Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 08:16
Behavioral task
behavioral1
Sample
20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe
-
Size
5.2MB
-
MD5
f841b0ad9eb5462e9ca1eb0a3149cbc7
-
SHA1
514d0e8f419fe084180c49fcbd4239ce338a3844
-
SHA256
a9b48d62702ce0649694d108b0e09bec566805d928d73030acb6e64fc5a73032
-
SHA512
6556e95ff456a434bb804b041ae8dac50a34ef6c01660417bdb26a9666ee8e3b39185d4f1b37a67e53a5a8200cfbe38308b866cf2975e7b366e9800511572f0a
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l6:RWWBibf56utgpPFotBER/mQ32lUe
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\xOkuxZT.exe cobalt_reflective_dll C:\Windows\System\jrlpDFm.exe cobalt_reflective_dll C:\Windows\System\VQIMvTJ.exe cobalt_reflective_dll C:\Windows\System\bSlQlQv.exe cobalt_reflective_dll C:\Windows\System\SDMfGcv.exe cobalt_reflective_dll C:\Windows\System\ByorycU.exe cobalt_reflective_dll C:\Windows\System\kMOFgCc.exe cobalt_reflective_dll C:\Windows\System\GkMbnvS.exe cobalt_reflective_dll C:\Windows\System\UCwcATr.exe cobalt_reflective_dll C:\Windows\System\OPZOBAU.exe cobalt_reflective_dll C:\Windows\System\ImqEsVr.exe cobalt_reflective_dll C:\Windows\System\dASjUyX.exe cobalt_reflective_dll C:\Windows\System\YJrWFwV.exe cobalt_reflective_dll C:\Windows\System\duXossO.exe cobalt_reflective_dll C:\Windows\System\NCrhnmQ.exe cobalt_reflective_dll C:\Windows\System\GHJExPD.exe cobalt_reflective_dll C:\Windows\System\tEnRrKW.exe cobalt_reflective_dll C:\Windows\System\vusTgUv.exe cobalt_reflective_dll C:\Windows\System\QOkHYlv.exe cobalt_reflective_dll C:\Windows\System\gvGsAHY.exe cobalt_reflective_dll C:\Windows\System\CoaAMUa.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 45 IoCs
Processes:
resource yara_rule behavioral2/memory/848-53-0x00007FF7D0040000-0x00007FF7D0391000-memory.dmp xmrig behavioral2/memory/3284-124-0x00007FF73DA30000-0x00007FF73DD81000-memory.dmp xmrig behavioral2/memory/1208-125-0x00007FF608940000-0x00007FF608C91000-memory.dmp xmrig behavioral2/memory/4920-127-0x00007FF687930000-0x00007FF687C81000-memory.dmp xmrig behavioral2/memory/4232-128-0x00007FF75A010000-0x00007FF75A361000-memory.dmp xmrig behavioral2/memory/4176-126-0x00007FF647FE0000-0x00007FF648331000-memory.dmp xmrig behavioral2/memory/1752-24-0x00007FF722D30000-0x00007FF723081000-memory.dmp xmrig behavioral2/memory/3428-10-0x00007FF6B3D70000-0x00007FF6B40C1000-memory.dmp xmrig behavioral2/memory/4576-129-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmp xmrig behavioral2/memory/3960-139-0x00007FF768BE0000-0x00007FF768F31000-memory.dmp xmrig behavioral2/memory/3192-144-0x00007FF657560000-0x00007FF6578B1000-memory.dmp xmrig behavioral2/memory/3024-150-0x00007FF722170000-0x00007FF7224C1000-memory.dmp xmrig behavioral2/memory/4372-147-0x00007FF725270000-0x00007FF7255C1000-memory.dmp xmrig behavioral2/memory/4444-145-0x00007FF733790000-0x00007FF733AE1000-memory.dmp xmrig behavioral2/memory/2152-143-0x00007FF6A9440000-0x00007FF6A9791000-memory.dmp xmrig behavioral2/memory/4740-142-0x00007FF782130000-0x00007FF782481000-memory.dmp xmrig behavioral2/memory/1092-140-0x00007FF7F66D0000-0x00007FF7F6A21000-memory.dmp xmrig behavioral2/memory/4856-138-0x00007FF65F020000-0x00007FF65F371000-memory.dmp xmrig behavioral2/memory/1320-137-0x00007FF73F760000-0x00007FF73FAB1000-memory.dmp xmrig behavioral2/memory/1572-135-0x00007FF683F00000-0x00007FF684251000-memory.dmp xmrig behavioral2/memory/2912-141-0x00007FF758840000-0x00007FF758B91000-memory.dmp xmrig behavioral2/memory/1356-134-0x00007FF755530000-0x00007FF755881000-memory.dmp xmrig behavioral2/memory/1208-130-0x00007FF608940000-0x00007FF608C91000-memory.dmp xmrig behavioral2/memory/1208-152-0x00007FF608940000-0x00007FF608C91000-memory.dmp xmrig behavioral2/memory/3428-198-0x00007FF6B3D70000-0x00007FF6B40C1000-memory.dmp xmrig behavioral2/memory/1752-200-0x00007FF722D30000-0x00007FF723081000-memory.dmp xmrig behavioral2/memory/4576-202-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmp xmrig behavioral2/memory/1356-204-0x00007FF755530000-0x00007FF755881000-memory.dmp xmrig behavioral2/memory/1320-208-0x00007FF73F760000-0x00007FF73FAB1000-memory.dmp xmrig behavioral2/memory/848-207-0x00007FF7D0040000-0x00007FF7D0391000-memory.dmp xmrig behavioral2/memory/1572-210-0x00007FF683F00000-0x00007FF684251000-memory.dmp xmrig behavioral2/memory/4856-212-0x00007FF65F020000-0x00007FF65F371000-memory.dmp xmrig behavioral2/memory/3960-214-0x00007FF768BE0000-0x00007FF768F31000-memory.dmp xmrig behavioral2/memory/1092-216-0x00007FF7F66D0000-0x00007FF7F6A21000-memory.dmp xmrig behavioral2/memory/4740-218-0x00007FF782130000-0x00007FF782481000-memory.dmp xmrig behavioral2/memory/2912-220-0x00007FF758840000-0x00007FF758B91000-memory.dmp xmrig behavioral2/memory/2152-222-0x00007FF6A9440000-0x00007FF6A9791000-memory.dmp xmrig behavioral2/memory/4176-226-0x00007FF647FE0000-0x00007FF648331000-memory.dmp xmrig behavioral2/memory/4444-225-0x00007FF733790000-0x00007FF733AE1000-memory.dmp xmrig behavioral2/memory/3192-228-0x00007FF657560000-0x00007FF6578B1000-memory.dmp xmrig behavioral2/memory/4372-230-0x00007FF725270000-0x00007FF7255C1000-memory.dmp xmrig behavioral2/memory/4920-234-0x00007FF687930000-0x00007FF687C81000-memory.dmp xmrig behavioral2/memory/3284-232-0x00007FF73DA30000-0x00007FF73DD81000-memory.dmp xmrig behavioral2/memory/3024-236-0x00007FF722170000-0x00007FF7224C1000-memory.dmp xmrig behavioral2/memory/4232-238-0x00007FF75A010000-0x00007FF75A361000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
xOkuxZT.exeVQIMvTJ.exejrlpDFm.exeCoaAMUa.exebSlQlQv.exegvGsAHY.exeQOkHYlv.exeSDMfGcv.exevusTgUv.exeGHJExPD.exeByorycU.exetEnRrKW.exeNCrhnmQ.exeduXossO.exekMOFgCc.exeGkMbnvS.exeYJrWFwV.exedASjUyX.exeOPZOBAU.exeUCwcATr.exeImqEsVr.exepid process 3428 xOkuxZT.exe 4576 VQIMvTJ.exe 1752 jrlpDFm.exe 1356 CoaAMUa.exe 1572 bSlQlQv.exe 1320 gvGsAHY.exe 848 QOkHYlv.exe 4856 SDMfGcv.exe 3960 vusTgUv.exe 1092 GHJExPD.exe 2912 ByorycU.exe 4740 tEnRrKW.exe 2152 NCrhnmQ.exe 3192 duXossO.exe 4444 kMOFgCc.exe 4176 GkMbnvS.exe 4372 YJrWFwV.exe 4920 dASjUyX.exe 3024 OPZOBAU.exe 3284 UCwcATr.exe 4232 ImqEsVr.exe -
Processes:
resource yara_rule behavioral2/memory/1208-0-0x00007FF608940000-0x00007FF608C91000-memory.dmp upx C:\Windows\System\xOkuxZT.exe upx C:\Windows\System\jrlpDFm.exe upx C:\Windows\System\VQIMvTJ.exe upx behavioral2/memory/4576-17-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmp upx C:\Windows\System\bSlQlQv.exe upx behavioral2/memory/1356-27-0x00007FF755530000-0x00007FF755881000-memory.dmp upx C:\Windows\System\SDMfGcv.exe upx C:\Windows\System\ByorycU.exe upx C:\Windows\System\kMOFgCc.exe upx C:\Windows\System\GkMbnvS.exe upx C:\Windows\System\UCwcATr.exe upx C:\Windows\System\OPZOBAU.exe upx C:\Windows\System\ImqEsVr.exe upx C:\Windows\System\dASjUyX.exe upx behavioral2/memory/3024-115-0x00007FF722170000-0x00007FF7224C1000-memory.dmp upx behavioral2/memory/4372-112-0x00007FF725270000-0x00007FF7255C1000-memory.dmp upx C:\Windows\System\YJrWFwV.exe upx behavioral2/memory/4444-97-0x00007FF733790000-0x00007FF733AE1000-memory.dmp upx C:\Windows\System\duXossO.exe upx behavioral2/memory/2152-86-0x00007FF6A9440000-0x00007FF6A9791000-memory.dmp upx behavioral2/memory/2912-84-0x00007FF758840000-0x00007FF758B91000-memory.dmp upx C:\Windows\System\NCrhnmQ.exe upx behavioral2/memory/3192-80-0x00007FF657560000-0x00007FF6578B1000-memory.dmp upx behavioral2/memory/4740-72-0x00007FF782130000-0x00007FF782481000-memory.dmp upx C:\Windows\System\GHJExPD.exe upx behavioral2/memory/1092-68-0x00007FF7F66D0000-0x00007FF7F6A21000-memory.dmp upx C:\Windows\System\tEnRrKW.exe upx behavioral2/memory/3960-59-0x00007FF768BE0000-0x00007FF768F31000-memory.dmp upx C:\Windows\System\vusTgUv.exe upx behavioral2/memory/848-53-0x00007FF7D0040000-0x00007FF7D0391000-memory.dmp upx behavioral2/memory/3284-124-0x00007FF73DA30000-0x00007FF73DD81000-memory.dmp upx behavioral2/memory/1208-125-0x00007FF608940000-0x00007FF608C91000-memory.dmp upx behavioral2/memory/4920-127-0x00007FF687930000-0x00007FF687C81000-memory.dmp upx behavioral2/memory/4232-128-0x00007FF75A010000-0x00007FF75A361000-memory.dmp upx behavioral2/memory/4176-126-0x00007FF647FE0000-0x00007FF648331000-memory.dmp upx behavioral2/memory/4856-52-0x00007FF65F020000-0x00007FF65F371000-memory.dmp upx behavioral2/memory/1572-40-0x00007FF683F00000-0x00007FF684251000-memory.dmp upx C:\Windows\System\QOkHYlv.exe upx C:\Windows\System\gvGsAHY.exe upx behavioral2/memory/1320-34-0x00007FF73F760000-0x00007FF73FAB1000-memory.dmp upx C:\Windows\System\CoaAMUa.exe upx behavioral2/memory/1752-24-0x00007FF722D30000-0x00007FF723081000-memory.dmp upx behavioral2/memory/3428-10-0x00007FF6B3D70000-0x00007FF6B40C1000-memory.dmp upx behavioral2/memory/4576-129-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmp upx behavioral2/memory/3960-139-0x00007FF768BE0000-0x00007FF768F31000-memory.dmp upx behavioral2/memory/3192-144-0x00007FF657560000-0x00007FF6578B1000-memory.dmp upx behavioral2/memory/3024-150-0x00007FF722170000-0x00007FF7224C1000-memory.dmp upx behavioral2/memory/4372-147-0x00007FF725270000-0x00007FF7255C1000-memory.dmp upx behavioral2/memory/4444-145-0x00007FF733790000-0x00007FF733AE1000-memory.dmp upx behavioral2/memory/2152-143-0x00007FF6A9440000-0x00007FF6A9791000-memory.dmp upx behavioral2/memory/4740-142-0x00007FF782130000-0x00007FF782481000-memory.dmp upx behavioral2/memory/1092-140-0x00007FF7F66D0000-0x00007FF7F6A21000-memory.dmp upx behavioral2/memory/4856-138-0x00007FF65F020000-0x00007FF65F371000-memory.dmp upx behavioral2/memory/1320-137-0x00007FF73F760000-0x00007FF73FAB1000-memory.dmp upx behavioral2/memory/1572-135-0x00007FF683F00000-0x00007FF684251000-memory.dmp upx behavioral2/memory/2912-141-0x00007FF758840000-0x00007FF758B91000-memory.dmp upx behavioral2/memory/1356-134-0x00007FF755530000-0x00007FF755881000-memory.dmp upx behavioral2/memory/1208-130-0x00007FF608940000-0x00007FF608C91000-memory.dmp upx behavioral2/memory/1208-152-0x00007FF608940000-0x00007FF608C91000-memory.dmp upx behavioral2/memory/3428-198-0x00007FF6B3D70000-0x00007FF6B40C1000-memory.dmp upx behavioral2/memory/1752-200-0x00007FF722D30000-0x00007FF723081000-memory.dmp upx behavioral2/memory/4576-202-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmp upx behavioral2/memory/1356-204-0x00007FF755530000-0x00007FF755881000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\jrlpDFm.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\gvGsAHY.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\ByorycU.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\tEnRrKW.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\duXossO.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\dASjUyX.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\vusTgUv.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\ImqEsVr.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\VQIMvTJ.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\kMOFgCc.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\UCwcATr.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\OPZOBAU.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\xOkuxZT.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\CoaAMUa.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\bSlQlQv.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\QOkHYlv.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\SDMfGcv.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\GHJExPD.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\NCrhnmQ.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\GkMbnvS.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\YJrWFwV.exe 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process target process PID 1208 wrote to memory of 3428 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe xOkuxZT.exe PID 1208 wrote to memory of 3428 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe xOkuxZT.exe PID 1208 wrote to memory of 4576 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe VQIMvTJ.exe PID 1208 wrote to memory of 4576 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe VQIMvTJ.exe PID 1208 wrote to memory of 1752 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe jrlpDFm.exe PID 1208 wrote to memory of 1752 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe jrlpDFm.exe PID 1208 wrote to memory of 1356 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe CoaAMUa.exe PID 1208 wrote to memory of 1356 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe CoaAMUa.exe PID 1208 wrote to memory of 1572 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe bSlQlQv.exe PID 1208 wrote to memory of 1572 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe bSlQlQv.exe PID 1208 wrote to memory of 848 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe QOkHYlv.exe PID 1208 wrote to memory of 848 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe QOkHYlv.exe PID 1208 wrote to memory of 1320 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe gvGsAHY.exe PID 1208 wrote to memory of 1320 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe gvGsAHY.exe PID 1208 wrote to memory of 4856 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe SDMfGcv.exe PID 1208 wrote to memory of 4856 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe SDMfGcv.exe PID 1208 wrote to memory of 3960 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe vusTgUv.exe PID 1208 wrote to memory of 3960 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe vusTgUv.exe PID 1208 wrote to memory of 1092 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe GHJExPD.exe PID 1208 wrote to memory of 1092 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe GHJExPD.exe PID 1208 wrote to memory of 2912 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe ByorycU.exe PID 1208 wrote to memory of 2912 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe ByorycU.exe PID 1208 wrote to memory of 4740 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe tEnRrKW.exe PID 1208 wrote to memory of 4740 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe tEnRrKW.exe PID 1208 wrote to memory of 2152 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe NCrhnmQ.exe PID 1208 wrote to memory of 2152 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe NCrhnmQ.exe PID 1208 wrote to memory of 3192 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe duXossO.exe PID 1208 wrote to memory of 3192 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe duXossO.exe PID 1208 wrote to memory of 4444 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe kMOFgCc.exe PID 1208 wrote to memory of 4444 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe kMOFgCc.exe PID 1208 wrote to memory of 4176 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe GkMbnvS.exe PID 1208 wrote to memory of 4176 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe GkMbnvS.exe PID 1208 wrote to memory of 4372 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe YJrWFwV.exe PID 1208 wrote to memory of 4372 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe YJrWFwV.exe PID 1208 wrote to memory of 3284 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe UCwcATr.exe PID 1208 wrote to memory of 3284 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe UCwcATr.exe PID 1208 wrote to memory of 4920 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe dASjUyX.exe PID 1208 wrote to memory of 4920 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe dASjUyX.exe PID 1208 wrote to memory of 3024 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe OPZOBAU.exe PID 1208 wrote to memory of 3024 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe OPZOBAU.exe PID 1208 wrote to memory of 4232 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe ImqEsVr.exe PID 1208 wrote to memory of 4232 1208 20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe ImqEsVr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20240520f841b0ad9eb5462e9ca1eb0a3149cbc7cobaltstrikecobaltstrike_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\xOkuxZT.exeC:\Windows\System\xOkuxZT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VQIMvTJ.exeC:\Windows\System\VQIMvTJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jrlpDFm.exeC:\Windows\System\jrlpDFm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CoaAMUa.exeC:\Windows\System\CoaAMUa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bSlQlQv.exeC:\Windows\System\bSlQlQv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QOkHYlv.exeC:\Windows\System\QOkHYlv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gvGsAHY.exeC:\Windows\System\gvGsAHY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SDMfGcv.exeC:\Windows\System\SDMfGcv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vusTgUv.exeC:\Windows\System\vusTgUv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GHJExPD.exeC:\Windows\System\GHJExPD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ByorycU.exeC:\Windows\System\ByorycU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tEnRrKW.exeC:\Windows\System\tEnRrKW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NCrhnmQ.exeC:\Windows\System\NCrhnmQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\duXossO.exeC:\Windows\System\duXossO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kMOFgCc.exeC:\Windows\System\kMOFgCc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GkMbnvS.exeC:\Windows\System\GkMbnvS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YJrWFwV.exeC:\Windows\System\YJrWFwV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UCwcATr.exeC:\Windows\System\UCwcATr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dASjUyX.exeC:\Windows\System\dASjUyX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OPZOBAU.exeC:\Windows\System\OPZOBAU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ImqEsVr.exeC:\Windows\System\ImqEsVr.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\ByorycU.exeFilesize
5.2MB
MD599be820d1f9da77413fcee83fc98e71e
SHA1e6ac816d644b061a3e4592a83f8389419ad944ae
SHA256c399f4d0c516eea801f358c7b7b36463418791d56ce5fbc062a8fadbbc3145f0
SHA5127120f23b642c94d429a56c934113feb514707a87f600948080f569c4e1343f17df9f279ba5458be2d5857416e92b95ccd869799329c5a86a68da48f2f35710d6
-
C:\Windows\System\CoaAMUa.exeFilesize
5.2MB
MD5002d61d08c49b0a162cfd7b87800db3c
SHA15736026534c8523de5b4f0f4ad846e2f364ff541
SHA25655b0aef03bd13c487bedb740affdc12cb495d2a1d338fb0d412c0dd3ef3db732
SHA512ec4d4d9ce6c8a4c81d1616c3ff48318a035e4358e20387578881c8e6012b559406a1180a0a65b798a7baac3b478f1d4bacaa20093576f40ca0f7e5035b8e07f5
-
C:\Windows\System\GHJExPD.exeFilesize
5.2MB
MD56543abc48b2b37d6f0d166ca6dd7a5ce
SHA113a3e09a6a1096edf0cd1d2f316e0b1aa6550822
SHA25624507bdc14bf93bcbe7cc41c26412ec6e26d8031d3b833f60b52f3a014cd25dc
SHA512acad7945e70af201fb76d2e6272e9b8bd69a649069090bb183def58b9ba07ee015469933d67edefbfbc5ae8a0f36e55a213ca54082690594938000a55b56db99
-
C:\Windows\System\GkMbnvS.exeFilesize
5.2MB
MD51f8295ffa50a5da970693347d59c871e
SHA1f590dabb2fc4c3e1f9edec094929929e3525dfa0
SHA2568b6f896d384fd36bfc9cb8b8c474a7ea2c50333e9efe930c9590f09773ad1e90
SHA51239b19de83dcd6a3c7e675da81f304fefbd317cc19406de123792b82ac4a9c69eb4dbe99b681bd5edf2645ab109cbb4a170eb2aa4d41d3b6ef1974f0730bd0ea8
-
C:\Windows\System\ImqEsVr.exeFilesize
5.2MB
MD5e35aea1af4c858e772eb655b05c7eded
SHA18bdcbb8fafe90a2d7b44ba1a13178188ae812d32
SHA256298a4ab7ef47cccd19c6e855eafaf381e553e6861ddb334676cc9645f9a165fd
SHA512d5885a9bb1f8d082330dc30f797ee7f607e0b9e376fc66eb9962d0c78e78edf595f87a11ab57aed66e4a417dd2a9f4a336341e6cfcb895b975991b48eef72f4c
-
C:\Windows\System\NCrhnmQ.exeFilesize
5.2MB
MD5b7c5ee899b8419b3c9bed7a4a10536c1
SHA16bb9ca150cbdfe40e962bb20de6bd312028b5c95
SHA256a3c0b86b9db800d451db3cc8eeaa01a65df0be0332240e8fa4972b4e18dfff64
SHA512f8ad0928b0094ed58f65379623073ef0f112eaf1fb24b39322a1330f7cae341afb54c1bf17ce0c226387c983206fea1a136cfcd2743fd7cbd58a090aebac9a69
-
C:\Windows\System\OPZOBAU.exeFilesize
5.2MB
MD5f9cc16884b22db36ac0cccbf2232abd4
SHA1059bd1441f0fc4fb0ae66737938ba732c6eb5fb2
SHA2567204b11f84b41ad4338824273e8806952d17b91270f8c8125b4a602aebfb0d5a
SHA5128896857c9b1cff830318ab1e13c4988946e124c89db3cb4126f5bfc52b1ccdb54dedbe5e95971bcc94ffcba6505f973d2f2ce2ff2fc0c52986b50b5753e22d54
-
C:\Windows\System\QOkHYlv.exeFilesize
5.2MB
MD59fc78605f4775981b907807c7af9e4d1
SHA1d4f1977a7cfccb3db67de2ab1642c1e4a36db0e6
SHA256368dbd5936f7234149d4ef4748003273979ac288a51744f1b9d98f4a157eb282
SHA512352d1952684bb6c909459cdc3308e1d4fb1462fbd96a2228e0e4c21d1b5eb93f879af8587213fd054b5e2d1932db3f3fc270b6e386e57c72a890124c9c9797bb
-
C:\Windows\System\SDMfGcv.exeFilesize
5.2MB
MD5a01c8810e7797a9c56ab131ef0c5792f
SHA1ffae0ce3ba8c53fb68da04b10ff51f8fc8499e65
SHA2567fe4a336e1b23f5601f9c0606d0ae635854a88ef12ddd4a79c8ca775fc745225
SHA51264436e1e6653ba707a40712f92c81e9e1f6988bcb6a70daf5f196e18ca1843351b269f6e7111a5d5d1061d1cbd2ee8a527d39f4452b3b5856cc5250d4d234220
-
C:\Windows\System\UCwcATr.exeFilesize
5.2MB
MD502dbd67773aa71b1cefd786ef58f229d
SHA1048b51f901ebd670ebcc386584486a7377aee9d2
SHA256ddd2fd86b4d74d0144f1843a7d47d5f0708b9403ad1c14a59dc0477339d876cf
SHA51218ee4f465d7492e503db456ce6018ff5135761ad93351b018e072785f212a5a5f26a8e01e32c9bac32c485f21658e043bfefa08390db25fb38366dc3bc36ecb6
-
C:\Windows\System\VQIMvTJ.exeFilesize
5.2MB
MD572161827c3e09aa15b33e4deaff6b631
SHA17165c9129711b778ddcc3e1ebf2b195eb8bf8cdd
SHA25606c98506f839e6aa3786e45bf7ef79571ead6f89b0e6be373f6adad3849dac18
SHA512f57c00eb0249d14bb902f48ea7bc55563eb46f83af374e3ae7b075bb91fd8f2658b32d6b76d50fb1d9e1bd70c94ca21b6e3e0e3733d94bdde8ff4306118d546e
-
C:\Windows\System\YJrWFwV.exeFilesize
5.2MB
MD55d435d4255b6bc46546b21ab394d1b1b
SHA1f45c317def6487a5f386fe22477803d29a17acb3
SHA256cc35daf41df0203e4c40ae8155064b35da3715cfc23946dd71c2ea36a4c537da
SHA5124fbd255163f8dcd5b1d927e46190c40b5eaf40a5b82756832b71b2a65ea124b783eef2298c7ddcd22e9234fde238aa780d1631baf829c96d6d4341f919ca6194
-
C:\Windows\System\bSlQlQv.exeFilesize
5.2MB
MD5d14c0d5aaab24aa166e7dc131f3e6b33
SHA147c51f22473ba2c37e24e500bf4d723c0b0f6659
SHA256cc05619d15899b2c6f7a0c1c028e5f2266494fa653ac50ff2534fe37704ed1de
SHA51211597feecae722e9f8e01ef2c5b531994895690977b0274f30710a0f472164af155743832707ceb7c3ff31a3c32ef0ea8bd783c49347a382f79419387d5509b4
-
C:\Windows\System\dASjUyX.exeFilesize
5.2MB
MD56ce225f93d21e050ecb091def3de9133
SHA145740a44c6f1982fe7a61008fabca6775bcfcae0
SHA2565949d1c167a38ebc8a07c328335637198d3aaf8b1ced614a0cec1905e539fdf9
SHA512352b543a97f68bf0f7296ffb9a81da6717499db25d79373d731ccf944897d9fd666c62e2f4e39713f6c44eb689a68aa97bed714c089023b1f43d4c9ef94972d7
-
C:\Windows\System\duXossO.exeFilesize
5.2MB
MD5ec5950d688c4ada528a6210538328bbe
SHA181a82e7b0eb60c20424373a4deb4c05fbb22a7bc
SHA2562cd3e1d5cd4f84bc83b7d449f60fa10cc66a6dfdae97a854aa15562daf82ab62
SHA51247ed5fbfd32fbadd3aff26f6fedafa5549485d67036017c2522b60531c333811ded8b661dcbc7a12b1a845708749646a98d574c5f18d50dcce29a546c1395490
-
C:\Windows\System\gvGsAHY.exeFilesize
5.2MB
MD5c9a835c0683f0c6a03e46f61e08f009e
SHA1be2e1d64965f64b98754a81ec88377545969f521
SHA256f4d2e0e628f2276f110cd753e0444edf1a5c96576ae66793796144dad75a3f62
SHA5122413314f75466ef1f52d52ee6e5f57a006d6c07ca2224881aeb76dadd707a982548246dba5ef2125ba89102c23def814e5b90de33162d79be8542daf6a869afb
-
C:\Windows\System\jrlpDFm.exeFilesize
5.2MB
MD563533519ccc0750fa7000a70ca4f2bd4
SHA1484cd3caaff7a8fc759bed5f89e799dc0cb17a03
SHA256d265fe493639956c337749f1cdb02ae42fef37fbb406d7a59542051c14fc710e
SHA512df70ad2a12f60e0cdf425610bde724f97b9888defeb125c0ff21acfa24d38d1b6e5c875884a438ba8a39e52c50fdf25bef4bbca1a8ee286e2a5f562dccdd8b8e
-
C:\Windows\System\kMOFgCc.exeFilesize
5.2MB
MD5a4104c68b02f8638b82c8161a055de08
SHA1ec68a956fad31c85e42928214fe4a98148ab6cb7
SHA2569df09e5697b98acb7566b9b2eadc6a792a68fe4feab8d06960b48a80db481104
SHA5124b69cb77e4c7ce1e11fbffe11bb20ba6691ed7d7aba97e2cf167190328330f7adffdd9b000a27a74c2d4285f265ef9c50e07301afdaa3d160fd62d8431a1b376
-
C:\Windows\System\tEnRrKW.exeFilesize
5.2MB
MD5e11f84c5135cdda62ba86a55e7ba7962
SHA17085b6464bd78f17fa0aa771c81d7cc1eee46272
SHA2563559717b893186a828769474faea27eaa18f7395a4a2d92e97a2fd194ce60fb3
SHA512c984e00a83fc77d6ee1624fea27f31115c33a816bb5c1ddf41ab3e2d5f61efabe2698f0b790043472c2e8c95818c9b47bdcacae50c2b41b12e57c68348aa6202
-
C:\Windows\System\vusTgUv.exeFilesize
5.2MB
MD52be3b59efc422462dbe2540916158d4d
SHA1b3d79fa0344c829759af53162085eb4cbe192e68
SHA25689f3c41153ed2838c358e0d20de08e421591f089018ea1ea0e779ad080e4d1ee
SHA512714467dab5fd30a5ac281dd1b5ee3be23fec6848eb2f04e9dd54b9e7ac3be2fc99ef8d0a21c655c720523b1a504e5415086e4141f8370c94c17a523137db1e50
-
C:\Windows\System\xOkuxZT.exeFilesize
5.2MB
MD57248d9260d56ab33edec6345522a156f
SHA1aa94718b571472a2a9a670adc5aa7a2660563d4a
SHA2562c6151c9788bee54768b5d7c0638a9de04215d5a10de5772a3c404a88c7de364
SHA512f3c9a22a9215e3c9c8c5d22b2dd3f4e45c02ef670bb922be947e16cd09ea59c43d9de267704e33a8ff32a03c186d410db40faf47a545aad7bc1ab8f8473536aa
-
memory/848-207-0x00007FF7D0040000-0x00007FF7D0391000-memory.dmpFilesize
3.3MB
-
memory/848-53-0x00007FF7D0040000-0x00007FF7D0391000-memory.dmpFilesize
3.3MB
-
memory/1092-140-0x00007FF7F66D0000-0x00007FF7F6A21000-memory.dmpFilesize
3.3MB
-
memory/1092-216-0x00007FF7F66D0000-0x00007FF7F6A21000-memory.dmpFilesize
3.3MB
-
memory/1092-68-0x00007FF7F66D0000-0x00007FF7F6A21000-memory.dmpFilesize
3.3MB
-
memory/1208-152-0x00007FF608940000-0x00007FF608C91000-memory.dmpFilesize
3.3MB
-
memory/1208-125-0x00007FF608940000-0x00007FF608C91000-memory.dmpFilesize
3.3MB
-
memory/1208-0-0x00007FF608940000-0x00007FF608C91000-memory.dmpFilesize
3.3MB
-
memory/1208-130-0x00007FF608940000-0x00007FF608C91000-memory.dmpFilesize
3.3MB
-
memory/1208-1-0x0000018CE8400000-0x0000018CE8410000-memory.dmpFilesize
64KB
-
memory/1320-208-0x00007FF73F760000-0x00007FF73FAB1000-memory.dmpFilesize
3.3MB
-
memory/1320-137-0x00007FF73F760000-0x00007FF73FAB1000-memory.dmpFilesize
3.3MB
-
memory/1320-34-0x00007FF73F760000-0x00007FF73FAB1000-memory.dmpFilesize
3.3MB
-
memory/1356-204-0x00007FF755530000-0x00007FF755881000-memory.dmpFilesize
3.3MB
-
memory/1356-27-0x00007FF755530000-0x00007FF755881000-memory.dmpFilesize
3.3MB
-
memory/1356-134-0x00007FF755530000-0x00007FF755881000-memory.dmpFilesize
3.3MB
-
memory/1572-135-0x00007FF683F00000-0x00007FF684251000-memory.dmpFilesize
3.3MB
-
memory/1572-210-0x00007FF683F00000-0x00007FF684251000-memory.dmpFilesize
3.3MB
-
memory/1572-40-0x00007FF683F00000-0x00007FF684251000-memory.dmpFilesize
3.3MB
-
memory/1752-24-0x00007FF722D30000-0x00007FF723081000-memory.dmpFilesize
3.3MB
-
memory/1752-200-0x00007FF722D30000-0x00007FF723081000-memory.dmpFilesize
3.3MB
-
memory/2152-86-0x00007FF6A9440000-0x00007FF6A9791000-memory.dmpFilesize
3.3MB
-
memory/2152-143-0x00007FF6A9440000-0x00007FF6A9791000-memory.dmpFilesize
3.3MB
-
memory/2152-222-0x00007FF6A9440000-0x00007FF6A9791000-memory.dmpFilesize
3.3MB
-
memory/2912-220-0x00007FF758840000-0x00007FF758B91000-memory.dmpFilesize
3.3MB
-
memory/2912-84-0x00007FF758840000-0x00007FF758B91000-memory.dmpFilesize
3.3MB
-
memory/2912-141-0x00007FF758840000-0x00007FF758B91000-memory.dmpFilesize
3.3MB
-
memory/3024-236-0x00007FF722170000-0x00007FF7224C1000-memory.dmpFilesize
3.3MB
-
memory/3024-115-0x00007FF722170000-0x00007FF7224C1000-memory.dmpFilesize
3.3MB
-
memory/3024-150-0x00007FF722170000-0x00007FF7224C1000-memory.dmpFilesize
3.3MB
-
memory/3192-80-0x00007FF657560000-0x00007FF6578B1000-memory.dmpFilesize
3.3MB
-
memory/3192-228-0x00007FF657560000-0x00007FF6578B1000-memory.dmpFilesize
3.3MB
-
memory/3192-144-0x00007FF657560000-0x00007FF6578B1000-memory.dmpFilesize
3.3MB
-
memory/3284-232-0x00007FF73DA30000-0x00007FF73DD81000-memory.dmpFilesize
3.3MB
-
memory/3284-124-0x00007FF73DA30000-0x00007FF73DD81000-memory.dmpFilesize
3.3MB
-
memory/3428-198-0x00007FF6B3D70000-0x00007FF6B40C1000-memory.dmpFilesize
3.3MB
-
memory/3428-10-0x00007FF6B3D70000-0x00007FF6B40C1000-memory.dmpFilesize
3.3MB
-
memory/3960-214-0x00007FF768BE0000-0x00007FF768F31000-memory.dmpFilesize
3.3MB
-
memory/3960-59-0x00007FF768BE0000-0x00007FF768F31000-memory.dmpFilesize
3.3MB
-
memory/3960-139-0x00007FF768BE0000-0x00007FF768F31000-memory.dmpFilesize
3.3MB
-
memory/4176-126-0x00007FF647FE0000-0x00007FF648331000-memory.dmpFilesize
3.3MB
-
memory/4176-226-0x00007FF647FE0000-0x00007FF648331000-memory.dmpFilesize
3.3MB
-
memory/4232-128-0x00007FF75A010000-0x00007FF75A361000-memory.dmpFilesize
3.3MB
-
memory/4232-238-0x00007FF75A010000-0x00007FF75A361000-memory.dmpFilesize
3.3MB
-
memory/4372-112-0x00007FF725270000-0x00007FF7255C1000-memory.dmpFilesize
3.3MB
-
memory/4372-230-0x00007FF725270000-0x00007FF7255C1000-memory.dmpFilesize
3.3MB
-
memory/4372-147-0x00007FF725270000-0x00007FF7255C1000-memory.dmpFilesize
3.3MB
-
memory/4444-97-0x00007FF733790000-0x00007FF733AE1000-memory.dmpFilesize
3.3MB
-
memory/4444-225-0x00007FF733790000-0x00007FF733AE1000-memory.dmpFilesize
3.3MB
-
memory/4444-145-0x00007FF733790000-0x00007FF733AE1000-memory.dmpFilesize
3.3MB
-
memory/4576-129-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmpFilesize
3.3MB
-
memory/4576-202-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmpFilesize
3.3MB
-
memory/4576-17-0x00007FF6E7F10000-0x00007FF6E8261000-memory.dmpFilesize
3.3MB
-
memory/4740-142-0x00007FF782130000-0x00007FF782481000-memory.dmpFilesize
3.3MB
-
memory/4740-218-0x00007FF782130000-0x00007FF782481000-memory.dmpFilesize
3.3MB
-
memory/4740-72-0x00007FF782130000-0x00007FF782481000-memory.dmpFilesize
3.3MB
-
memory/4856-138-0x00007FF65F020000-0x00007FF65F371000-memory.dmpFilesize
3.3MB
-
memory/4856-212-0x00007FF65F020000-0x00007FF65F371000-memory.dmpFilesize
3.3MB
-
memory/4856-52-0x00007FF65F020000-0x00007FF65F371000-memory.dmpFilesize
3.3MB
-
memory/4920-234-0x00007FF687930000-0x00007FF687C81000-memory.dmpFilesize
3.3MB
-
memory/4920-127-0x00007FF687930000-0x00007FF687C81000-memory.dmpFilesize
3.3MB