Analysis

  • max time kernel
    147s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 21:52

General

  • Target

    2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe

  • Size

    5.2MB

  • MD5

    543b6e2284fbdb0fb9057a455d7e8e68

  • SHA1

    8958c3bbf404dc5ce572a1a24d1e6c41e66ddf56

  • SHA256

    dbff180c1cd14428a03c7e1699faa9e758c80d0eb31edf04189abfbd2f2f14c9

  • SHA512

    9c05c36c83224e9458a003d4af8cf0e94a7a0d26f914741e642ea09b4aff3137dbf268a61f3a32b30f94598ea9040f598f82953e6b60049b1fb611c051f262ed

  • SSDEEP

    49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lV:RWWBibf56utgpPFotBER/mQ32lUh

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 21 IoCs
  • UPX dump on OEP (original entry point) 64 IoCs
  • XMRig Miner payload 53 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_543b6e2284fbdb0fb9057a455d7e8e68_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\System\YeZEXgx.exe
      C:\Windows\System\YeZEXgx.exe
      2⤵
      • Executes dropped EXE
      PID:2332
    • C:\Windows\System\DEYjaai.exe
      C:\Windows\System\DEYjaai.exe
      2⤵
      • Executes dropped EXE
      PID:2384
    • C:\Windows\System\TquvyKR.exe
      C:\Windows\System\TquvyKR.exe
      2⤵
      • Executes dropped EXE
      PID:2504
    • C:\Windows\System\CrJpGsh.exe
      C:\Windows\System\CrJpGsh.exe
      2⤵
      • Executes dropped EXE
      PID:2644
    • C:\Windows\System\DRKzuYz.exe
      C:\Windows\System\DRKzuYz.exe
      2⤵
      • Executes dropped EXE
      PID:2588
    • C:\Windows\System\QxniJYb.exe
      C:\Windows\System\QxniJYb.exe
      2⤵
      • Executes dropped EXE
      PID:2576
    • C:\Windows\System\BViGbFK.exe
      C:\Windows\System\BViGbFK.exe
      2⤵
      • Executes dropped EXE
      PID:2352
    • C:\Windows\System\zJbXjZf.exe
      C:\Windows\System\zJbXjZf.exe
      2⤵
      • Executes dropped EXE
      PID:2256
    • C:\Windows\System\RYdnkOe.exe
      C:\Windows\System\RYdnkOe.exe
      2⤵
      • Executes dropped EXE
      PID:2724
    • C:\Windows\System\xefKNpM.exe
      C:\Windows\System\xefKNpM.exe
      2⤵
      • Executes dropped EXE
      PID:1728
    • C:\Windows\System\MDFjfNU.exe
      C:\Windows\System\MDFjfNU.exe
      2⤵
      • Executes dropped EXE
      PID:584
    • C:\Windows\System\OhFabFa.exe
      C:\Windows\System\OhFabFa.exe
      2⤵
      • Executes dropped EXE
      PID:2464
    • C:\Windows\System\ByeLOWm.exe
      C:\Windows\System\ByeLOWm.exe
      2⤵
      • Executes dropped EXE
      PID:2568
    • C:\Windows\System\TmqSjgv.exe
      C:\Windows\System\TmqSjgv.exe
      2⤵
      • Executes dropped EXE
      PID:2564
    • C:\Windows\System\ATcypFq.exe
      C:\Windows\System\ATcypFq.exe
      2⤵
      • Executes dropped EXE
      PID:1960
    • C:\Windows\System\aWPDkrs.exe
      C:\Windows\System\aWPDkrs.exe
      2⤵
      • Executes dropped EXE
      PID:2112
    • C:\Windows\System\JRuXiDb.exe
      C:\Windows\System\JRuXiDb.exe
      2⤵
      • Executes dropped EXE
      PID:1964
    • C:\Windows\System\tUOIzUm.exe
      C:\Windows\System\tUOIzUm.exe
      2⤵
      • Executes dropped EXE
      PID:1284
    • C:\Windows\System\knHREJX.exe
      C:\Windows\System\knHREJX.exe
      2⤵
      • Executes dropped EXE
      PID:1544
    • C:\Windows\System\pCurfxR.exe
      C:\Windows\System\pCurfxR.exe
      2⤵
      • Executes dropped EXE
      PID:912
    • C:\Windows\System\kyPJxoM.exe
      C:\Windows\System\kyPJxoM.exe
      2⤵
      • Executes dropped EXE
      PID:2832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\ATcypFq.exe
    Filesize

    5.2MB

    MD5

    63cde64c1500aaf3cba43f2035461c77

    SHA1

    d69f1806a7f4a121127e6a1e041e3a0ff50c70a7

    SHA256

    b354ecf0269d5674937a7d947083d6da34b46e8b145a605f5c0e951ca971ffe8

    SHA512

    2df32f0cf4a9a5ca53b100a668614e345fc0b87b3eb5cc93a9c3497854cedee8f98535b2322c275503675503237f1a88d93c58726dfae2692ed472e8fa027b1b

  • C:\Windows\system\BViGbFK.exe
    Filesize

    5.2MB

    MD5

    be6d4b5b64b3416a8b212dd42203a9f7

    SHA1

    cca8a7b7c1a3170590c005085186bb85a577a864

    SHA256

    cee2688127c82626dcca025ff994d8a326c66ff23982b3477b222eee84fba58f

    SHA512

    f544ae79e906b94b5cd2826c61ddab76431ee9bd442fa3b9357a6b5fe642d2b3fd86d8cae02e09509db43e80a6306ffd7aa0a902bce30b49024ad23639e6cdc0

  • C:\Windows\system\DEYjaai.exe
    Filesize

    5.2MB

    MD5

    c67e34cecc84c8321faea85ce5376e21

    SHA1

    2ec760751ee87ac7a9a083743c521abd8360c9d0

    SHA256

    fdf315bca937d289b2f676a7c7ed1741d6704df663ab326b1d4e2622f6dc7272

    SHA512

    cd026f6d2ef08ce95927f62187ee1c89f346b22e543a773551c8a3578b58a1291426a31846f7a2147cbe1cc2f5e5143bc8533b132b238e8242415d74dc7e0a52

  • C:\Windows\system\OhFabFa.exe
    Filesize

    5.2MB

    MD5

    2a144e9b8f18637d249094acc325ecbd

    SHA1

    abe1f988ce322c58ef2d91850e305d34a4d9ef06

    SHA256

    1e9f51e22e8a75930d7c455966087cf37c640f8d5b89e0fb0aa5cb327650390a

    SHA512

    e05e8b3d17c16f1a3d24917bcff17601b579500ee2392df2418e94f532e0ee8bacd9bd287abaab35fbec976d02a5470b7ca23d2e1fd82c43f3b770cb716f1fa7

  • C:\Windows\system\TmqSjgv.exe
    Filesize

    5.2MB

    MD5

    c30fbaf74bda35dbd8ddbd7d94d954c8

    SHA1

    11c0b6233ebb1c60194b42ab8e05f96cb064f803

    SHA256

    14cbfb71097385423c46026de827a4c9c3755e9987c87aed2f41880f3a81a6c9

    SHA512

    82625d8b2e8d33847447ceda101e565d56eecd2f08049bfa6674183482a19224b42e09052bfd810896f39f614db599bbf32c757255d2d5ba05762d1b79d44b13

  • C:\Windows\system\TquvyKR.exe
    Filesize

    5.2MB

    MD5

    34e80b55dd66724babb340269b511b65

    SHA1

    4abbc566fe189d1489c915ddf913c0215b111eec

    SHA256

    daa2cb08d2a8f1516fd1af98044b7dff81fb6717fbb2b5fe31ce3c06a52e6468

    SHA512

    2524c34735469f3e971b007b300470c9e36d8c1a8ae6c50b681f311f0304da88ec7fb9c2a93f649395f3d63dceb37d1ade98d534835faedbf003f60326ba8ec9

  • C:\Windows\system\pCurfxR.exe
    Filesize

    5.2MB

    MD5

    105fdb51cd6b0771803321fb813cd39f

    SHA1

    b2b2139a7bb5f3fbf21e5d1c506c49c5fe909b28

    SHA256

    99615f1574ee94e14145e81dcb266378ff5632082d0250cce6bb9a126e656a17

    SHA512

    10f18cb9d0993d69f57441d244e8d9991f183997ddf7fbb9c33345b71e3a5c722c1cbc27bc0aedb57415154f7910cd7a90660037863876cab9441edf25c19327

  • C:\Windows\system\tUOIzUm.exe
    Filesize

    5.2MB

    MD5

    2fe536e59d14bdfbf25b68a433879478

    SHA1

    f9436e21e86bdf608c72923489556687cfd06e79

    SHA256

    49fd3becba79d747652f1760a9171e6616db08793f046e90de32898e55f68abe

    SHA512

    6639ebe2cb3720ccf0350e5eecd193501e67114ec11ce01a2d9037364e3fe4af455bcb35abcce7ff63a0197338d74c29286567242e39dc791d266770bd739c31

  • \Windows\system\ByeLOWm.exe
    Filesize

    5.2MB

    MD5

    7afa274dd723d761475284a95dca71e0

    SHA1

    c5abb031ef52a8fb13b8c488006cdecf910ea420

    SHA256

    1ac916a2abced60bd5bebcbbc3aebabeb02a34e19347a6743523e30fab8f66c4

    SHA512

    c04adea17e6fb7cbb971f76d9298f8e9a3305824c92433d3a39ed85d304992a6af763759252b537aaf3080820aee7b2a31f23576c842d8e81c80db9125d4759b

  • \Windows\system\CrJpGsh.exe
    Filesize

    5.2MB

    MD5

    edffe21ce52087aec6543924b04c3b8b

    SHA1

    191f69212a45bcdedbccb51351c96587949cdefa

    SHA256

    d759c3fef688dbaef16dc7963d10af1760c2c0133b8a052358ddbb1a0cbe1878

    SHA512

    9425455b9d8678823febbdb105e029b062dcdba617b1e69ed7f6968fe3ae16f69c1b6bca554f716ad6b011fd6fee22aeabf6112494469dc960cba3bbb1da8db0

  • \Windows\system\DRKzuYz.exe
    Filesize

    5.2MB

    MD5

    18144c28f05728622e3d74b0dc81f3f1

    SHA1

    f3ce2eb33ce2b30fb42cda2589585cbd9a0e4089

    SHA256

    d937a85c54d72258ca76b39430df03402df9118e15ad6937e18d5843b6451f77

    SHA512

    e30c716aeaa83cd7e14474d0a7fd41d7ae9aba65e315dac59b1dd5921da17eef31c883e89e408b71f9fe83a3d50886f839edce88d47c45d5a0e8b8f86d838378

  • \Windows\system\JRuXiDb.exe
    Filesize

    5.2MB

    MD5

    5108e6ec209b02a044b57aa541e943b1

    SHA1

    24875cc76df11c33b6095df9b0856031071bd9e4

    SHA256

    1317cfcc898c9f381a983b191f9cc5858215120c9ac38b724d99ab86b5d02cfa

    SHA512

    608a3ba5c366b9319dfc421fb590234820fb5c8202e76c8daf84234ee1ff86a756000717e59f9eff4d847cdfb7184e0ac76dbd932a037efa4a8391386f490da6

  • \Windows\system\MDFjfNU.exe
    Filesize

    5.2MB

    MD5

    b46cda6180529200a038a82e789819fd

    SHA1

    713402074d0c0021755b6beddc339641f1c53fc2

    SHA256

    c1bd49139df1f7f48843dd80168e07e523e1522d4a1b0ad53311bf9272e640f1

    SHA512

    7efc426c975fd6a4d4e88fd45c9d86ce34d9feabde9f33c6b2d12cfdbcb24b0e4dc6272e164f46fdea649b8a0a0ae8f4df3df4ef19ebccb77c7e54dff322bcc1

  • \Windows\system\QxniJYb.exe
    Filesize

    5.2MB

    MD5

    427200bd9cfc56d9dd7e2a4ed41d849d

    SHA1

    4c6890074909df36d87c9ed30bea1b64b5fe043a

    SHA256

    009cf96b122116f0920e970d7a24f1b1df6085942ba12867cd2404fb46dfc9f1

    SHA512

    08ea0c9c9a650a34c9db817e7ae8c02d13df7548f4d9cbb32207e1904b8b1f8656f2c81f74af16fe3a005f307098e7ce0222c2b171cffd3f51770a6a239559fa

  • \Windows\system\RYdnkOe.exe
    Filesize

    5.2MB

    MD5

    ed35fbbc8bc6f485bf1ce0c4ef1ed6e0

    SHA1

    f9c9e42510702b9e0e5f7c75e2a19b2ae2ab5879

    SHA256

    82bb11d53c5f162e0d96c0144a99fde5f3dede76175a266e3d3e6ca4c4161515

    SHA512

    8d91cdef9bb1a214c05abf46a5bb93b47b75eaca9f615a2ea3822e9fa3f136ee61206be8d1d7bdd9627a633da2602c3631ff2759e934e64f7cb680e2ca3e6a17

  • \Windows\system\YeZEXgx.exe
    Filesize

    5.2MB

    MD5

    562a6aefe4bdcdd99bf0103b930ca292

    SHA1

    b302eeea53f20fda51082782dc17cf1d9cc83b2c

    SHA256

    5232fd5267e11e0ca929c4833bc4a5061d33ff555c4e835bfe3b0e9168456cd1

    SHA512

    e423c72ef2ecffb618c15dbb95fc96993f93f2cc0a2cc99d48341a1aac571f854e9e23238b5d61ebaf553f8f6c84ad20ff2b05c1e8eccde69ef5f7c20e3f8857

  • \Windows\system\aWPDkrs.exe
    Filesize

    5.2MB

    MD5

    55dbc9f3147ea2c013c66a62ebd15991

    SHA1

    04861a46c1d0c6718e404b3e70888feec6f54b31

    SHA256

    cb110be50b15e172718ab5281cb2c51bf1b90a86e1a3bd858d02b6847f5da494

    SHA512

    28ad7d72dcc50d681c1ca24ce7b0f213096caa0a620cdfefd1d6dd661650da0c4558b61cbd2e26940a8a2c185629f2d492e00fe54e1b13400e39ce7da3bd0ac4

  • \Windows\system\knHREJX.exe
    Filesize

    5.2MB

    MD5

    5b54366d164b4ad7ebffa49055121967

    SHA1

    bea326ca1fb92bc53ff4a4a02c7dd6d36429e55f

    SHA256

    a79e63711b9b2d663f4e698ffbe3c8e7a696d25382efb49be0eefa95e48846fb

    SHA512

    a211cb2e629bbda26e3a159c1a9468a627a970be8e145084801a224db73eaaa2b96a41b14133192b0a9fc21c24c6deb5c7dd0a24576221a4ef9c6423a80edb40

  • \Windows\system\kyPJxoM.exe
    Filesize

    5.2MB

    MD5

    e15187017a73b60907cab647b27d8c33

    SHA1

    f3bef5da6546441fcb01a074abe767eb0f2470be

    SHA256

    452c17c8083ac3b94448cf058a7b41946d79c005d5537792633523136629a917

    SHA512

    406cec40c8c4a71b26673f56a4162673211d6640d370a8b59756fb5cbdff0c1cacc2e5e227c942821fefa4da30a3cc93b8f3ad685d21e0e32ef874c77cea4231

  • \Windows\system\xefKNpM.exe
    Filesize

    5.2MB

    MD5

    6dd9e91cb45131635f89597945dced26

    SHA1

    802c3757ba3c6119f292a42a6baef4305372e2b4

    SHA256

    4a2f7e33e9c72de342ca3149eefb199ae85edf4a5bc231c9c46da63f7d5287de

    SHA512

    4b64776ec4e0438b7f5b62ed6848f37459cbea70603560a0662901c84dcdd2e5df3f913e6680d2e994b0165793cf666997539d4e7c77bc69cb4fdb91563699e3

  • \Windows\system\zJbXjZf.exe
    Filesize

    5.2MB

    MD5

    3eda60c34662aa064b7cdb468cf5ad58

    SHA1

    5e6b751bbcc0da945b818226c45711e14043b4d1

    SHA256

    2ef66df4ec77a7c341ec06e5fd0c204a45a9e419ed44cb814cc46ec748415be3

    SHA512

    2c8e0925d1a2b12142210a93cad265afac495c9a4c442023a0f44c3e119df4dc0956234ab3f4b422fa2eb9fcb201bf4326e53b10ca95cab2a13ad5c6a31f864e

  • memory/584-275-0x000000013FED0000-0x0000000140221000-memory.dmp
    Filesize

    3.3MB

  • memory/584-126-0x000000013FED0000-0x0000000140221000-memory.dmp
    Filesize

    3.3MB

  • memory/912-141-0x000000013FB40000-0x000000013FE91000-memory.dmp
    Filesize

    3.3MB

  • memory/912-172-0x000000013FB40000-0x000000013FE91000-memory.dmp
    Filesize

    3.3MB

  • memory/912-306-0x000000013FB40000-0x000000013FE91000-memory.dmp
    Filesize

    3.3MB

  • memory/1284-122-0x000000013FDB0000-0x0000000140101000-memory.dmp
    Filesize

    3.3MB

  • memory/1284-289-0x000000013FDB0000-0x0000000140101000-memory.dmp
    Filesize

    3.3MB

  • memory/1544-130-0x000000013F190000-0x000000013F4E1000-memory.dmp
    Filesize

    3.3MB

  • memory/1544-167-0x000000013F190000-0x000000013F4E1000-memory.dmp
    Filesize

    3.3MB

  • memory/1544-298-0x000000013F190000-0x000000013F4E1000-memory.dmp
    Filesize

    3.3MB

  • memory/1728-134-0x000000013F530000-0x000000013F881000-memory.dmp
    Filesize

    3.3MB

  • memory/1728-71-0x000000013F530000-0x000000013F881000-memory.dmp
    Filesize

    3.3MB

  • memory/1728-273-0x000000013F530000-0x000000013F881000-memory.dmp
    Filesize

    3.3MB

  • memory/1960-123-0x000000013FE30000-0x0000000140181000-memory.dmp
    Filesize

    3.3MB

  • memory/1960-160-0x000000013FE30000-0x0000000140181000-memory.dmp
    Filesize

    3.3MB

  • memory/1960-295-0x000000013FE30000-0x0000000140181000-memory.dmp
    Filesize

    3.3MB

  • memory/1964-304-0x000000013F4E0000-0x000000013F831000-memory.dmp
    Filesize

    3.3MB

  • memory/1964-162-0x000000013F4E0000-0x000000013F831000-memory.dmp
    Filesize

    3.3MB

  • memory/1964-124-0x000000013F4E0000-0x000000013F831000-memory.dmp
    Filesize

    3.3MB

  • memory/2112-287-0x000000013F970000-0x000000013FCC1000-memory.dmp
    Filesize

    3.3MB

  • memory/2112-120-0x000000013F970000-0x000000013FCC1000-memory.dmp
    Filesize

    3.3MB

  • memory/2256-259-0x000000013F960000-0x000000013FCB1000-memory.dmp
    Filesize

    3.3MB

  • memory/2256-52-0x000000013F960000-0x000000013FCB1000-memory.dmp
    Filesize

    3.3MB

  • memory/2332-7-0x000000013F830000-0x000000013FB81000-memory.dmp
    Filesize

    3.3MB

  • memory/2332-111-0x000000013F830000-0x000000013FB81000-memory.dmp
    Filesize

    3.3MB

  • memory/2332-204-0x000000013F830000-0x000000013FB81000-memory.dmp
    Filesize

    3.3MB

  • memory/2352-269-0x000000013F470000-0x000000013F7C1000-memory.dmp
    Filesize

    3.3MB

  • memory/2352-118-0x000000013F470000-0x000000013F7C1000-memory.dmp
    Filesize

    3.3MB

  • memory/2352-56-0x000000013F470000-0x000000013F7C1000-memory.dmp
    Filesize

    3.3MB

  • memory/2384-209-0x000000013FBF0000-0x000000013FF41000-memory.dmp
    Filesize

    3.3MB

  • memory/2384-112-0x000000013FBF0000-0x000000013FF41000-memory.dmp
    Filesize

    3.3MB

  • memory/2384-14-0x000000013FBF0000-0x000000013FF41000-memory.dmp
    Filesize

    3.3MB

  • memory/2464-278-0x000000013F5C0000-0x000000013F911000-memory.dmp
    Filesize

    3.3MB

  • memory/2464-89-0x000000013F5C0000-0x000000013F911000-memory.dmp
    Filesize

    3.3MB

  • memory/2504-113-0x000000013F630000-0x000000013F981000-memory.dmp
    Filesize

    3.3MB

  • memory/2504-210-0x000000013F630000-0x000000013F981000-memory.dmp
    Filesize

    3.3MB

  • memory/2504-27-0x000000013F630000-0x000000013F981000-memory.dmp
    Filesize

    3.3MB

  • memory/2564-93-0x000000013F960000-0x000000013FCB1000-memory.dmp
    Filesize

    3.3MB

  • memory/2564-279-0x000000013F960000-0x000000013FCB1000-memory.dmp
    Filesize

    3.3MB

  • memory/2568-158-0x000000013F1B0000-0x000000013F501000-memory.dmp
    Filesize

    3.3MB

  • memory/2568-293-0x000000013F1B0000-0x000000013F501000-memory.dmp
    Filesize

    3.3MB

  • memory/2568-121-0x000000013F1B0000-0x000000013F501000-memory.dmp
    Filesize

    3.3MB

  • memory/2576-257-0x000000013F310000-0x000000013F661000-memory.dmp
    Filesize

    3.3MB

  • memory/2576-49-0x000000013F310000-0x000000013F661000-memory.dmp
    Filesize

    3.3MB

  • memory/2588-262-0x000000013FE60000-0x00000001401B1000-memory.dmp
    Filesize

    3.3MB

  • memory/2588-116-0x000000013FE60000-0x00000001401B1000-memory.dmp
    Filesize

    3.3MB

  • memory/2588-34-0x000000013FE60000-0x00000001401B1000-memory.dmp
    Filesize

    3.3MB

  • memory/2644-29-0x000000013FB20000-0x000000013FE71000-memory.dmp
    Filesize

    3.3MB

  • memory/2644-207-0x000000013FB20000-0x000000013FE71000-memory.dmp
    Filesize

    3.3MB

  • memory/2724-125-0x000000013FCA0000-0x000000013FFF1000-memory.dmp
    Filesize

    3.3MB

  • memory/2724-271-0x000000013FCA0000-0x000000013FFF1000-memory.dmp
    Filesize

    3.3MB

  • memory/2832-165-0x000000013FAD0000-0x000000013FE21000-memory.dmp
    Filesize

    3.3MB

  • memory/2832-307-0x000000013FAD0000-0x000000013FE21000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-28-0x000000013FB20000-0x000000013FE71000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-139-0x000000013FB40000-0x000000013FE91000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-168-0x000000013FE60000-0x00000001401B1000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-255-0x000000013FB40000-0x000000013FE91000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-266-0x000000013FAD0000-0x000000013FE21000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-164-0x000000013FAD0000-0x000000013FE21000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-186-0x00000000021F0000-0x0000000002541000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-202-0x00000000021F0000-0x0000000002541000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-12-0x000000013FBF0000-0x000000013FF41000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-169-0x000000013F1F0000-0x000000013F541000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-50-0x000000013F960000-0x000000013FCB1000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-53-0x000000013F1F0000-0x000000013F541000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-23-0x000000013F630000-0x000000013F981000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-55-0x00000000021F0000-0x0000000002541000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-80-0x000000013FED0000-0x0000000140221000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-0-0x000000013F1F0000-0x000000013F541000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-58-0x000000013FCA0000-0x000000013FFF1000-memory.dmp
    Filesize

    3.3MB

  • memory/2908-1-0x00000000002F0000-0x0000000000300000-memory.dmp
    Filesize

    64KB

  • memory/2908-187-0x000000013FCA0000-0x000000013FFF1000-memory.dmp
    Filesize

    3.3MB