Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 08:14
Behavioral task
behavioral1
Sample
20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe
-
Size
5.2MB
-
MD5
b67ee9c9e52b20b357a7b8a046b258c0
-
SHA1
c239963813ffbfe8ebbc08f3172424207acbfd63
-
SHA256
5705022d3bf360d3c0067f4450ed5c0bba4324294cc018498057c4ec8855b27a
-
SHA512
32f3c6d9b0a68bfdd6c4dba41a064f16b3cad3a66bfa1396f55265dc855e65ece2556a1872bbf0f62b29cee7648f69ee939744cb7e47307954a5afcc7152b3dc
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l/:RWWBibf56utgpPFotBER/mQ32lUr
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\qILCaho.exe cobalt_reflective_dll C:\Windows\System\scTdRtD.exe cobalt_reflective_dll C:\Windows\System\krgTWYu.exe cobalt_reflective_dll C:\Windows\System\qQGeBjG.exe cobalt_reflective_dll C:\Windows\System\LUfELsc.exe cobalt_reflective_dll C:\Windows\System\lalywRf.exe cobalt_reflective_dll C:\Windows\System\gKedhtO.exe cobalt_reflective_dll C:\Windows\System\kUqBqJu.exe cobalt_reflective_dll C:\Windows\System\irpLgYs.exe cobalt_reflective_dll C:\Windows\System\vRFFgVY.exe cobalt_reflective_dll C:\Windows\System\bSihvGs.exe cobalt_reflective_dll C:\Windows\System\rvkWERW.exe cobalt_reflective_dll C:\Windows\System\sJuZMaj.exe cobalt_reflective_dll C:\Windows\System\scLkNNV.exe cobalt_reflective_dll C:\Windows\System\hqXDHvU.exe cobalt_reflective_dll C:\Windows\System\evRvBCU.exe cobalt_reflective_dll C:\Windows\System\tRLSMEC.exe cobalt_reflective_dll C:\Windows\System\HoJGvad.exe cobalt_reflective_dll C:\Windows\System\DKRbWzk.exe cobalt_reflective_dll C:\Windows\System\IjKwkCG.exe cobalt_reflective_dll C:\Windows\System\IhQCaQG.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 47 IoCs
Processes:
resource yara_rule behavioral2/memory/5152-44-0x00007FF698030000-0x00007FF698381000-memory.dmp xmrig behavioral2/memory/1976-117-0x00007FF608000000-0x00007FF608351000-memory.dmp xmrig behavioral2/memory/5016-120-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmp xmrig behavioral2/memory/3376-124-0x00007FF7FF470000-0x00007FF7FF7C1000-memory.dmp xmrig behavioral2/memory/1656-127-0x00007FF724950000-0x00007FF724CA1000-memory.dmp xmrig behavioral2/memory/1716-129-0x00007FF70D510000-0x00007FF70D861000-memory.dmp xmrig behavioral2/memory/4980-134-0x00007FF66CDB0000-0x00007FF66D101000-memory.dmp xmrig behavioral2/memory/5484-135-0x00007FF6E3990000-0x00007FF6E3CE1000-memory.dmp xmrig behavioral2/memory/5976-133-0x00007FF686170000-0x00007FF6864C1000-memory.dmp xmrig behavioral2/memory/5928-132-0x00007FF6B3000000-0x00007FF6B3351000-memory.dmp xmrig behavioral2/memory/5904-131-0x00007FF693720000-0x00007FF693A71000-memory.dmp xmrig behavioral2/memory/4640-130-0x00007FF747550000-0x00007FF7478A1000-memory.dmp xmrig behavioral2/memory/4872-128-0x00007FF66F350000-0x00007FF66F6A1000-memory.dmp xmrig behavioral2/memory/5516-126-0x00007FF763AA0000-0x00007FF763DF1000-memory.dmp xmrig behavioral2/memory/5356-125-0x00007FF71EB00000-0x00007FF71EE51000-memory.dmp xmrig behavioral2/memory/5628-123-0x00007FF772FA0000-0x00007FF7732F1000-memory.dmp xmrig behavioral2/memory/5448-122-0x00007FF6378A0000-0x00007FF637BF1000-memory.dmp xmrig behavioral2/memory/5152-121-0x00007FF698030000-0x00007FF698381000-memory.dmp xmrig behavioral2/memory/972-119-0x00007FF6155D0000-0x00007FF615921000-memory.dmp xmrig behavioral2/memory/4040-118-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmp xmrig behavioral2/memory/4596-116-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmp xmrig behavioral2/memory/2428-114-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp xmrig behavioral2/memory/2484-115-0x00007FF674330000-0x00007FF674681000-memory.dmp xmrig behavioral2/memory/2428-136-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp xmrig behavioral2/memory/2428-154-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp xmrig behavioral2/memory/2428-159-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp xmrig behavioral2/memory/2484-184-0x00007FF674330000-0x00007FF674681000-memory.dmp xmrig behavioral2/memory/4596-186-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmp xmrig behavioral2/memory/1976-188-0x00007FF608000000-0x00007FF608351000-memory.dmp xmrig behavioral2/memory/4040-194-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmp xmrig behavioral2/memory/972-196-0x00007FF6155D0000-0x00007FF615921000-memory.dmp xmrig behavioral2/memory/5016-198-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmp xmrig behavioral2/memory/5152-200-0x00007FF698030000-0x00007FF698381000-memory.dmp xmrig behavioral2/memory/5448-202-0x00007FF6378A0000-0x00007FF637BF1000-memory.dmp xmrig behavioral2/memory/5628-204-0x00007FF772FA0000-0x00007FF7732F1000-memory.dmp xmrig behavioral2/memory/3376-206-0x00007FF7FF470000-0x00007FF7FF7C1000-memory.dmp xmrig behavioral2/memory/5356-208-0x00007FF71EB00000-0x00007FF71EE51000-memory.dmp xmrig behavioral2/memory/5516-210-0x00007FF763AA0000-0x00007FF763DF1000-memory.dmp xmrig behavioral2/memory/1656-220-0x00007FF724950000-0x00007FF724CA1000-memory.dmp xmrig behavioral2/memory/4872-222-0x00007FF66F350000-0x00007FF66F6A1000-memory.dmp xmrig behavioral2/memory/1716-224-0x00007FF70D510000-0x00007FF70D861000-memory.dmp xmrig behavioral2/memory/4640-226-0x00007FF747550000-0x00007FF7478A1000-memory.dmp xmrig behavioral2/memory/5904-228-0x00007FF693720000-0x00007FF693A71000-memory.dmp xmrig behavioral2/memory/5928-232-0x00007FF6B3000000-0x00007FF6B3351000-memory.dmp xmrig behavioral2/memory/5976-231-0x00007FF686170000-0x00007FF6864C1000-memory.dmp xmrig behavioral2/memory/4980-234-0x00007FF66CDB0000-0x00007FF66D101000-memory.dmp xmrig behavioral2/memory/5484-236-0x00007FF6E3990000-0x00007FF6E3CE1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
qILCaho.exescTdRtD.exekrgTWYu.exeqQGeBjG.exeLUfELsc.exelalywRf.exegKedhtO.exekUqBqJu.exeirpLgYs.exevRFFgVY.exebSihvGs.exervkWERW.exesJuZMaj.exescLkNNV.exehqXDHvU.exeevRvBCU.exetRLSMEC.exeHoJGvad.exeDKRbWzk.exeIjKwkCG.exeIhQCaQG.exepid process 2484 qILCaho.exe 4596 scTdRtD.exe 1976 krgTWYu.exe 4040 qQGeBjG.exe 972 LUfELsc.exe 5016 lalywRf.exe 5152 gKedhtO.exe 5448 kUqBqJu.exe 5628 irpLgYs.exe 3376 vRFFgVY.exe 5356 bSihvGs.exe 5516 rvkWERW.exe 1656 sJuZMaj.exe 4872 scLkNNV.exe 1716 hqXDHvU.exe 4640 evRvBCU.exe 5904 tRLSMEC.exe 5928 HoJGvad.exe 5976 DKRbWzk.exe 4980 IjKwkCG.exe 5484 IhQCaQG.exe -
Processes:
resource yara_rule behavioral2/memory/2428-0-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp upx C:\Windows\System\qILCaho.exe upx behavioral2/memory/2484-8-0x00007FF674330000-0x00007FF674681000-memory.dmp upx C:\Windows\System\scTdRtD.exe upx behavioral2/memory/4596-14-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmp upx C:\Windows\System\krgTWYu.exe upx behavioral2/memory/1976-20-0x00007FF608000000-0x00007FF608351000-memory.dmp upx C:\Windows\System\qQGeBjG.exe upx behavioral2/memory/4040-26-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmp upx C:\Windows\System\LUfELsc.exe upx behavioral2/memory/972-31-0x00007FF6155D0000-0x00007FF615921000-memory.dmp upx C:\Windows\System\lalywRf.exe upx behavioral2/memory/5016-37-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmp upx C:\Windows\System\gKedhtO.exe upx behavioral2/memory/5152-44-0x00007FF698030000-0x00007FF698381000-memory.dmp upx C:\Windows\System\kUqBqJu.exe upx C:\Windows\System\irpLgYs.exe upx C:\Windows\System\vRFFgVY.exe upx C:\Windows\System\bSihvGs.exe upx C:\Windows\System\rvkWERW.exe upx C:\Windows\System\sJuZMaj.exe upx C:\Windows\System\scLkNNV.exe upx C:\Windows\System\hqXDHvU.exe upx C:\Windows\System\evRvBCU.exe upx C:\Windows\System\tRLSMEC.exe upx C:\Windows\System\HoJGvad.exe upx C:\Windows\System\DKRbWzk.exe upx C:\Windows\System\IjKwkCG.exe upx C:\Windows\System\IhQCaQG.exe upx behavioral2/memory/1976-117-0x00007FF608000000-0x00007FF608351000-memory.dmp upx behavioral2/memory/5016-120-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmp upx behavioral2/memory/3376-124-0x00007FF7FF470000-0x00007FF7FF7C1000-memory.dmp upx behavioral2/memory/1656-127-0x00007FF724950000-0x00007FF724CA1000-memory.dmp upx behavioral2/memory/1716-129-0x00007FF70D510000-0x00007FF70D861000-memory.dmp upx behavioral2/memory/4980-134-0x00007FF66CDB0000-0x00007FF66D101000-memory.dmp upx behavioral2/memory/5484-135-0x00007FF6E3990000-0x00007FF6E3CE1000-memory.dmp upx behavioral2/memory/5976-133-0x00007FF686170000-0x00007FF6864C1000-memory.dmp upx behavioral2/memory/5928-132-0x00007FF6B3000000-0x00007FF6B3351000-memory.dmp upx behavioral2/memory/5904-131-0x00007FF693720000-0x00007FF693A71000-memory.dmp upx behavioral2/memory/4640-130-0x00007FF747550000-0x00007FF7478A1000-memory.dmp upx behavioral2/memory/4872-128-0x00007FF66F350000-0x00007FF66F6A1000-memory.dmp upx behavioral2/memory/5516-126-0x00007FF763AA0000-0x00007FF763DF1000-memory.dmp upx behavioral2/memory/5356-125-0x00007FF71EB00000-0x00007FF71EE51000-memory.dmp upx behavioral2/memory/5628-123-0x00007FF772FA0000-0x00007FF7732F1000-memory.dmp upx behavioral2/memory/5448-122-0x00007FF6378A0000-0x00007FF637BF1000-memory.dmp upx behavioral2/memory/5152-121-0x00007FF698030000-0x00007FF698381000-memory.dmp upx behavioral2/memory/972-119-0x00007FF6155D0000-0x00007FF615921000-memory.dmp upx behavioral2/memory/4040-118-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmp upx behavioral2/memory/4596-116-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmp upx behavioral2/memory/2428-114-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp upx behavioral2/memory/2484-115-0x00007FF674330000-0x00007FF674681000-memory.dmp upx behavioral2/memory/2428-136-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp upx behavioral2/memory/2428-154-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp upx behavioral2/memory/2428-159-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmp upx behavioral2/memory/2484-184-0x00007FF674330000-0x00007FF674681000-memory.dmp upx behavioral2/memory/4596-186-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmp upx behavioral2/memory/1976-188-0x00007FF608000000-0x00007FF608351000-memory.dmp upx behavioral2/memory/4040-194-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmp upx behavioral2/memory/972-196-0x00007FF6155D0000-0x00007FF615921000-memory.dmp upx behavioral2/memory/5016-198-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmp upx behavioral2/memory/5152-200-0x00007FF698030000-0x00007FF698381000-memory.dmp upx behavioral2/memory/5448-202-0x00007FF6378A0000-0x00007FF637BF1000-memory.dmp upx behavioral2/memory/5628-204-0x00007FF772FA0000-0x00007FF7732F1000-memory.dmp upx behavioral2/memory/3376-206-0x00007FF7FF470000-0x00007FF7FF7C1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\qILCaho.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\qQGeBjG.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\lalywRf.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\hqXDHvU.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\IjKwkCG.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\kUqBqJu.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\vRFFgVY.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\rvkWERW.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\scLkNNV.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\krgTWYu.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\LUfELsc.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\HoJGvad.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\IhQCaQG.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\DKRbWzk.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\scTdRtD.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\gKedhtO.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\irpLgYs.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\bSihvGs.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\sJuZMaj.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\evRvBCU.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\tRLSMEC.exe 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process target process PID 2428 wrote to memory of 2484 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe qILCaho.exe PID 2428 wrote to memory of 2484 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe qILCaho.exe PID 2428 wrote to memory of 4596 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe scTdRtD.exe PID 2428 wrote to memory of 4596 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe scTdRtD.exe PID 2428 wrote to memory of 1976 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe krgTWYu.exe PID 2428 wrote to memory of 1976 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe krgTWYu.exe PID 2428 wrote to memory of 4040 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe qQGeBjG.exe PID 2428 wrote to memory of 4040 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe qQGeBjG.exe PID 2428 wrote to memory of 972 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe LUfELsc.exe PID 2428 wrote to memory of 972 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe LUfELsc.exe PID 2428 wrote to memory of 5016 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe lalywRf.exe PID 2428 wrote to memory of 5016 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe lalywRf.exe PID 2428 wrote to memory of 5152 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe gKedhtO.exe PID 2428 wrote to memory of 5152 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe gKedhtO.exe PID 2428 wrote to memory of 5448 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe kUqBqJu.exe PID 2428 wrote to memory of 5448 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe kUqBqJu.exe PID 2428 wrote to memory of 5628 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe irpLgYs.exe PID 2428 wrote to memory of 5628 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe irpLgYs.exe PID 2428 wrote to memory of 3376 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe vRFFgVY.exe PID 2428 wrote to memory of 3376 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe vRFFgVY.exe PID 2428 wrote to memory of 5356 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe bSihvGs.exe PID 2428 wrote to memory of 5356 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe bSihvGs.exe PID 2428 wrote to memory of 5516 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe rvkWERW.exe PID 2428 wrote to memory of 5516 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe rvkWERW.exe PID 2428 wrote to memory of 1656 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe sJuZMaj.exe PID 2428 wrote to memory of 1656 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe sJuZMaj.exe PID 2428 wrote to memory of 4872 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe scLkNNV.exe PID 2428 wrote to memory of 4872 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe scLkNNV.exe PID 2428 wrote to memory of 1716 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe hqXDHvU.exe PID 2428 wrote to memory of 1716 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe hqXDHvU.exe PID 2428 wrote to memory of 4640 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe evRvBCU.exe PID 2428 wrote to memory of 4640 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe evRvBCU.exe PID 2428 wrote to memory of 5904 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe tRLSMEC.exe PID 2428 wrote to memory of 5904 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe tRLSMEC.exe PID 2428 wrote to memory of 5928 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe HoJGvad.exe PID 2428 wrote to memory of 5928 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe HoJGvad.exe PID 2428 wrote to memory of 5976 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe DKRbWzk.exe PID 2428 wrote to memory of 5976 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe DKRbWzk.exe PID 2428 wrote to memory of 4980 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe IjKwkCG.exe PID 2428 wrote to memory of 4980 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe IjKwkCG.exe PID 2428 wrote to memory of 5484 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe IhQCaQG.exe PID 2428 wrote to memory of 5484 2428 20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe IhQCaQG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20240520b67ee9c9e52b20b357a7b8a046b258c0cobaltstrikecobaltstrike_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\qILCaho.exeC:\Windows\System\qILCaho.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\scTdRtD.exeC:\Windows\System\scTdRtD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\krgTWYu.exeC:\Windows\System\krgTWYu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qQGeBjG.exeC:\Windows\System\qQGeBjG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LUfELsc.exeC:\Windows\System\LUfELsc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lalywRf.exeC:\Windows\System\lalywRf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gKedhtO.exeC:\Windows\System\gKedhtO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kUqBqJu.exeC:\Windows\System\kUqBqJu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\irpLgYs.exeC:\Windows\System\irpLgYs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vRFFgVY.exeC:\Windows\System\vRFFgVY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bSihvGs.exeC:\Windows\System\bSihvGs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rvkWERW.exeC:\Windows\System\rvkWERW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sJuZMaj.exeC:\Windows\System\sJuZMaj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\scLkNNV.exeC:\Windows\System\scLkNNV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hqXDHvU.exeC:\Windows\System\hqXDHvU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\evRvBCU.exeC:\Windows\System\evRvBCU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tRLSMEC.exeC:\Windows\System\tRLSMEC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HoJGvad.exeC:\Windows\System\HoJGvad.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DKRbWzk.exeC:\Windows\System\DKRbWzk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IjKwkCG.exeC:\Windows\System\IjKwkCG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IhQCaQG.exeC:\Windows\System\IhQCaQG.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\DKRbWzk.exeFilesize
5.2MB
MD58ba50bae11a9375ce9d75c3d334be2c0
SHA17194b50ed39d6e4c66581f7c5464f461822b0b9b
SHA256b40c10899f3bb853283348fd5f8bfd571e63ddb33df69fbe5dba6de830b742bd
SHA512ba384c6e75141fa45d30706aff8fe85291eec67bed3871c9b52ff14e4df2591d813a7bc1642d8cc39b1bb13610bea7fbefa90ba5f0785689aca7fe17d3763951
-
C:\Windows\System\HoJGvad.exeFilesize
5.2MB
MD5de94c7b7fd473b8d548b6c0e8dfef77b
SHA19089f2b9d4ff83b99893b66ec8bc1f5527b2f505
SHA256dc0022667425d3b0cb1e4271489bcded1e428b7bb244f74333ef9075cc08f2ce
SHA512af694ab15b9dc51b055003b2e0ec2a02511b8089e4d598e137ae99751255217d53d9881875cdf42614b9d5432ff333bccd34c8d1414b0425e956c86d29aa9345
-
C:\Windows\System\IhQCaQG.exeFilesize
5.2MB
MD585d535038f5ad8ac7f63d5eaef8c8eed
SHA1e7601beb7d58bbaada8089cda4c1319de1687e07
SHA25607137d8bf2f1f3a8f9e7a049d2f5b5b72ea71deea77d84edc6c48e0e9d9cbd73
SHA512081ae9a02a50cbccbbadf17bacb29ec106c52698423c6a4b0b5d0271b2dcbe2359eaa4de6cb3453291b579676b54831ca1e9742b35ec20906d060a4a2baae918
-
C:\Windows\System\IjKwkCG.exeFilesize
5.2MB
MD555baa80b5ad174592098351247fb1cb7
SHA1c330777e5aa0e024c8c0bb6edb98f96c73d72761
SHA25607b6da6fa1e2b9a48ab9496decf2772ea587775dedba8809eed7bd4c2e635a30
SHA5124d5ca9de21c8ff50d1c59aeb451b84c8513e3ae86c041bfbbe126d2cb70d564bd458a47dd16da3649d36b3f41e48e28b2f6f9d85b715535654f054aca6af8541
-
C:\Windows\System\LUfELsc.exeFilesize
5.2MB
MD572a03f574c706a92fc748b1bab2b9d99
SHA1062d3eeeb8d90e40bdf137c330ac04b26c7918d3
SHA25698e52f33c15ed99f4f611d0bb7d7db41f52a4085c0434f29e01b1f47e02396f6
SHA512e9c0612ee17ce9d53525c0fb157d9dd575870dc64a56a86284af06194863a5a11c94b19102967b148da9ddca65312d8447dbb0701716f92cb6b652cfa360dd13
-
C:\Windows\System\bSihvGs.exeFilesize
5.2MB
MD547b3693d304a4f6ea414eb06ff711405
SHA19e32364d3cc2f3b22721a6a7a6eab67de5f378da
SHA25609068bc9eda89d91cda4db3a0885424b80053ee36f4b5811acbd0bf931bbb73b
SHA512dc42e12578a0ab26cd1e5165c7024feaf4daf37d581e187958e7209aa459c936e2be632a990f6c6babd1433702656390eca0ce0080582b2056aa72f6712ae118
-
C:\Windows\System\evRvBCU.exeFilesize
5.2MB
MD57879e38601e90c44a4f5f057f9007683
SHA1eabc0f62e195fdb8a95d5229b1cccb9b51af4c0e
SHA2565418eb9da4feca7a34978d5c82367e31f1fa8a95c9983d99ef47e05598b16525
SHA51230e2cbff11890f504af7a84e232182374b4f6f430a2060ef726268530ec661ebd167cd24be3496ee477242bb020585d64596d6dc1a89d841f2f847c2080e6ef3
-
C:\Windows\System\gKedhtO.exeFilesize
5.2MB
MD58dc9b370b61e8033ed12d42129b5b119
SHA1eac579392b685b98c7557e2a9a8e8fef86208381
SHA25647888dfd83f189298076bb571af08e4e7e6623a0fe74dff812be70d2b7313173
SHA512da2b61460481dd032b853c0a047d6deaaceb5263963b80e288476df11da7e91f335c73c860041f0c418ed4750f086adf9c1f9f3baaadfcb37c6c23fa3de58272
-
C:\Windows\System\hqXDHvU.exeFilesize
5.2MB
MD5ed24ec2feba3e32fa41772902313787e
SHA13ee37394ba4976867b892894a1ec54912e5e3753
SHA2568d896538fa621f507b5dbe6d2e2852d3f8d1dc9b9f52bdfb671aa9a4caca9b80
SHA5129b94542e255a9815b28eca871071d7662960ddfe756bd2581058e701c8eeba08d15f6938d854aac972b997de0e62cd15d89f8ca654991d10417b4fcd9836ce7d
-
C:\Windows\System\irpLgYs.exeFilesize
5.2MB
MD52bec6a01ccccbfb0407bb8ae7125387b
SHA1548a0f4a1ef10cfcc06f239730235c3f2440bc4e
SHA256f4ac6618890ad48bacfa12a791399e15d23513783b8fa1c15c40ecae11e12012
SHA51283f5082e87f1eceeb0afe42101399bf5a7fff7f47d034b576f0391309c4fbfbcc1d97d66a7540eb24e42c79011c3bfc632a9a0f86535b00f9a78974c0c98487f
-
C:\Windows\System\kUqBqJu.exeFilesize
5.2MB
MD54d5e41011df1c6ca8aa190000d2fc9f6
SHA14d7e4be21059e8ef10a225230387a2afff777074
SHA256cf2a7f7a74881edddf8d4d5564a8cc5a99bd0c0fe40d7a248c82e7a98a6258f6
SHA51291acd33618ea02a8e5bae8f4d49c6fda154e22af21a860ef6111c9db83f086f1548bfafe62a9c93a8a4a3a4a753689382502cbc0de78f3a26f4c5e4879342b08
-
C:\Windows\System\krgTWYu.exeFilesize
5.2MB
MD5cdecd71bc32fd43df63fbec4d26d3c19
SHA1605457874b7234ec8ab7aa65b2b6ed4e8c17d643
SHA25661e38a26c5661b84b3daf71c45a2dd4203e818759055740c7a78ba836b569ea8
SHA512602eb8a7711d15084c860d701d1e30bef1633642b5283eb02ee6567ef24628f726ed0a69187408ac0024a88862dc47d29506cb3cffd0a743c3b90c7c9aea1e3d
-
C:\Windows\System\lalywRf.exeFilesize
5.2MB
MD574887ce7d58aa3c687ffcb6c00467b88
SHA107eb04dc96bb810682efc865c3caf06a9e78dd61
SHA256501e21e02671aee37e7f548d2fbbf1a7094836d0038796dd308b6efbd68b87b6
SHA512732f8ec089e35df7c8a4ec189b8c04d6bd8c1c0bd04fbe3c3cdda581ed26279d0cf0f754261c5ff63d2ea3fefd34c8ee447c18c2566464b7860ab6b49d463172
-
C:\Windows\System\qILCaho.exeFilesize
5.2MB
MD578f51b39ce87a4df237f1da79e8b9faa
SHA15213eb30f69e78c989d22c01b1eb99523092b239
SHA2566a5261b301b15851536d5d2d1d80fce2aec99793b54a6c281579279a6b3f1bc0
SHA512e16a0635b406d99df94c955468fab98d6dc3590373d2176aec654faad88f324a073a56f8c466ce2c9058f0f906ccbbf1213f820b0977bed44f495c8e78b55712
-
C:\Windows\System\qQGeBjG.exeFilesize
5.2MB
MD56afb3f5ffd95e888465f74dc3d7ad6f2
SHA147eaedf57bb2a36eac4b260a77687d134a625f6f
SHA256b8833d8d5bd18809eaeda27b525a056f2c918f6ec3fa72b8ac26a8797a83dbd2
SHA512c1124449a6a8d487057b5826dc031f3ec95351117279318a230e3822d386da2e6fb3b8a0fb6a1a66900cf82b2856ac177c92344111a144ed4424a1b0dac1a784
-
C:\Windows\System\rvkWERW.exeFilesize
5.2MB
MD5d521461c340e00b6a05cc72210b10202
SHA11796457ebee810923403882cd1067830c47e61e3
SHA2563f8aacba0a9117f00678d7b7a49018fbec515b882f724e0d489fd7331c14692e
SHA5120a084ad3ecb3e129c0f177f10cb206243ade89523b20344f3a951003b6c37e798312961384dc27cab6ad6b6e5606193098763076f8c04c3d6d7468a925b888fd
-
C:\Windows\System\sJuZMaj.exeFilesize
5.2MB
MD55f18e71e001e79c77caf2bb9e7ed314c
SHA13eb3e6c96435fbdca78a57308096af0ce22de35d
SHA256ba5d431c57c47d7c9fa9f0c5f628b86a2c74a666ad701692c45746fc36382b0b
SHA5126df22027d8a45d1da5f6a7cb53ffabc3913986e0c44ddc024602e6a626da1b7c2d240a663462f8f9bf3d5ef0d32f6058fd8ad6448a17fd14d58368458fa2210c
-
C:\Windows\System\scLkNNV.exeFilesize
5.2MB
MD53a01d8814c9f7cab7716a664ea4d121e
SHA1e01b903c509606081ee76f52cbd331dcfdeab005
SHA2568fc446df1b936fb429dee9f41d42e074d5f050a938e6e6a4b7484fa7882fd395
SHA51245c21b495aad4ddda1d3e0504a0a29dc35c29c402cc173f9a6fb9ab4fbbd52d1b1add481db48d68a85b94ac902763743dff10c1180b287c218d15a66e0a378fc
-
C:\Windows\System\scTdRtD.exeFilesize
5.2MB
MD55825f4d605a2e8889b6afd7224fe3447
SHA110a7460d38b0527bdb8f321f17990859659f982a
SHA2568f809207857c9d070bbb031f0dddc59e162bc506fe1785aa71cf8d4c51831016
SHA5121729153490661dae60296b4ef65ec30a16feefae33f0ca09a3fc9d8f9367d1bfeeae768545e69391a07efadcf5d771f65c3f868d500ab2308063b818ea13924f
-
C:\Windows\System\tRLSMEC.exeFilesize
5.2MB
MD54f1f6d4b1592e260a6454d6314a0a732
SHA1e46d2e1f52bfdaaaaf99d54bbc0037ce374e1348
SHA25697e1d0f7fda30a330a9962c244233841b3d628f472fe25f33224ec00c8a97c38
SHA5120d4ea9c746085e9676b261df67eaa89100ff37e83c174df150a6601d9113cc485c53659f4f5526cd9ed3cf47242ad04e6197893d646a531781c600f2b0ec94f0
-
C:\Windows\System\vRFFgVY.exeFilesize
5.2MB
MD5a4d1a98c2ca75ef104daebe84a20a2bb
SHA1a10edab6898fa84ba1356e4dff2164f1d0cdc318
SHA256d25014299ebd9cb1c4fea3cb43b3e73e9aec97328ead235665377bc06013fa08
SHA5122e01fb2f41b2b9ee9ee2789dc0fe28de90a0a86edd10c30fbc9e44cb8d6e9406aa6e812ecac86d8e0c07635457ce4ea15ba8baeb6fb108c4405a5967d7e6eec6
-
memory/972-196-0x00007FF6155D0000-0x00007FF615921000-memory.dmpFilesize
3.3MB
-
memory/972-31-0x00007FF6155D0000-0x00007FF615921000-memory.dmpFilesize
3.3MB
-
memory/972-119-0x00007FF6155D0000-0x00007FF615921000-memory.dmpFilesize
3.3MB
-
memory/1656-220-0x00007FF724950000-0x00007FF724CA1000-memory.dmpFilesize
3.3MB
-
memory/1656-127-0x00007FF724950000-0x00007FF724CA1000-memory.dmpFilesize
3.3MB
-
memory/1716-129-0x00007FF70D510000-0x00007FF70D861000-memory.dmpFilesize
3.3MB
-
memory/1716-224-0x00007FF70D510000-0x00007FF70D861000-memory.dmpFilesize
3.3MB
-
memory/1976-20-0x00007FF608000000-0x00007FF608351000-memory.dmpFilesize
3.3MB
-
memory/1976-188-0x00007FF608000000-0x00007FF608351000-memory.dmpFilesize
3.3MB
-
memory/1976-117-0x00007FF608000000-0x00007FF608351000-memory.dmpFilesize
3.3MB
-
memory/2428-154-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmpFilesize
3.3MB
-
memory/2428-0-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmpFilesize
3.3MB
-
memory/2428-159-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmpFilesize
3.3MB
-
memory/2428-1-0x000002564BE60000-0x000002564BE70000-memory.dmpFilesize
64KB
-
memory/2428-136-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmpFilesize
3.3MB
-
memory/2428-114-0x00007FF6AC520000-0x00007FF6AC871000-memory.dmpFilesize
3.3MB
-
memory/2484-8-0x00007FF674330000-0x00007FF674681000-memory.dmpFilesize
3.3MB
-
memory/2484-184-0x00007FF674330000-0x00007FF674681000-memory.dmpFilesize
3.3MB
-
memory/2484-115-0x00007FF674330000-0x00007FF674681000-memory.dmpFilesize
3.3MB
-
memory/3376-124-0x00007FF7FF470000-0x00007FF7FF7C1000-memory.dmpFilesize
3.3MB
-
memory/3376-206-0x00007FF7FF470000-0x00007FF7FF7C1000-memory.dmpFilesize
3.3MB
-
memory/4040-194-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmpFilesize
3.3MB
-
memory/4040-118-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmpFilesize
3.3MB
-
memory/4040-26-0x00007FF7C3030000-0x00007FF7C3381000-memory.dmpFilesize
3.3MB
-
memory/4596-14-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmpFilesize
3.3MB
-
memory/4596-186-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmpFilesize
3.3MB
-
memory/4596-116-0x00007FF7C9390000-0x00007FF7C96E1000-memory.dmpFilesize
3.3MB
-
memory/4640-130-0x00007FF747550000-0x00007FF7478A1000-memory.dmpFilesize
3.3MB
-
memory/4640-226-0x00007FF747550000-0x00007FF7478A1000-memory.dmpFilesize
3.3MB
-
memory/4872-222-0x00007FF66F350000-0x00007FF66F6A1000-memory.dmpFilesize
3.3MB
-
memory/4872-128-0x00007FF66F350000-0x00007FF66F6A1000-memory.dmpFilesize
3.3MB
-
memory/4980-134-0x00007FF66CDB0000-0x00007FF66D101000-memory.dmpFilesize
3.3MB
-
memory/4980-234-0x00007FF66CDB0000-0x00007FF66D101000-memory.dmpFilesize
3.3MB
-
memory/5016-120-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmpFilesize
3.3MB
-
memory/5016-37-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmpFilesize
3.3MB
-
memory/5016-198-0x00007FF7E2C80000-0x00007FF7E2FD1000-memory.dmpFilesize
3.3MB
-
memory/5152-121-0x00007FF698030000-0x00007FF698381000-memory.dmpFilesize
3.3MB
-
memory/5152-44-0x00007FF698030000-0x00007FF698381000-memory.dmpFilesize
3.3MB
-
memory/5152-200-0x00007FF698030000-0x00007FF698381000-memory.dmpFilesize
3.3MB
-
memory/5356-208-0x00007FF71EB00000-0x00007FF71EE51000-memory.dmpFilesize
3.3MB
-
memory/5356-125-0x00007FF71EB00000-0x00007FF71EE51000-memory.dmpFilesize
3.3MB
-
memory/5448-122-0x00007FF6378A0000-0x00007FF637BF1000-memory.dmpFilesize
3.3MB
-
memory/5448-202-0x00007FF6378A0000-0x00007FF637BF1000-memory.dmpFilesize
3.3MB
-
memory/5484-236-0x00007FF6E3990000-0x00007FF6E3CE1000-memory.dmpFilesize
3.3MB
-
memory/5484-135-0x00007FF6E3990000-0x00007FF6E3CE1000-memory.dmpFilesize
3.3MB
-
memory/5516-210-0x00007FF763AA0000-0x00007FF763DF1000-memory.dmpFilesize
3.3MB
-
memory/5516-126-0x00007FF763AA0000-0x00007FF763DF1000-memory.dmpFilesize
3.3MB
-
memory/5628-123-0x00007FF772FA0000-0x00007FF7732F1000-memory.dmpFilesize
3.3MB
-
memory/5628-204-0x00007FF772FA0000-0x00007FF7732F1000-memory.dmpFilesize
3.3MB
-
memory/5904-228-0x00007FF693720000-0x00007FF693A71000-memory.dmpFilesize
3.3MB
-
memory/5904-131-0x00007FF693720000-0x00007FF693A71000-memory.dmpFilesize
3.3MB
-
memory/5928-132-0x00007FF6B3000000-0x00007FF6B3351000-memory.dmpFilesize
3.3MB
-
memory/5928-232-0x00007FF6B3000000-0x00007FF6B3351000-memory.dmpFilesize
3.3MB
-
memory/5976-231-0x00007FF686170000-0x00007FF6864C1000-memory.dmpFilesize
3.3MB
-
memory/5976-133-0x00007FF686170000-0x00007FF6864C1000-memory.dmpFilesize
3.3MB