Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 06:45

General

  • Target

    2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.9MB

  • MD5

    03f72815581f3b582e9f2b9ab3eb02c9

  • SHA1

    c9fddba1d1107079320c41b71a51de0f0021ac67

  • SHA256

    8311e443f96e95e8a9c1735b352706688e7cf1f34dcfa8e3d7825d5c7db8727d

  • SHA512

    900a9b8dda0a310b7c4debb5fbbf3aa217c2563060d690c7113165877b58907b2a335dd23594bf9b4ecf82ad257921e0dc5305e774571e69d5d92f2f56fec571

  • SSDEEP

    98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lU9:Q+856utgpPF8u/79

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 64 IoCs
  • Executes dropped EXE 21 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\System\LzCFmEM.exe
      C:\Windows\System\LzCFmEM.exe
      2⤵
      • Executes dropped EXE
      PID:2412
    • C:\Windows\System\eXbOzqe.exe
      C:\Windows\System\eXbOzqe.exe
      2⤵
      • Executes dropped EXE
      PID:4084
    • C:\Windows\System\suuizFR.exe
      C:\Windows\System\suuizFR.exe
      2⤵
      • Executes dropped EXE
      PID:3448
    • C:\Windows\System\aiFCTkg.exe
      C:\Windows\System\aiFCTkg.exe
      2⤵
      • Executes dropped EXE
      PID:1760
    • C:\Windows\System\aWBglaM.exe
      C:\Windows\System\aWBglaM.exe
      2⤵
      • Executes dropped EXE
      PID:2264
    • C:\Windows\System\uHrovZX.exe
      C:\Windows\System\uHrovZX.exe
      2⤵
      • Executes dropped EXE
      PID:1436
    • C:\Windows\System\wWOvAXm.exe
      C:\Windows\System\wWOvAXm.exe
      2⤵
      • Executes dropped EXE
      PID:3540
    • C:\Windows\System\FMRGIVh.exe
      C:\Windows\System\FMRGIVh.exe
      2⤵
      • Executes dropped EXE
      PID:3684
    • C:\Windows\System\YVYKDUb.exe
      C:\Windows\System\YVYKDUb.exe
      2⤵
      • Executes dropped EXE
      PID:3256
    • C:\Windows\System\bMltfMi.exe
      C:\Windows\System\bMltfMi.exe
      2⤵
      • Executes dropped EXE
      PID:1676
    • C:\Windows\System\jOVdRIk.exe
      C:\Windows\System\jOVdRIk.exe
      2⤵
      • Executes dropped EXE
      PID:4548
    • C:\Windows\System\EUpwJap.exe
      C:\Windows\System\EUpwJap.exe
      2⤵
      • Executes dropped EXE
      PID:1736
    • C:\Windows\System\SMZEyWX.exe
      C:\Windows\System\SMZEyWX.exe
      2⤵
      • Executes dropped EXE
      PID:1912
    • C:\Windows\System\nbpJKIV.exe
      C:\Windows\System\nbpJKIV.exe
      2⤵
      • Executes dropped EXE
      PID:4200
    • C:\Windows\System\UTKOfIo.exe
      C:\Windows\System\UTKOfIo.exe
      2⤵
      • Executes dropped EXE
      PID:4388
    • C:\Windows\System\GynxLnm.exe
      C:\Windows\System\GynxLnm.exe
      2⤵
      • Executes dropped EXE
      PID:4652
    • C:\Windows\System\oaObGXR.exe
      C:\Windows\System\oaObGXR.exe
      2⤵
      • Executes dropped EXE
      PID:2108
    • C:\Windows\System\VsVBCXT.exe
      C:\Windows\System\VsVBCXT.exe
      2⤵
      • Executes dropped EXE
      PID:5080
    • C:\Windows\System\yhDvNNP.exe
      C:\Windows\System\yhDvNNP.exe
      2⤵
      • Executes dropped EXE
      PID:2852
    • C:\Windows\System\myEpjcZ.exe
      C:\Windows\System\myEpjcZ.exe
      2⤵
      • Executes dropped EXE
      PID:460
    • C:\Windows\System\kzgMnYw.exe
      C:\Windows\System\kzgMnYw.exe
      2⤵
      • Executes dropped EXE
      PID:3416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System\EUpwJap.exe
    Filesize

    5.9MB

    MD5

    2cb5ec22def54a743414249a7dc25e74

    SHA1

    17a00846108b1fb9abde10fc3f5e09f65a5dc3c6

    SHA256

    20a4f049320ebaaef95da98646f63d58f783fa426f160ff9de598a6f2d3e5e0f

    SHA512

    44043969b552cf1cb23879c3f276d4c5c681410e423698f90603a21ef9b93321000e673fcd84fb89e1b1a608d359d3fa5f11b40fb0ee3de47a9f2a50d9d94324

  • C:\Windows\System\FMRGIVh.exe
    Filesize

    5.9MB

    MD5

    61c1f14960949639993010e6f24320d9

    SHA1

    7cb324f1756d70cff2dff593a207cfd75927d089

    SHA256

    fa620d2a095a168d4d95dfa88b49e6b1ce7d11763d47bbd3393410863f255920

    SHA512

    201c1aa42d2d284d0916ea33ec4b73a5f112c923529604d29234e2cff290c71c3a64fb8ae3d8f5b9b0dc8e15c653ffdf38f0d76d495a54eb1c847036ff8fda2a

  • C:\Windows\System\GynxLnm.exe
    Filesize

    5.9MB

    MD5

    39854d1e6a3857b8ee6830860ce5ad90

    SHA1

    2c7e5fc68e9b2b0bb54f808c3232cd573e1c2336

    SHA256

    0b552f1003e66836dc805b24f8716fe6dfbf0607bb4cc25c3c412efb4ab58cb7

    SHA512

    265d52a5127771f763f208b95cd3e79f892c2be0d340ee0de50a5ed70a3c9cac90ebcb6a54a814123e4ffa935c9c91d7dde2159135ee9c0fc81ea4eeb8d21534

  • C:\Windows\System\LzCFmEM.exe
    Filesize

    5.9MB

    MD5

    8c4add64c1e5350e3d8b3faeba233486

    SHA1

    7c4a4643d74a4a033a1e765ee659ed04dedcdde9

    SHA256

    43c6b9f16aead7873b68721d86d79673102c947cb3daf74e30dc8f0a63f88c99

    SHA512

    37be5f4db501429a85fbd9eeeb9528374eaad5583b6a523f2cfae6731a93c64c928a4b556dae2fa467db23544405668004e240fd8649cf7510d71f41b198563d

  • C:\Windows\System\SMZEyWX.exe
    Filesize

    5.9MB

    MD5

    a2e1243d572244a35eb3a6112b79b580

    SHA1

    b9430e0bb5fb0cfc670a228d7d766fc76697d11c

    SHA256

    43655e87a6022edd597774632310cbd27558d8e4a0d5ea86b29620b40030319d

    SHA512

    0db95e44b7f4a2660bbb63f72710b39e1eb84ae7adbe24834a637e039d996146616080c1e09f9e72c5766d2f79b4247a76994c5254cc7d726604dad32d98a064

  • C:\Windows\System\UTKOfIo.exe
    Filesize

    5.9MB

    MD5

    5a6df708637e6fe8d65a7c9d98c4c1e7

    SHA1

    e0498273745a657674beb0ba987d92170e113383

    SHA256

    403a95c15ff07d5d54184e80477acc3522b193007653edeea3b2f5e847b4e9f5

    SHA512

    e1aa356d10710fd4b8943cb25a2047cacccfb7920f6b473d309bc5f3f577f0a6c3d334b9ec1a56b90c1af7a564b532e7c2bc5344fa8da12a25df5c86ff160473

  • C:\Windows\System\VsVBCXT.exe
    Filesize

    5.9MB

    MD5

    5913462cc5166fe520272ace21a3d8e2

    SHA1

    ae1302888aea2675a48bf51210f610f4b02d7784

    SHA256

    5044ee7935f9d41aab6eddeea9845c62b2ae64d3ae415146ccc099b7f5c4d6fb

    SHA512

    e07270057a474e95e1f2a517c2b476d7ad3a4fe4a0d2aec0078200e851e3ccd963ecc420dee4ab48e15277c84d688c461ce1bb62baf73be4be98f4d8d6f7c5a4

  • C:\Windows\System\YVYKDUb.exe
    Filesize

    5.9MB

    MD5

    3bc93546776079eb9d7cdbf454ef81eb

    SHA1

    41130d6f723aac8bd284ecc68f6212f7c4dade97

    SHA256

    664f6508376026db6f09b22bf30ddf29205f683cbc76d6d78f56da1c5c963144

    SHA512

    412922577631e737f51102a52c5fdecfdfb9ca893356e2e9a18f29eebc6cc1e8c528e877c52d587cc44bd8eb870149ccef84135883bce2073ae1c6c91e0db862

  • C:\Windows\System\aWBglaM.exe
    Filesize

    5.9MB

    MD5

    08e76806c93813d37eb2bca2a1e4d783

    SHA1

    5dbb08adade72ea0ef0ed77c080a177f78dd4721

    SHA256

    49acbfebb90e9d80556cc072578d0d81deea4c6b0a50265f4f34b1f7b14cf342

    SHA512

    11907a6e0ce83c4064a1c74dc50ce71926b5a4c86b947b00616511042a9c7302efe13643a41922c33fcc006e6a9b0a3268fc6df055a3ce0b5c799b00a2b9444c

  • C:\Windows\System\aiFCTkg.exe
    Filesize

    5.9MB

    MD5

    9229a2dfebde72e87526c9419aa113be

    SHA1

    51678b941bfa23245d353b426f81160052bd9f63

    SHA256

    e2af5883f8e196f33a0a0be10ba8ad82fd44a35ad97ad26398c1ee876b354de8

    SHA512

    cef5a28b03a797644ff401375f2eb9f6e0d01bfd07c42682dfda84c7dff460c7e8be17985cd04d135b178f2e292ca60a0dba436a28935d2f0068fd9f7b6876a9

  • C:\Windows\System\bMltfMi.exe
    Filesize

    5.9MB

    MD5

    1b91228accc8baef822539895271674d

    SHA1

    3d32c72816942e5dd7f5c3dea81328347df6f26b

    SHA256

    8f10c6779a7379a6feced57d2a10f276175aa96676037a1375ed4490929ee843

    SHA512

    3b31406568dddea32d725f9d4275a3ca8f68f3e2d09977f28a4f03bca2404d60fb3d032c4be7109bd27ca5b4072e7dac0e2c1b968c60d919c4330412ae2c3962

  • C:\Windows\System\eXbOzqe.exe
    Filesize

    5.9MB

    MD5

    706c7b184ade147e67b2491a30bcfb8c

    SHA1

    de6486f0ba6e26ba76235cc81dabf6469b57d747

    SHA256

    9036ab4b06843b479d25c5a333f933b19a9734f8a7387bd781eeebf5b96566b7

    SHA512

    fd18de3a604552f490b7fda24b25da574dbc8dfe11335811a9266a4fe83184af537dfcf015611c5d621551d26521ab3edef9ab85afb5641750261e4f48213aa7

  • C:\Windows\System\jOVdRIk.exe
    Filesize

    5.9MB

    MD5

    7c8069bf951cc7f995d78bf6c05c5734

    SHA1

    5e353938785b282081ac020f3da30f753866ab1d

    SHA256

    03e01cfa084cf79fcb0338b6d4cb4606c13cb0fc70e4e400c9d032d58e2cf7cd

    SHA512

    0805d1d0e3ac8374e2a80a4c98401888c074ad67f058bd39678b8b360179aa32301313b69502c8a730e9f6b26fe3030f266c0703253f5b113e1db191f2c024a2

  • C:\Windows\System\kzgMnYw.exe
    Filesize

    5.9MB

    MD5

    1b955eb68a34782a5171a49f15576a0b

    SHA1

    c116aa212a1f604b4751909dfc393551bacdfc78

    SHA256

    5ed2c776666e1de0d9d99fb2312df31183a7c47bb794059f8a4d7be5ad3092c8

    SHA512

    558078ce3d0e2d016572c070a7214a6349ad9019632218175b87eedbe3b24d92202dbf5bde59823636dc8eb8244ca5949a59b36c4c915bda58daa408b474bea9

  • C:\Windows\System\myEpjcZ.exe
    Filesize

    5.9MB

    MD5

    b1bc0046d28f3f673bc48037f64d8a51

    SHA1

    b55b6451fe4e53b0ea45effce3ff26a513f69d15

    SHA256

    d6b2119324cf316e7a855221633558978d336901d546219a855936a357f4ebca

    SHA512

    805f554d7dc548cf53b269fd106c3cd0b9126e897893b4a765c51427524e0dbb540793f39530e439317eb6604199b996b70071189f7edc52febb2a6bd424519e

  • C:\Windows\System\nbpJKIV.exe
    Filesize

    5.9MB

    MD5

    0e90db32ac3688955d212816dea0d21f

    SHA1

    598652480d0385aa4f1e266ae166ca3c0e0f0545

    SHA256

    86571819530179ec61523ee8afb7cd0dba35c0b18baec5b219819f2243d85357

    SHA512

    9b4a4d4da5c42f4d4dddd9f78c9eda2ed3bf0e4d11b45ed5aac24ae173020f15f8add36ab8b815d8275b53cc4c687721cd57ff235856b06e074f460a223e63d8

  • C:\Windows\System\oaObGXR.exe
    Filesize

    5.9MB

    MD5

    65aeb1f03dd7cb1e8849e8db3a869782

    SHA1

    95c0f05b9e97a04433519edfee8f915bfebbc66a

    SHA256

    c051a39d999741e1f25552be7de09df9efb55183ce2a2b6e1bccb5f25107c9db

    SHA512

    4d5c9da14a3bcf3b0814c6d25c0aa5f6d570f1e70a7e7e449d55d545e0071cfbdd4a2cf57a3ee04d1ff94292c455f4262ea5cf3f7de18071102790fcd0ee0b9f

  • C:\Windows\System\suuizFR.exe
    Filesize

    5.9MB

    MD5

    a81334358994239ac59f61975b1c5fae

    SHA1

    7ba11a9659f2f87e60970aee068836517a560fbf

    SHA256

    afc46914b6f5b2da67dec8862934d940fe240d34fcc83584c6f0930c8f324c38

    SHA512

    96ab565598b2db6a3749a6a2a48970812c2c0d469b6b714300df53847eda283dcc5136cafaedae31b32b6cfc46469edbcc6678b158073974e7b0b1b1c28d0f96

  • C:\Windows\System\uHrovZX.exe
    Filesize

    5.9MB

    MD5

    5c38284ba12718fec44cd68ec11c0833

    SHA1

    b9c6991b2cdc4a8fad94f4b19a06091270fdbfaf

    SHA256

    fd34758e091833ec1cd3806d8080dc9eb1a97350aee3d4620b12650b767403b5

    SHA512

    deb9d0015368f4e19c98f277b7eee3e782f8f1a9c5b97c6fb208a977d2c522850571d3009d6011a0d1adfb048cd7f0ac0cc0cb0b2c59f57c85ce91a08b9437b7

  • C:\Windows\System\wWOvAXm.exe
    Filesize

    5.9MB

    MD5

    3108cb3326bf01b9c312d559eaedf4a0

    SHA1

    3ed0e84897f7fe330c288c39e0bb607a6194d60a

    SHA256

    4fbc51ee9b41cdf5eaef971f64de6e5e4accaec76082ee4b5d42a2d593e2e2e4

    SHA512

    7e34d37c262c94accdf13a62de4edd5433386f73f98f5ba549df5ba9ab7c24387711b4ab23a2c091864ca6fad211c6e1143a12bd885e7633cb35aa2a5d99b53c

  • C:\Windows\System\yhDvNNP.exe
    Filesize

    5.9MB

    MD5

    c1d5808a958e994e62a1fd2200398afc

    SHA1

    531a38398f11993de8aacc2a5bd5895d91fe01e3

    SHA256

    a218a73a00f4d3bacb1e1b45c094cd2b7356a56cc031da7c9c497f65604f34a1

    SHA512

    37baf93dafd651a70afdd3702803163b548321ef8edc5d7e464d6864c12c841dc4007f097368a7c35e03f0b02b02cba16e2c41d0c60ef0cb62e7665f5b3e49af

  • memory/460-141-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmp
    Filesize

    3.3MB

  • memory/460-127-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmp
    Filesize

    3.3MB

  • memory/460-161-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmp
    Filesize

    3.3MB

  • memory/1436-148-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp
    Filesize

    3.3MB

  • memory/1436-40-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp
    Filesize

    3.3MB

  • memory/1436-114-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp
    Filesize

    3.3MB

  • memory/1676-134-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmp
    Filesize

    3.3MB

  • memory/1676-60-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmp
    Filesize

    3.3MB

  • memory/1676-151-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-153-0x00007FF7D4000000-0x00007FF7D4354000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-81-0x00007FF7D4000000-0x00007FF7D4354000-memory.dmp
    Filesize

    3.3MB

  • memory/1760-34-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp
    Filesize

    3.3MB

  • memory/1760-97-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp
    Filesize

    3.3MB

  • memory/1760-145-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp
    Filesize

    3.3MB

  • memory/1912-155-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmp
    Filesize

    3.3MB

  • memory/1912-86-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmp
    Filesize

    3.3MB

  • memory/1912-136-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmp
    Filesize

    3.3MB

  • memory/2108-115-0x00007FF623FD0000-0x00007FF624324000-memory.dmp
    Filesize

    3.3MB

  • memory/2108-156-0x00007FF623FD0000-0x00007FF624324000-memory.dmp
    Filesize

    3.3MB

  • memory/2264-128-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp
    Filesize

    3.3MB

  • memory/2264-35-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp
    Filesize

    3.3MB

  • memory/2264-146-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp
    Filesize

    3.3MB

  • memory/2412-142-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmp
    Filesize

    3.3MB

  • memory/2412-8-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmp
    Filesize

    3.3MB

  • memory/2852-159-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmp
    Filesize

    3.3MB

  • memory/2852-120-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmp
    Filesize

    3.3MB

  • memory/2852-139-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmp
    Filesize

    3.3MB

  • memory/3256-57-0x00007FF727EB0000-0x00007FF728204000-memory.dmp
    Filesize

    3.3MB

  • memory/3256-150-0x00007FF727EB0000-0x00007FF728204000-memory.dmp
    Filesize

    3.3MB

  • memory/3256-133-0x00007FF727EB0000-0x00007FF728204000-memory.dmp
    Filesize

    3.3MB

  • memory/3416-162-0x00007FF773C60000-0x00007FF773FB4000-memory.dmp
    Filesize

    3.3MB

  • memory/3416-131-0x00007FF773C60000-0x00007FF773FB4000-memory.dmp
    Filesize

    3.3MB

  • memory/3448-144-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmp
    Filesize

    3.3MB

  • memory/3448-28-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmp
    Filesize

    3.3MB

  • memory/3540-49-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmp
    Filesize

    3.3MB

  • memory/3540-147-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmp
    Filesize

    3.3MB

  • memory/3684-149-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmp
    Filesize

    3.3MB

  • memory/3684-132-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmp
    Filesize

    3.3MB

  • memory/3684-53-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmp
    Filesize

    3.3MB

  • memory/3760-0-0x00007FF752000000-0x00007FF752354000-memory.dmp
    Filesize

    3.3MB

  • memory/3760-1-0x0000028E283A0000-0x0000028E283B0000-memory.dmp
    Filesize

    64KB

  • memory/3760-76-0x00007FF752000000-0x00007FF752354000-memory.dmp
    Filesize

    3.3MB

  • memory/4084-143-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmp
    Filesize

    3.3MB

  • memory/4084-19-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmp
    Filesize

    3.3MB

  • memory/4200-84-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmp
    Filesize

    3.3MB

  • memory/4200-135-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmp
    Filesize

    3.3MB

  • memory/4200-154-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmp
    Filesize

    3.3MB

  • memory/4388-158-0x00007FF686780000-0x00007FF686AD4000-memory.dmp
    Filesize

    3.3MB

  • memory/4388-137-0x00007FF686780000-0x00007FF686AD4000-memory.dmp
    Filesize

    3.3MB

  • memory/4388-90-0x00007FF686780000-0x00007FF686AD4000-memory.dmp
    Filesize

    3.3MB

  • memory/4548-152-0x00007FF6D27A0000-0x00007FF6D2AF4000-memory.dmp
    Filesize

    3.3MB

  • memory/4548-70-0x00007FF6D27A0000-0x00007FF6D2AF4000-memory.dmp
    Filesize

    3.3MB

  • memory/4652-157-0x00007FF709B10000-0x00007FF709E64000-memory.dmp
    Filesize

    3.3MB

  • memory/4652-138-0x00007FF709B10000-0x00007FF709E64000-memory.dmp
    Filesize

    3.3MB

  • memory/4652-98-0x00007FF709B10000-0x00007FF709E64000-memory.dmp
    Filesize

    3.3MB

  • memory/5080-140-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmp
    Filesize

    3.3MB

  • memory/5080-118-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmp
    Filesize

    3.3MB

  • memory/5080-160-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmp
    Filesize

    3.3MB