Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 02:32

General

  • Target

    2024-12-22_6fabe8fa37373ceea870dbb7b8f07447_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.2MB

  • MD5

    6fabe8fa37373ceea870dbb7b8f07447

  • SHA1

    5d9705daa2851b80d172875e55c7713a379ad242

  • SHA256

    68247b8c9c7d210489c91382f131c4c4fac64d9d72dc2f83ff08ac5669fa4bfe

  • SHA512

    28714b392b88bb2afe882783465dcb53bc740114014476b504446466a092a7880973d45487b75493fed7ca9c5d599505a684d2a47ad948914aae023f5978fe7c

  • SSDEEP

    49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lj:RWWBibf56utgpPFotBER/mQ32lU3

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Cobaltstrike family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 41 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-22_6fabe8fa37373ceea870dbb7b8f07447_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-22_6fabe8fa37373ceea870dbb7b8f07447_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\System\SULJAVE.exe
      C:\Windows\System\SULJAVE.exe
      2⤵
      • Executes dropped EXE
      PID:2840
    • C:\Windows\System\bapvXDm.exe
      C:\Windows\System\bapvXDm.exe
      2⤵
      • Executes dropped EXE
      PID:2948
    • C:\Windows\System\EYeFMMk.exe
      C:\Windows\System\EYeFMMk.exe
      2⤵
      • Executes dropped EXE
      PID:3064
    • C:\Windows\System\BDyOkin.exe
      C:\Windows\System\BDyOkin.exe
      2⤵
      • Executes dropped EXE
      PID:2132
    • C:\Windows\System\AbDebet.exe
      C:\Windows\System\AbDebet.exe
      2⤵
      • Executes dropped EXE
      PID:2768
    • C:\Windows\System\LLjEZtz.exe
      C:\Windows\System\LLjEZtz.exe
      2⤵
      • Executes dropped EXE
      PID:2900
    • C:\Windows\System\IJhaJTd.exe
      C:\Windows\System\IJhaJTd.exe
      2⤵
      • Executes dropped EXE
      PID:2728
    • C:\Windows\System\GRKcXfi.exe
      C:\Windows\System\GRKcXfi.exe
      2⤵
      • Executes dropped EXE
      PID:2852
    • C:\Windows\System\FFeRXxn.exe
      C:\Windows\System\FFeRXxn.exe
      2⤵
      • Executes dropped EXE
      PID:2120
    • C:\Windows\System\akowmgF.exe
      C:\Windows\System\akowmgF.exe
      2⤵
      • Executes dropped EXE
      PID:2160
    • C:\Windows\System\tRCpUGc.exe
      C:\Windows\System\tRCpUGc.exe
      2⤵
      • Executes dropped EXE
      PID:2188
    • C:\Windows\System\Diibtwi.exe
      C:\Windows\System\Diibtwi.exe
      2⤵
      • Executes dropped EXE
      PID:2372
    • C:\Windows\System\FpKESPv.exe
      C:\Windows\System\FpKESPv.exe
      2⤵
      • Executes dropped EXE
      PID:1616
    • C:\Windows\System\VObyUTy.exe
      C:\Windows\System\VObyUTy.exe
      2⤵
      • Executes dropped EXE
      PID:1468
    • C:\Windows\System\msZEYxb.exe
      C:\Windows\System\msZEYxb.exe
      2⤵
      • Executes dropped EXE
      PID:1764
    • C:\Windows\System\BMLlCUj.exe
      C:\Windows\System\BMLlCUj.exe
      2⤵
      • Executes dropped EXE
      PID:2792
    • C:\Windows\System\GQMvmKh.exe
      C:\Windows\System\GQMvmKh.exe
      2⤵
      • Executes dropped EXE
      PID:1496
    • C:\Windows\System\hGZstJc.exe
      C:\Windows\System\hGZstJc.exe
      2⤵
      • Executes dropped EXE
      PID:2720
    • C:\Windows\System\DQwatvU.exe
      C:\Windows\System\DQwatvU.exe
      2⤵
      • Executes dropped EXE
      PID:2924
    • C:\Windows\System\NVGvXqQ.exe
      C:\Windows\System\NVGvXqQ.exe
      2⤵
      • Executes dropped EXE
      PID:1128
    • C:\Windows\System\suyYCSV.exe
      C:\Windows\System\suyYCSV.exe
      2⤵
      • Executes dropped EXE
      PID:1896

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\AbDebet.exe

    Filesize

    5.2MB

    MD5

    5d4470b24d92ad1ecfbb500899e5a5b9

    SHA1

    75aa9677281918524d2a1a1f5fcf3da97eb076f0

    SHA256

    98eb2f814692afe6eab14680152b916003809a7ff98df22c5f047a7625405ee1

    SHA512

    9bb9431a815a1f82e6787da7df4d6bd5570ea800cf3a37511ddd7d341c1f31687f40a434153298514399a0d2b7e0a957e67cdbeeb9c5160b640438d87324bd69

  • C:\Windows\system\BDyOkin.exe

    Filesize

    5.2MB

    MD5

    3c9d276c0c3366b41e2d18c2507d2874

    SHA1

    9aa3114d9ed7075160efb2a7c9e81ea6898ca352

    SHA256

    69c7dc1b8663fc09695b7a1df62d4d04a7c04384c2d83f741e81f7c9a3e1e322

    SHA512

    ae30fad9d386f218d75d454414160589d4d06776d93e2d2d8174b12f1a94e7ee60f25ead345ccf28b6f0767819b36284709b0edf6003e05cb90a8417ad463bd2

  • C:\Windows\system\BMLlCUj.exe

    Filesize

    5.2MB

    MD5

    d5114710c44954e724ffdfc649585c63

    SHA1

    525e453a5d731a9a008a3e70fcd411e219f7b755

    SHA256

    c4fdb95b189182665d0e0bcd3844058003e409cc4d1f085a17fff240980984cd

    SHA512

    f8984eb5cdbfbebf727351201ad79c8ca75f4c4a89f5c70d81063f2766c03c69bee50217f9b982af51838e41995ce76da1546ad1c6bf0541474fc2e6a256d060

  • C:\Windows\system\Diibtwi.exe

    Filesize

    5.2MB

    MD5

    0198ac5588dfc492d8bcebe5f8741d2e

    SHA1

    18a290a6fb756c221a1a9aecf4f60abf605426d7

    SHA256

    e8a3c419a2a2f106da84458f6288317dee45f5e05b86fdda1a4c60566916231c

    SHA512

    bbbe231e3f736e02dafbedcf391ac63e683eb9d093919935e6a2b0c87959c5ad57be00d7669d397432f61e42d1ea7171db75084743aa4ee503bd51e50b02a403

  • C:\Windows\system\EYeFMMk.exe

    Filesize

    5.2MB

    MD5

    8840836f0a89371070eb92c40491285e

    SHA1

    fc936f9888f389e6b6b84f2f113b0b95856b5366

    SHA256

    8dc2d9d1f28f2e2f3dd18bf5d0cf1ac7b0a5ac06a77b65b000b39a93296a1f2e

    SHA512

    1f7b4aff30fdc4dafa575182144cf0afa649585405c73fb174a3bde6e451f383273169c76072eb725d3e3ff8892e78d0a1b4321bf940b7547f6b3a18886bf505

  • C:\Windows\system\FFeRXxn.exe

    Filesize

    5.2MB

    MD5

    d996d2e10d385a2307f81c4437025aca

    SHA1

    cd4e2f130b63643c41cef7070447d5c20f5d3b9f

    SHA256

    8ae878de344f3b9ecbe11c2bbb3c321cc7355568fdd9d531cce8a57ed5391ef3

    SHA512

    87f1d78ced1ec1dea3974601c8a1b5435a85144640904db17fb124de26cc6c7804ce076c335714463c7da807a6af2d0cc69988a5702625f9e8a08d2bf07d0cb1

  • C:\Windows\system\FpKESPv.exe

    Filesize

    5.2MB

    MD5

    2896156253443aa7432c6f45511f973b

    SHA1

    bfd35682000e8a40d5c7c39cfda0178771a80127

    SHA256

    556cd77a6a3f6a8f70f54468dbf124e8debc534f0d720ba2a1d6f54f376980b5

    SHA512

    0646da28858a3ef24c0981c405f1384289ffda913689794b65ccdc76a606d7d7db5843a50e0d8302f6bfdd1ace29ce1a51058dc8f6cd4a7995478e76e37d3dda

  • C:\Windows\system\IJhaJTd.exe

    Filesize

    5.2MB

    MD5

    ce19cb79816d58ec9519abf83fd4f81a

    SHA1

    23bd9c7545aecc2eacda8401dbb843a9b4f0213b

    SHA256

    0240b589d8cadff7890631d1c2de7720dc52027f8251006be6751a32c69ecffd

    SHA512

    19b92f90c8badd10e2bc1a6d09c23bdd31790615ac02ab0af65c6f679147de4d3fb22894488e333165f590fd95a0e356cf77135edce6dd8dd503fba16fe75a08

  • C:\Windows\system\LLjEZtz.exe

    Filesize

    5.2MB

    MD5

    03b4370750b4fbf3c605660759c8897e

    SHA1

    d4ea6715d962dcdef7c624ea0a29da1168413103

    SHA256

    6477b1d5f202887c3bed11bb142341eae7de809f7af622e97822eb32bf655b67

    SHA512

    694975fe8e4bf4902a6d4753de48c4b6c7f7a1099a3d0450bfb76b5e6a19e715bb22860091b5ef6cc9ad55369ed9063628407f294754baa0a4e5424caef725ff

  • C:\Windows\system\SULJAVE.exe

    Filesize

    5.2MB

    MD5

    6d1c6f16abbf0a09c426bd8fcb4eccac

    SHA1

    457d6ec159e7eedc9c76b59ac71d6495aad7ec9f

    SHA256

    90fce314ff299044ee70d33566e58efe3b12d3427626c0aa09c1d0fcc03edf24

    SHA512

    063e759173be4084de627328a5488e730f8906f6bea2de722f032a3ca72a6d3091050970786927043330b836f081f2648dd56ce232beaa4ce9b544262e9da95e

  • C:\Windows\system\VObyUTy.exe

    Filesize

    5.2MB

    MD5

    aef7b2a52e48f4443fba18ae4018330a

    SHA1

    a0f8431688102802e8e1217fcb0bd82d2f8eb9c3

    SHA256

    6146b1f273c3a1c32cbe64cfc67f28a0400448d2545841acb4e2c351cc284d7e

    SHA512

    9efa12b34d74c3fdbd350124e452dbd5c5f02738ff5ed4377ce75953ee55067cb665764e5f36053d5de095b96c42d7eb77e712296ece382cf61a1f85cf0d11a1

  • C:\Windows\system\akowmgF.exe

    Filesize

    5.2MB

    MD5

    f9546c960d25471baa02250df1898b5c

    SHA1

    c91ede62c6c77f8d1b0a326b76146c48a7cd4468

    SHA256

    6e14ecfbc93d48ce993e3d879a0a80409b7ce9953e282e1539a5919dcefaf3c9

    SHA512

    c37183efd60f1c527edf121e2a2f010ef3a433341ef11026ba542b0aac523524ae0723b599e25bfe50c307e72f17ec7bccdba4c2b9276a380043dc3bee5a695d

  • C:\Windows\system\msZEYxb.exe

    Filesize

    5.2MB

    MD5

    28d495c71890d1f34ca5e83a2b63fe7c

    SHA1

    d837f6c9bc04df4c7c94f5ca0c0af1b1b6a5bde2

    SHA256

    1dfe82f904c45f8ab6f8c521c91f777d19df368c284bf6d7013ddac07ff718a1

    SHA512

    e8786550fab91bbbf64071a35568a9bccfbedc5c0860faaa9a7dc206f61b3176873b1154b0dca661ca8059d2c78ac87f9fcd8afa6e61c104520f4e15d76b162c

  • C:\Windows\system\suyYCSV.exe

    Filesize

    5.2MB

    MD5

    62a0e5378e0e3f6127492e288dfce7f9

    SHA1

    56c391cfb1ae76dedf35db67c27b2c59702ab57e

    SHA256

    dfd22946e71ea22feb7d008f113128a0c1847bf87858f1dfbf36ce858c2e6d1c

    SHA512

    574b4bb2668517efdc41ea2bfef7ed91485386657d2db0d6866bb4be02645e470f1b35b99755301939cdc25d2b2c7f51f56278755cf1d0a2e4796abbb8ed959c

  • C:\Windows\system\tRCpUGc.exe

    Filesize

    5.2MB

    MD5

    f845b87ad5114728306a44925aa79c0b

    SHA1

    3c1c4460c031e30a8c4f5e92c7c45b203b2a389d

    SHA256

    249fee125ad709f8c9fe12bf41bf59e00feb1df83dc7a51a5ce79f8a2ff1e311

    SHA512

    296acf1d2bdb3bee40a98918c8f67b3e57357f2a8c8c099858fa9fd63b1472c374c84dd32468cb7b3d2759c7063a4c8fc05b8de616bb4458cf36cc4a137757c4

  • \Windows\system\DQwatvU.exe

    Filesize

    5.2MB

    MD5

    3e30bc6493c9df6b06f06e466360bf81

    SHA1

    fd9a205bcfaac6bcfe7aec088eb3fbbdf1fe06fa

    SHA256

    cf8520dba8d0eb2144765bd33635e9266f6ff1ffa2beac6bd3a2e2a83a3a9f4c

    SHA512

    0bae122c143e63ebf45cebeb60ab60cf085d4926b194439ddaebb5192eb695b95a0c9ec2f8b659b2201896a86db6529915ea6ddef1292625f82dce6328fd902e

  • \Windows\system\GQMvmKh.exe

    Filesize

    5.2MB

    MD5

    d780aa668d5fd306cdf22c6e5ad8f18f

    SHA1

    4a52820fd1471ec53005d5e596e1f3ded1c5829c

    SHA256

    c34714d7e6a070f2a90a99bb52b8d2228170c328741aa6ca1eeb7bac1b2d1773

    SHA512

    352f3b9a6863c1c075db32ed041350fc03040aa60510090d6cb0324faece9c01509dd10a4a31e2abeaf9cab3d06f10a0305092831b5bc0340a923fd4ff00e88f

  • \Windows\system\GRKcXfi.exe

    Filesize

    5.2MB

    MD5

    89a877e06835a26c6168de2320f1b967

    SHA1

    534a9c47d2f9ec8133fdf9fde7613eaa507dac4a

    SHA256

    d7186da9c136da80192c4ba4763964a38e3e06fe1a05ed47f8eceb14f64d8b56

    SHA512

    347dd4869664bd256bc88901da6d8ad7d56f72e2568ff7b3048a3984e0275be0d84a5dc06d6524931ff8c4ff3857649c9c371ec2d3f1d9f8074079f51332c75f

  • \Windows\system\NVGvXqQ.exe

    Filesize

    5.2MB

    MD5

    38e1d3e6d9d43fb3fb6911de84062aea

    SHA1

    13fd2c51601988adc0ec99097698f6af85f55e31

    SHA256

    73dceecdee59c779202ee1cc7e1ba964a8e43446930180265f81c517a341f648

    SHA512

    33984b1adfda7cf990e7ea591c2809bd1566e12c567a1ff6aeabadf5843d130302da891df851c4000d01090b450aa0c3e76292690f5a38dca93725cfefc8a27a

  • \Windows\system\bapvXDm.exe

    Filesize

    5.2MB

    MD5

    ef39a387c5d52f194b336c465f3504b0

    SHA1

    f2f2b883fd53ee2aadf405b0bf4fa66b3ca267fa

    SHA256

    f75e6efe8112e12b5d87b57c60ffe877b486e29eadb36933db933b3153b34b90

    SHA512

    8ce1f0f2a28ce6dcd0dbdd43d79198dbea84e2e286219d95ab6d4d26fb366c0be8ed83787bbe2cd2d71c2ae1d58b6411c9921d990b517d931e912c5ce9f78b47

  • \Windows\system\hGZstJc.exe

    Filesize

    5.2MB

    MD5

    d69914f476b237dc6f5ba1e5e79cb822

    SHA1

    bb0d1e3fa74585bd1ad32dff2389e060b0808a6b

    SHA256

    e92cbc9efee1f4fba5344af78c1cdcab5bf70c70c5e521a9e0f9382658128e51

    SHA512

    f106879ad15351b169b2f790ec87aaeae6c6d61cec7757742f2065bbbcb8074f64511bc364ed12e8bd2eae18909009aa0d3091dc283a89fa826cbd3ab110e789

  • memory/1128-162-0x000000013FF60000-0x00000001402B1000-memory.dmp

    Filesize

    3.3MB

  • memory/1468-156-0x000000013F920000-0x000000013FC71000-memory.dmp

    Filesize

    3.3MB

  • memory/1496-159-0x000000013FAD0000-0x000000013FE21000-memory.dmp

    Filesize

    3.3MB

  • memory/1616-251-0x000000013FB30000-0x000000013FE81000-memory.dmp

    Filesize

    3.3MB

  • memory/1616-102-0x000000013FB30000-0x000000013FE81000-memory.dmp

    Filesize

    3.3MB

  • memory/1764-157-0x000000013F060000-0x000000013F3B1000-memory.dmp

    Filesize

    3.3MB

  • memory/1764-107-0x000000013F060000-0x000000013F3B1000-memory.dmp

    Filesize

    3.3MB

  • memory/1764-253-0x000000013F060000-0x000000013F3B1000-memory.dmp

    Filesize

    3.3MB

  • memory/1896-163-0x000000013FE30000-0x0000000140181000-memory.dmp

    Filesize

    3.3MB

  • memory/2120-67-0x000000013F130000-0x000000013F481000-memory.dmp

    Filesize

    3.3MB

  • memory/2120-237-0x000000013F130000-0x000000013F481000-memory.dmp

    Filesize

    3.3MB

  • memory/2132-230-0x000000013FA70000-0x000000013FDC1000-memory.dmp

    Filesize

    3.3MB

  • memory/2132-94-0x000000013FA70000-0x000000013FDC1000-memory.dmp

    Filesize

    3.3MB

  • memory/2132-28-0x000000013FA70000-0x000000013FDC1000-memory.dmp

    Filesize

    3.3MB

  • memory/2160-73-0x000000013F430000-0x000000013F781000-memory.dmp

    Filesize

    3.3MB

  • memory/2160-241-0x000000013F430000-0x000000013F781000-memory.dmp

    Filesize

    3.3MB

  • memory/2188-141-0x000000013F690000-0x000000013F9E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2188-79-0x000000013F690000-0x000000013F9E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2188-247-0x000000013F690000-0x000000013F9E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2372-100-0x000000013FA20000-0x000000013FD71000-memory.dmp

    Filesize

    3.3MB

  • memory/2372-249-0x000000013FA20000-0x000000013FD71000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-106-0x000000013F060000-0x000000013F3B1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-165-0x000000013F060000-0x000000013F3B1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-1-0x0000000000080000-0x0000000000090000-memory.dmp

    Filesize

    64KB

  • memory/2376-65-0x000000013F130000-0x000000013F481000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-54-0x000000013F390000-0x000000013F6E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-53-0x000000013FEC0000-0x0000000140211000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-52-0x000000013F900000-0x000000013FC51000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-9-0x000000013FEC0000-0x0000000140211000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-70-0x000000013F430000-0x000000013F781000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-139-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-140-0x000000013F430000-0x000000013F781000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-101-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-41-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-164-0x000000013F900000-0x000000013FC51000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-34-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-78-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-142-0x000000013F900000-0x000000013FC51000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-21-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-13-0x000000013FCB0000-0x0000000140001000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-0-0x000000013F900000-0x000000013FC51000-memory.dmp

    Filesize

    3.3MB

  • memory/2376-99-0x0000000002280000-0x00000000025D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2720-160-0x000000013FA40000-0x000000013FD91000-memory.dmp

    Filesize

    3.3MB

  • memory/2728-51-0x000000013F670000-0x000000013F9C1000-memory.dmp

    Filesize

    3.3MB

  • memory/2728-231-0x000000013F670000-0x000000013F9C1000-memory.dmp

    Filesize

    3.3MB

  • memory/2728-138-0x000000013F670000-0x000000013F9C1000-memory.dmp

    Filesize

    3.3MB

  • memory/2768-35-0x000000013F990000-0x000000013FCE1000-memory.dmp

    Filesize

    3.3MB

  • memory/2768-227-0x000000013F990000-0x000000013FCE1000-memory.dmp

    Filesize

    3.3MB

  • memory/2792-158-0x000000013FE30000-0x0000000140181000-memory.dmp

    Filesize

    3.3MB

  • memory/2840-216-0x000000013FEC0000-0x0000000140211000-memory.dmp

    Filesize

    3.3MB

  • memory/2840-15-0x000000013FEC0000-0x0000000140211000-memory.dmp

    Filesize

    3.3MB

  • memory/2852-236-0x000000013F390000-0x000000013F6E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2852-68-0x000000013F390000-0x000000013F6E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2900-235-0x000000013F690000-0x000000013F9E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2900-46-0x000000013F690000-0x000000013F9E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2900-108-0x000000013F690000-0x000000013F9E1000-memory.dmp

    Filesize

    3.3MB

  • memory/2924-161-0x000000013F410000-0x000000013F761000-memory.dmp

    Filesize

    3.3MB

  • memory/2948-218-0x000000013FCB0000-0x0000000140001000-memory.dmp

    Filesize

    3.3MB

  • memory/2948-16-0x000000013FCB0000-0x0000000140001000-memory.dmp

    Filesize

    3.3MB

  • memory/3064-220-0x000000013F790000-0x000000013FAE1000-memory.dmp

    Filesize

    3.3MB

  • memory/3064-22-0x000000013F790000-0x000000013FAE1000-memory.dmp

    Filesize

    3.3MB

  • memory/3064-69-0x000000013F790000-0x000000013FAE1000-memory.dmp

    Filesize

    3.3MB