Analysis

  • max time kernel
    144s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 21:53

General

  • Target

    2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe

  • Size

    5.2MB

  • MD5

    61e26f7e69c3c9693997cdce2ef6e5e5

  • SHA1

    be3ad5fd6ff9eaa2a2a67c21917a6b8a2a15df1a

  • SHA256

    d6f2e59903ba7e920aba30a1877793754c108272f87b296bb13d56f18e633b5d

  • SHA512

    4b50d6bfcad7934441358684e44b0fb8c92394ec71f3834eff34aed9825542bd548a8c199050ec2520c73c2669ef3ec07ca996e9fa26e301bbc6d4b001f348cc

  • SSDEEP

    49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6ll:RWWBibf56utgpPFotBER/mQ32lUp

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Reflective DLL injection artifacts 21 IoCs
  • UPX dump on OEP (original entry point) 64 IoCs
  • XMRig Miner payload 52 IoCs
  • Executes dropped EXE 21 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\System\JjEdZkS.exe
      C:\Windows\System\JjEdZkS.exe
      2⤵
      • Executes dropped EXE
      PID:2216
    • C:\Windows\System\CeSwosK.exe
      C:\Windows\System\CeSwosK.exe
      2⤵
      • Executes dropped EXE
      PID:3428
    • C:\Windows\System\tzqgsnl.exe
      C:\Windows\System\tzqgsnl.exe
      2⤵
      • Executes dropped EXE
      PID:3824
    • C:\Windows\System\OomUhIy.exe
      C:\Windows\System\OomUhIy.exe
      2⤵
      • Executes dropped EXE
      PID:3568
    • C:\Windows\System\VnaKJrW.exe
      C:\Windows\System\VnaKJrW.exe
      2⤵
      • Executes dropped EXE
      PID:4032
    • C:\Windows\System\ISEhTXq.exe
      C:\Windows\System\ISEhTXq.exe
      2⤵
      • Executes dropped EXE
      PID:4512
    • C:\Windows\System\FZBiNsV.exe
      C:\Windows\System\FZBiNsV.exe
      2⤵
      • Executes dropped EXE
      PID:5052
    • C:\Windows\System\zqYeCBh.exe
      C:\Windows\System\zqYeCBh.exe
      2⤵
      • Executes dropped EXE
      PID:2632
    • C:\Windows\System\zWDkeWh.exe
      C:\Windows\System\zWDkeWh.exe
      2⤵
      • Executes dropped EXE
      PID:1612
    • C:\Windows\System\RDfmSWK.exe
      C:\Windows\System\RDfmSWK.exe
      2⤵
      • Executes dropped EXE
      PID:1212
    • C:\Windows\System\sxxZkKM.exe
      C:\Windows\System\sxxZkKM.exe
      2⤵
      • Executes dropped EXE
      PID:1716
    • C:\Windows\System\koPPUwj.exe
      C:\Windows\System\koPPUwj.exe
      2⤵
      • Executes dropped EXE
      PID:3292
    • C:\Windows\System\EwkCXxJ.exe
      C:\Windows\System\EwkCXxJ.exe
      2⤵
      • Executes dropped EXE
      PID:1864
    • C:\Windows\System\rBAwkqd.exe
      C:\Windows\System\rBAwkqd.exe
      2⤵
      • Executes dropped EXE
      PID:2348
    • C:\Windows\System\lXmTHnG.exe
      C:\Windows\System\lXmTHnG.exe
      2⤵
      • Executes dropped EXE
      PID:1036
    • C:\Windows\System\tCofnWm.exe
      C:\Windows\System\tCofnWm.exe
      2⤵
      • Executes dropped EXE
      PID:3668
    • C:\Windows\System\NGCXxol.exe
      C:\Windows\System\NGCXxol.exe
      2⤵
      • Executes dropped EXE
      PID:412
    • C:\Windows\System\vgfjUJs.exe
      C:\Windows\System\vgfjUJs.exe
      2⤵
      • Executes dropped EXE
      PID:2920
    • C:\Windows\System\ElhvJlg.exe
      C:\Windows\System\ElhvJlg.exe
      2⤵
      • Executes dropped EXE
      PID:932
    • C:\Windows\System\FfceyfW.exe
      C:\Windows\System\FfceyfW.exe
      2⤵
      • Executes dropped EXE
      PID:4844
    • C:\Windows\System\XZPIqKB.exe
      C:\Windows\System\XZPIqKB.exe
      2⤵
      • Executes dropped EXE
      PID:876
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4292,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:8
    1⤵
      PID:3248

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\System\CeSwosK.exe
      Filesize

      5.2MB

      MD5

      8f03fab20b7a50f6b642db9706e2658a

      SHA1

      4a97f4ca7b728c77701b85b5a9ce4e61ea370326

      SHA256

      0edeeba508e7ad24b16c6e90af40f30267916c966c4b9bc747abfe159d0d3042

      SHA512

      e7726635c5174c45ca51a0484707cd58eef96ac159a4ca8f45270a8fe301a5c69f3560d00e5a8029e72afdb408a28c848fbb561c7878b2cb383d602510078d5d

    • C:\Windows\System\ElhvJlg.exe
      Filesize

      5.2MB

      MD5

      7c8558e2b84c6c44d5c5042d25484f33

      SHA1

      8113e687ab39bb237826f0c0fd8213b977dfb35f

      SHA256

      21a48b9d8a8c3b0f66555ff5384c0d0062a0d4bd7206d27384d9eac624938c2f

      SHA512

      e1d4b215a90b8249d17d5f9953322f5a00e7511949066ec0d17c90f78a46481e39d040c46ecbd9c01498e88a69470f49b168718f46491c09e4d0a9ac86e6b633

    • C:\Windows\System\EwkCXxJ.exe
      Filesize

      5.2MB

      MD5

      ed2ea20d6a2c464dbd1c2b9416ea5567

      SHA1

      7c0e8b5dae1a839571324bca27555e1919cba799

      SHA256

      9dc919530f41d7f12e86118989e76b4ad58aa8509ef67018888b032ed94b212e

      SHA512

      06193afd6f90fd6a22f49f0ef14af2dc36f254f897f68dc1cfb686bc51716d67c00e19688bc35ff5ebf3480376fab191c29ec6749a988e05b05777347eac6a43

    • C:\Windows\System\FZBiNsV.exe
      Filesize

      5.2MB

      MD5

      84cb75d59db5a803a74b74fa2fcb3270

      SHA1

      abdb93b86355e34b79ebc4c0e54f2ec7cf3a7c57

      SHA256

      c598aab32712415a760af402dcad0db60895712f140a622f06dba26169a34bdc

      SHA512

      d3668b96403862d6d386d348b3d0cfcd5b8c8c14f129e2c23a53cf9ad25d40879cb889db142d1e05e9e682585938962a2323de47cb003ada879e602230272bed

    • C:\Windows\System\FfceyfW.exe
      Filesize

      5.2MB

      MD5

      d84bb3cf8f989ee9caecaea93f9ab695

      SHA1

      d2b5c0a9fe3aa6fb5d764b9b8eb0d78c52a11676

      SHA256

      23ad37c8f6b549e7f3c5e5bd29943136c589df0456a9c426dcd919909d6ba818

      SHA512

      55e3c8bf7b4a15a2fd1b4f826b37fa8bea4992ba90aa2cc884abaa3d50618a4581179ba288fb443cf3acfead1a4f476096e6caadb72150480930653f1922db08

    • C:\Windows\System\ISEhTXq.exe
      Filesize

      5.2MB

      MD5

      e42e104db2c9b20dc10de639e58930a0

      SHA1

      34db7ccd4d2268e66ec32f442ae3573336d1ae0e

      SHA256

      8b0c9dc296895781e8a04ed7095dcc5328769c009ed2d281b073a16030f5d482

      SHA512

      6c5eecc3af2811e9e5b1b4b59a3e26aee81ea98ca3d4447f10b0e77768087982fb9c670d6971ae0fb6936bdb4a66d90654150f812f78cf843d1edf48adf4bd1b

    • C:\Windows\System\JjEdZkS.exe
      Filesize

      5.2MB

      MD5

      5a5a8003d67f56c76fe500e3049d6621

      SHA1

      b7fa41260448d80b7b9adadab621c6f9aef3f16a

      SHA256

      249aeee9ab9c2ba9c0a7887ef7cbe5d629ccf56f148d5f74a664ccf5077d4799

      SHA512

      9b49cfb58dcb1d8becf50d115bdbf8e168bae12e445583b1f7e0b3f9956fd70e357a8b9df3cd714b1b6a24238bec147749844ef30bff24b64e1a858a51bd511e

    • C:\Windows\System\NGCXxol.exe
      Filesize

      5.2MB

      MD5

      80e5eb84a44802c849a405fa35d264a8

      SHA1

      e0d7551fd2040558816500b4ecc79d47042d75f5

      SHA256

      dc4088a5241bca305ee550fffc8af9d90a8a024836908f267b363abe8fa2bc14

      SHA512

      97aeae8849783646cab49bc92212e98cb3cd6a61893ae4ad284e5129b2ae9dd8066324a654ce58b78672195bef567f5987bd2e615d7393c6f6ec1bdb7a947a94

    • C:\Windows\System\OomUhIy.exe
      Filesize

      5.2MB

      MD5

      52e0f40cee954529e0c2f2abbf1c63a5

      SHA1

      5f6b9d98e83562c3bec1bf327b5b0c96897c7254

      SHA256

      b7a9b74a4162b08c98e0f3b71d4da51e4aa65298630c65e72bea34408d1f1960

      SHA512

      3c4fd7ddf8d4abef6b349be5397d2695f4340cc23f1e4a459f8dd7e473bc7a5db4424658912188ffb0a087db6bf4c55e8dc30bbcb86d078f1d2215e45a02c81f

    • C:\Windows\System\RDfmSWK.exe
      Filesize

      5.2MB

      MD5

      7d83519812aedd4b4899c05c1ac0b8c0

      SHA1

      72843c5b66cd23bff311858df2beeae161c3dfd8

      SHA256

      7d30ad6b98ccbec5b0a4cb9a835992ec4851ebdb96a4b7cc1ab0b90140b87bd1

      SHA512

      536eeea1c99e4e0de663c5881e43c488b87a351869fe849c9c789de053a48a5fb9258bd6d61591f15653ffb04e439ca8e76fb9ae5732ef18069440c592229eaf

    • C:\Windows\System\VnaKJrW.exe
      Filesize

      5.2MB

      MD5

      2ed25621bad4586046f42c5bf08f8aab

      SHA1

      100f06d0d8268e87e81f00118ff5f2a91dece8b3

      SHA256

      4fd81792cbda700d1bafb0d921d2f365560eb75a00f72c44bab90dddf4798618

      SHA512

      56f32e4aa0083ba7c526d39c0f27b7479827a09c72d6abbb9de6c46d8d582d9a6a875cf7e13f46a3ec525d5890950d88555d403763716b68b530520971d94f48

    • C:\Windows\System\XZPIqKB.exe
      Filesize

      5.2MB

      MD5

      dec48c73fd3248a93e1b0fb5f7e64f3c

      SHA1

      fc8aa08735743f16e394959e51f885c0bb2049ad

      SHA256

      fc17c63a284e09881274f274b6a3b3e33c01e2bbd6d695e7827cebf500d17e38

      SHA512

      47cdf65edec723b475a165514212c89b4c24e241456e9f4e7aaeb3d4ae8c5b77d6830e356cfa1df88d738cf14cb892f53dd4130311feabb598e60a3992d99775

    • C:\Windows\System\koPPUwj.exe
      Filesize

      5.2MB

      MD5

      a0909ad13a7bc76ffbf49dd7bb4cb5bf

      SHA1

      3bb5a1be537281b36b3b686ab66bcca9036a71cf

      SHA256

      20fbb1056f256176369d32042d79aa96d8f90b476de88252d03c4f1bfb702eaf

      SHA512

      51876f3b87822e252771e2ae073173fe5eee8011359f3cde69d3be931080f79395e61aab785c811c10b286d9e7a7c7d71f608202767f21d3576160139f65f756

    • C:\Windows\System\lXmTHnG.exe
      Filesize

      5.2MB

      MD5

      c1c6161aa4e05ea4bbaf963532d9ea31

      SHA1

      d51faa715e1a7314f701afd705e988746a487972

      SHA256

      441582dd6bffd5627b7f087cad091cdc6b55136778347b1a1eb57cf13f6840ae

      SHA512

      07e124d10ec8626a8d692aa61dc5a817b350062f43c76c20a7f8b716d16440fc57387f5358c9ac4826175ff2a9af7a269aca5495f6a8f61fa87fc20a8e17402c

    • C:\Windows\System\rBAwkqd.exe
      Filesize

      5.2MB

      MD5

      65eab2ab538883882bd267c5c9c7fa8e

      SHA1

      897dce3acc0db6c7a14dd6342326011a59e0e4e0

      SHA256

      e62832962d3b751e1cab8aa1304042cb8b0a272332f9fde8a194c45e95667127

      SHA512

      ee777f80d010d36a22a3bac3e0fa48ee4776046a9d6d075fa876ff0272717a1e9a2a17ae9b1a9aabe951caea5f6c9a191c0b75ce45d664a8fa7131fe21e2b429

    • C:\Windows\System\sxxZkKM.exe
      Filesize

      5.2MB

      MD5

      12e930a58a76f2a3f10e45e2c1d6b108

      SHA1

      b1a954650ac0e14432b9f1b6753cc7cad97bd3f7

      SHA256

      fa126de2e311ffe23efa238d32bc2e9863d16bf84cd1bd824e65006bfbb4d980

      SHA512

      fc7ecace579d05000266cc75c9e048f0a7f16677715b7d817b281bf2f4e41f83a229653fcebee0e2503d1d60cd73367643b391e1d002093045bbffa9b03969e7

    • C:\Windows\System\tCofnWm.exe
      Filesize

      5.2MB

      MD5

      ce90490b48638249cd37b07f2e397bdf

      SHA1

      150c8542ee546154806d5fd51af3444e3a1cc6ae

      SHA256

      831fcd77013f567c484bfdd4cb184eb96bec56bcc3e3ba826129d0326a4c4d29

      SHA512

      aa9c0980954ccab3fd6058168cb6e31535adb503a596f8abf9571b243afc4b636bd498ccd645f9072aa478909527a725adea7233c4b5d5c08d2a87012ae668ae

    • C:\Windows\System\tzqgsnl.exe
      Filesize

      5.2MB

      MD5

      c276d2af36d61907947877b55f370991

      SHA1

      9be6ec5cabcdd306b15ef69e073227345c3668ac

      SHA256

      0ddc95a4a3240544de68746146b7593f5badd38251334544db721edc84e06dc3

      SHA512

      9e1f66b627e2cfcffb4369b32941636f54b849b2a7e2877d6bfd63cfcebf12035acd5c7777477ede49ed969c3efe813c72a6267e6120f3ef33197283da7be384

    • C:\Windows\System\vgfjUJs.exe
      Filesize

      5.2MB

      MD5

      65f6e90e2e7118b283c0d42b76f429bf

      SHA1

      824ac1e592b06af49da316456eabd2e040a909bf

      SHA256

      1a84a719171b8a0909f68d80b69dad43efc04226bb3173aac4abca455f709ca4

      SHA512

      fab9c9ef429d92fa5ec8fd440a54bea848e27ba454ebc06bf36b2d82c15d4bc2e3ebcfd04294b0c51b5af275adb3a2e1f129cd2ebd9280ce8615e8e9b95aa33c

    • C:\Windows\System\zWDkeWh.exe
      Filesize

      5.2MB

      MD5

      dca558952389270ff6c2cf4b71808488

      SHA1

      f775b5e809bdfc09a561ef8d955fc78dde2007fe

      SHA256

      5ddcf7728ebf765bdb76df758fa85f4c1e58e042b0e6f6c040973243b1f36a8f

      SHA512

      d831416da4a80fb33008fb18dc6f766d73bc96df0f6d2f7b2094809f8ec286526913ddfac07514857ddf292f0c2cc587d0a9d04367e1e16da66778c0294a72e4

    • C:\Windows\System\zqYeCBh.exe
      Filesize

      5.2MB

      MD5

      ac212c174a4a9fb86413360a3ec0d136

      SHA1

      26bf4cb48e839e64b1805635e43d4b43d588b85e

      SHA256

      035de2681ff16e26fa57ce5a114c32e1a28a31f404a890d11bcf530d2ea09b84

      SHA512

      2748dc0ba3c30fb3e3aba69346d1a1da77169e6c0b060a20a0650e943f6763dfe5a6ac42fa223a2e4db7d94bd887a224d10c6c40891b2f1fb349e3dc6c3bc673

    • memory/412-143-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmp
      Filesize

      3.3MB

    • memory/412-240-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmp
      Filesize

      3.3MB

    • memory/876-249-0x00007FF765710000-0x00007FF765A61000-memory.dmp
      Filesize

      3.3MB

    • memory/876-147-0x00007FF765710000-0x00007FF765A61000-memory.dmp
      Filesize

      3.3MB

    • memory/932-245-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmp
      Filesize

      3.3MB

    • memory/932-145-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmp
      Filesize

      3.3MB

    • memory/1036-141-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp
      Filesize

      3.3MB

    • memory/1036-94-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp
      Filesize

      3.3MB

    • memory/1036-244-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp
      Filesize

      3.3MB

    • memory/1212-68-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp
      Filesize

      3.3MB

    • memory/1212-231-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp
      Filesize

      3.3MB

    • memory/1212-136-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp
      Filesize

      3.3MB

    • memory/1612-59-0x00007FF790580000-0x00007FF7908D1000-memory.dmp
      Filesize

      3.3MB

    • memory/1612-217-0x00007FF790580000-0x00007FF7908D1000-memory.dmp
      Filesize

      3.3MB

    • memory/1716-70-0x00007FF608230000-0x00007FF608581000-memory.dmp
      Filesize

      3.3MB

    • memory/1716-226-0x00007FF608230000-0x00007FF608581000-memory.dmp
      Filesize

      3.3MB

    • memory/1716-137-0x00007FF608230000-0x00007FF608581000-memory.dmp
      Filesize

      3.3MB

    • memory/1864-228-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp
      Filesize

      3.3MB

    • memory/1864-139-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp
      Filesize

      3.3MB

    • memory/1864-85-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp
      Filesize

      3.3MB

    • memory/2216-8-0x00007FF6184E0000-0x00007FF618831000-memory.dmp
      Filesize

      3.3MB

    • memory/2216-74-0x00007FF6184E0000-0x00007FF618831000-memory.dmp
      Filesize

      3.3MB

    • memory/2216-193-0x00007FF6184E0000-0x00007FF618831000-memory.dmp
      Filesize

      3.3MB

    • memory/2348-89-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp
      Filesize

      3.3MB

    • memory/2348-242-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp
      Filesize

      3.3MB

    • memory/2348-140-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp
      Filesize

      3.3MB

    • memory/2632-134-0x00007FF61FE10000-0x00007FF620161000-memory.dmp
      Filesize

      3.3MB

    • memory/2632-55-0x00007FF61FE10000-0x00007FF620161000-memory.dmp
      Filesize

      3.3MB

    • memory/2632-212-0x00007FF61FE10000-0x00007FF620161000-memory.dmp
      Filesize

      3.3MB

    • memory/2920-241-0x00007FF784B50000-0x00007FF784EA1000-memory.dmp
      Filesize

      3.3MB

    • memory/2920-144-0x00007FF784B50000-0x00007FF784EA1000-memory.dmp
      Filesize

      3.3MB

    • memory/2968-64-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp
      Filesize

      3.3MB

    • memory/2968-1-0x0000024A57DC0000-0x0000024A57DD0000-memory.dmp
      Filesize

      64KB

    • memory/2968-0-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp
      Filesize

      3.3MB

    • memory/2968-148-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp
      Filesize

      3.3MB

    • memory/2968-126-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp
      Filesize

      3.3MB

    • memory/3292-79-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmp
      Filesize

      3.3MB

    • memory/3292-229-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmp
      Filesize

      3.3MB

    • memory/3428-195-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp
      Filesize

      3.3MB

    • memory/3428-16-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp
      Filesize

      3.3MB

    • memory/3428-78-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp
      Filesize

      3.3MB

    • memory/3568-200-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp
      Filesize

      3.3MB

    • memory/3568-26-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp
      Filesize

      3.3MB

    • memory/3568-98-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp
      Filesize

      3.3MB

    • memory/3668-142-0x00007FF7047E0000-0x00007FF704B31000-memory.dmp
      Filesize

      3.3MB

    • memory/3668-243-0x00007FF7047E0000-0x00007FF704B31000-memory.dmp
      Filesize

      3.3MB

    • memory/3824-198-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp
      Filesize

      3.3MB

    • memory/3824-20-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp
      Filesize

      3.3MB

    • memory/4032-35-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp
      Filesize

      3.3MB

    • memory/4032-202-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp
      Filesize

      3.3MB

    • memory/4512-204-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp
      Filesize

      3.3MB

    • memory/4512-40-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp
      Filesize

      3.3MB

    • memory/4512-132-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp
      Filesize

      3.3MB

    • memory/4844-247-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmp
      Filesize

      3.3MB

    • memory/4844-146-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmp
      Filesize

      3.3MB

    • memory/5052-208-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp
      Filesize

      3.3MB

    • memory/5052-45-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp
      Filesize

      3.3MB

    • memory/5052-133-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp
      Filesize

      3.3MB