Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 08:16
Behavioral task
behavioral1
Sample
20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe
-
Size
5.2MB
-
MD5
ece0c0ed1f879feceb90e1e7e9499bc5
-
SHA1
6516a5c1d0b4d00465532c8d84f47c917eef87e0
-
SHA256
13dfd72e64b69083fb2ffe8aa1bdd77e86d42a64571abcd6ca15341b6ba78292
-
SHA512
457629ac9bc2336e1cafa6018e6158861e8849241d0e8f8d71ec5435114797790d0122b63d22b71299fbe6026bd62791d1fd49e3600ffb8f0b89c685383034c9
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lx:RWWBibf56utgpPFotBER/mQ32lUd
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\QXdEESG.exe cobalt_reflective_dll C:\Windows\System\rQcqqhm.exe cobalt_reflective_dll C:\Windows\System\sZqWUgX.exe cobalt_reflective_dll C:\Windows\System\jEngwgg.exe cobalt_reflective_dll C:\Windows\System\cMDWeWP.exe cobalt_reflective_dll C:\Windows\System\BjNsHpb.exe cobalt_reflective_dll C:\Windows\System\mPTfjzg.exe cobalt_reflective_dll C:\Windows\System\KygwmDp.exe cobalt_reflective_dll C:\Windows\System\qXSnoPX.exe cobalt_reflective_dll C:\Windows\System\EuknsZg.exe cobalt_reflective_dll C:\Windows\System\cYNegZT.exe cobalt_reflective_dll C:\Windows\System\ceagEqj.exe cobalt_reflective_dll C:\Windows\System\EFAJPtx.exe cobalt_reflective_dll C:\Windows\System\mKvDYec.exe cobalt_reflective_dll C:\Windows\System\lbLEnFN.exe cobalt_reflective_dll C:\Windows\System\KWuPavf.exe cobalt_reflective_dll C:\Windows\System\iqyUAtL.exe cobalt_reflective_dll C:\Windows\System\ywutPwv.exe cobalt_reflective_dll C:\Windows\System\MTthgSc.exe cobalt_reflective_dll C:\Windows\System\aHAXqZL.exe cobalt_reflective_dll C:\Windows\System\JHMClSS.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 46 IoCs
Processes:
resource yara_rule behavioral2/memory/4504-98-0x00007FF757E20000-0x00007FF758171000-memory.dmp xmrig behavioral2/memory/2084-123-0x00007FF62D450000-0x00007FF62D7A1000-memory.dmp xmrig behavioral2/memory/696-124-0x00007FF7F6C40000-0x00007FF7F6F91000-memory.dmp xmrig behavioral2/memory/5012-122-0x00007FF7AABB0000-0x00007FF7AAF01000-memory.dmp xmrig behavioral2/memory/348-121-0x00007FF797180000-0x00007FF7974D1000-memory.dmp xmrig behavioral2/memory/2400-106-0x00007FF77B240000-0x00007FF77B591000-memory.dmp xmrig behavioral2/memory/1344-83-0x00007FF765310000-0x00007FF765661000-memory.dmp xmrig behavioral2/memory/828-73-0x00007FF721B50000-0x00007FF721EA1000-memory.dmp xmrig behavioral2/memory/2472-131-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmp xmrig behavioral2/memory/748-135-0x00007FF6B2620000-0x00007FF6B2971000-memory.dmp xmrig behavioral2/memory/4724-140-0x00007FF728250000-0x00007FF7285A1000-memory.dmp xmrig behavioral2/memory/828-139-0x00007FF721B50000-0x00007FF721EA1000-memory.dmp xmrig behavioral2/memory/4652-138-0x00007FF782BA0000-0x00007FF782EF1000-memory.dmp xmrig behavioral2/memory/5112-136-0x00007FF6D0B70000-0x00007FF6D0EC1000-memory.dmp xmrig behavioral2/memory/3640-134-0x00007FF7856B0000-0x00007FF785A01000-memory.dmp xmrig behavioral2/memory/1212-133-0x00007FF76CA70000-0x00007FF76CDC1000-memory.dmp xmrig behavioral2/memory/4376-132-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmp xmrig behavioral2/memory/2832-130-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmp xmrig behavioral2/memory/3912-137-0x00007FF60A3A0000-0x00007FF60A6F1000-memory.dmp xmrig behavioral2/memory/348-129-0x00007FF797180000-0x00007FF7974D1000-memory.dmp xmrig behavioral2/memory/996-143-0x00007FF629D70000-0x00007FF62A0C1000-memory.dmp xmrig behavioral2/memory/3788-150-0x00007FF6C6C60000-0x00007FF6C6FB1000-memory.dmp xmrig behavioral2/memory/4904-149-0x00007FF6D48F0000-0x00007FF6D4C41000-memory.dmp xmrig behavioral2/memory/4908-148-0x00007FF726BC0000-0x00007FF726F11000-memory.dmp xmrig behavioral2/memory/348-151-0x00007FF797180000-0x00007FF7974D1000-memory.dmp xmrig behavioral2/memory/2832-206-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmp xmrig behavioral2/memory/2472-208-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmp xmrig behavioral2/memory/4376-210-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmp xmrig behavioral2/memory/3640-212-0x00007FF7856B0000-0x00007FF785A01000-memory.dmp xmrig behavioral2/memory/1212-214-0x00007FF76CA70000-0x00007FF76CDC1000-memory.dmp xmrig behavioral2/memory/748-216-0x00007FF6B2620000-0x00007FF6B2971000-memory.dmp xmrig behavioral2/memory/5112-218-0x00007FF6D0B70000-0x00007FF6D0EC1000-memory.dmp xmrig behavioral2/memory/3912-220-0x00007FF60A3A0000-0x00007FF60A6F1000-memory.dmp xmrig behavioral2/memory/828-223-0x00007FF721B50000-0x00007FF721EA1000-memory.dmp xmrig behavioral2/memory/4724-224-0x00007FF728250000-0x00007FF7285A1000-memory.dmp xmrig behavioral2/memory/4504-228-0x00007FF757E20000-0x00007FF758171000-memory.dmp xmrig behavioral2/memory/1344-230-0x00007FF765310000-0x00007FF765661000-memory.dmp xmrig behavioral2/memory/4652-229-0x00007FF782BA0000-0x00007FF782EF1000-memory.dmp xmrig behavioral2/memory/2400-234-0x00007FF77B240000-0x00007FF77B591000-memory.dmp xmrig behavioral2/memory/996-233-0x00007FF629D70000-0x00007FF62A0C1000-memory.dmp xmrig behavioral2/memory/696-236-0x00007FF7F6C40000-0x00007FF7F6F91000-memory.dmp xmrig behavioral2/memory/2084-240-0x00007FF62D450000-0x00007FF62D7A1000-memory.dmp xmrig behavioral2/memory/5012-242-0x00007FF7AABB0000-0x00007FF7AAF01000-memory.dmp xmrig behavioral2/memory/4908-239-0x00007FF726BC0000-0x00007FF726F11000-memory.dmp xmrig behavioral2/memory/3788-245-0x00007FF6C6C60000-0x00007FF6C6FB1000-memory.dmp xmrig behavioral2/memory/4904-246-0x00007FF6D48F0000-0x00007FF6D4C41000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
JHMClSS.exeaHAXqZL.exeQXdEESG.exerQcqqhm.exesZqWUgX.exejEngwgg.exeywutPwv.exeiqyUAtL.exeMTthgSc.execMDWeWP.exemPTfjzg.exeBjNsHpb.exeKWuPavf.exeKygwmDp.exeqXSnoPX.execeagEqj.exeEuknsZg.exelbLEnFN.execYNegZT.exemKvDYec.exeEFAJPtx.exepid process 2832 JHMClSS.exe 2472 aHAXqZL.exe 4376 QXdEESG.exe 3640 rQcqqhm.exe 1212 sZqWUgX.exe 748 jEngwgg.exe 5112 ywutPwv.exe 3912 iqyUAtL.exe 4652 MTthgSc.exe 828 cMDWeWP.exe 4724 mPTfjzg.exe 1344 BjNsHpb.exe 4504 KWuPavf.exe 996 KygwmDp.exe 2400 qXSnoPX.exe 5012 ceagEqj.exe 2084 EuknsZg.exe 4908 lbLEnFN.exe 696 cYNegZT.exe 4904 mKvDYec.exe 3788 EFAJPtx.exe -
Processes:
resource yara_rule behavioral2/memory/348-0-0x00007FF797180000-0x00007FF7974D1000-memory.dmp upx behavioral2/memory/2832-8-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmp upx C:\Windows\System\QXdEESG.exe upx C:\Windows\System\rQcqqhm.exe upx C:\Windows\System\sZqWUgX.exe upx behavioral2/memory/1212-32-0x00007FF76CA70000-0x00007FF76CDC1000-memory.dmp upx C:\Windows\System\jEngwgg.exe upx C:\Windows\System\cMDWeWP.exe upx C:\Windows\System\BjNsHpb.exe upx C:\Windows\System\mPTfjzg.exe upx C:\Windows\System\KygwmDp.exe upx C:\Windows\System\qXSnoPX.exe upx C:\Windows\System\EuknsZg.exe upx behavioral2/memory/4504-98-0x00007FF757E20000-0x00007FF758171000-memory.dmp upx C:\Windows\System\cYNegZT.exe upx C:\Windows\System\ceagEqj.exe upx behavioral2/memory/2084-123-0x00007FF62D450000-0x00007FF62D7A1000-memory.dmp upx C:\Windows\System\EFAJPtx.exe upx C:\Windows\System\mKvDYec.exe upx behavioral2/memory/696-124-0x00007FF7F6C40000-0x00007FF7F6F91000-memory.dmp upx behavioral2/memory/5012-122-0x00007FF7AABB0000-0x00007FF7AAF01000-memory.dmp upx behavioral2/memory/348-121-0x00007FF797180000-0x00007FF7974D1000-memory.dmp upx behavioral2/memory/3788-120-0x00007FF6C6C60000-0x00007FF6C6FB1000-memory.dmp upx behavioral2/memory/4904-117-0x00007FF6D48F0000-0x00007FF6D4C41000-memory.dmp upx C:\Windows\System\lbLEnFN.exe upx behavioral2/memory/4908-110-0x00007FF726BC0000-0x00007FF726F11000-memory.dmp upx behavioral2/memory/2400-106-0x00007FF77B240000-0x00007FF77B591000-memory.dmp upx C:\Windows\System\KWuPavf.exe upx behavioral2/memory/1344-83-0x00007FF765310000-0x00007FF765661000-memory.dmp upx behavioral2/memory/996-80-0x00007FF629D70000-0x00007FF62A0C1000-memory.dmp upx behavioral2/memory/828-73-0x00007FF721B50000-0x00007FF721EA1000-memory.dmp upx C:\Windows\System\iqyUAtL.exe upx behavioral2/memory/3912-63-0x00007FF60A3A0000-0x00007FF60A6F1000-memory.dmp upx behavioral2/memory/4724-60-0x00007FF728250000-0x00007FF7285A1000-memory.dmp upx C:\Windows\System\ywutPwv.exe upx C:\Windows\System\MTthgSc.exe upx behavioral2/memory/4652-53-0x00007FF782BA0000-0x00007FF782EF1000-memory.dmp upx behavioral2/memory/5112-50-0x00007FF6D0B70000-0x00007FF6D0EC1000-memory.dmp upx behavioral2/memory/748-38-0x00007FF6B2620000-0x00007FF6B2971000-memory.dmp upx behavioral2/memory/3640-28-0x00007FF7856B0000-0x00007FF785A01000-memory.dmp upx behavioral2/memory/4376-24-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmp upx C:\Windows\System\aHAXqZL.exe upx behavioral2/memory/2472-12-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmp upx C:\Windows\System\JHMClSS.exe upx behavioral2/memory/2472-131-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmp upx behavioral2/memory/748-135-0x00007FF6B2620000-0x00007FF6B2971000-memory.dmp upx behavioral2/memory/4724-140-0x00007FF728250000-0x00007FF7285A1000-memory.dmp upx behavioral2/memory/828-139-0x00007FF721B50000-0x00007FF721EA1000-memory.dmp upx behavioral2/memory/4652-138-0x00007FF782BA0000-0x00007FF782EF1000-memory.dmp upx behavioral2/memory/5112-136-0x00007FF6D0B70000-0x00007FF6D0EC1000-memory.dmp upx behavioral2/memory/3640-134-0x00007FF7856B0000-0x00007FF785A01000-memory.dmp upx behavioral2/memory/1212-133-0x00007FF76CA70000-0x00007FF76CDC1000-memory.dmp upx behavioral2/memory/4376-132-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmp upx behavioral2/memory/2832-130-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmp upx behavioral2/memory/3912-137-0x00007FF60A3A0000-0x00007FF60A6F1000-memory.dmp upx behavioral2/memory/348-129-0x00007FF797180000-0x00007FF7974D1000-memory.dmp upx behavioral2/memory/996-143-0x00007FF629D70000-0x00007FF62A0C1000-memory.dmp upx behavioral2/memory/3788-150-0x00007FF6C6C60000-0x00007FF6C6FB1000-memory.dmp upx behavioral2/memory/4904-149-0x00007FF6D48F0000-0x00007FF6D4C41000-memory.dmp upx behavioral2/memory/4908-148-0x00007FF726BC0000-0x00007FF726F11000-memory.dmp upx behavioral2/memory/348-151-0x00007FF797180000-0x00007FF7974D1000-memory.dmp upx behavioral2/memory/2832-206-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmp upx behavioral2/memory/2472-208-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmp upx behavioral2/memory/4376-210-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\rQcqqhm.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\jEngwgg.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\ywutPwv.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\KWuPavf.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\KygwmDp.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\ceagEqj.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\JHMClSS.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\aHAXqZL.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\sZqWUgX.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\mPTfjzg.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\cYNegZT.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\QXdEESG.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\iqyUAtL.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\MTthgSc.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\qXSnoPX.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\lbLEnFN.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\EFAJPtx.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\cMDWeWP.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\BjNsHpb.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\EuknsZg.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\mKvDYec.exe 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process target process PID 348 wrote to memory of 2832 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe JHMClSS.exe PID 348 wrote to memory of 2832 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe JHMClSS.exe PID 348 wrote to memory of 2472 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe aHAXqZL.exe PID 348 wrote to memory of 2472 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe aHAXqZL.exe PID 348 wrote to memory of 4376 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe QXdEESG.exe PID 348 wrote to memory of 4376 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe QXdEESG.exe PID 348 wrote to memory of 1212 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe sZqWUgX.exe PID 348 wrote to memory of 1212 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe sZqWUgX.exe PID 348 wrote to memory of 3640 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe rQcqqhm.exe PID 348 wrote to memory of 3640 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe rQcqqhm.exe PID 348 wrote to memory of 748 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe jEngwgg.exe PID 348 wrote to memory of 748 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe jEngwgg.exe PID 348 wrote to memory of 5112 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe ywutPwv.exe PID 348 wrote to memory of 5112 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe ywutPwv.exe PID 348 wrote to memory of 3912 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe iqyUAtL.exe PID 348 wrote to memory of 3912 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe iqyUAtL.exe PID 348 wrote to memory of 4652 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe MTthgSc.exe PID 348 wrote to memory of 4652 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe MTthgSc.exe PID 348 wrote to memory of 828 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe cMDWeWP.exe PID 348 wrote to memory of 828 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe cMDWeWP.exe PID 348 wrote to memory of 4724 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe mPTfjzg.exe PID 348 wrote to memory of 4724 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe mPTfjzg.exe PID 348 wrote to memory of 1344 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe BjNsHpb.exe PID 348 wrote to memory of 1344 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe BjNsHpb.exe PID 348 wrote to memory of 4504 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe KWuPavf.exe PID 348 wrote to memory of 4504 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe KWuPavf.exe PID 348 wrote to memory of 996 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe KygwmDp.exe PID 348 wrote to memory of 996 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe KygwmDp.exe PID 348 wrote to memory of 2400 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe qXSnoPX.exe PID 348 wrote to memory of 2400 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe qXSnoPX.exe PID 348 wrote to memory of 5012 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe ceagEqj.exe PID 348 wrote to memory of 5012 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe ceagEqj.exe PID 348 wrote to memory of 2084 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe EuknsZg.exe PID 348 wrote to memory of 2084 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe EuknsZg.exe PID 348 wrote to memory of 696 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe cYNegZT.exe PID 348 wrote to memory of 696 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe cYNegZT.exe PID 348 wrote to memory of 4908 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe lbLEnFN.exe PID 348 wrote to memory of 4908 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe lbLEnFN.exe PID 348 wrote to memory of 4904 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe mKvDYec.exe PID 348 wrote to memory of 4904 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe mKvDYec.exe PID 348 wrote to memory of 3788 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe EFAJPtx.exe PID 348 wrote to memory of 3788 348 20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe EFAJPtx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20240520ece0c0ed1f879feceb90e1e7e9499bc5cobaltstrikecobaltstrike_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\JHMClSS.exeC:\Windows\System\JHMClSS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aHAXqZL.exeC:\Windows\System\aHAXqZL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QXdEESG.exeC:\Windows\System\QXdEESG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sZqWUgX.exeC:\Windows\System\sZqWUgX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rQcqqhm.exeC:\Windows\System\rQcqqhm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jEngwgg.exeC:\Windows\System\jEngwgg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ywutPwv.exeC:\Windows\System\ywutPwv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iqyUAtL.exeC:\Windows\System\iqyUAtL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MTthgSc.exeC:\Windows\System\MTthgSc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cMDWeWP.exeC:\Windows\System\cMDWeWP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mPTfjzg.exeC:\Windows\System\mPTfjzg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BjNsHpb.exeC:\Windows\System\BjNsHpb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KWuPavf.exeC:\Windows\System\KWuPavf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KygwmDp.exeC:\Windows\System\KygwmDp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qXSnoPX.exeC:\Windows\System\qXSnoPX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ceagEqj.exeC:\Windows\System\ceagEqj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EuknsZg.exeC:\Windows\System\EuknsZg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cYNegZT.exeC:\Windows\System\cYNegZT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lbLEnFN.exeC:\Windows\System\lbLEnFN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mKvDYec.exeC:\Windows\System\mKvDYec.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EFAJPtx.exeC:\Windows\System\EFAJPtx.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\BjNsHpb.exeFilesize
5.2MB
MD53056e505db69683375e9542835627928
SHA1b6b6298271e46787c048770a33eb0327aed16d63
SHA256d3e92f46423a1e9a0fd0a50b7891dc42c09ef97827de38aade803fe7a2a922e4
SHA5126fd1a687f1f8997f07a71094bf9a3b6cfda0d61ad2790d358a13d6945f4e1bf4faded99f74928a9f2a6e3587e1eea9b3dfd7f9ca6363c2b4a6a49acc06b7af71
-
C:\Windows\System\EFAJPtx.exeFilesize
5.2MB
MD55bba75a0a80465ae95ae91ed303c48e5
SHA11c2ab715aa4fa22d698ca695fa2a6aec511afaac
SHA2567aaf7017fff2d01bf322c92acb4c0ffe7982240406f5ba3646f1115c26c712f5
SHA5126921d7ae2f18569f3abe56ba98be14557a5da0c48de02ab6f4e884ae81f65e379dbca2758162b80c7db615ea76b4625c59395e18edc2046eccd69ac699fe9b4f
-
C:\Windows\System\EuknsZg.exeFilesize
5.2MB
MD55cc3989772dc5840be9432e3a9a33032
SHA1d3efea384b99ea97b434d46098768545b2495774
SHA256ef8e9fba0a10acd09fb5dfef6e6107c9d12b6259ce1b653fbd0a1012e46bf982
SHA5124de22840b44a751c0cbee9b48b1bbab5e56b2e913501708290d06f6a3ffc527bbec95b442d496a254e2e97bb97a451d285741b1a9f2c5338f99bacf30a3d5567
-
C:\Windows\System\JHMClSS.exeFilesize
5.2MB
MD5eeada34d8cfad1931a60793d0f6a632b
SHA191bd69aa8188813baa919a5cdb68c32fa2f46d28
SHA256ec6f4382a0f45dc5d1fa8af3010b39a4770028ccb8279d2d6e2f1aae340cc841
SHA51269ceede40923054a5ea582eac949358e119f62a0d3a8de5ec8122304fdc6b10adf0621182816a646f5e651f70428cc4e001ff0378e8bb46e4e68ac09405c1c79
-
C:\Windows\System\KWuPavf.exeFilesize
5.2MB
MD5ebcfd84f7c3e58d996a802bf397d9da5
SHA1131f48fc659f88cb09ba495fc7bbcc263d65ec0b
SHA256e9b9c8b2f99a6f7436ee66790df2b170a13f53a23c4521c1e5e896dce32ff76d
SHA512b2ad33130eae286b1f2b0ea3ec9361cb6165e132511e92f62ce98d09dcac16bedb843c0a43dd4c67fd1e856c9386a79ba80939b468f3701ab09a7da28ccfb92b
-
C:\Windows\System\KygwmDp.exeFilesize
5.2MB
MD5e22af92aeb07c83fbf52448d5ed160e2
SHA17479f01e150a502247969e3b77297e225bc0cc92
SHA25626de7715baac60317d35fc639c28502d4329da6cd0868d3e3c43d1d8a079ddc4
SHA5129bcccb31a14cd7e4c0de62c6dcce454d86784c67e91a0eba7bd8e60441b211759be27afb7bd416e68d44d5ddca66e235c0a0a4df45fc0227219295c57c1444bf
-
C:\Windows\System\MTthgSc.exeFilesize
5.2MB
MD5f1537ee26baabf356e8676832a64cd8d
SHA10c172a0e9ce9fa453d08da3a4499e46e5d74b08b
SHA256b6bc9f4f43636a1279ccf38d1f2882aead1ea6b4e5ac46e3eed3e96cf02c61cc
SHA512c3adfe312d1a8e35b54a934a2d11ff73517fb860376adc08d5134f039e0842404c1a3944dbbf6366be3783c19e6846790763fc8650a76c62d7a7a7e92b5c517a
-
C:\Windows\System\QXdEESG.exeFilesize
5.2MB
MD523e2f72d19d9b50c764229048c7667e6
SHA1e8f3f7e98ce120cb0a478f923c26f36cfee552b9
SHA2565cf1eecaedfec663e9989876de39150cadb4bf9fd865adbeb4cc2fb287930d31
SHA512b35909ae482509cf757e531af60c3e606af65f1477402118fe8147fbc6cab3672375b1692a9e837d7d79ff42528025373a4912ce1e05cef71e55d46c7720c678
-
C:\Windows\System\aHAXqZL.exeFilesize
5.2MB
MD56a1c30657427115875c7f957de1789d3
SHA191582354d1a347ecd38d829e4a3e36ff314bcce7
SHA256530259e603e3877c99cbcd445d8c386aada42b2ff7432662cbb7c9403b3e9099
SHA51202bfa7a0f8316ffc0cfd337e676fe5ca85c9a5bfb15f10f9614942ca1777ac70a2a9277703ba895a8f4fdae5e5403dedd66c58678f135a8550f10a0726547fd3
-
C:\Windows\System\cMDWeWP.exeFilesize
5.2MB
MD5315e2a13f5baae92f5e1369e03502b03
SHA1c041ad4db27dfc56cad5131de1f65b68cdc22fe5
SHA2568e1844352348e7efffb8497e8c1906aad1a0ab5ae9cfa6b0f149a2111795f159
SHA512de42c020b2173ddde7398d012868a6df64558169f9ee5b8c230b14ff743dc5ca09f84863a17df788065baf484360927cffe35c944be85c2dd03be77e13cf5844
-
C:\Windows\System\cYNegZT.exeFilesize
5.2MB
MD57a851050e9748940cbcd704ee8d4c550
SHA1fa25cce5fbda94d5c46edec9f674b442d11f3250
SHA256fbd3e291fe47247a3b1e6274f17ce8cd58faef81a899e84ae7ca80ea06a1df90
SHA51261adde15422dbb14bb698f9355565501d79a10c57c498e1f98548f5b5319118dbb6005d39cb8852b3821c07389edc762a471e783f205a7c627d905c04ead3ba1
-
C:\Windows\System\ceagEqj.exeFilesize
5.2MB
MD5b872661d8e2caf4d0383c5c92fbf7d93
SHA1d3c846429c15af29319b25239b1eac1a5277934c
SHA256a4c85344771c83de9ceddb908e34742700279f33bd74cc244f82e60ba6925a2c
SHA512dc769402ec3c08628019581797fa01627e27933f17de80d0fff6c8052dcc9a92ad9c7c853c4c34c34702bd7d90dad726b780d85dd51dc255814b08028677b435
-
C:\Windows\System\iqyUAtL.exeFilesize
5.2MB
MD5684ac75871af9907186427888a54b8f8
SHA1338137ff00fef22e26d2e9d6be466e597a231e1f
SHA2561fc7a96a36f40e5cefacd6d05978345a4b983afe5e340b2b260e72d8e58bd504
SHA512f6419d9bf043c1bc5b3244cb6e87cae2dfc16e504481231069f42b508cc9f8af7e045b9cae0accb8c82a94433e092ff8234a5f0fdfc469da7be444ec88e30280
-
C:\Windows\System\jEngwgg.exeFilesize
5.2MB
MD5b21b8a45832e3cf0fba1e41413d75252
SHA1813a4c5fe98a4dcf3455cb462baa07939ecffebd
SHA256c12f423fa834f7794abb2fc73aba7a179a3af3a3c4f30cf6d9b99acf582a06b0
SHA51277dc142782bd65fefbc7b51359d9fc8e2403178ce07121a72d4b67b678451afbbee55524cfd89d19b3820d3822d23a8993ec57fa5b4d25096868bed0de86dc92
-
C:\Windows\System\lbLEnFN.exeFilesize
5.2MB
MD5c8aafc7f6d8d7709cef72b7b1e77b65e
SHA13536f9902b33482f9edfe1b2dce4a6d4cc9a0ed4
SHA25600af3d98e2bc142b7029a19387ed664fa46b247b3b67050ea423a77dc21334d7
SHA512df9482287fad59a009fe8e3078f2e864ecb88b0d7b33a63b4bedd28ee163aa00097b3264d776afb851337bcfc3e27dad11d4d107bd2a78fcdf18cc0e3e2b2222
-
C:\Windows\System\mKvDYec.exeFilesize
5.2MB
MD5e9ea0124766aa027c4943902a8ffdc92
SHA1b8aaac0fe783302f3d87d14e6491ca6618e4790c
SHA2569bc6a5f88ddbfe7e9decd0ad6b448bf1811c1f0c63629c9b03e11d4e3cba291c
SHA512ebc3bcfdaf62bc2bb8931530cf06d85ea0b12e2f9368401d2090484f24e208753ebc53f2dd0e3c0b59b12144dcfbafc61836853df2d9a3885070e86ae8170c1f
-
C:\Windows\System\mPTfjzg.exeFilesize
5.2MB
MD561e5b01eea9ffcb7be52c16372f91e70
SHA1ce49d3a7b6bac3f2349ad7a939c89743a17a239e
SHA256f73f223c6cb1861229ece6032801e9fd9e5d3316ca91e7e4f9fc87f77cfaae50
SHA5122676ec87634f8a925362c5c6cdb56e1a1e5eb56abf4416e3521be233c09aed04286256ff82bbdd0e6484c8bf32b8a32e10c75ad62ac6980bb9bda85aa8b9db8c
-
C:\Windows\System\qXSnoPX.exeFilesize
5.2MB
MD50673f17c94dcc2ece54819cae3e68ea7
SHA1066b95de4a0567390ebca82f0b0d9b0dde98e24f
SHA2561379a4ad8a5812cd7165fc540993409f2366a2b05b3db1e10365b73f69a5b3cb
SHA512a2aaf59200e8fac1c5006c07e7b7d595942a44fb37b29933b3f9208011c6cf80fffff31211c05431ac5ef17c100e2822020c81681c281248e2024de11e44c45c
-
C:\Windows\System\rQcqqhm.exeFilesize
5.2MB
MD557f939bf8b43180552336247704822e9
SHA1bb9998d5a403e180e40bb86b663aa3bd2e06ba94
SHA256ccdec0dbd7956b2ca9681c99a20b8809812f173018483cb60158c05de80e43c5
SHA512a3fd2eea97b35fcf13ba5b4adc444d4d89d726e30e54d6b72f037c14161b1f20887d32a0e946ce63fc4eaa87e49f067d825f0a9f9bf688d72c7da51447e46a66
-
C:\Windows\System\sZqWUgX.exeFilesize
5.2MB
MD57f3cfe3e9ca781bb0c4a5db3401710ec
SHA1427c9252929931195557bbc2068f6e212acf0879
SHA2560075c99624603388b0079049c423b0273d6b3bc29bfe588e37cd31cb1447375c
SHA51269cd30b3b2ec7101e2a6ad37fe18faad87ef348ef4a40b707adc520b20789aef60b0013ea3a180440aa2583b6252810ef3d437f2dd93cbff8b426b3e4ba61538
-
C:\Windows\System\ywutPwv.exeFilesize
5.2MB
MD5a418a0a9956ac3e37f3d382fdde957d6
SHA10848fb8d35bbede0d9a9e53cb9ea26074f058f9f
SHA256e5db02929c7cecf43468e244c6fb49ce241d5d7ecb0461a653fbecafa6489397
SHA51200ae516cc333fe690ea63a57b57451718a496d21c02a57c1ec7e0d69164369ed054ee8bebb8dda7982054208f0a5cbf1e9ec0fe2ef83e563c5e1dc8cf9999f52
-
memory/348-0-0x00007FF797180000-0x00007FF7974D1000-memory.dmpFilesize
3.3MB
-
memory/348-121-0x00007FF797180000-0x00007FF7974D1000-memory.dmpFilesize
3.3MB
-
memory/348-129-0x00007FF797180000-0x00007FF7974D1000-memory.dmpFilesize
3.3MB
-
memory/348-151-0x00007FF797180000-0x00007FF7974D1000-memory.dmpFilesize
3.3MB
-
memory/348-1-0x000002C4636B0000-0x000002C4636C0000-memory.dmpFilesize
64KB
-
memory/696-236-0x00007FF7F6C40000-0x00007FF7F6F91000-memory.dmpFilesize
3.3MB
-
memory/696-124-0x00007FF7F6C40000-0x00007FF7F6F91000-memory.dmpFilesize
3.3MB
-
memory/748-38-0x00007FF6B2620000-0x00007FF6B2971000-memory.dmpFilesize
3.3MB
-
memory/748-216-0x00007FF6B2620000-0x00007FF6B2971000-memory.dmpFilesize
3.3MB
-
memory/748-135-0x00007FF6B2620000-0x00007FF6B2971000-memory.dmpFilesize
3.3MB
-
memory/828-73-0x00007FF721B50000-0x00007FF721EA1000-memory.dmpFilesize
3.3MB
-
memory/828-223-0x00007FF721B50000-0x00007FF721EA1000-memory.dmpFilesize
3.3MB
-
memory/828-139-0x00007FF721B50000-0x00007FF721EA1000-memory.dmpFilesize
3.3MB
-
memory/996-233-0x00007FF629D70000-0x00007FF62A0C1000-memory.dmpFilesize
3.3MB
-
memory/996-80-0x00007FF629D70000-0x00007FF62A0C1000-memory.dmpFilesize
3.3MB
-
memory/996-143-0x00007FF629D70000-0x00007FF62A0C1000-memory.dmpFilesize
3.3MB
-
memory/1212-133-0x00007FF76CA70000-0x00007FF76CDC1000-memory.dmpFilesize
3.3MB
-
memory/1212-32-0x00007FF76CA70000-0x00007FF76CDC1000-memory.dmpFilesize
3.3MB
-
memory/1212-214-0x00007FF76CA70000-0x00007FF76CDC1000-memory.dmpFilesize
3.3MB
-
memory/1344-83-0x00007FF765310000-0x00007FF765661000-memory.dmpFilesize
3.3MB
-
memory/1344-230-0x00007FF765310000-0x00007FF765661000-memory.dmpFilesize
3.3MB
-
memory/2084-240-0x00007FF62D450000-0x00007FF62D7A1000-memory.dmpFilesize
3.3MB
-
memory/2084-123-0x00007FF62D450000-0x00007FF62D7A1000-memory.dmpFilesize
3.3MB
-
memory/2400-234-0x00007FF77B240000-0x00007FF77B591000-memory.dmpFilesize
3.3MB
-
memory/2400-106-0x00007FF77B240000-0x00007FF77B591000-memory.dmpFilesize
3.3MB
-
memory/2472-12-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmpFilesize
3.3MB
-
memory/2472-208-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmpFilesize
3.3MB
-
memory/2472-131-0x00007FF65DE70000-0x00007FF65E1C1000-memory.dmpFilesize
3.3MB
-
memory/2832-206-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmpFilesize
3.3MB
-
memory/2832-8-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmpFilesize
3.3MB
-
memory/2832-130-0x00007FF6C1D20000-0x00007FF6C2071000-memory.dmpFilesize
3.3MB
-
memory/3640-28-0x00007FF7856B0000-0x00007FF785A01000-memory.dmpFilesize
3.3MB
-
memory/3640-134-0x00007FF7856B0000-0x00007FF785A01000-memory.dmpFilesize
3.3MB
-
memory/3640-212-0x00007FF7856B0000-0x00007FF785A01000-memory.dmpFilesize
3.3MB
-
memory/3788-245-0x00007FF6C6C60000-0x00007FF6C6FB1000-memory.dmpFilesize
3.3MB
-
memory/3788-150-0x00007FF6C6C60000-0x00007FF6C6FB1000-memory.dmpFilesize
3.3MB
-
memory/3788-120-0x00007FF6C6C60000-0x00007FF6C6FB1000-memory.dmpFilesize
3.3MB
-
memory/3912-63-0x00007FF60A3A0000-0x00007FF60A6F1000-memory.dmpFilesize
3.3MB
-
memory/3912-137-0x00007FF60A3A0000-0x00007FF60A6F1000-memory.dmpFilesize
3.3MB
-
memory/3912-220-0x00007FF60A3A0000-0x00007FF60A6F1000-memory.dmpFilesize
3.3MB
-
memory/4376-24-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmpFilesize
3.3MB
-
memory/4376-132-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmpFilesize
3.3MB
-
memory/4376-210-0x00007FF7B6CE0000-0x00007FF7B7031000-memory.dmpFilesize
3.3MB
-
memory/4504-228-0x00007FF757E20000-0x00007FF758171000-memory.dmpFilesize
3.3MB
-
memory/4504-98-0x00007FF757E20000-0x00007FF758171000-memory.dmpFilesize
3.3MB
-
memory/4652-138-0x00007FF782BA0000-0x00007FF782EF1000-memory.dmpFilesize
3.3MB
-
memory/4652-53-0x00007FF782BA0000-0x00007FF782EF1000-memory.dmpFilesize
3.3MB
-
memory/4652-229-0x00007FF782BA0000-0x00007FF782EF1000-memory.dmpFilesize
3.3MB
-
memory/4724-60-0x00007FF728250000-0x00007FF7285A1000-memory.dmpFilesize
3.3MB
-
memory/4724-224-0x00007FF728250000-0x00007FF7285A1000-memory.dmpFilesize
3.3MB
-
memory/4724-140-0x00007FF728250000-0x00007FF7285A1000-memory.dmpFilesize
3.3MB
-
memory/4904-117-0x00007FF6D48F0000-0x00007FF6D4C41000-memory.dmpFilesize
3.3MB
-
memory/4904-246-0x00007FF6D48F0000-0x00007FF6D4C41000-memory.dmpFilesize
3.3MB
-
memory/4904-149-0x00007FF6D48F0000-0x00007FF6D4C41000-memory.dmpFilesize
3.3MB
-
memory/4908-148-0x00007FF726BC0000-0x00007FF726F11000-memory.dmpFilesize
3.3MB
-
memory/4908-110-0x00007FF726BC0000-0x00007FF726F11000-memory.dmpFilesize
3.3MB
-
memory/4908-239-0x00007FF726BC0000-0x00007FF726F11000-memory.dmpFilesize
3.3MB
-
memory/5012-122-0x00007FF7AABB0000-0x00007FF7AAF01000-memory.dmpFilesize
3.3MB
-
memory/5012-242-0x00007FF7AABB0000-0x00007FF7AAF01000-memory.dmpFilesize
3.3MB
-
memory/5112-218-0x00007FF6D0B70000-0x00007FF6D0EC1000-memory.dmpFilesize
3.3MB
-
memory/5112-136-0x00007FF6D0B70000-0x00007FF6D0EC1000-memory.dmpFilesize
3.3MB
-
memory/5112-50-0x00007FF6D0B70000-0x00007FF6D0EC1000-memory.dmpFilesize
3.3MB