Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 06:24

General

  • Target

    2024-06-30_0baed767ae2076761d744d5cc4b9a0ab_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.9MB

  • MD5

    0baed767ae2076761d744d5cc4b9a0ab

  • SHA1

    0b0aaa9c67ae5a99deea3c6c096f9eec9dbd3b75

  • SHA256

    026d7144e59f38a06d0a4c2d6661a5f4a54280beecd12c6a30d83818ea1e3f07

  • SHA512

    c08da43401f3351ff9530bedb148dc0d65d929f688e890a9dc9dfc48b7f225ddc887a02736a0a8f15c2881e6c18f66acf92c4385114c071fe01a0a8abf567dba

  • SSDEEP

    98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUO:Q+856utgpPF8u/7O

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 21 IoCs
  • UPX dump on OEP (original entry point) 57 IoCs
  • XMRig Miner payload 59 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 57 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-30_0baed767ae2076761d744d5cc4b9a0ab_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-30_0baed767ae2076761d744d5cc4b9a0ab_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\System\PyBFcDk.exe
      C:\Windows\System\PyBFcDk.exe
      2⤵
      • Executes dropped EXE
      PID:3016
    • C:\Windows\System\kDzFIfo.exe
      C:\Windows\System\kDzFIfo.exe
      2⤵
      • Executes dropped EXE
      PID:868
    • C:\Windows\System\ygZkAVo.exe
      C:\Windows\System\ygZkAVo.exe
      2⤵
      • Executes dropped EXE
      PID:2172
    • C:\Windows\System\Kaqgjoo.exe
      C:\Windows\System\Kaqgjoo.exe
      2⤵
      • Executes dropped EXE
      PID:2604
    • C:\Windows\System\TrvIcja.exe
      C:\Windows\System\TrvIcja.exe
      2⤵
      • Executes dropped EXE
      PID:2724
    • C:\Windows\System\NuiXYVE.exe
      C:\Windows\System\NuiXYVE.exe
      2⤵
      • Executes dropped EXE
      PID:2568
    • C:\Windows\System\cxxZlEF.exe
      C:\Windows\System\cxxZlEF.exe
      2⤵
      • Executes dropped EXE
      PID:2488
    • C:\Windows\System\mkaCgrh.exe
      C:\Windows\System\mkaCgrh.exe
      2⤵
      • Executes dropped EXE
      PID:2636
    • C:\Windows\System\wQWIPOz.exe
      C:\Windows\System\wQWIPOz.exe
      2⤵
      • Executes dropped EXE
      PID:2460
    • C:\Windows\System\efhnUZY.exe
      C:\Windows\System\efhnUZY.exe
      2⤵
      • Executes dropped EXE
      PID:2540
    • C:\Windows\System\KJojMFc.exe
      C:\Windows\System\KJojMFc.exe
      2⤵
      • Executes dropped EXE
      PID:2924
    • C:\Windows\System\MCkZLCn.exe
      C:\Windows\System\MCkZLCn.exe
      2⤵
      • Executes dropped EXE
      PID:2152
    • C:\Windows\System\CCKAegy.exe
      C:\Windows\System\CCKAegy.exe
      2⤵
      • Executes dropped EXE
      PID:2940
    • C:\Windows\System\mvoklWq.exe
      C:\Windows\System\mvoklWq.exe
      2⤵
      • Executes dropped EXE
      PID:2440
    • C:\Windows\System\FmHqayj.exe
      C:\Windows\System\FmHqayj.exe
      2⤵
      • Executes dropped EXE
      PID:1904
    • C:\Windows\System\OWsEVSt.exe
      C:\Windows\System\OWsEVSt.exe
      2⤵
      • Executes dropped EXE
      PID:1352
    • C:\Windows\System\ZGskpBP.exe
      C:\Windows\System\ZGskpBP.exe
      2⤵
      • Executes dropped EXE
      PID:1960
    • C:\Windows\System\DykCPKY.exe
      C:\Windows\System\DykCPKY.exe
      2⤵
      • Executes dropped EXE
      PID:2796
    • C:\Windows\System\eNpgzKP.exe
      C:\Windows\System\eNpgzKP.exe
      2⤵
      • Executes dropped EXE
      PID:2908
    • C:\Windows\System\aPAkmDK.exe
      C:\Windows\System\aPAkmDK.exe
      2⤵
      • Executes dropped EXE
      PID:1144
    • C:\Windows\System\BMzalIm.exe
      C:\Windows\System\BMzalIm.exe
      2⤵
      • Executes dropped EXE
      PID:1872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\DykCPKY.exe
    Filesize

    5.9MB

    MD5

    1e067ce03b001c08766191a40c9f8e78

    SHA1

    c5c43aaa7bc8d80fd7c8548e6f3dd4a683ed058c

    SHA256

    7892f432513eab1679f608522143920eeacdb0525e69a3fb9efbfb8533a0436f

    SHA512

    a312e115fd20d6975169c22de70b4a702fc80fd55d570c32fbb35c167e631e212558db15ebae9c01d35c8d344391fc01dd96ba5217ac0f50584961207a95eb18

  • C:\Windows\system\Kaqgjoo.exe
    Filesize

    5.9MB

    MD5

    a8bf4f91011d5c93dd98a94457b60397

    SHA1

    fbc94b00322d2ee38f1b2a998aa1318225a6ab06

    SHA256

    9b1cd2701ed04fbe8e927b4aed079f6cc96fce0c48b104e39db1ed5ec1c649d8

    SHA512

    d36167d988ea4844bce874ab4f5ecdc121ca05830b9f8e0c9a0b83a50911e45e4cf85a1f09014cd79487a851626c363c898a9bcd30837c03f65ade7cdd9be000

  • C:\Windows\system\MCkZLCn.exe
    Filesize

    5.9MB

    MD5

    f52b5bce3c46dc0c491afb75798430c6

    SHA1

    c894e426d82d55c671864311d229e94ec3fbce80

    SHA256

    4dfcd69cf67adcbe917b838a345ab02cdd04301546c3c9882f4dfb2207f14d30

    SHA512

    0f5353afe1ffdc6d67ad2b0105220b966c26972a4304f96e8ad31d27ef7e378ba5619de24f2d95ce2a5e3f7347403d91c7a00d6ad762ea77866d61384731881f

  • C:\Windows\system\NuiXYVE.exe
    Filesize

    5.9MB

    MD5

    055e3612169c51bdc2ddfb5817da18ac

    SHA1

    bb426933fb0d60e0dc7d0dec2fc1dae22b4124e5

    SHA256

    449cc0bc5e7b9e2a99b6ee5079b76b7adc2086299ad3d037ae01b330f3f41d3e

    SHA512

    7b4a2f0839b84c46e618ae629404a24cdfdd8592c4953ed49edfd36121b5a9805511d9793fda0629be190f55faba8d7d4ae390fa434c720414cd0b37f4ecb2bb

  • C:\Windows\system\TrvIcja.exe
    Filesize

    5.9MB

    MD5

    5b9663a8fd714848bd09d8268a213c76

    SHA1

    cac9271aaabb9c6d96c55a8525142bcbde60e2d1

    SHA256

    7b14d0b5215b57918f3a6816e25605264ac465b82a32a5c30ee0d22d6510bc50

    SHA512

    c378eafe08531ead840fc0ceac81e612bfb5b28580b174e6d9b89cc881dbabaf3abd86908087967c96d89c62eb5c139200ee2b086e4743e09fe999bd25d6ea61

  • C:\Windows\system\ZGskpBP.exe
    Filesize

    5.9MB

    MD5

    adceff466fbe971ef18115f710b2a513

    SHA1

    6fe06df1705a6f3185f67618542d2bb2d92acc23

    SHA256

    da78777177340d6400eab2f4bdd8feb60dd6bcea836aa202bacadcebbc55a764

    SHA512

    ce22c2381233fbcd20ab2fd4537e68fc95406cc510f28a3edb7ea33fdeb24b9dbe3658e00ad9f7047c05cb85083155993d4c00cfd895275d3ae67cd0895e9d33

  • C:\Windows\system\aPAkmDK.exe
    Filesize

    5.9MB

    MD5

    31ff5617bbf1bf75eb00b3ada72b8159

    SHA1

    156390351e84e890fa2a19a852f0a6659a7f8629

    SHA256

    fe73fcf826f8f18a41343d155eeb98515594b3e308699d7b3209794448e024ff

    SHA512

    360feeb119720275e262687fcc573d871cd5217f67b5a9edc4b335056004e76a2b6425fbec2daaea8e6cd9bf7c685af20f27a5ea3bae558ecc3d5852a934ff1e

  • C:\Windows\system\kDzFIfo.exe
    Filesize

    5.9MB

    MD5

    84539003df914de759e3cb1ff1fb8b1e

    SHA1

    65a681a80a7171603e7c4c4e2c5c8ad5c02a3875

    SHA256

    87a73577d41975a972e92c4f1d7ae9d6ee0135b96952c3624f57d05bd7f3d8d6

    SHA512

    56fec354b4e4f31ddacdf1b776d3b121776c23c8995cdb51b5dac5e01f9634724620f644dbd218086b14ad2a83061a115052ffb1d539fb9b737976153d4c2081

  • C:\Windows\system\mkaCgrh.exe
    Filesize

    5.9MB

    MD5

    7519f8cc74b40f614b95c4c77c772099

    SHA1

    2faeaaa56322d24caabb622f306282a3712c1526

    SHA256

    24963a99af11303fc9d43ab51fb436f3f8a672f2006f33fb85aef2401aa9b4bc

    SHA512

    3c05f264d144ad135724a434f1685eb27db22d820b7e77d70fd20b132213ec4ad49e791af2c7ee341b1162bdc96185ec25c3ddf3c427a40886e864d9dd8f2c9b

  • C:\Windows\system\mvoklWq.exe
    Filesize

    5.9MB

    MD5

    2813ed34ab8d6beea4d84d4de4f10d3b

    SHA1

    213147f4bb87f186cab5cb73f34d7aa26f3b00f0

    SHA256

    729f1398eef9dde2b7b148681052190b65bf0fdc0ca2ab6497beb11c28c1f65d

    SHA512

    77d84c6a456fc3197344c681558d9267941dfb4248a9d9eb2f0559f053910511e7312cac6a90e585c45d3ba7b462c69b0edd6d74fd1eb7ec48ad8d0e394f6cf2

  • C:\Windows\system\wQWIPOz.exe
    Filesize

    5.9MB

    MD5

    74675717bf793b5ee321eef5e1f7db2b

    SHA1

    416542020376f5c0567d6fe4ac066b63120eb0c2

    SHA256

    ff328cdf986963f2cb1bc19fd6b128749246deb266d9ac4c2a5ed83e5f88678c

    SHA512

    8dfb3ba5222baa89c6f9318dbe01d4e11fe9a6c2b6c44695b678d36eba832bf3652a7efebd7f9a06eb55e359fea47e72f84a27e19d04549be29c843fb1aca9de

  • C:\Windows\system\ygZkAVo.exe
    Filesize

    5.9MB

    MD5

    41bace7686570fba6ed09ac11b926b45

    SHA1

    b838cd693b898988791150d04fcca4b02723804e

    SHA256

    761e65d0d02fc8374fbfdbca7e4892c511129243ff0b0a1dc7f999e38ed7d90e

    SHA512

    3d58fe29e91c51758a42d9db3ec0c4803dfc84cabaadcb54746f02285d10c13030dfd8597a8d8d000e93c0d41c022ba20af86dcb69bbfefd312e2e88bb385504

  • \Windows\system\BMzalIm.exe
    Filesize

    5.9MB

    MD5

    24044f9f2b5392043bcc2c42454afae8

    SHA1

    eb7d13349e4888e61b4a7d5bfda36fd15ed7ef44

    SHA256

    871d5827983bea782a527ac6a4989e01306f4dc4cb2b2d89b67c507b3bb82660

    SHA512

    5250b0d119799e7b3d7fbfa4e95a1e8e950fbf238a9f80bb6b72be2b1984b16086f54b83ea901820f352e9230a9e8acdb930d3685123b264c373aeaa2ddbdaeb

  • \Windows\system\CCKAegy.exe
    Filesize

    5.9MB

    MD5

    347ae66acfc686599b84cf9f1fa8a787

    SHA1

    c9b6430e0a52d50e18ce3a2bb577f256fd034462

    SHA256

    e3684b519ee0df59dd9231579fd2086dfa511ac4796bffceb1f3b24b579c46ae

    SHA512

    912710d49702e1a95126a19b743e81defb64d91de13f37169d6086e0fa91e176be8290be64b633ee751423232e479559cb8f7951d3ea9e0905d66fc8bef09689

  • \Windows\system\FmHqayj.exe
    Filesize

    5.9MB

    MD5

    2b5e259a7dbb790ebb98029628b8eca4

    SHA1

    931aa2436543125aa08b39bf27dcf3a6e004969c

    SHA256

    bddc0fb31c759f17efc5ffa2097e889fc290db5e8bbe21700f72d93b05a46fea

    SHA512

    9a192ba66d6227445d4f981e1383a07895ca98c448f7eca365fe423781ef6d17ebbbb9c6d1037ad6b3fa2fe186d5c485a224c82e502d92dcc1012485c0a11673

  • \Windows\system\KJojMFc.exe
    Filesize

    5.9MB

    MD5

    dd91084a653443d65641513bcceb2b18

    SHA1

    7b22b92d355fa0820a449bd4a0eef28234c884b2

    SHA256

    38a35041e3d37aca4f333ecc3c72fa01ae868e5c44e4a6b7a91599b6428da7ec

    SHA512

    e566f91e8d208be9051e0e2fc83d78daa02c7f215eef78244f12413a5b268d91c635e73f32590cc4e70f52faf5b4d52ecb7fef2f31fe5778b90ce8a5798be9cb

  • \Windows\system\OWsEVSt.exe
    Filesize

    5.9MB

    MD5

    acb817514d00b55d78174539203f9640

    SHA1

    164ec25087611cbded1a2c6f383e17cb01eabc4c

    SHA256

    da59d8b725a4080c1a373052a4d8aadc2205eddc7e698101d0c97ed3bf8d5941

    SHA512

    f724c729ab247d1e3b49b69d7856890f386776dd9498078a826e96303ebf2caf16d2382401c94c3a7037580bbe3b57bcb832fbb66d1e1019dafa80a01059352d

  • \Windows\system\PyBFcDk.exe
    Filesize

    5.9MB

    MD5

    2ee6f4971a506b12343685ea9d04f9d0

    SHA1

    5f63c5fbe597026f2fc40c134f8b1acc2965d58b

    SHA256

    c0355ca29e53d3894ae670cf3e93db0b773039f9e657e79db14020c8e4b17dcc

    SHA512

    c260c80cdeece105b1503e123a3531a76724eb7d6523c970881f084f24e93d0b71cc24bcc373545bca2bc1a45736c8a2edce4ce7b1318a417271b8233a445c24

  • \Windows\system\cxxZlEF.exe
    Filesize

    5.9MB

    MD5

    4c2ed895b82f2135e0edec41de7868c4

    SHA1

    ac447f56cf5cdec1b9deb6cf22412cf1c17d0cc7

    SHA256

    bfc96aa22e82b50106c776c17eada4758ed18b4a0386c0b2762ccc79ae4790e1

    SHA512

    218faae41659e57cce97857735ef3dac78e0347d33e0d493ea1db275246fd70e4743dc9b821ea346f1af8ed778d30f163f2e1a3a3f21433c92725cb6a0f7267c

  • \Windows\system\eNpgzKP.exe
    Filesize

    5.9MB

    MD5

    0268782cde512a6bd8ffe12e1167411f

    SHA1

    92892edfbef2a2cbf22680928f0f2c3b215cf627

    SHA256

    1fd4a701d516221b72ff9ab5da362396cab49e84b6e3914ec10ddca41cb5757e

    SHA512

    7bdb57df0405b873fae5f3f48375c6ae3dd862dc924c24b8370132a2035170274a15e8e8223424c2781855c96f390a964501bba9b2d8df79ccd6f6b71bc30510

  • \Windows\system\efhnUZY.exe
    Filesize

    5.9MB

    MD5

    9654afd26d64ef2869ccc73ee4500b99

    SHA1

    458b49d32d5eb13fbd88fffc002d3842d2de3bb2

    SHA256

    bce15be556ae5624b434706993e7f97f45e6136657a6cd4fdc5e0b881111f038

    SHA512

    cb6c056494b296b1b6f41d3a840c87683e3c719d900d6fb47f9e2935ac9f3912c7f9016c6f64b12dc43d6d71578b0055f153650bdc90a9d38f43ba91c425017e

  • memory/868-144-0x000000013F6F0000-0x000000013FA44000-memory.dmp
    Filesize

    3.3MB

  • memory/868-22-0x000000013F6F0000-0x000000013FA44000-memory.dmp
    Filesize

    3.3MB

  • memory/2152-139-0x000000013F460000-0x000000013F7B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2152-84-0x000000013F460000-0x000000013F7B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2152-153-0x000000013F460000-0x000000013F7B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2172-21-0x000000013FB00000-0x000000013FE54000-memory.dmp
    Filesize

    3.3MB

  • memory/2172-145-0x000000013FB00000-0x000000013FE54000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-81-0x00000000022B0000-0x0000000002604000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-41-0x00000000022B0000-0x0000000002604000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-62-0x000000013F440000-0x000000013F794000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-136-0x00000000022B0000-0x0000000002604000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-1-0x000000013F440000-0x000000013F794000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-74-0x000000013FD80000-0x00000001400D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-49-0x000000013F7A0000-0x000000013FAF4000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-0-0x0000000000080000-0x0000000000090000-memory.dmp
    Filesize

    64KB

  • memory/2240-11-0x00000000022B0000-0x0000000002604000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-20-0x000000013FB00000-0x000000013FE54000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-89-0x00000000022B0000-0x0000000002604000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-137-0x000000013FD80000-0x00000001400D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-95-0x000000013FEE0000-0x0000000140234000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-35-0x000000013F940000-0x000000013FC94000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-55-0x000000013F090000-0x000000013F3E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-141-0x000000013FEE0000-0x0000000140234000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-113-0x00000000022B0000-0x0000000002604000-memory.dmp
    Filesize

    3.3MB

  • memory/2240-28-0x00000000022B0000-0x0000000002604000-memory.dmp
    Filesize

    3.3MB

  • memory/2440-142-0x000000013FEE0000-0x0000000140234000-memory.dmp
    Filesize

    3.3MB

  • memory/2440-96-0x000000013FEE0000-0x0000000140234000-memory.dmp
    Filesize

    3.3MB

  • memory/2440-155-0x000000013FEE0000-0x0000000140234000-memory.dmp
    Filesize

    3.3MB

  • memory/2460-135-0x000000013FDA0000-0x00000001400F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2460-151-0x000000013FDA0000-0x00000001400F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2460-63-0x000000013FDA0000-0x00000001400F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2488-149-0x000000013F7A0000-0x000000013FAF4000-memory.dmp
    Filesize

    3.3MB

  • memory/2488-50-0x000000013F7A0000-0x000000013FAF4000-memory.dmp
    Filesize

    3.3MB

  • memory/2540-70-0x000000013F350000-0x000000013F6A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2540-152-0x000000013F350000-0x000000013F6A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2568-94-0x000000013F690000-0x000000013F9E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2568-42-0x000000013F690000-0x000000013F9E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2568-148-0x000000013F690000-0x000000013F9E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2604-29-0x000000013F4E0000-0x000000013F834000-memory.dmp
    Filesize

    3.3MB

  • memory/2604-146-0x000000013F4E0000-0x000000013F834000-memory.dmp
    Filesize

    3.3MB

  • memory/2636-56-0x000000013F090000-0x000000013F3E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2636-109-0x000000013F090000-0x000000013F3E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2636-150-0x000000013F090000-0x000000013F3E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2724-147-0x000000013F940000-0x000000013FC94000-memory.dmp
    Filesize

    3.3MB

  • memory/2724-36-0x000000013F940000-0x000000013FC94000-memory.dmp
    Filesize

    3.3MB

  • memory/2924-138-0x000000013FD80000-0x00000001400D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2924-154-0x000000013FD80000-0x00000001400D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2924-80-0x000000013FD80000-0x00000001400D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2940-140-0x000000013F690000-0x000000013F9E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2940-156-0x000000013F690000-0x000000013F9E4000-memory.dmp
    Filesize

    3.3MB

  • memory/3016-143-0x000000013F460000-0x000000013F7B4000-memory.dmp
    Filesize

    3.3MB

  • memory/3016-19-0x000000013F460000-0x000000013F7B4000-memory.dmp
    Filesize

    3.3MB