Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2024, 10:04

General

  • Target

    2024-11-17_26055de68d74c846d4ff408d74e3013b_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.2MB

  • MD5

    26055de68d74c846d4ff408d74e3013b

  • SHA1

    5d8179d2d33e388c32306ca53204455bafc38eda

  • SHA256

    7ca7cd26ca00d7828460aabe26b6f69fc7fef4d297f033276204346ebfe89f52

  • SHA512

    ec5f43dc57e51f8b3c08ada5add7a2da8119a199d4e01eed58afb5f806948d72b296ba8e0b030f7068562c95c493e2134f12ec5a28831b931c49ee2727e8afd1

  • SSDEEP

    49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lc:RWWBibf56utgpPFotBER/mQ32lUQ

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Cobaltstrike family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 40 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-17_26055de68d74c846d4ff408d74e3013b_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-17_26055de68d74c846d4ff408d74e3013b_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\System\FrOenpi.exe
      C:\Windows\System\FrOenpi.exe
      2⤵
      • Executes dropped EXE
      PID:2780
    • C:\Windows\System\pFvNqbK.exe
      C:\Windows\System\pFvNqbK.exe
      2⤵
      • Executes dropped EXE
      PID:2692
    • C:\Windows\System\kGqQmmg.exe
      C:\Windows\System\kGqQmmg.exe
      2⤵
      • Executes dropped EXE
      PID:2556
    • C:\Windows\System\WywGMXq.exe
      C:\Windows\System\WywGMXq.exe
      2⤵
      • Executes dropped EXE
      PID:2584
    • C:\Windows\System\iDYiRGQ.exe
      C:\Windows\System\iDYiRGQ.exe
      2⤵
      • Executes dropped EXE
      PID:2840
    • C:\Windows\System\mhdcqNd.exe
      C:\Windows\System\mhdcqNd.exe
      2⤵
      • Executes dropped EXE
      PID:2604
    • C:\Windows\System\qLPdrCh.exe
      C:\Windows\System\qLPdrCh.exe
      2⤵
      • Executes dropped EXE
      PID:2612
    • C:\Windows\System\OONXkOk.exe
      C:\Windows\System\OONXkOk.exe
      2⤵
      • Executes dropped EXE
      PID:1096
    • C:\Windows\System\QjfJFnf.exe
      C:\Windows\System\QjfJFnf.exe
      2⤵
      • Executes dropped EXE
      PID:1872
    • C:\Windows\System\GlbbfyT.exe
      C:\Windows\System\GlbbfyT.exe
      2⤵
      • Executes dropped EXE
      PID:2252
    • C:\Windows\System\gXHdicI.exe
      C:\Windows\System\gXHdicI.exe
      2⤵
      • Executes dropped EXE
      PID:748
    • C:\Windows\System\wGFTTiJ.exe
      C:\Windows\System\wGFTTiJ.exe
      2⤵
      • Executes dropped EXE
      PID:2504
    • C:\Windows\System\YFxkLGh.exe
      C:\Windows\System\YFxkLGh.exe
      2⤵
      • Executes dropped EXE
      PID:1392
    • C:\Windows\System\pBSoUbQ.exe
      C:\Windows\System\pBSoUbQ.exe
      2⤵
      • Executes dropped EXE
      PID:1620
    • C:\Windows\System\slrrwMg.exe
      C:\Windows\System\slrrwMg.exe
      2⤵
      • Executes dropped EXE
      PID:1560
    • C:\Windows\System\IpJPudY.exe
      C:\Windows\System\IpJPudY.exe
      2⤵
      • Executes dropped EXE
      PID:1304
    • C:\Windows\System\naNdrWh.exe
      C:\Windows\System\naNdrWh.exe
      2⤵
      • Executes dropped EXE
      PID:2136
    • C:\Windows\System\HKBoYcw.exe
      C:\Windows\System\HKBoYcw.exe
      2⤵
      • Executes dropped EXE
      PID:1136
    • C:\Windows\System\fcKcspV.exe
      C:\Windows\System\fcKcspV.exe
      2⤵
      • Executes dropped EXE
      PID:1448
    • C:\Windows\System\yMYuJFI.exe
      C:\Windows\System\yMYuJFI.exe
      2⤵
      • Executes dropped EXE
      PID:2536
    • C:\Windows\System\ERBzBEw.exe
      C:\Windows\System\ERBzBEw.exe
      2⤵
      • Executes dropped EXE
      PID:2616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\ERBzBEw.exe

    Filesize

    5.2MB

    MD5

    d4a315ad3a03b6f357bd843c7e83773d

    SHA1

    1e624ce826a05c4fbe12c5b11bd7ef67be2a2b80

    SHA256

    e951e9212953295da16e94fc0af53be9dec13a61ddc3ef0cc4867aa155d66444

    SHA512

    e1e8a61e0f76a4516d454788cd0098d7103d816560fd6b9c8f6e1e8186cd0cb04149d47ee6273e49601b9e9b54ca050464dcfbf83f9dbc2ce903f8c28eb0599b

  • C:\Windows\system\OONXkOk.exe

    Filesize

    5.2MB

    MD5

    2062e10bb15264960ae40f7949866306

    SHA1

    e8e6b737a24a263fafb0f2b15f61811a62ca67e5

    SHA256

    78bc47e4bf5d9d74ba73904d149cc197aa7efbf9d9776ae6d3c16cab38f8301e

    SHA512

    1a31104cb95b214d837781be7d712e8bf3596cb683a4035890bef236e96e836951d92a1e28b45f18665964d06503b3bd84dd7ab0f228c1d5aed32df9bce8e176

  • C:\Windows\system\QjfJFnf.exe

    Filesize

    5.2MB

    MD5

    6b41830670a5ceff51418fafae23db16

    SHA1

    6820988b250b8e1a8341a039e827f47ed6f63d86

    SHA256

    2f05774cbfbfb841f8f317b8bbd9b9d71a407294916ad1aa870cd4245c3562de

    SHA512

    44f5f67c6dd23524606550054e325a19802dd19cbf1ad6eae6ff523d6523c1a941dcd60f691a32fc75c9de264aec34e9620b379c20bf858c060f2207f6b1fbc8

  • C:\Windows\system\WywGMXq.exe

    Filesize

    5.2MB

    MD5

    7ebda18368301106822ca48648b11d0f

    SHA1

    3dd3d6079f1d95e712e4bf51c659e8328527ee8f

    SHA256

    201a0113ab6bfbfe339a2da86aebafd0888d8603443acd9ea170741c85d81917

    SHA512

    22b027fcda30aca5675d13448ebe678fb0467e183c34cfdb9b92933d11d928d92da7b44acb8065a5fdb6ef1ac46e1c317394d551b1c578c341b60e63c1aacddd

  • C:\Windows\system\YFxkLGh.exe

    Filesize

    5.2MB

    MD5

    c2faad6f5affcf768400e4f6a58ff702

    SHA1

    61f8f9bacf1d1a98a5f43ca62b7786d476371e85

    SHA256

    02c763d97eea6193b68515c6bebaccf6e25324ac00058c3dc6bd6d04f7f61cf9

    SHA512

    ea94c112192fcffca904143d7590e4cccd8cc495b6f6d4510a59e239c17eb3bc3a0873d6c2d4c4e2026f48fa4d90301a54820900bbe18d204fa4d88e2762644f

  • C:\Windows\system\fcKcspV.exe

    Filesize

    5.2MB

    MD5

    cd2825041ad53faed8694a8d01004811

    SHA1

    ca712ae7315ab3a614ce83863230dabb88f09ace

    SHA256

    5d5a202d47be4cb307481913d13083b7ba950c1559bb8e64482a2759a08756ea

    SHA512

    8ea468db5f7a3787f11333ca23e557c758540b6110c8386f14cd1c23b17f48cf718e74d6fd7ef605e985813520527c9ffe4b6c0756ca7e142e1f366586b34704

  • C:\Windows\system\gXHdicI.exe

    Filesize

    5.2MB

    MD5

    fe04c17e4719d1bdbf8bf0aeec6a373c

    SHA1

    635d2bea35ac07ce59b9bf0f1bfb296965a87573

    SHA256

    5f643610c019de3afb7e71be129ffe7badf586d1bba965445720e9f468871314

    SHA512

    1cfcac5d69807e2ef9701e70a677cd7f8054910b29c71dfded0cd2f7ae13837cb7ca51106793a1ed81b4ec61508ac6249d44aa4bf0d2b4f025d3abe484c849b7

  • C:\Windows\system\iDYiRGQ.exe

    Filesize

    5.2MB

    MD5

    42b1a5005b59ec038f5accbe2ac5d3cb

    SHA1

    ba634047d0b1eb7b56ed320aef038be3717b0451

    SHA256

    3d5d2750188c20935e37c6ac0e81052e495ca8d0c9d8a029cb905f4d661fe643

    SHA512

    67e2e0785e29ef0410395a2cc2a22382eed34a5dd481e85736a55cc0fa3a65e4f585c2b46214a9afff496f4c484531e564186e4f616d801c67e85cc60fa02d80

  • C:\Windows\system\mhdcqNd.exe

    Filesize

    5.2MB

    MD5

    bb3a4255b9d1408f40c875676d11d2fb

    SHA1

    55baaa437a32418a36c2194b1951c81cf9102b18

    SHA256

    6c06b27392d5c7a3184d8d1aa08b93c0eeb65160523cbecf5839c8bba263d4c1

    SHA512

    eafa54b4996069418d584a70fc8d18fa26adb494f930718a4c80f65087097a83042f3ea10faa90758040cf927c08ea76301c6d9f5fbe0a4b8dff30284a8d68f3

  • C:\Windows\system\naNdrWh.exe

    Filesize

    5.2MB

    MD5

    45bd23df60564a5d9dd72f6eeac6bc82

    SHA1

    299a5f13dc6f99ddba25634ba1c82f0b6212fcb1

    SHA256

    13eeac4b31d1345b32502467f57f2b1d77cdd35791f9066b642366eda69a9341

    SHA512

    e8d11fcb2d90ed4a9195a67c9c8cc037105ef20ab2d8d987c88d81d05b2e2f0869a6bbedb32e4de95de9d208a6c67d99d72a5ff94a1f3eb5eff1c2e015b3baeb

  • C:\Windows\system\pBSoUbQ.exe

    Filesize

    5.2MB

    MD5

    e388b86b2687c92b258e85408d9cd34e

    SHA1

    4fd47f40384599b7a4ad887e08a6e99cd3a84682

    SHA256

    c0814a075eeb5aedf5408534df31450df306e7d111d79111f2bc8560b9ad6b85

    SHA512

    47841644da095a7b2d609629b7a4f46cf6518c6e956486eb5c8422896273093afb204bfca5a61fd6146487a8dee9b40d9f24f217f09b9df107d0dfe3aa51b647

  • C:\Windows\system\slrrwMg.exe

    Filesize

    5.2MB

    MD5

    12e85fa34ab322aa7fa118190008bee7

    SHA1

    ca056f99f3a92b74b8897962bd490144c2f1bcd3

    SHA256

    c65f137501bb3a89d25f3250db5c86cc6026d26a3b9f12c0f1571226af54afc7

    SHA512

    8674303c922773f939286ea781690e9a6b45ef9bb0ca8436ced73c16ccef98674d4ab9feb4e465583795ebc81e35db37e134b86b1037193f34e7f0696148735c

  • C:\Windows\system\wGFTTiJ.exe

    Filesize

    5.2MB

    MD5

    8db2b5f717d1cbf9e88b2043952caec8

    SHA1

    07a891667987b307f884fb8c2e2d96f1430c40e4

    SHA256

    a3872c48d8998816890aa2552f381c9947f4a42ddbcbedb0e7e14f7763e97a99

    SHA512

    060656df2aba5485910b097f7361be725b766e72b978719f40b3093848c7314f132e08db0f215e2161cfb1f6ab4754b7dc9c207a6a88b5049897e64ed05bbd63

  • \Windows\system\FrOenpi.exe

    Filesize

    5.2MB

    MD5

    fa044a5018ea7fbe0aa1ab70821c520a

    SHA1

    922bb3c09c914ded8597acf69c6baf7cc5dbbe3e

    SHA256

    5348764a7d7a34f7de57fb6b81fffec3c7b28ca1cb6f119658ce8d17dc08ea2d

    SHA512

    c654b159082f80607a04b5e805e2fb7534d7f3b6a819fefd0b6563d8582d5cbf89013c6dc16501154f1f08c3cc3eafb9778d6ea4f493b1bb1b597000ddc33611

  • \Windows\system\GlbbfyT.exe

    Filesize

    5.2MB

    MD5

    c0af08b5b2f78d35e0570752886dc454

    SHA1

    c526bc2cbda395aa4a29f74abfb0132011a9572a

    SHA256

    acf88fc5fe3f516a803b66e7121e5443f414f3d7c37bf4fb51f96d749affef0e

    SHA512

    4f26d774f0f87aa45724db6e8c34ed0f801073fe0ba365a13070a4a2d9872a477648a27e5415ddaa3f7c6bf92a93401bacde3a527805e53c460a45ecfc43a270

  • \Windows\system\HKBoYcw.exe

    Filesize

    5.2MB

    MD5

    f51bf58d7f13b4d5a3e89fc9d1dfd45e

    SHA1

    766c9754c447c30ef859b2819d8892745d3c65c2

    SHA256

    80907d4ed56a4ab2329fd1e19c665b36f0c26b3b6d31621a20062030106d89ee

    SHA512

    ebcaa43b1093dafee4c7f9b98d873d07c0b8ddc7011e80e1a949af242b5f96887d82c8184e94a5475ae3eb77d83268674ca34ba4a250e8145b86f17baac388b8

  • \Windows\system\IpJPudY.exe

    Filesize

    5.2MB

    MD5

    b30eb62bdbc4b96b939c69b0c8fd6702

    SHA1

    d755de6eac6bef75df3833a0bc9f80f55e4ba3ee

    SHA256

    bd329763fe86663b791a7fce499b92ec2b19c7210a820d53dfc4181c34b9838d

    SHA512

    c0b6626bbe3a7d2e8fd28b1de88124f80c29e86b48332c767097b5cc1e51fad4aa95009c0033ae52a7aa529a48034216100d4787b73fe0e85a46b0e9058fceab

  • \Windows\system\kGqQmmg.exe

    Filesize

    5.2MB

    MD5

    d9f1a843d06c917c6527b2401ce24a12

    SHA1

    36cf01f160fc89a4011fa7fcbae360f4dd7e109a

    SHA256

    df701798dc7530d0cb7e518b50422b4e3cb1673c088c3432f03dd323ed910601

    SHA512

    22add06238b40afcd7a4dddc5ca7ad80021ab5468d66e343a65524d2c321cb66650338e58d3f97b0a73b783659804f3df45dfa3b10c37b868fd918f7182937a2

  • \Windows\system\pFvNqbK.exe

    Filesize

    5.2MB

    MD5

    26e6d3a0cf945177bf95054cd16510ca

    SHA1

    ad4a94a11aeee139e2cd6449953aab30188eb00d

    SHA256

    515f38bc2f1f2d8cea67c207891ff238026280eb7f72187d249e13fbc311b66f

    SHA512

    925bf79c2c13c3b8f9c902e8a51465ab5a113f89c0c16cec710be8201eea85d18dadf8be58be35e2206a2fa21beba8593069ad27dd811ab14db940243e5ed54a

  • \Windows\system\qLPdrCh.exe

    Filesize

    5.2MB

    MD5

    7f914d931256ff7988d34dadcb66d0ba

    SHA1

    ee7f081501b049a0128cd04016020441df2e2baa

    SHA256

    c57bd4a4d7ee1a5294577c7e708143d62c382da974c7f34d1a1cba3671bc63d1

    SHA512

    aae93dc627b7e3dda5509c0f1a2c3eed0297e5f2b5640d00fd4303ed89aeb93a7aae921e84355512e480b47aa63b0bde4032f8dee9fd0bbd677e24c3025b446e

  • \Windows\system\yMYuJFI.exe

    Filesize

    5.2MB

    MD5

    3bc7b513f0c3c769dbbf08a63d91fdab

    SHA1

    de63e9ab9183f3a205b3bf11d97e8b6cb05ced5c

    SHA256

    55b32a4463dd4dedd28f34160f8e3eb5d0d37918e9ae0ea9b97cb576dbfdc8b1

    SHA512

    9a6bd9da8f89cb852111970ff04cf6895601627f5ee527f586104d097ecd5ac66b50b2a644096dca4dce51cc92d4363cf1b0a18865d0b228c4cd1c18dadb275a

  • memory/748-82-0x000000013F860000-0x000000013FBB1000-memory.dmp

    Filesize

    3.3MB

  • memory/748-259-0x000000013F860000-0x000000013FBB1000-memory.dmp

    Filesize

    3.3MB

  • memory/748-144-0x000000013F860000-0x000000013FBB1000-memory.dmp

    Filesize

    3.3MB

  • memory/1096-63-0x000000013FA50000-0x000000013FDA1000-memory.dmp

    Filesize

    3.3MB

  • memory/1096-241-0x000000013FA50000-0x000000013FDA1000-memory.dmp

    Filesize

    3.3MB

  • memory/1136-168-0x000000013FE40000-0x0000000140191000-memory.dmp

    Filesize

    3.3MB

  • memory/1304-166-0x000000013FF50000-0x00000001402A1000-memory.dmp

    Filesize

    3.3MB

  • memory/1392-261-0x000000013FE30000-0x0000000140181000-memory.dmp

    Filesize

    3.3MB

  • memory/1392-155-0x000000013FE30000-0x0000000140181000-memory.dmp

    Filesize

    3.3MB

  • memory/1392-95-0x000000013FE30000-0x0000000140181000-memory.dmp

    Filesize

    3.3MB

  • memory/1448-169-0x000000013FA70000-0x000000013FDC1000-memory.dmp

    Filesize

    3.3MB

  • memory/1560-165-0x000000013F410000-0x000000013F761000-memory.dmp

    Filesize

    3.3MB

  • memory/1620-159-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/1620-269-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/1620-116-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-107-0x000000013F740000-0x000000013FA91000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-256-0x000000013F740000-0x000000013FA91000-memory.dmp

    Filesize

    3.3MB

  • memory/1872-70-0x000000013F740000-0x000000013FA91000-memory.dmp

    Filesize

    3.3MB

  • memory/2136-167-0x000000013FED0000-0x0000000140221000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-19-0x000000013FED0000-0x0000000140221000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-118-0x000000013F410000-0x000000013F761000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-87-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-158-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-154-0x000000013FE30000-0x0000000140181000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-26-0x000000013F5C0000-0x000000013F911000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-1-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB

  • memory/2144-13-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-112-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-62-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-103-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-145-0x000000013FA30000-0x000000013FD81000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-94-0x000000013FE30000-0x0000000140181000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-37-0x000000013F5B0000-0x000000013F901000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-173-0x000000013FA30000-0x000000013FD81000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-93-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-42-0x000000013FA30000-0x000000013FD81000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-0-0x000000013FA30000-0x000000013FD81000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-76-0x000000013F6D0000-0x000000013FA21000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-46-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-39-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2144-68-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2252-183-0x000000013F6D0000-0x000000013FA21000-memory.dmp

    Filesize

    3.3MB

  • memory/2252-275-0x000000013F6D0000-0x000000013FA21000-memory.dmp

    Filesize

    3.3MB

  • memory/2252-77-0x000000013F6D0000-0x000000013FA21000-memory.dmp

    Filesize

    3.3MB

  • memory/2252-143-0x000000013F6D0000-0x000000013FA21000-memory.dmp

    Filesize

    3.3MB

  • memory/2504-88-0x000000013FCA0000-0x000000013FFF1000-memory.dmp

    Filesize

    3.3MB

  • memory/2504-153-0x000000013FCA0000-0x000000013FFF1000-memory.dmp

    Filesize

    3.3MB

  • memory/2504-266-0x000000013FCA0000-0x000000013FFF1000-memory.dmp

    Filesize

    3.3MB

  • memory/2536-170-0x000000013F630000-0x000000013F981000-memory.dmp

    Filesize

    3.3MB

  • memory/2556-230-0x000000013FED0000-0x0000000140221000-memory.dmp

    Filesize

    3.3MB

  • memory/2556-48-0x000000013FED0000-0x0000000140221000-memory.dmp

    Filesize

    3.3MB

  • memory/2556-21-0x000000013FED0000-0x0000000140221000-memory.dmp

    Filesize

    3.3MB

  • memory/2584-234-0x000000013F5C0000-0x000000013F911000-memory.dmp

    Filesize

    3.3MB

  • memory/2584-31-0x000000013F5C0000-0x000000013F911000-memory.dmp

    Filesize

    3.3MB

  • memory/2584-54-0x000000013F5C0000-0x000000013F911000-memory.dmp

    Filesize

    3.3MB

  • memory/2604-238-0x000000013FD00000-0x0000000140051000-memory.dmp

    Filesize

    3.3MB

  • memory/2604-71-0x000000013FD00000-0x0000000140051000-memory.dmp

    Filesize

    3.3MB

  • memory/2604-43-0x000000013FD00000-0x0000000140051000-memory.dmp

    Filesize

    3.3MB

  • memory/2612-55-0x000000013F580000-0x000000013F8D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2612-239-0x000000013F580000-0x000000013F8D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2616-171-0x000000013FBD0000-0x000000013FF21000-memory.dmp

    Filesize

    3.3MB

  • memory/2692-223-0x000000013F740000-0x000000013FA91000-memory.dmp

    Filesize

    3.3MB

  • memory/2692-15-0x000000013F740000-0x000000013FA91000-memory.dmp

    Filesize

    3.3MB

  • memory/2692-47-0x000000013F740000-0x000000013FA91000-memory.dmp

    Filesize

    3.3MB

  • memory/2780-45-0x000000013F4C0000-0x000000013F811000-memory.dmp

    Filesize

    3.3MB

  • memory/2780-11-0x000000013F4C0000-0x000000013F811000-memory.dmp

    Filesize

    3.3MB

  • memory/2780-221-0x000000013F4C0000-0x000000013F811000-memory.dmp

    Filesize

    3.3MB

  • memory/2840-233-0x000000013F5B0000-0x000000013F901000-memory.dmp

    Filesize

    3.3MB

  • memory/2840-61-0x000000013F5B0000-0x000000013F901000-memory.dmp

    Filesize

    3.3MB

  • memory/2840-32-0x000000013F5B0000-0x000000013F901000-memory.dmp

    Filesize

    3.3MB