140074000-memory.dmp
    Filesize

    3.3MB

  • memory/2536-141-0x000000013FD20000-0x0000000140074000-memory.dmp
    Filesize

    3.3MB

  • memory/2552-91-0x000000013F400000-0x000000013F754000-memory.dmp
    Filesize

    3.3MB

  • memory/2552-29-0x000000013F400000-0x000000013F754000-memory.dmp
    Filesize

    3.3MB

  • memory/2552-151-0x000000013F400000-0x000000013F754000-memory.dmp
    Filesize

    3.3MB

  • memory/2624-156-0x000000013F380000-0x000000013F6D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2624-65-0x000000013F380000-0x000000013F6D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2664-152-0x000000013FEC0000-0x0000000140214000-memory.dmp
    Filesize

    3.3MB

  • memory/2664-40-0x000000013FEC0000-0x0000000140214000-memory.dmp
    Filesize

    3.3MB

  • memory/2744-153-0x000000013F680000-0x000000013F9D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2744-41-0x000000013F680000-0x000000013F9D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-56-0x000000013FC20000-0x000000013FF74000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-7-0x000000013F550000-0x000000013F8A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-1-0x0000000001B20000-0x0000000001B30000-memory.dmp
    Filesize

    64KB

  • memory/2784-99-0x000000013F330000-0x000000013F684000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-27-0x000000013F400000-0x000000013F754000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-77-0x0000000002340000-0x0000000002694000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-107-0x000000013F550000-0x000000013F8A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-84-0x000000013F230000-0x000000013F584000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-18-0x000000013F2C0000-0x000000013F614000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-64-0x000000013F380000-0x000000013F6D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-92-0x0000000002340000-0x0000000002694000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-51-0x0000000002340000-0x0000000002694000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-42-0x000000013F680000-0x000000013F9D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-48-0x000000013F490000-0x000000013F7E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-70-0x0000000002340000-0x0000000002694000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-138-0x000000013F380000-0x000000013F6D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-139-0x0000000002340000-0x0000000002694000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-147-0x000000013F550000-0x000000013F8A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-0-0x000000013FC20000-0x000000013FF74000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-142-0x000000013F230000-0x000000013F584000-memory.dmp
    Filesize

    3.3MB

  • memory/2784-145-0x000000013F330000-0x000000013F684000-memory.dmp
    Filesize

    3.3MB

  • memory/2792-58-0x000000013FF30000-0x0000000140284000-memory.dmp
    Filesize

    3.3MB

  • memory/2792-155-0x000000013FF30000-0x0000000140284000-memory.dmp
    Filesize

    3.3MB

  • memory/2812-161-0x000000013F330000-0x000000013F684000-memory.dmp
    Filesize

    3.3MB

  • memory/2812-146-0x000000013F330000-0x000000013F684000-memory.dmp
    Filesize

    3.3MB

  • memory/2812-100-0x000000013F330000-0x000000013F684000-memory.dmp
    Filesize

    3.3MB

  • memory/2940-159-0x000000013F230000-0x000000013F584000-memory.dmp
    Filesize

    3.3MB

  • memory/2940-85-0x000000013F230000-0x000000013F584000-memory.dmp
    Filesize

    3.3MB

  • memory/2940-143-0x000000013F230000-0x000000013F584000-memory.dmp
    Filesize

    3.3MB

  • memory/2956-144-0x000000013FCE0000-0x0000000140034000-memory.dmp
    Filesize

    3.3MB

  • memory/2956-160-0x000000013FCE0000-0x0000000140034000-memory.dmp
    Filesize

    3.3MB

  • memory/2956-93-0x000000013FCE0000-0x0000000140034000-memory.dmp
    Filesize

    3.3MB

  • memory/2984-149-0x000000013F3D0000-0x000000013F724000-memory.dmp
    Filesize

    3.3MB

  • memory/2984-19-0x000000013F3D0000-0x000000013F724000-memory.dmp
    Filesize

    3.3MB

  • memory/2992-148-0x000000013F550000-0x000000013F8A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2992-14-0x000000013F550000-0x000000013F8A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2992-57-0x000000013F550000-0x000000013F8A4000-memory.dmp
    Filesize

    3.3MB

  • memory/3036-154-0x000000013F490000-0x000000013F7E4000-memory.dmp
    Filesize

    3.3MB

  • memory/3036-49-0x000000013F490000-0x000000013F7E4000-memory.dmp
    Filesize

    3.3MB