Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 05:50

General

  • Target

    2024-06-30_5f14ffe89964271cac4025e953339c48_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.9MB

  • MD5

    5f14ffe89964271cac4025e953339c48

  • SHA1

    0c24d608074084987eb489d9af28bd44bb4418f4

  • SHA256

    323140ae6707575622973ae79a6f015a2a38e63a4b9462a202fa6e2e2c0d3d19

  • SHA512

    40cff4e014524cd14e61b896925a268c2a2ba0be32c48e38f4224b17d154c0fd49d13e6b8f6ba50ebb3f4a25d8ba6bf90549919dff255007439fc65b88747362

  • SSDEEP

    98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUC:Q+856utgpPF8u/7C

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 21 IoCs
  • UPX dump on OEP (original entry point) 52 IoCs
  • XMRig Miner payload 56 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 52 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-30_5f14ffe89964271cac4025e953339c48_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-30_5f14ffe89964271cac4025e953339c48_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\System\ueirzPj.exe
      C:\Windows\System\ueirzPj.exe
      2⤵
      • Executes dropped EXE
      PID:2420
    • C:\Windows\System\sWQwijm.exe
      C:\Windows\System\sWQwijm.exe
      2⤵
      • Executes dropped EXE
      PID:2256
    • C:\Windows\System\ZmepKAM.exe
      C:\Windows\System\ZmepKAM.exe
      2⤵
      • Executes dropped EXE
      PID:2644
    • C:\Windows\System\lkRHtqs.exe
      C:\Windows\System\lkRHtqs.exe
      2⤵
      • Executes dropped EXE
      PID:2748
    • C:\Windows\System\abvwOtK.exe
      C:\Windows\System\abvwOtK.exe
      2⤵
      • Executes dropped EXE
      PID:2824
    • C:\Windows\System\aFZXNak.exe
      C:\Windows\System\aFZXNak.exe
      2⤵
      • Executes dropped EXE
      PID:2684
    • C:\Windows\System\aeJXnXg.exe
      C:\Windows\System\aeJXnXg.exe
      2⤵
      • Executes dropped EXE
      PID:1072
    • C:\Windows\System\WnXYHVz.exe
      C:\Windows\System\WnXYHVz.exe
      2⤵
      • Executes dropped EXE
      PID:2576
    • C:\Windows\System\bGAUnqf.exe
      C:\Windows\System\bGAUnqf.exe
      2⤵
      • Executes dropped EXE
      PID:2860
    • C:\Windows\System\RMDDIQR.exe
      C:\Windows\System\RMDDIQR.exe
      2⤵
      • Executes dropped EXE
      PID:2704
    • C:\Windows\System\oZzxQaR.exe
      C:\Windows\System\oZzxQaR.exe
      2⤵
      • Executes dropped EXE
      PID:2540
    • C:\Windows\System\tNXtptD.exe
      C:\Windows\System\tNXtptD.exe
      2⤵
      • Executes dropped EXE
      PID:2584
    • C:\Windows\System\CMtfDvM.exe
      C:\Windows\System\CMtfDvM.exe
      2⤵
      • Executes dropped EXE
      PID:2908
    • C:\Windows\System\WhRGbvN.exe
      C:\Windows\System\WhRGbvN.exe
      2⤵
      • Executes dropped EXE
      PID:1516
    • C:\Windows\System\ixGgruw.exe
      C:\Windows\System\ixGgruw.exe
      2⤵
      • Executes dropped EXE
      PID:2772
    • C:\Windows\System\OSMONhS.exe
      C:\Windows\System\OSMONhS.exe
      2⤵
      • Executes dropped EXE
      PID:2060
    • C:\Windows\System\ixCvjzd.exe
      C:\Windows\System\ixCvjzd.exe
      2⤵
      • Executes dropped EXE
      PID:2224
    • C:\Windows\System\zPDSOdS.exe
      C:\Windows\System\zPDSOdS.exe
      2⤵
      • Executes dropped EXE
      PID:2120
    • C:\Windows\System\NyBmulz.exe
      C:\Windows\System\NyBmulz.exe
      2⤵
      • Executes dropped EXE
      PID:1768
    • C:\Windows\System\WOMEdeI.exe
      C:\Windows\System\WOMEdeI.exe
      2⤵
      • Executes dropped EXE
      PID:2628
    • C:\Windows\System\MlKnunE.exe
      C:\Windows\System\MlKnunE.exe
      2⤵
      • Executes dropped EXE
      PID:2640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\CMtfDvM.exe
    Filesize

    5.9MB

    MD5

    26be89865883e8fbda0b4168303d40d4

    SHA1

    14032d7439c00ade39bf5414335d614840c3959d

    SHA256

    38585d4141f8251c1ca107b43b8aaa45ab0cf0217536781433e816f7587ad670

    SHA512

    79648f020b24ee4cd33650630e3a09a923acb90792601dc9043fd9c4b73e700ad606ab12387ef45171f8906668edeb3d61e14aa624f8bc5f40e20e6d4be3e360

  • C:\Windows\system\NyBmulz.exe
    Filesize

    5.9MB

    MD5

    8f6032678675b0df8fcfa15b8ac5e856

    SHA1

    7d9667565547cf498452a08db28ca38a14587216

    SHA256

    4b8be19534a14d64d17efaf249b2bdd5e933ccf2c11148d1789257ce0a19f719

    SHA512

    4afd2d062fb00dcdd86f940eed08f7bd73ab6d2dfc4f78ad384c4dc5786d3e325de422cf029e6cea98185ffcc1e2d3cb106b870109e6b6c89457ee7ec73cfd16

  • C:\Windows\system\OSMONhS.exe
    Filesize

    5.9MB

    MD5

    04e1aae67758019249c8c0b97404146f

    SHA1

    10c97bb00527660d7d35e4f1f9725df2ef38657d

    SHA256

    28c228cc8dbf2bc646c09206760c4e63432f7404590d0ee3200365ada2f6dc6c

    SHA512

    84613f5ee378fbabd9844342609492233fc72a1278e8205445b0f03e57820a89479c95fa6a88d07fd9d719a52f351f8a0471ef56877b73597b1355134cfe0bcd

  • C:\Windows\system\RMDDIQR.exe
    Filesize

    5.9MB

    MD5

    4281dacdf0026027dd0b4f5ade104add

    SHA1

    dd49c7bf0ad9799544b91aa476d30e21da0764b4

    SHA256

    d0e39b6f6a2d2daa82e1b834d8390427c2f18ab60e388ee24065a595e5711e0a

    SHA512

    12e1aca7ab190c56e37e753cc17d2a22afb1835eabf3e7d2d338d3f28eaef355a2c86e0edf3ca7ddf45352319488b98a7b115ad7d5a1c25919f38ca5c3bea989

  • C:\Windows\system\WOMEdeI.exe
    Filesize

    5.9MB

    MD5

    a996b80bb2a83de0350862eee401a0e5

    SHA1

    25262a6e21bf79e681c02420e287a5b9e5f944f7

    SHA256

    b9a4a5146185c23c25900210fbbafb98aede4483d63ee29c01a7f4764f70bd43

    SHA512

    2b78b7ef3ba850336a48287bb04320672cda701e302350348fb793730916b82d5c3006cc82dfa89a5eac7acaf9cdc6219278095c0f70fc9167d5f60a278636ba

  • C:\Windows\system\WhRGbvN.exe
    Filesize

    5.9MB

    MD5

    1f20b7a202529b56daf200c83297f38c

    SHA1

    4b3e3b4c365753d74d95847a9bfe2edd9c6eb2ca

    SHA256

    01dcda796ed14867523e1d74cb72d532ac3b81263c7e271b6ce740ee4b12afb4

    SHA512

    946993375eaabf8919191ad1eafac33ff00d0c0432064e4c77c2d1ac66c816a6660b705196e4d3657fed18237bebf096211abedc61ddd6d89155c2e6411fe69e

  • C:\Windows\system\WnXYHVz.exe
    Filesize

    5.9MB

    MD5

    153fea8b83c8e0720e60be2a65740d97

    SHA1

    a5b535d9170fc2c7d404068f7c06749ff847695a

    SHA256

    262e6a6e7ae51cf209995e309b233756b1785721ebbd53a9fe32e947a0331a43

    SHA512

    a6f0049efdbaacfd0d59aa80a8824a59ca05f120865dd9a7536b31909c18559b16351376dcaf6a68956d8e2e1b7c89ac2ab602ea9297681ab7b447305aae6019

  • C:\Windows\system\ZmepKAM.exe
    Filesize

    5.9MB

    MD5

    49da1fc0bfdad7b656c944cb25f41b0e

    SHA1

    11935ed09688c420e374fc9ef1b5ede261995165

    SHA256

    fa53e24145ea58fbe5a13da02864c3a3d076712096152f1ed22086083b445c5f

    SHA512

    064ae47aca95ecbc8db34b52fabf2ca5015a0ecb86fd3f52ffbcb443904479f11a1538c397cb9ee958734a555038ed66b198344f82fc3a672b50ea48bf5a4773

  • C:\Windows\system\aFZXNak.exe
    Filesize

    5.9MB

    MD5

    fa83c344b0d48f510687758277cb798e

    SHA1

    c0730f54d05a7117e45c04ac4ec54a8c26e56a6d

    SHA256

    8d1f2b2f71c32a1446f6a473feaf2877296c659f2f5f6c11acb57e458627091a

    SHA512

    1214f9fb40ce5c86d54a43f68fa727e99a917bc20d745690e4bd65118306bd0225b0b36b2a9989808a3b8b6a46fe3a845a3c167ae31e207a194e63a9f1bd26ee

  • C:\Windows\system\abvwOtK.exe
    Filesize

    5.9MB

    MD5

    90bfbfbc1da84c1ba4962fed51a15c55

    SHA1

    fe13907cb6e7b26fd689a1e17c3d44a632116860

    SHA256

    5ba2b595f5a8b588d357cedcf04a366bb3a394a1ee9fe1311e3a7c102b7ac4e6

    SHA512

    c5baf051655db5420e2c827dffff9c3f22f47f471e315c83d68a11ef42ce121911fe0ff32b003a648061bedde45cade37a4904d7b4c58a9d50840930269434db

  • C:\Windows\system\aeJXnXg.exe
    Filesize

    5.9MB

    MD5

    40e401908756388600366f4455dd3a6a

    SHA1

    7d01678dc8b131c4be580f941d78c5178b1b3b43

    SHA256

    adeb5cddf88743cbfee1209c0704d89885a4a7666d565132dc7636587f50a679

    SHA512

    3e2884d06fa31f20e8e29298795c8603c4785194b1a0ddbb206abe40d08b5bd0f6d1921172d5fa739d765fcb08a799a474872e6eb9f71673766fc33a66ab92e6

  • C:\Windows\system\bGAUnqf.exe
    Filesize

    5.9MB

    MD5

    8aac43af33d5c314e3106552610e3432

    SHA1

    f2513ba9a5b148b5c5395070d2a55db043bdcddb

    SHA256

    63ff2c6e7a1efed818297e7360963810a1895c1117645d149cb3caf5e816618a

    SHA512

    b0329a0a90f08130cc9b3175d3230cfd723bac0b2d765baaac03cc12cee449b7b6162bfe55528bd2031c7c72aa22deb78f925b9d5b3864114038723ec241f2ef

  • C:\Windows\system\ixCvjzd.exe
    Filesize

    5.9MB

    MD5

    b149652ff3fb949dec836412c2d86cb6

    SHA1

    8b2665ca32bc0a8adee42172d7734d7358b6fee0

    SHA256

    dfb708eab43533073faba041b0af3049f8cc7840ba9646fe521ff509710a6c35

    SHA512

    d88c0ab70ad367613d14eb1378836fc4f58d0b174acce156646799c19d6b8e10dc9151ff2bcd0e4ac844db4cda45968863bd309bb88eea31280d64c59c6850df

  • C:\Windows\system\ixGgruw.exe
    Filesize

    5.9MB

    MD5

    152516264ec1b5af43a201d06b1469ee

    SHA1

    a3676348bc1fd2116a1160014e816334ea34f64f

    SHA256

    b2668372047a2e0f46eed45db98f6ed42e66cce4008572e732a89de240f51851

    SHA512

    9d3bcf8976111dc2641ee2e6eacae65577a7875a07e12ce7546cc79664ed3c2c5da130960048b909362abcb61ce538ee34929a1724f2076d247f9953ce6d317b

  • C:\Windows\system\lkRHtqs.exe
    Filesize

    5.9MB

    MD5

    721767b7dccc9116721a06c9573ce654

    SHA1

    41e2f0c1ddf1a4eabd33b0fb91765c3743918f00

    SHA256

    8d1806e8c22a3d1a4e3efdc562010c2f0711589f448e3293769a11a65f64f09e

    SHA512

    56d9a394ad443298ff02b4cf553daf0cf780049ec48714cb3e5e698e6237da596dd027ec2d4a781ee6439f4977115342ec48462e13654d2b16cf08d5d20bec3d

  • C:\Windows\system\oZzxQaR.exe
    Filesize

    5.9MB

    MD5

    801ea311d078eb99348e6b26f16acca3

    SHA1

    d6ced33e9fa65df8e084627fd3a8e114e954f1f3

    SHA256

    d01cd64a8ff705a11c09979b7cafc2196dd0b851f36ebab91ec9edb34baddb57

    SHA512

    acbc5431d050c9b90577cb853d29c4363ec0d977609d9a34b2e5b01c2826dd79338873686e5df288948aad82ac4393470766714a2557db0d625413c039b4a3f6

  • C:\Windows\system\tNXtptD.exe
    Filesize

    5.9MB

    MD5

    c26cd5139197d419a50c5db95be07daa

    SHA1

    640e070392c1cb4d3d4acda09da6c236c16998cd

    SHA256

    6193ad25459860792f21b13eeab028e3acbd898f5f11c98817ca344816a771d2

    SHA512

    c2224fe4a6fcaeb9970a2a9f97815ee674dc693d8d6a64181334e4545aa0cf5d80eb4b890e25727458ab57e35ea66a403cb0c214493cddb764f60485c623573e

  • C:\Windows\system\zPDSOdS.exe
    Filesize

    5.9MB

    MD5

    f49d930415b5d4ce8d5ff13b9b6d477d

    SHA1

    e69b4dc1841e98d3ed3314d2edd2ca453b3ab4ad

    SHA256

    7cbf260e71aeda00de2eeffb72ac86aef5909f6ce6979ff671f0e1cf77875ee6

    SHA512

    8746e695988eb992165fbc2119cefca830eb10d5f7e5569c127400a556d5396a7513558e23005a463027d5ca2f71e0294d3b2246457b7625a7147a2add64664c

  • \Windows\system\MlKnunE.exe
    Filesize

    5.9MB

    MD5

    af9e5f957641734bd6624fb448c4914e

    SHA1

    4d0689372672bd40ea87f19ded4c3da93f68a7e8

    SHA256

    282979de691f2363d5e78bdd62fe40e7f0598e2ff1537dfd300576f52cf42c7a

    SHA512

    73f502bd975ebb68fcbbb8a927aa4a311b3e9fe48d14884724eea54a69f6755a190b5a2822cfa1bbcd24c9d4b600fd1d6bf7edf897362d32666c0c5839a3de1b

  • \Windows\system\sWQwijm.exe
    Filesize

    5.9MB

    MD5

    3190e8e1dd50ac304ccf0b8364d21684

    SHA1

    ca6c9a69a50cdcac6c5de1269ab589575a78e008

    SHA256

    51ddaa1ae3335c357b37fc8e046cffd403b7a9280bcc915c64224dcb5a511c09

    SHA512

    a853c94e6e36e0a669f9f346184d9bed5d9a4eba45b735f01f13730a3751641921c4dcc75206798c27902a6ac18ee9b443b153993404ec17c8e57b88f020a19f

  • \Windows\system\ueirzPj.exe
    Filesize

    5.9MB

    MD5

    994db2047cecd5adbaca6247f0e35456

    SHA1

    123f9f84a9ec6ea61613b60727b17edd29acd2ff

    SHA256

    9cc7f56e06bef7f5224c18da1d9bd1e9e33d7ea7fbaa8b8d4e2cde2cf35d8ad6

    SHA512

    47044d098279e9ebf8fca91ef1291a327522209bfea5bb23341fcb900970efb0a88b3342c5271b720b0adf83abe798fcacb5499559efae0630f3c43257b61749

  • memory/1072-139-0x000000013F650000-0x000000013F9A4000-memory.dmp
    Filesize

    3.3MB

  • memory/1072-119-0x000000013F650000-0x000000013F9A4000-memory.dmp
    Filesize

    3.3MB

  • memory/1516-146-0x000000013F2F0000-0x000000013F644000-memory.dmp
    Filesize

    3.3MB

  • memory/1516-129-0x000000013F2F0000-0x000000013F644000-memory.dmp
    Filesize

    3.3MB

  • memory/2256-148-0x000000013F470000-0x000000013F7C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2256-131-0x000000013F470000-0x000000013F7C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-120-0x000000013FB40000-0x000000013FE94000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-127-0x000000013FFA0000-0x00000001402F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-118-0x000000013F650000-0x000000013F9A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-1-0x00000000001F0000-0x0000000000200000-memory.dmp
    Filesize

    64KB

  • memory/2280-7-0x000000013F640000-0x000000013F994000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-0-0x000000013F050000-0x000000013F3A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-134-0x000000013F470000-0x000000013F7C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-132-0x000000013F050000-0x000000013F3A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-116-0x000000013FD40000-0x0000000140094000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-114-0x0000000002220000-0x0000000002574000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-112-0x000000013F5B0000-0x000000013F904000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-109-0x000000013F470000-0x000000013F7C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-130-0x000000013FEE0000-0x0000000140234000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-124-0x000000013F6A0000-0x000000013F9F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2280-110-0x000000013F610000-0x000000013F964000-memory.dmp
    Filesize

    3.3MB

  • memory/2420-8-0x000000013F640000-0x000000013F994000-memory.dmp
    Filesize

    3.3MB

  • memory/2420-147-0x000000013F640000-0x000000013F994000-memory.dmp
    Filesize

    3.3MB

  • memory/2420-133-0x000000013F640000-0x000000013F994000-memory.dmp
    Filesize

    3.3MB

  • memory/2540-125-0x000000013F6A0000-0x000000013F9F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2540-143-0x000000013F6A0000-0x000000013F9F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2576-140-0x000000013FB40000-0x000000013FE94000-memory.dmp
    Filesize

    3.3MB

  • memory/2576-121-0x000000013FB40000-0x000000013FE94000-memory.dmp
    Filesize

    3.3MB

  • memory/2584-126-0x000000013F160000-0x000000013F4B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2584-144-0x000000013F160000-0x000000013F4B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2644-135-0x000000013F610000-0x000000013F964000-memory.dmp
    Filesize

    3.3MB

  • memory/2644-111-0x000000013F610000-0x000000013F964000-memory.dmp
    Filesize

    3.3MB

  • memory/2684-138-0x000000013FD40000-0x0000000140094000-memory.dmp
    Filesize

    3.3MB

  • memory/2684-117-0x000000013FD40000-0x0000000140094000-memory.dmp
    Filesize

    3.3MB

  • memory/2704-123-0x000000013F080000-0x000000013F3D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2704-142-0x000000013F080000-0x000000013F3D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2748-136-0x000000013F5B0000-0x000000013F904000-memory.dmp
    Filesize

    3.3MB

  • memory/2748-113-0x000000013F5B0000-0x000000013F904000-memory.dmp
    Filesize

    3.3MB

  • memory/2824-137-0x000000013F1F0000-0x000000013F544000-memory.dmp
    Filesize

    3.3MB

  • memory/2824-115-0x000000013F1F0000-0x000000013F544000-memory.dmp
    Filesize

    3.3MB

  • memory/2860-141-0x000000013F2B0000-0x000000013F604000-memory.dmp
    Filesize

    3.3MB

  • memory/2860-122-0x000000013F2B0000-0x000000013F604000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-145-0x000000013FFA0000-0x00000001402F4000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-128-0x000000013FFA0000-0x00000001402F4000-memory.dmp
    Filesize

    3.3MB