Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2024 20:11

General

  • Target

    2024-12-27_e4cac74f43a9f73cc0728d38482d171e_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.2MB

  • MD5

    e4cac74f43a9f73cc0728d38482d171e

  • SHA1

    977112261fff435460b1880fdcdd8bb687fff836

  • SHA256

    6636e15c0e73dec8a3c9b644f5103f1057058c31efac04eb35a18634e00bca9b

  • SHA512

    c408aee2a4299e00b785ffedc86b654f326fc8cba05838dbbb4abdbb549ce8e47ca2d3ce3fc06f6a4d5e97741b97edf826c801edb9a647767b974329decbe91d

  • SSDEEP

    49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6ld:RWWBibf56utgpPFotBER/mQ32lUp

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Cobaltstrike family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 40 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 63 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-27_e4cac74f43a9f73cc0728d38482d171e_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-27_e4cac74f43a9f73cc0728d38482d171e_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\System\aYcchHw.exe
      C:\Windows\System\aYcchHw.exe
      2⤵
      • Executes dropped EXE
      PID:1148
    • C:\Windows\System\oIusRZX.exe
      C:\Windows\System\oIusRZX.exe
      2⤵
      • Executes dropped EXE
      PID:2196
    • C:\Windows\System\dqQPQcM.exe
      C:\Windows\System\dqQPQcM.exe
      2⤵
      • Executes dropped EXE
      PID:2264
    • C:\Windows\System\ehbmjQp.exe
      C:\Windows\System\ehbmjQp.exe
      2⤵
      • Executes dropped EXE
      PID:2208
    • C:\Windows\System\eNadUVe.exe
      C:\Windows\System\eNadUVe.exe
      2⤵
      • Executes dropped EXE
      PID:2664
    • C:\Windows\System\FtXDxHW.exe
      C:\Windows\System\FtXDxHW.exe
      2⤵
      • Executes dropped EXE
      PID:2764
    • C:\Windows\System\NaTfklL.exe
      C:\Windows\System\NaTfklL.exe
      2⤵
      • Executes dropped EXE
      PID:2700
    • C:\Windows\System\axCscoR.exe
      C:\Windows\System\axCscoR.exe
      2⤵
      • Executes dropped EXE
      PID:2720
    • C:\Windows\System\vWOIgWt.exe
      C:\Windows\System\vWOIgWt.exe
      2⤵
      • Executes dropped EXE
      PID:2816
    • C:\Windows\System\kAzKXqe.exe
      C:\Windows\System\kAzKXqe.exe
      2⤵
      • Executes dropped EXE
      PID:2604
    • C:\Windows\System\HscvWuY.exe
      C:\Windows\System\HscvWuY.exe
      2⤵
      • Executes dropped EXE
      PID:1724
    • C:\Windows\System\nRAwtuV.exe
      C:\Windows\System\nRAwtuV.exe
      2⤵
      • Executes dropped EXE
      PID:3060
    • C:\Windows\System\YFbdLnl.exe
      C:\Windows\System\YFbdLnl.exe
      2⤵
      • Executes dropped EXE
      PID:2088
    • C:\Windows\System\MPWbgvD.exe
      C:\Windows\System\MPWbgvD.exe
      2⤵
      • Executes dropped EXE
      PID:1996
    • C:\Windows\System\ePkBPut.exe
      C:\Windows\System\ePkBPut.exe
      2⤵
      • Executes dropped EXE
      PID:2448
    • C:\Windows\System\YiyvUJw.exe
      C:\Windows\System\YiyvUJw.exe
      2⤵
      • Executes dropped EXE
      PID:2620
    • C:\Windows\System\lSwpzpr.exe
      C:\Windows\System\lSwpzpr.exe
      2⤵
      • Executes dropped EXE
      PID:1316
    • C:\Windows\System\ZsNnJXS.exe
      C:\Windows\System\ZsNnJXS.exe
      2⤵
      • Executes dropped EXE
      PID:1800
    • C:\Windows\System\mQWrsiw.exe
      C:\Windows\System\mQWrsiw.exe
      2⤵
      • Executes dropped EXE
      PID:2304
    • C:\Windows\System\IVmHQEb.exe
      C:\Windows\System\IVmHQEb.exe
      2⤵
      • Executes dropped EXE
      PID:2648
    • C:\Windows\System\qtfbTGG.exe
      C:\Windows\System\qtfbTGG.exe
      2⤵
      • Executes dropped EXE
      PID:1072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\HscvWuY.exe

    Filesize

    5.2MB

    MD5

    1e40939b6fb354408067199cf0bb2e71

    SHA1

    a25e1176efb682d65b8e4f0c2eb5809d98833ec0

    SHA256

    daeba571b207fae5396a504808f0bde4568c3aa204f4806f60359f8d611d084b

    SHA512

    b70c865e79251e4a280a4d6bf7e38e37c1b2b07b7670eab63ed1495eb8892ee2bf7a06f5463006d711341a780bb22d431a7ccbe382189efa702686767bb8d588

  • C:\Windows\system\IVmHQEb.exe

    Filesize

    5.2MB

    MD5

    3051384578fad9f88542e1a697fecfa4

    SHA1

    a0ab16b2c1557428403641464b6edd6fb22717d7

    SHA256

    3d195c8ce085b78bf776d57debb4774c935000ac70acff606b297d5d3a07009b

    SHA512

    32d50c48155582caace53d4b1c8f460a24564fbc31e0f507e66084b8f200b52911397d200f8d418349d9e4b71370f2ca4fdd169077c810a57faf3a94a725f49d

  • C:\Windows\system\MPWbgvD.exe

    Filesize

    5.2MB

    MD5

    233121ca8f8fb2a481ca4d16a44c34cf

    SHA1

    d8f968327ee15d1dbe8855583782dd4ff87f40fc

    SHA256

    4f16b63cbdc7454b11d5a7d1b8dd9ab2786842776a26e5c6ba1c69edf6b0c9ce

    SHA512

    ff9244a6f4f28d5b61c7760cd9d544ee753d2a807fd4543e68a2d06b70ff335ddb4fd12f28e38f6f39e65da70e24151eda7cb995c786be773a4549a015cc1ffb

  • C:\Windows\system\NaTfklL.exe

    Filesize

    5.2MB

    MD5

    af4f486369d0c09c22cd392d17257057

    SHA1

    2ae5a9d9d1b3c4d97869ad8fbe612fd7081e2de1

    SHA256

    fa81d79354151810ecea4cca167484cd3744708180a90d4cf362bb62380e1895

    SHA512

    769c6ae5a7eeca620d1eb6256e9d0483d7abeab4b4502a0498aab280e090b8266fdb0fab2677c395c2db9fa5e61f870043820b8d4a8b84881174d0d80a483464

  • C:\Windows\system\YFbdLnl.exe

    Filesize

    5.2MB

    MD5

    92f6f880dd4706ce40b81c57495aa0c5

    SHA1

    c8ab98015451b3cd96e2a6e49c16b88b897ca8a8

    SHA256

    0227891685e5a124676d42c695a3630b339dd59bb3c45af519d92c674adca516

    SHA512

    acadf51c0d300678cdcf747a85f73ec35a3cc3afec6ab88d98d8a8f6f5b535629aa6f7553e4a0a13715abda0be190f3e448db85f71cd5e3e811946beb1844c37

  • C:\Windows\system\YiyvUJw.exe

    Filesize

    5.2MB

    MD5

    f6a774e02bb4d180bc01e0fd209d579b

    SHA1

    026664b628afc34fbdd43521fd5c5cbac558495f

    SHA256

    ab111fd5c4b742aef5052c25cc9d2c4708fc90025d7caf2f0c82e4047b33cb40

    SHA512

    11134ebaa573fd5d55134e9683bfb793f5b4a3d909fcbbbe0ca36d2c90eb58a13718e3d5f62d0648bc00094084b08591777652a56f08882159db7912eb8502c9

  • C:\Windows\system\ZsNnJXS.exe

    Filesize

    5.2MB

    MD5

    09851c9cd51e3d17ea718d08d31e2881

    SHA1

    df7f843e2fe3c88f6f9af32883f7cdadc749a8af

    SHA256

    128a7109338be2c13d0663b2faa2c1bfab115cc1bbb46c463d74055f2fd749bd

    SHA512

    6a6f78725cd322ce5185c14e6bb9cb5e285c7a4a120f213fefc519de0cdcfce1ee632054ab4adea5d29c0973bc1c2014b6134caec3986cc6052458c0ead55268

  • C:\Windows\system\aYcchHw.exe

    Filesize

    5.2MB

    MD5

    2c2364c3b4c6a46ad4b7bb54f4eaac8c

    SHA1

    b323b03c2dc4e5dffed050cab3608db17205adaf

    SHA256

    520538bc64fff5a9871f546b99f274d056adf7ead21e50090b94bf302825ad43

    SHA512

    6cbf393e625e8c78ed7672d3c30fe40bc18dd1d631267d56a831dba15c4c458b92c8afa1b89937e28a03e6cee24faaf55338047131de3c3598002a59a231b638

  • C:\Windows\system\eNadUVe.exe

    Filesize

    5.2MB

    MD5

    e95240e0eeb5ea57fc96b7f2207d094c

    SHA1

    c280b5b5568f8510a5161de338523bf0f8799893

    SHA256

    effd1dd111180b95fdf24e3fe0b12920d29bfe60074033b65da2ea5ce2ad4cca

    SHA512

    a87ea38cdbf486c6f8517feb6273403dcd0f904483f0a8591fd6f54bd31bb5531137dee59d33144085f37cb5a3474f158ef5c30e1eca8036d3ad8b86aa5cd4c2

  • C:\Windows\system\ePkBPut.exe

    Filesize

    5.2MB

    MD5

    294316704f3da748b2646e1649e0c80d

    SHA1

    52f126ee16bcaa617d8bae2290735fe875341da6

    SHA256

    649de7eafd990f116c34734071c4cde3e23595b8ae3a626770aaa9e57b658108

    SHA512

    a930452fc154c511d8b1d0eed587dce080f2dac62749e74c09d1c7e724ed6370e7a498a534ea5bdb008c314ecff5b6ec0f54a09c75f6faee0c063f95894c788b

  • C:\Windows\system\ehbmjQp.exe

    Filesize

    5.2MB

    MD5

    c437e4d46f80e62a0de619bb947814ad

    SHA1

    f89ce0ff1ab32e3b5f9ebb7b80a1e775d41faf43

    SHA256

    c0175663bea999547ec98961e1d67de96c122f94dc2c10d604d08963104ae16c

    SHA512

    37be8df55b7a6c7a8a1c392c62ad2d74f84c02bf59c92ee1d19ba0d22ac626fda69912b7ef5c7a5708c83cd1906f81a62d2828683180edf8b19c7a0f97d0ab1d

  • C:\Windows\system\kAzKXqe.exe

    Filesize

    5.2MB

    MD5

    92f242c5f6677f991e632ca153656fbc

    SHA1

    343315b97b344844aaf4f235d1d934f72068a61e

    SHA256

    117d270545b04f91cce0b99dc3501a41b745058a7264ce6d32ca680d2e4b0eda

    SHA512

    9201dcb86cd8747156e802d4d219ecf345ca637005d3af3caca77e75f63add59dc576b99ca76f29ccc60d5c5cf1f593d1c955709c7802fc47d92dbc6cc81596f

  • C:\Windows\system\nRAwtuV.exe

    Filesize

    5.2MB

    MD5

    f51a8e88636bc0283fb1b8ac5c12af4d

    SHA1

    abdd7c9dfd092e2c31171b6ff8984f2e0a12b294

    SHA256

    dfbe72c8a4f9e87f3168dc949ad39c96e5471a5b692a84056136746462fb08b8

    SHA512

    7233ed421d595f6d8de4fdbab7aaf1e3db1b0aaa25857dc50585af13a632564e842bc88314f62a2baee0b3172bb96fc78d2b10d446d47705184c75bfc70549ba

  • C:\Windows\system\oIusRZX.exe

    Filesize

    5.2MB

    MD5

    ce218958805ad23e799bb04f1ef6e38d

    SHA1

    c2381bb5c2aab126bbda89b035c0c49ccaa3af3b

    SHA256

    aac304be16617d4dabcfd1ef92040f59a0f7c51bda0ebcc6bacec275ac3ce0b8

    SHA512

    2c0eb7894fb6eb2216e850a207b5fe776e973bff3f8e847ec078be563a092e9e27946520f5371502c70956bdcf9e0ab53de11cec17c60f27c9163e5a8ff4dfea

  • C:\Windows\system\qtfbTGG.exe

    Filesize

    5.2MB

    MD5

    8330f005d899bb0292de50ea0a400bab

    SHA1

    face22dffe7535b7b288d0197449f815db2631c4

    SHA256

    1203576fbe598c279586b5633095b3a0ef206d6911fb442f65dc348aa009d372

    SHA512

    7af876c1f6153018e87e461b5a02ae551731d9d583d138c16041ac0a5604a8bb9744b85c2ea11820c2ccd60a915b6722630df8cce34d3982caec0c48616ef323

  • \Windows\system\FtXDxHW.exe

    Filesize

    5.2MB

    MD5

    04dd383ef959fee9c547ceb3dbe6134a

    SHA1

    ce0a698b23ed1553854a88c0baab97326d7fbc1d

    SHA256

    2efe55aa7193915f2d634b55d17ccdaa79e104585f791e73cb63ef2e9095e952

    SHA512

    cf37d953bbdcf89e767524429043e55a201fcd1fb1585cf5b11d1751b26cde0fa79b8d89209215c997f9c699c2a115f9b79e4a2d9f7e3ca890333e499f7a7615

  • \Windows\system\axCscoR.exe

    Filesize

    5.2MB

    MD5

    b8494bd6e6c6f979a1b11618b4efb281

    SHA1

    6f00f731b45bd3a3420d126848ebe09617216af6

    SHA256

    1c44d1b5ec9524194feb9610e2b653a9a156bad6b82a201bae21dc22781cf4c0

    SHA512

    b79c38e25c9919c50c1b91e29f073974f9beb29cc662b9e30a8938a8ae0dbd55a85283c026758dd0245b4167c3017d6038eb8a882f9b3d57ede23361ac565922

  • \Windows\system\dqQPQcM.exe

    Filesize

    5.2MB

    MD5

    97a5eb200e86b81020a025b0a1a5c664

    SHA1

    c48f5522f2b46239038bf0179ce2c2965fca6601

    SHA256

    b06972a3c9d265f2f2a4be85fc484ac0e5715329e3f02c11b6c57c7283cd8437

    SHA512

    968ac2f5a1881ba370c28be310d6655cc5d58400f41823574a1b32d38e39f07ef1852baea1627256ed396be637995513367c1675a669a342ce2f69997c7d206f

  • \Windows\system\lSwpzpr.exe

    Filesize

    5.2MB

    MD5

    8bc234fcf424d96d57a9f2b2bbcda090

    SHA1

    ed3360460b8b65c7903a45889a33f0aa3a64dffe

    SHA256

    ef0b3565006aa6132103a0c1073a330226063b8f7915360b403d7e8b37af05f9

    SHA512

    f1b7818bfb5f72de8006ef5287f8555ee8d9e0d52926118f4bc0badcabd379735ce25c233c4bd6c781129a4f8946f3177c684deb5ae6696f1d95630bc30cbd99

  • \Windows\system\mQWrsiw.exe

    Filesize

    5.2MB

    MD5

    01feec0ea150344792d6c8fb8232c776

    SHA1

    55ad329c7f069628bb6ed04b81b7d030359fa606

    SHA256

    1c7fec3e4520b77ea39cf9191e92c108ac8164e3a0314a7f5a2664df34d01ac5

    SHA512

    553faabdeee49fe55bc8111d25d8f3d2fcd84c3b7aa4bb77d55b786bca9421580d35bfc2da7e99f6a452c167e1a64b2c629653e0936e1566a451ef5c02be4205

  • \Windows\system\vWOIgWt.exe

    Filesize

    5.2MB

    MD5

    3ba983b143234261d2e129c74c3f48ce

    SHA1

    c0d38d9c74ecf1067ac40b59b1fcfe8301664ac2

    SHA256

    f94935f23063c71d7d546519936b917025980661bf0f1beaa532885a13372ad1

    SHA512

    26bf0ca5f5d4ccdb16083ca2645be35f74d0bcca9706e19c3bbfc557f80e137fde9c6ebb08c2a985607aaf84b9a05dfbb6d950bf97445f9a890d45dbc48f79fc

  • memory/1072-162-0x000000013F770000-0x000000013FAC1000-memory.dmp

    Filesize

    3.3MB

  • memory/1148-216-0x000000013F800000-0x000000013FB51000-memory.dmp

    Filesize

    3.3MB

  • memory/1148-56-0x000000013F800000-0x000000013FB51000-memory.dmp

    Filesize

    3.3MB

  • memory/1148-20-0x000000013F800000-0x000000013FB51000-memory.dmp

    Filesize

    3.3MB

  • memory/1316-158-0x000000013F760000-0x000000013FAB1000-memory.dmp

    Filesize

    3.3MB

  • memory/1724-116-0x000000013FDE0000-0x0000000140131000-memory.dmp

    Filesize

    3.3MB

  • memory/1724-253-0x000000013FDE0000-0x0000000140131000-memory.dmp

    Filesize

    3.3MB

  • memory/1800-159-0x000000013F810000-0x000000013FB61000-memory.dmp

    Filesize

    3.3MB

  • memory/1996-155-0x000000013FF80000-0x00000001402D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2088-154-0x000000013F7D0000-0x000000013FB21000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-101-0x0000000002340000-0x0000000002691000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-138-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-126-0x0000000002340000-0x0000000002691000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-50-0x0000000002340000-0x0000000002691000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-79-0x0000000002340000-0x0000000002691000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-32-0x000000013F3B0000-0x000000013F701000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-146-0x000000013FDE0000-0x0000000140131000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-60-0x000000013F280000-0x000000013F5D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-39-0x0000000002340000-0x0000000002691000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-1-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/2172-163-0x000000013F830000-0x000000013FB81000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-140-0x000000013F830000-0x000000013FB81000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-65-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-53-0x000000013F830000-0x000000013FB81000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-127-0x000000013FF80000-0x00000001402D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-27-0x000000013F280000-0x000000013F5D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-123-0x0000000002340000-0x0000000002691000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-0-0x000000013F830000-0x000000013FB81000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-24-0x000000013FF00000-0x0000000140251000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-28-0x000000013FF10000-0x0000000140261000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-6-0x0000000002340000-0x0000000002691000-memory.dmp

    Filesize

    3.3MB

  • memory/2172-97-0x000000013FDE0000-0x0000000140131000-memory.dmp

    Filesize

    3.3MB

  • memory/2196-22-0x000000013F280000-0x000000013F5D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2196-217-0x000000013F280000-0x000000013F5D1000-memory.dmp

    Filesize

    3.3MB

  • memory/2208-30-0x000000013FF00000-0x0000000140251000-memory.dmp

    Filesize

    3.3MB

  • memory/2208-221-0x000000013FF00000-0x0000000140251000-memory.dmp

    Filesize

    3.3MB

  • memory/2264-29-0x000000013FF10000-0x0000000140261000-memory.dmp

    Filesize

    3.3MB

  • memory/2264-219-0x000000013FF10000-0x0000000140261000-memory.dmp

    Filesize

    3.3MB

  • memory/2304-160-0x000000013F240000-0x000000013F591000-memory.dmp

    Filesize

    3.3MB

  • memory/2448-156-0x000000013F5F0000-0x000000013F941000-memory.dmp

    Filesize

    3.3MB

  • memory/2604-244-0x000000013F4F0000-0x000000013F841000-memory.dmp

    Filesize

    3.3MB

  • memory/2604-84-0x000000013F4F0000-0x000000013F841000-memory.dmp

    Filesize

    3.3MB

  • memory/2620-157-0x000000013F860000-0x000000013FBB1000-memory.dmp

    Filesize

    3.3MB

  • memory/2648-161-0x000000013F450000-0x000000013F7A1000-memory.dmp

    Filesize

    3.3MB

  • memory/2664-236-0x000000013F3B0000-0x000000013F701000-memory.dmp

    Filesize

    3.3MB

  • memory/2664-93-0x000000013F3B0000-0x000000013F701000-memory.dmp

    Filesize

    3.3MB

  • memory/2664-36-0x000000013F3B0000-0x000000013F701000-memory.dmp

    Filesize

    3.3MB

  • memory/2700-238-0x000000013F920000-0x000000013FC71000-memory.dmp

    Filesize

    3.3MB

  • memory/2700-51-0x000000013F920000-0x000000013FC71000-memory.dmp

    Filesize

    3.3MB

  • memory/2720-240-0x000000013F3D0000-0x000000013F721000-memory.dmp

    Filesize

    3.3MB

  • memory/2720-59-0x000000013F3D0000-0x000000013F721000-memory.dmp

    Filesize

    3.3MB

  • memory/2764-223-0x000000013F7F0000-0x000000013FB41000-memory.dmp

    Filesize

    3.3MB

  • memory/2764-43-0x000000013F7F0000-0x000000013FB41000-memory.dmp

    Filesize

    3.3MB

  • memory/2764-132-0x000000013F7F0000-0x000000013FB41000-memory.dmp

    Filesize

    3.3MB

  • memory/2816-67-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/2816-242-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/2816-139-0x000000013FD20000-0x0000000140071000-memory.dmp

    Filesize

    3.3MB

  • memory/3060-246-0x000000013F9E0000-0x000000013FD31000-memory.dmp

    Filesize

    3.3MB

  • memory/3060-112-0x000000013F9E0000-0x000000013FD31000-memory.dmp

    Filesize

    3.3MB