Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 07:08

General

  • Target

    2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.9MB

  • MD5

    daf8c1f4e989079a41bc0175817478ca

  • SHA1

    726d3556ff459041cdf841ec030eb6a3caf79422

  • SHA256

    926b0754561e66c80d9fcb2e21990f0679311998321c9faf77a31ef0c6dbd816

  • SHA512

    46df376541ef7884570535f94e60dda15b7dd434635820f6af1c6bcba2e087d1ef02949c4e93100a09f683436bc71e75dae51520a31e80deaf809d01fd479727

  • SSDEEP

    98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUU:Q+856utgpPF8u/7U

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 21 IoCs
  • UPX dump on OEP (original entry point) 64 IoCs
  • XMRig Miner payload 64 IoCs
  • Executes dropped EXE 21 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_daf8c1f4e989079a41bc0175817478ca_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\System\DzBHtco.exe
      C:\Windows\System\DzBHtco.exe
      2⤵
      • Executes dropped EXE
      PID:3668
    • C:\Windows\System\lJxUhOb.exe
      C:\Windows\System\lJxUhOb.exe
      2⤵
      • Executes dropped EXE
      PID:3968
    • C:\Windows\System\MQMUiDJ.exe
      C:\Windows\System\MQMUiDJ.exe
      2⤵
      • Executes dropped EXE
      PID:4164
    • C:\Windows\System\ZcWMmoD.exe
      C:\Windows\System\ZcWMmoD.exe
      2⤵
      • Executes dropped EXE
      PID:3012
    • C:\Windows\System\aHDWJPg.exe
      C:\Windows\System\aHDWJPg.exe
      2⤵
      • Executes dropped EXE
      PID:3704
    • C:\Windows\System\eooMBWG.exe
      C:\Windows\System\eooMBWG.exe
      2⤵
      • Executes dropped EXE
      PID:4172
    • C:\Windows\System\PdNuTRn.exe
      C:\Windows\System\PdNuTRn.exe
      2⤵
      • Executes dropped EXE
      PID:1836
    • C:\Windows\System\wLIArfx.exe
      C:\Windows\System\wLIArfx.exe
      2⤵
      • Executes dropped EXE
      PID:216
    • C:\Windows\System\zLRtbAJ.exe
      C:\Windows\System\zLRtbAJ.exe
      2⤵
      • Executes dropped EXE
      PID:1492
    • C:\Windows\System\DdRwUTn.exe
      C:\Windows\System\DdRwUTn.exe
      2⤵
      • Executes dropped EXE
      PID:4380
    • C:\Windows\System\RqOMMTO.exe
      C:\Windows\System\RqOMMTO.exe
      2⤵
      • Executes dropped EXE
      PID:3432
    • C:\Windows\System\HUFBdeS.exe
      C:\Windows\System\HUFBdeS.exe
      2⤵
      • Executes dropped EXE
      PID:2020
    • C:\Windows\System\NiNheSx.exe
      C:\Windows\System\NiNheSx.exe
      2⤵
      • Executes dropped EXE
      PID:2016
    • C:\Windows\System\qFeyUiI.exe
      C:\Windows\System\qFeyUiI.exe
      2⤵
      • Executes dropped EXE
      PID:3256
    • C:\Windows\System\InwFwRV.exe
      C:\Windows\System\InwFwRV.exe
      2⤵
      • Executes dropped EXE
      PID:2076
    • C:\Windows\System\rVNMZpm.exe
      C:\Windows\System\rVNMZpm.exe
      2⤵
      • Executes dropped EXE
      PID:2404
    • C:\Windows\System\pwCaugY.exe
      C:\Windows\System\pwCaugY.exe
      2⤵
      • Executes dropped EXE
      PID:4340
    • C:\Windows\System\IgcMpER.exe
      C:\Windows\System\IgcMpER.exe
      2⤵
      • Executes dropped EXE
      PID:3772
    • C:\Windows\System\ihnOzGP.exe
      C:\Windows\System\ihnOzGP.exe
      2⤵
      • Executes dropped EXE
      PID:2848
    • C:\Windows\System\XlbRKFl.exe
      C:\Windows\System\XlbRKFl.exe
      2⤵
      • Executes dropped EXE
      PID:4812
    • C:\Windows\System\uVsaSvc.exe
      C:\Windows\System\uVsaSvc.exe
      2⤵
      • Executes dropped EXE
      PID:2816

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System\DdRwUTn.exe
    Filesize

    5.9MB

    MD5

    54aa8434bf025352a8c981f7448e2b47

    SHA1

    fd7c657ddea97a6b8693b24fa8d5eb00a500ae3c

    SHA256

    308882925ef12019d5109696a810047f339027193902a7311a8f5c765c688d0b

    SHA512

    9b950f3af68236675fa0ebe91285703633049fbf2995b0edaa3b9a5b21019fa391735bfa47380e3b87fd63a1f2749ec66cc7d3b96c16a25ae141d3cb8c3edd13

  • C:\Windows\System\DzBHtco.exe
    Filesize

    5.9MB

    MD5

    9a39609e131b62597647b94ab28c9ad2

    SHA1

    3bc5f54290cb2582e268133e72ba4d08a2bc4b3e

    SHA256

    1cd38c05ee4c655bed869637d61e24f7e8a2a369ca0496a2f7444bd7d6adc3e0

    SHA512

    11eb49858fae24a4fe7b4dca9c599a84953da1acaf171e568a25414fe257964967fda4b07f63f7de33f98d89b71a3c9f3341367016300fc0e73f0021b6e7a664

  • C:\Windows\System\HUFBdeS.exe
    Filesize

    5.9MB

    MD5

    c63098afc847f8229efab41ddbfd0fdc

    SHA1

    dc6fd8eed999e0ee81385fe4265375a482b0b42a

    SHA256

    4dd32d8510207324330867face7fbac3ef264604de31bcec1ea274cb57622351

    SHA512

    67e1ea034eb588879dc3b30c233e1e9faed2ccfac7b2e13201dbf2f71c4e974b66037c8cc2a9a066de2e4fdaec7655fafc3cecd70d49070af70e19950c2bef62

  • C:\Windows\System\IgcMpER.exe
    Filesize

    5.9MB

    MD5

    7998352ee9335ee91df913b8f17ac469

    SHA1

    d1f046308bf8a7586d6c8a12b354e12ce9c1b51a

    SHA256

    0a9592bd01972256809bc59c1902fa2e6b060b8a4fbb8614c4b779e274e23ad9

    SHA512

    21973ed95306ad1f8b390682c0f7875e8d83bf7e706ddfbf991d4dc50c1174af9dd20bd945c323da4b67310706076d5f4680a168fefb984248f8a97026051315

  • C:\Windows\System\InwFwRV.exe
    Filesize

    5.9MB

    MD5

    e2819476a519b4e09ebb929554a84e9f

    SHA1

    c1ff5a32417b46629f5da31a660e0c69c933dd66

    SHA256

    9942ec0359ba2eb2787f2632199457268354cb86c355528d790252ffcd4cd4d7

    SHA512

    f68148f4f5b82526596c7819711eba216a43aa7599478ba1669308c3f8636280eddb73cae1ed551a9642e9492d145ff7f66a5f1b1cacc56c7b6c661f03a04519

  • C:\Windows\System\MQMUiDJ.exe
    Filesize

    5.9MB

    MD5

    d9288c76989f2e5da80a067ed415603a

    SHA1

    1bfbb3ac32b77719ed2b90869373db024115c7a5

    SHA256

    7eab711018e15aad6a711472d74112e7d0bfc6ca56a52125aae63ef756665865

    SHA512

    42818a5f8485e0646b496002e9952d02755f47188f415aca45286e88487f37c3c45f5096cd5a91b41b637ca3c117b7bab3cba203d8c40dfe652900a4e84b5a6d

  • C:\Windows\System\NiNheSx.exe
    Filesize

    5.9MB

    MD5

    3d3440c6620b4e1f05e572553d57b243

    SHA1

    f8dcb06e160284f164ca6b7846101505506a3ed9

    SHA256

    c58a1496eca055d5f57b7c6ce8ce68b92930ec63028943a6f99124c2e1e96f7f

    SHA512

    205931ed421b989ae6d5a5c058bdbd84047ca62546fa4048317e81db3523a73d5f9f8b718bba544712017ea13dc17f089033207156a6812329f652d01e577404

  • C:\Windows\System\PdNuTRn.exe
    Filesize

    5.9MB

    MD5

    556e65a6024dfaac37dcd3b0e989d437

    SHA1

    e9f647c46ad4a8ade865b6f1a078c73c4477c2a5

    SHA256

    7acadd29e47c892651e9a9b3947e5454ebd34e926a90fec55dd0aa03e472faa7

    SHA512

    1ecdc7e6f4a260074f3178a338bf0a79fff2a0c5fb18e437646699bb69c77252c37512161445b0032dad890abe4d250efda713a295fce6105e5682dfb293b70d

  • C:\Windows\System\RqOMMTO.exe
    Filesize

    5.9MB

    MD5

    16b068a0d43508f370fdf0595a9b8fd3

    SHA1

    5b8bc9f3d785c0f293a4ac90f44fcc54bfcae9f8

    SHA256

    d72312c44c6892ac460eb2684734af7b18276a2aa1372b6cff403628c3abf8bc

    SHA512

    149f07d0e3202200342a40379344101027726439a306a01f8272683013cba35c45091f60121cf8f8bc3b06bcb547ac5e9dbdb3fbfc8c4a4ceff042ad5e48b49d

  • C:\Windows\System\XlbRKFl.exe
    Filesize

    5.9MB

    MD5

    73bb3ff349695dfb2ba0735c126a5f16

    SHA1

    05dc272b2f24f2585b04eba1fb1de3421f9b1240

    SHA256

    ff05492db2375eddef48590636ba22e73dc10e7671b29a1933d67645bc4f7317

    SHA512

    a11428b6b5bd32edeebb57011000d9c5fa33c2f52c261d8a3a9fae12cecb90a4e8964a5542e80c026376d14c0e0ac938514542122be8818f03502bdc690bbca6

  • C:\Windows\System\ZcWMmoD.exe
    Filesize

    5.9MB

    MD5

    f2443f7b1f979eb455729f4a7e5beee8

    SHA1

    b2f4d51e17a7a2f78fe8eaeebfd6fb69db93fa70

    SHA256

    c89432a27166236b607573de8291bd79e37356bd15adf7c89629c21fee2081ce

    SHA512

    a87690df6b7699ec5a1cb4f18ee28fb5c225c33fe4d155cd42a49ad276d3036ad29732e09c851053de017f9fee3f5217b9b2ef1497def8933bd102281cc11e03

  • C:\Windows\System\aHDWJPg.exe
    Filesize

    5.9MB

    MD5

    b298724441c387779a9c76230e09a2ac

    SHA1

    81cd5563239fac3e19a43153c63a187b718890a5

    SHA256

    1b4bb1b1c2741453f847f91df978f35a493a665f9bf90754d5698474a2bfc634

    SHA512

    ed63b959d2f16e8dfe27f1f7408d9e7750001ded9472b258c58adf0662b1063d5fa8f04304afcc91f03daa5a5f7892bf2413406c6f7303ddcb9a31ae3e747133

  • C:\Windows\System\eooMBWG.exe
    Filesize

    5.9MB

    MD5

    a44f6587a6cf04724b7202782b39041b

    SHA1

    b5cf0a3f57ccb7e97efa5cfa549a1c81f5365ae1

    SHA256

    b05ac91461e6bd23dae30e09d430ec632e25ca60eecf1352ba0ce4978d57dfa3

    SHA512

    acf6cb87fb55705a2e8b62aed07a1db74ebb4f8dec25413611d4400e50c996506c98b489bd8cecb87a5007cbfdf7150320772744c1b0346149165570db254b77

  • C:\Windows\System\ihnOzGP.exe
    Filesize

    5.9MB

    MD5

    1b54b798fa921130d4d9b4758ceedd84

    SHA1

    22cef904ae85acfcc54056f8aae7bf3bb30d3384

    SHA256

    05ca0ffa2dd24e4df3ba4d2d614c769f6af3db8cd56dffedb9ff0b10e2184dc4

    SHA512

    69afcd89f1097eb2194c6b53e51a2988dd553060a2d781cbabdd663468b94f2dd8f6e0808960b55ac7465a7ea92e32440e2b2caf8bfad92f51d555f8d555d1bf

  • C:\Windows\System\lJxUhOb.exe
    Filesize

    5.9MB

    MD5

    125ff3c5a4052c2c4bda1acab0f2f2e5

    SHA1

    dfa37f96b02bd5543cca820b6c39881de31939ed

    SHA256

    550606fb3cb6636142ae7da29fd8ba850a831b6f7368eadbe8285e3e6e1eb938

    SHA512

    5a972b90931d4d0becfd80c3c4d395156e85951c032aacc80b9a2c0cd8436375756c2edee5318b124fcee1c1c1516d36d63e3bd3417cddb9051a027e675dbb3a

  • C:\Windows\System\pwCaugY.exe
    Filesize

    5.9MB

    MD5

    1579d1b4e353b37cbc3d842d78b938f2

    SHA1

    95f0d3b8b5acfdb39c346e3a8ca75c82edc24eb0

    SHA256

    66ed2853bf5afdd2f01a61fc868b110f5a3fbdfee551c5c3098ef600d95107d3

    SHA512

    f21b92ca8d0e1de07db6cdfecd4939109f1aa4ee765cc2a0b7ca8f2173708eadbb27d10d115c4d820fb0e69bebaa132428490a66fd1347bd57237816909b2e18

  • C:\Windows\System\qFeyUiI.exe
    Filesize

    5.9MB

    MD5

    7ca05e48a185c7a55b0d54ceb90bb000

    SHA1

    e4d26f033102a15d29f84a0b26df9d3f99e7be83

    SHA256

    7fc2e9b860b3060a6431bd7734e4ae9e61bd9a1a8531a36d68d034e894c1303d

    SHA512

    6ec343ce82939c0ee481630684454c6cbcc03e6f8111a9d1581d4830f615d410c710f9c7272a36678fca8436f9747d68e81ca57f8d008e6057757a76376100f9

  • C:\Windows\System\rVNMZpm.exe
    Filesize

    5.9MB

    MD5

    7c9a60ebcf0445dc3c2b327b09a57bf9

    SHA1

    657e7a8104a6007fde63be0b8593b41f498431ba

    SHA256

    588a47719220694e29f1d0b8420205eb6e69a6911945ed8bc1db2bdc2beaf73e

    SHA512

    191ff2e635b73a060da2f3dd91891c2f3ba35d3bd508727cbd5f9e825d80a94186f8c625ad781aa26176bfdf116a36f23a4a1d34eeccfad01ffdde3b4d8b96a1

  • C:\Windows\System\uVsaSvc.exe
    Filesize

    5.9MB

    MD5

    22fb8bf409ba6c2284e73d45fcd89201

    SHA1

    2e9b863a257cb1c34774501eaaacdeaece695a40

    SHA256

    bb65866eaf17f914b0924d29634624b05909e84d65323d4124f2b002c90088cb

    SHA512

    f2fc87ffd5fdf40c8e70b814858a123a4e3f44f7945137cd2a82508c702ea00743f7128f0f6739ff40a08a05965692e0ba7a30d8965ddff1c81ef225209c22e2

  • C:\Windows\System\wLIArfx.exe
    Filesize

    5.9MB

    MD5

    693aed710a094c72314f43ebc1f17e68

    SHA1

    687b5d3739cf7ab91cfa95752ae680ae6d382634

    SHA256

    5a5086a0a18c960b94e663bfb8d1bf0468eaf872539f576a0b05148945a8729e

    SHA512

    8d673e61a6b706aaf81379becc2161467faa17b630e3fde400f0ca31639da75cd1016593a0ba9a800bf8b682ec21120423aa6f57980e7aa3a82b266344d313d9

  • C:\Windows\System\zLRtbAJ.exe
    Filesize

    5.9MB

    MD5

    67e7eb9e779bcfe4d1a5caade147c1bd

    SHA1

    fd193ac90ef74d7e378adc06d817e649b05f9632

    SHA256

    de2e134cf8446d9ba7118d8e455fba4dbb6a1c00cb029a787df6f2b7967e2b81

    SHA512

    f6d1b7c3d58bdd341184db154628d284b84313f256d4ef53dbe0bc4d0ec3029cd77294bf660af41953c1af04eaf457892d0c6e355877efe791c340cf085f5c66

  • memory/216-127-0x00007FF6093C0000-0x00007FF609714000-memory.dmp
    Filesize

    3.3MB

  • memory/216-150-0x00007FF6093C0000-0x00007FF609714000-memory.dmp
    Filesize

    3.3MB

  • memory/216-48-0x00007FF6093C0000-0x00007FF609714000-memory.dmp
    Filesize

    3.3MB

  • memory/1492-56-0x00007FF7959D0000-0x00007FF795D24000-memory.dmp
    Filesize

    3.3MB

  • memory/1492-151-0x00007FF7959D0000-0x00007FF795D24000-memory.dmp
    Filesize

    3.3MB

  • memory/1492-133-0x00007FF7959D0000-0x00007FF795D24000-memory.dmp
    Filesize

    3.3MB

  • memory/1836-121-0x00007FF6AA070000-0x00007FF6AA3C4000-memory.dmp
    Filesize

    3.3MB

  • memory/1836-44-0x00007FF6AA070000-0x00007FF6AA3C4000-memory.dmp
    Filesize

    3.3MB

  • memory/1836-149-0x00007FF6AA070000-0x00007FF6AA3C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2016-155-0x00007FF648930000-0x00007FF648C84000-memory.dmp
    Filesize

    3.3MB

  • memory/2016-80-0x00007FF648930000-0x00007FF648C84000-memory.dmp
    Filesize

    3.3MB

  • memory/2016-136-0x00007FF648930000-0x00007FF648C84000-memory.dmp
    Filesize

    3.3MB

  • memory/2020-74-0x00007FF683F70000-0x00007FF6842C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2020-153-0x00007FF683F70000-0x00007FF6842C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2076-98-0x00007FF73DCB0000-0x00007FF73E004000-memory.dmp
    Filesize

    3.3MB

  • memory/2076-157-0x00007FF73DCB0000-0x00007FF73E004000-memory.dmp
    Filesize

    3.3MB

  • memory/2076-139-0x00007FF73DCB0000-0x00007FF73E004000-memory.dmp
    Filesize

    3.3MB

  • memory/2404-140-0x00007FF7156A0000-0x00007FF7159F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2404-102-0x00007FF7156A0000-0x00007FF7159F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2404-160-0x00007FF7156A0000-0x00007FF7159F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2816-135-0x00007FF61B460000-0x00007FF61B7B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2816-163-0x00007FF61B460000-0x00007FF61B7B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2848-123-0x00007FF7B71B0000-0x00007FF7B7504000-memory.dmp
    Filesize

    3.3MB

  • memory/2848-142-0x00007FF7B71B0000-0x00007FF7B7504000-memory.dmp
    Filesize

    3.3MB

  • memory/2848-162-0x00007FF7B71B0000-0x00007FF7B7504000-memory.dmp
    Filesize

    3.3MB

  • memory/3012-22-0x00007FF698800000-0x00007FF698B54000-memory.dmp
    Filesize

    3.3MB

  • memory/3012-147-0x00007FF698800000-0x00007FF698B54000-memory.dmp
    Filesize

    3.3MB

  • memory/3012-103-0x00007FF698800000-0x00007FF698B54000-memory.dmp
    Filesize

    3.3MB

  • memory/3040-1-0x0000015EFD190000-0x0000015EFD1A0000-memory.dmp
    Filesize

    64KB

  • memory/3040-0-0x00007FF7EB210000-0x00007FF7EB564000-memory.dmp
    Filesize

    3.3MB

  • memory/3040-91-0x00007FF7EB210000-0x00007FF7EB564000-memory.dmp
    Filesize

    3.3MB

  • memory/3256-84-0x00007FF6628E0000-0x00007FF662C34000-memory.dmp
    Filesize

    3.3MB

  • memory/3256-138-0x00007FF6628E0000-0x00007FF662C34000-memory.dmp
    Filesize

    3.3MB

  • memory/3256-156-0x00007FF6628E0000-0x00007FF662C34000-memory.dmp
    Filesize

    3.3MB

  • memory/3432-137-0x00007FF758890000-0x00007FF758BE4000-memory.dmp
    Filesize

    3.3MB

  • memory/3432-154-0x00007FF758890000-0x00007FF758BE4000-memory.dmp
    Filesize

    3.3MB

  • memory/3432-75-0x00007FF758890000-0x00007FF758BE4000-memory.dmp
    Filesize

    3.3MB

  • memory/3668-18-0x00007FF677010000-0x00007FF677364000-memory.dmp
    Filesize

    3.3MB

  • memory/3668-143-0x00007FF677010000-0x00007FF677364000-memory.dmp
    Filesize

    3.3MB

  • memory/3704-113-0x00007FF7B0890000-0x00007FF7B0BE4000-memory.dmp
    Filesize

    3.3MB

  • memory/3704-146-0x00007FF7B0890000-0x00007FF7B0BE4000-memory.dmp
    Filesize

    3.3MB

  • memory/3704-30-0x00007FF7B0890000-0x00007FF7B0BE4000-memory.dmp
    Filesize

    3.3MB

  • memory/3772-119-0x00007FF7C0480000-0x00007FF7C07D4000-memory.dmp
    Filesize

    3.3MB

  • memory/3772-158-0x00007FF7C0480000-0x00007FF7C07D4000-memory.dmp
    Filesize

    3.3MB

  • memory/3968-144-0x00007FF6D6670000-0x00007FF6D69C4000-memory.dmp
    Filesize

    3.3MB

  • memory/3968-21-0x00007FF6D6670000-0x00007FF6D69C4000-memory.dmp
    Filesize

    3.3MB

  • memory/4164-19-0x00007FF675D30000-0x00007FF676084000-memory.dmp
    Filesize

    3.3MB

  • memory/4164-94-0x00007FF675D30000-0x00007FF676084000-memory.dmp
    Filesize

    3.3MB

  • memory/4164-145-0x00007FF675D30000-0x00007FF676084000-memory.dmp
    Filesize

    3.3MB

  • memory/4172-148-0x00007FF73E200000-0x00007FF73E554000-memory.dmp
    Filesize

    3.3MB

  • memory/4172-41-0x00007FF73E200000-0x00007FF73E554000-memory.dmp
    Filesize

    3.3MB

  • memory/4340-106-0x00007FF695020000-0x00007FF695374000-memory.dmp
    Filesize

    3.3MB

  • memory/4340-159-0x00007FF695020000-0x00007FF695374000-memory.dmp
    Filesize

    3.3MB

  • memory/4340-141-0x00007FF695020000-0x00007FF695374000-memory.dmp
    Filesize

    3.3MB

  • memory/4380-152-0x00007FF68AFC0000-0x00007FF68B314000-memory.dmp
    Filesize

    3.3MB

  • memory/4380-66-0x00007FF68AFC0000-0x00007FF68B314000-memory.dmp
    Filesize

    3.3MB

  • memory/4380-134-0x00007FF68AFC0000-0x00007FF68B314000-memory.dmp
    Filesize

    3.3MB

  • memory/4812-129-0x00007FF63E390000-0x00007FF63E6E4000-memory.dmp
    Filesize

    3.3MB

  • memory/4812-161-0x00007FF63E390000-0x00007FF63E6E4000-memory.dmp
    Filesize

    3.3MB