Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 08:17
Behavioral task
behavioral1
Sample
20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe
-
Size
5.2MB
-
MD5
ff125116f134e5a9eb784c333d90bdad
-
SHA1
5d02ff798199bc4bdd88a660e7d49aae53ff837c
-
SHA256
c7582440ac863d0f189018c4e6e51817e31c5d602547d401346b17abc4c5caed
-
SHA512
24f36338edecbbfbe1fab9f79a085318d44b95c92e5cc36c076649bbeb260f75b2ba4f25818054a796382d44dc498fee706e0d57d31d043b3f7ab582794d0b51
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lo:RWWBibf56utgpPFotBER/mQ32lUs
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\TbrNeqO.exe cobalt_reflective_dll C:\Windows\System\HGmVVhe.exe cobalt_reflective_dll C:\Windows\System\ETiSfXS.exe cobalt_reflective_dll C:\Windows\System\YTQKmCE.exe cobalt_reflective_dll C:\Windows\System\JVzpYal.exe cobalt_reflective_dll C:\Windows\System\zDwJqeM.exe cobalt_reflective_dll C:\Windows\System\WCdREEK.exe cobalt_reflective_dll C:\Windows\System\oaKjkLO.exe cobalt_reflective_dll C:\Windows\System\blmptHa.exe cobalt_reflective_dll C:\Windows\System\OugRfxk.exe cobalt_reflective_dll C:\Windows\System\cgjXvdw.exe cobalt_reflective_dll C:\Windows\System\qiKOUsQ.exe cobalt_reflective_dll C:\Windows\System\udidbUW.exe cobalt_reflective_dll C:\Windows\System\xudSJVt.exe cobalt_reflective_dll C:\Windows\System\pVVqWWl.exe cobalt_reflective_dll C:\Windows\System\HXlXDpL.exe cobalt_reflective_dll C:\Windows\System\tvtoota.exe cobalt_reflective_dll C:\Windows\System\IYSeqGf.exe cobalt_reflective_dll C:\Windows\System\DsxHOzX.exe cobalt_reflective_dll C:\Windows\System\EKdvgMc.exe cobalt_reflective_dll C:\Windows\System\alMWkwo.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 46 IoCs
Processes:
resource yara_rule behavioral2/memory/4052-40-0x00007FF7CBB10000-0x00007FF7CBE61000-memory.dmp xmrig behavioral2/memory/2936-113-0x00007FF725620000-0x00007FF725971000-memory.dmp xmrig behavioral2/memory/2400-114-0x00007FF656F60000-0x00007FF6572B1000-memory.dmp xmrig behavioral2/memory/1204-116-0x00007FF6A93E0000-0x00007FF6A9731000-memory.dmp xmrig behavioral2/memory/5020-115-0x00007FF686380000-0x00007FF6866D1000-memory.dmp xmrig behavioral2/memory/3712-117-0x00007FF7A3F80000-0x00007FF7A42D1000-memory.dmp xmrig behavioral2/memory/4488-118-0x00007FF624CF0000-0x00007FF625041000-memory.dmp xmrig behavioral2/memory/4880-120-0x00007FF69FCC0000-0x00007FF6A0011000-memory.dmp xmrig behavioral2/memory/388-119-0x00007FF698B20000-0x00007FF698E71000-memory.dmp xmrig behavioral2/memory/4788-121-0x00007FF60FFF0000-0x00007FF610341000-memory.dmp xmrig behavioral2/memory/1464-122-0x00007FF792070000-0x00007FF7923C1000-memory.dmp xmrig behavioral2/memory/1796-124-0x00007FF6AA370000-0x00007FF6AA6C1000-memory.dmp xmrig behavioral2/memory/1520-125-0x00007FF79B0D0000-0x00007FF79B421000-memory.dmp xmrig behavioral2/memory/2452-126-0x00007FF640CA0000-0x00007FF640FF1000-memory.dmp xmrig behavioral2/memory/4872-123-0x00007FF7A0AF0000-0x00007FF7A0E41000-memory.dmp xmrig behavioral2/memory/4916-127-0x00007FF67A6C0000-0x00007FF67AA11000-memory.dmp xmrig behavioral2/memory/2192-129-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmp xmrig behavioral2/memory/2260-128-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmp xmrig behavioral2/memory/2492-131-0x00007FF782880000-0x00007FF782BD1000-memory.dmp xmrig behavioral2/memory/4496-133-0x00007FF621090000-0x00007FF6213E1000-memory.dmp xmrig behavioral2/memory/2936-136-0x00007FF725620000-0x00007FF725971000-memory.dmp xmrig behavioral2/memory/4396-132-0x00007FF602A40000-0x00007FF602D91000-memory.dmp xmrig behavioral2/memory/2028-130-0x00007FF6247C0000-0x00007FF624B11000-memory.dmp xmrig behavioral2/memory/2260-150-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmp xmrig behavioral2/memory/2260-151-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmp xmrig behavioral2/memory/2192-196-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmp xmrig behavioral2/memory/2028-198-0x00007FF6247C0000-0x00007FF624B11000-memory.dmp xmrig behavioral2/memory/2492-200-0x00007FF782880000-0x00007FF782BD1000-memory.dmp xmrig behavioral2/memory/4396-202-0x00007FF602A40000-0x00007FF602D91000-memory.dmp xmrig behavioral2/memory/4496-204-0x00007FF621090000-0x00007FF6213E1000-memory.dmp xmrig behavioral2/memory/4052-206-0x00007FF7CBB10000-0x00007FF7CBE61000-memory.dmp xmrig behavioral2/memory/2452-212-0x00007FF640CA0000-0x00007FF640FF1000-memory.dmp xmrig behavioral2/memory/4916-211-0x00007FF67A6C0000-0x00007FF67AA11000-memory.dmp xmrig behavioral2/memory/2936-209-0x00007FF725620000-0x00007FF725971000-memory.dmp xmrig behavioral2/memory/1204-214-0x00007FF6A93E0000-0x00007FF6A9731000-memory.dmp xmrig behavioral2/memory/2400-219-0x00007FF656F60000-0x00007FF6572B1000-memory.dmp xmrig behavioral2/memory/388-224-0x00007FF698B20000-0x00007FF698E71000-memory.dmp xmrig behavioral2/memory/4488-222-0x00007FF624CF0000-0x00007FF625041000-memory.dmp xmrig behavioral2/memory/3712-220-0x00007FF7A3F80000-0x00007FF7A42D1000-memory.dmp xmrig behavioral2/memory/5020-217-0x00007FF686380000-0x00007FF6866D1000-memory.dmp xmrig behavioral2/memory/4788-235-0x00007FF60FFF0000-0x00007FF610341000-memory.dmp xmrig behavioral2/memory/1464-233-0x00007FF792070000-0x00007FF7923C1000-memory.dmp xmrig behavioral2/memory/4880-236-0x00007FF69FCC0000-0x00007FF6A0011000-memory.dmp xmrig behavioral2/memory/1796-229-0x00007FF6AA370000-0x00007FF6AA6C1000-memory.dmp xmrig behavioral2/memory/4872-231-0x00007FF7A0AF0000-0x00007FF7A0E41000-memory.dmp xmrig behavioral2/memory/1520-226-0x00007FF79B0D0000-0x00007FF79B421000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
TbrNeqO.exeETiSfXS.exeHGmVVhe.exeYTQKmCE.exeJVzpYal.exezDwJqeM.exeWCdREEK.exeoaKjkLO.exeblmptHa.exeOugRfxk.exealMWkwo.execgjXvdw.exeEKdvgMc.exeDsxHOzX.exeqiKOUsQ.exeIYSeqGf.exetvtoota.exeHXlXDpL.exeudidbUW.exepVVqWWl.exexudSJVt.exepid process 2192 TbrNeqO.exe 2028 ETiSfXS.exe 2492 HGmVVhe.exe 4396 YTQKmCE.exe 4496 JVzpYal.exe 4052 zDwJqeM.exe 2452 WCdREEK.exe 2936 oaKjkLO.exe 4916 blmptHa.exe 2400 OugRfxk.exe 5020 alMWkwo.exe 1204 cgjXvdw.exe 3712 EKdvgMc.exe 4488 DsxHOzX.exe 388 qiKOUsQ.exe 4880 IYSeqGf.exe 4788 tvtoota.exe 1464 HXlXDpL.exe 4872 udidbUW.exe 1796 pVVqWWl.exe 1520 xudSJVt.exe -
Processes:
resource yara_rule behavioral2/memory/2260-0-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmp upx behavioral2/memory/2192-8-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmp upx C:\Windows\System\TbrNeqO.exe upx C:\Windows\System\HGmVVhe.exe upx C:\Windows\System\ETiSfXS.exe upx behavioral2/memory/2028-13-0x00007FF6247C0000-0x00007FF624B11000-memory.dmp upx behavioral2/memory/4396-26-0x00007FF602A40000-0x00007FF602D91000-memory.dmp upx C:\Windows\System\YTQKmCE.exe upx C:\Windows\System\JVzpYal.exe upx C:\Windows\System\zDwJqeM.exe upx behavioral2/memory/4052-40-0x00007FF7CBB10000-0x00007FF7CBE61000-memory.dmp upx C:\Windows\System\WCdREEK.exe upx C:\Windows\System\oaKjkLO.exe upx C:\Windows\System\blmptHa.exe upx C:\Windows\System\OugRfxk.exe upx C:\Windows\System\cgjXvdw.exe upx C:\Windows\System\qiKOUsQ.exe upx C:\Windows\System\udidbUW.exe upx C:\Windows\System\xudSJVt.exe upx C:\Windows\System\pVVqWWl.exe upx C:\Windows\System\HXlXDpL.exe upx C:\Windows\System\tvtoota.exe upx C:\Windows\System\IYSeqGf.exe upx C:\Windows\System\DsxHOzX.exe upx C:\Windows\System\EKdvgMc.exe upx C:\Windows\System\alMWkwo.exe upx behavioral2/memory/4496-32-0x00007FF621090000-0x00007FF6213E1000-memory.dmp upx behavioral2/memory/2492-20-0x00007FF782880000-0x00007FF782BD1000-memory.dmp upx behavioral2/memory/2936-113-0x00007FF725620000-0x00007FF725971000-memory.dmp upx behavioral2/memory/2400-114-0x00007FF656F60000-0x00007FF6572B1000-memory.dmp upx behavioral2/memory/1204-116-0x00007FF6A93E0000-0x00007FF6A9731000-memory.dmp upx behavioral2/memory/5020-115-0x00007FF686380000-0x00007FF6866D1000-memory.dmp upx behavioral2/memory/3712-117-0x00007FF7A3F80000-0x00007FF7A42D1000-memory.dmp upx behavioral2/memory/4488-118-0x00007FF624CF0000-0x00007FF625041000-memory.dmp upx behavioral2/memory/4880-120-0x00007FF69FCC0000-0x00007FF6A0011000-memory.dmp upx behavioral2/memory/388-119-0x00007FF698B20000-0x00007FF698E71000-memory.dmp upx behavioral2/memory/4788-121-0x00007FF60FFF0000-0x00007FF610341000-memory.dmp upx behavioral2/memory/1464-122-0x00007FF792070000-0x00007FF7923C1000-memory.dmp upx behavioral2/memory/1796-124-0x00007FF6AA370000-0x00007FF6AA6C1000-memory.dmp upx behavioral2/memory/1520-125-0x00007FF79B0D0000-0x00007FF79B421000-memory.dmp upx behavioral2/memory/2452-126-0x00007FF640CA0000-0x00007FF640FF1000-memory.dmp upx behavioral2/memory/4872-123-0x00007FF7A0AF0000-0x00007FF7A0E41000-memory.dmp upx behavioral2/memory/4916-127-0x00007FF67A6C0000-0x00007FF67AA11000-memory.dmp upx behavioral2/memory/2192-129-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmp upx behavioral2/memory/2260-128-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmp upx behavioral2/memory/2492-131-0x00007FF782880000-0x00007FF782BD1000-memory.dmp upx behavioral2/memory/4496-133-0x00007FF621090000-0x00007FF6213E1000-memory.dmp upx behavioral2/memory/2936-136-0x00007FF725620000-0x00007FF725971000-memory.dmp upx behavioral2/memory/4396-132-0x00007FF602A40000-0x00007FF602D91000-memory.dmp upx behavioral2/memory/2028-130-0x00007FF6247C0000-0x00007FF624B11000-memory.dmp upx behavioral2/memory/2260-150-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmp upx behavioral2/memory/2260-151-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmp upx behavioral2/memory/2192-196-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmp upx behavioral2/memory/2028-198-0x00007FF6247C0000-0x00007FF624B11000-memory.dmp upx behavioral2/memory/2492-200-0x00007FF782880000-0x00007FF782BD1000-memory.dmp upx behavioral2/memory/4396-202-0x00007FF602A40000-0x00007FF602D91000-memory.dmp upx behavioral2/memory/4496-204-0x00007FF621090000-0x00007FF6213E1000-memory.dmp upx behavioral2/memory/4052-206-0x00007FF7CBB10000-0x00007FF7CBE61000-memory.dmp upx behavioral2/memory/2452-212-0x00007FF640CA0000-0x00007FF640FF1000-memory.dmp upx behavioral2/memory/4916-211-0x00007FF67A6C0000-0x00007FF67AA11000-memory.dmp upx behavioral2/memory/2936-209-0x00007FF725620000-0x00007FF725971000-memory.dmp upx behavioral2/memory/1204-214-0x00007FF6A93E0000-0x00007FF6A9731000-memory.dmp upx behavioral2/memory/2400-219-0x00007FF656F60000-0x00007FF6572B1000-memory.dmp upx behavioral2/memory/388-224-0x00007FF698B20000-0x00007FF698E71000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\HGmVVhe.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\JVzpYal.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\tvtoota.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\HXlXDpL.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\pVVqWWl.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\TbrNeqO.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\ETiSfXS.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\EKdvgMc.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\udidbUW.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\YTQKmCE.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\OugRfxk.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\alMWkwo.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\cgjXvdw.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\DsxHOzX.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\zDwJqeM.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\WCdREEK.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\qiKOUsQ.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\IYSeqGf.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\xudSJVt.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\oaKjkLO.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\blmptHa.exe 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process target process PID 2260 wrote to memory of 2192 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe TbrNeqO.exe PID 2260 wrote to memory of 2192 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe TbrNeqO.exe PID 2260 wrote to memory of 2028 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe ETiSfXS.exe PID 2260 wrote to memory of 2028 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe ETiSfXS.exe PID 2260 wrote to memory of 2492 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe HGmVVhe.exe PID 2260 wrote to memory of 2492 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe HGmVVhe.exe PID 2260 wrote to memory of 4396 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe YTQKmCE.exe PID 2260 wrote to memory of 4396 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe YTQKmCE.exe PID 2260 wrote to memory of 4496 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe JVzpYal.exe PID 2260 wrote to memory of 4496 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe JVzpYal.exe PID 2260 wrote to memory of 4052 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe zDwJqeM.exe PID 2260 wrote to memory of 4052 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe zDwJqeM.exe PID 2260 wrote to memory of 2452 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe WCdREEK.exe PID 2260 wrote to memory of 2452 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe WCdREEK.exe PID 2260 wrote to memory of 2936 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe oaKjkLO.exe PID 2260 wrote to memory of 2936 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe oaKjkLO.exe PID 2260 wrote to memory of 4916 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe blmptHa.exe PID 2260 wrote to memory of 4916 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe blmptHa.exe PID 2260 wrote to memory of 2400 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe OugRfxk.exe PID 2260 wrote to memory of 2400 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe OugRfxk.exe PID 2260 wrote to memory of 5020 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe alMWkwo.exe PID 2260 wrote to memory of 5020 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe alMWkwo.exe PID 2260 wrote to memory of 1204 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe cgjXvdw.exe PID 2260 wrote to memory of 1204 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe cgjXvdw.exe PID 2260 wrote to memory of 3712 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe EKdvgMc.exe PID 2260 wrote to memory of 3712 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe EKdvgMc.exe PID 2260 wrote to memory of 4488 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe DsxHOzX.exe PID 2260 wrote to memory of 4488 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe DsxHOzX.exe PID 2260 wrote to memory of 388 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe qiKOUsQ.exe PID 2260 wrote to memory of 388 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe qiKOUsQ.exe PID 2260 wrote to memory of 4880 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe IYSeqGf.exe PID 2260 wrote to memory of 4880 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe IYSeqGf.exe PID 2260 wrote to memory of 4788 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe tvtoota.exe PID 2260 wrote to memory of 4788 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe tvtoota.exe PID 2260 wrote to memory of 1464 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe HXlXDpL.exe PID 2260 wrote to memory of 1464 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe HXlXDpL.exe PID 2260 wrote to memory of 4872 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe udidbUW.exe PID 2260 wrote to memory of 4872 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe udidbUW.exe PID 2260 wrote to memory of 1796 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe pVVqWWl.exe PID 2260 wrote to memory of 1796 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe pVVqWWl.exe PID 2260 wrote to memory of 1520 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe xudSJVt.exe PID 2260 wrote to memory of 1520 2260 20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe xudSJVt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20240520ff125116f134e5a9eb784c333d90bdadcobaltstrikecobaltstrike_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\TbrNeqO.exeC:\Windows\System\TbrNeqO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ETiSfXS.exeC:\Windows\System\ETiSfXS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HGmVVhe.exeC:\Windows\System\HGmVVhe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YTQKmCE.exeC:\Windows\System\YTQKmCE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JVzpYal.exeC:\Windows\System\JVzpYal.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zDwJqeM.exeC:\Windows\System\zDwJqeM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WCdREEK.exeC:\Windows\System\WCdREEK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oaKjkLO.exeC:\Windows\System\oaKjkLO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\blmptHa.exeC:\Windows\System\blmptHa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OugRfxk.exeC:\Windows\System\OugRfxk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\alMWkwo.exeC:\Windows\System\alMWkwo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cgjXvdw.exeC:\Windows\System\cgjXvdw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EKdvgMc.exeC:\Windows\System\EKdvgMc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DsxHOzX.exeC:\Windows\System\DsxHOzX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qiKOUsQ.exeC:\Windows\System\qiKOUsQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IYSeqGf.exeC:\Windows\System\IYSeqGf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tvtoota.exeC:\Windows\System\tvtoota.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HXlXDpL.exeC:\Windows\System\HXlXDpL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\udidbUW.exeC:\Windows\System\udidbUW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pVVqWWl.exeC:\Windows\System\pVVqWWl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xudSJVt.exeC:\Windows\System\xudSJVt.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4276,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=4008 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\DsxHOzX.exeFilesize
5.2MB
MD5e34bb73badd4fe73ee3528f2baea4c76
SHA15ce0b0456e4f00eede29bb592a05fd5a8d2d33ea
SHA256712d04f54c634abd758089288b43519807c973180f4fced3788afbaeb14aced0
SHA5120e03ca61d2e9567e0e14541d33575ec88359c34b0a0fe4cd3f63f0c4aaad92fa01aac6f1963daff2f0805b9fde8ddc86ab0147b56b859fbdcf388cea257eafa5
-
C:\Windows\System\EKdvgMc.exeFilesize
5.2MB
MD5e1b29ea9cfd1975f7a102e1096adfd99
SHA149e7659e5700e9b9ccb05a0a48a003df96c9853f
SHA256f2db2b63a416bae574839a0f60e2e358f27157d8c10f9719004262be3d7ddf76
SHA51210547e5822dafb03fb749743e25f824b1d63b34d932d24038d7dcc5f82888b52449ebb0f70c8ffa3d2c1175d291aa034f0e36b4c9f189b5551df5f427a2c918a
-
C:\Windows\System\ETiSfXS.exeFilesize
5.2MB
MD51f5cc1d47ec3f0cb78bed0e69524a5c8
SHA12d146d0f51c9f875112c6a2f57a15f97d9ed6c90
SHA256043301239773b4d2884017e3c1852ee6de96053c0a6874b863b22a38519c7275
SHA512d985c8722320b069a107bc0bb19655b05495977a99062f2bdb493b2a0b281964709a44cb7814d9bfffb76081495c5acbfa23ad1bd6993e3f2a6248227e761b79
-
C:\Windows\System\HGmVVhe.exeFilesize
5.2MB
MD519ecfb1cfe3108546a679292d15408a2
SHA15bc52cbefb28b5d88e5a6f3efa4f48b1d11d90d7
SHA256efa2b5d0878d368e9999a9fe79dea8fe0fbfb1d1100cf3d320c5db6f16daa0d4
SHA5122e145ca196c5a4b0ce70f3d645ec90cdb83f15f27757332d06ce9a52b821f306b9bd1503c21b04c8b4b69c32787257f8966b0d853318c8ec3595de870ba94b4a
-
C:\Windows\System\HXlXDpL.exeFilesize
5.2MB
MD549805bd183b4caade6db5d7abd5bce8b
SHA1837a657fa6398575eb3f4d5c1b32f7b5b320e4a5
SHA256724623cbcf283a3d4841d9d3e3af9fb7beb1768d6b9ad9a2bdbc93668c6d893a
SHA5128b92c8f78a5cf081de2253b7cdd732b8dd8ac503ed2722aac7b211072c74ecfde4244273cd0821fb96fa1b1ebc76454bd9040a5fe4dac2c1246fc8378ceca4e0
-
C:\Windows\System\IYSeqGf.exeFilesize
5.2MB
MD5c8f2cbab8ce95a5c60a0dd7eb3da165e
SHA1c4902fea4d5e890adef9d7ec743598aa5c3859f4
SHA256f969aed36933b94b27e04a20079b663db0fbf0791c13aeeffd07f05887d2c546
SHA512f528dcf74187390c6d8c98a7828176cc901addda68a88239e07cacd675806700eb933a36fdfd6a4b1c383f9a724d0a3098dfa64edb2326abfb326817bd02a8e6
-
C:\Windows\System\JVzpYal.exeFilesize
5.2MB
MD57817f6de97908f97fc17a42e9d2bea23
SHA142451ec3cf12c0f3613bd92c3145b15ae4de505f
SHA25622b6db815e8732873c64ff1770e60d08eb6fa18e6d0508decfae6fea2266e522
SHA51220c65f2f515b3261e02cba6b7598830785ae592881f731996658e4a3513f7eb3efb1e6e9a52e3f84a596c2687f78df550c59dda53a61ce91bc1d9f3a13795b94
-
C:\Windows\System\OugRfxk.exeFilesize
5.2MB
MD5c2ca5329a08ebfb22707076b4acfb5f3
SHA1599e41ad7683397679f416b7cd220fc4e354b161
SHA256e620c9278f6f43734db2f08873c14daaab086c2fcf82dc3b4b94d5f5764cf696
SHA51249a8c56209952217ce4dd11a762edebb842f393be0a4bc907cf8d6b927eda2d1513b2d78c0c5fde9856e433ea30611eaff7662b534dc0703c8faa51cca61269a
-
C:\Windows\System\TbrNeqO.exeFilesize
5.2MB
MD5b39447275ed1040c3d877c6602457bdc
SHA13577c7bfee0902cbd12206abf0da2041d89c7a7e
SHA256bf5e4a9e3c318b8f221b5e190bb9f0c101c43731067aad87f99a48399b000f39
SHA512a67f002403e797b68bf74e1ceb09c1f1aa491c6c843af010b5d97e4cfd3465f52a2946f2aef3a98a2325673dbe5150eaac02f9ac12dd1a31ee67ac1ffcaae918
-
C:\Windows\System\WCdREEK.exeFilesize
5.2MB
MD5bd88915c059de6e29effb5c93db27037
SHA19de63247a77e6132ccaa2261a2d12462f3ab8b93
SHA256d62cdfb46ba27ce0a8f4be25c7254895852100074d1426a0ce7849f0398eb2a5
SHA512a0b75c961a143e7e65fcb84284dbfeec953c7870762a5b5e700d6553a0041a848519cd4306742f7101516407a034953209cc8f9ae73a2c323a63b7964a4512c2
-
C:\Windows\System\YTQKmCE.exeFilesize
5.2MB
MD57566d14af261441d2ba3951b1f536c16
SHA1750c378e1f54f3e77cb6e3082338339492472c0f
SHA2564586a4a23a4790aad3e93fc0816d175e4d6b4ae1a7dd897af5a36fcb47a4e9e5
SHA512210c41e341d432ec4370c4f7c2133b9a332471ee5b0289439af1e51d123c566b915709af0c68e1d86b584f80fcca0a817ae78dc9ed97c68076c38f04e24fe20c
-
C:\Windows\System\alMWkwo.exeFilesize
5.2MB
MD58e6651c0e0326ae3f3269646eef7a0dd
SHA1b4782ae3cd298722b52249d64cd8c5e6d1bebd55
SHA256755c8152561769c9b10b9c5d137b1cd5a0479956e9eba2b2658df8f61717b681
SHA512e7aa799617ecf69cf7c7846e965cb99bb248f16612573060069022cf3f805df6c1f3f2c59c98f94bd020760bb4085766fd7793948806f11ed666bcd585a7f821
-
C:\Windows\System\blmptHa.exeFilesize
5.2MB
MD5ff0a58caf8a6ba058150a736d57f24ca
SHA1e03f24e6dc7789aa76645c93b329c0f792182efb
SHA256b2589c2cbfdc0b5826bd1a2712c08fef61c893987e189b90da0725eea3f8dce8
SHA512c5c9223dfc7d21196d1ae7fa179289801f7c33eb525844a234957c4b7adf02785b73c8f262d9c8bad35f4ad03fabdcecd72a91aced91e4b321e55523beb40a27
-
C:\Windows\System\cgjXvdw.exeFilesize
5.2MB
MD525f1240772f89c5878b27567be04ea47
SHA15166397d083f48dd8b5b46ae930d871c60d90dab
SHA256704cde2c489daee776ddb7788937ee53ea28407f6a2610fad998f94e3adaeeee
SHA51233b48024ab60639235f743a9682673105fdfafcbeed8d3bd3659283d2994d2e926bc856f942a3509b553c2a1c5d4531089a8f1a3378a59f61397ce9746b396e6
-
C:\Windows\System\oaKjkLO.exeFilesize
5.2MB
MD537b11d1adc999c2faba0394ac60dcacb
SHA12e09504760109a2fb1bfcaa1c58ff3b397b730e9
SHA2560a15e252aab9ed26d30a987cb242b20fd2c87433042b32fe1da87d0afe977119
SHA512be41ee991a0a0bf5cb4edaca66641517098289b9bc1e262fd563fa0fc184bce8bf97e722301fe1e2f5715adc44aea6a66fc49a78062d55697225ae600df4025c
-
C:\Windows\System\pVVqWWl.exeFilesize
5.2MB
MD5835d76433840cc4ad10ed9203ecc9644
SHA1c2d77cfd1b549f281fe01358c4229e8ce48c4a4b
SHA256a1f17ae81dc37935c0618fb7867631dd64fb86626fb6363e721da90986109cbf
SHA5129372982ba225d9fefe9f3b66101b9cc183d28b7b24d337e78e783c00fe0b7e2a52d22edda2685b2a2cf1e6218e01cc386b293c935b672ab8124b112edf52e543
-
C:\Windows\System\qiKOUsQ.exeFilesize
5.2MB
MD5efae85009c298618df584db1201ac9a9
SHA18547683cbe230349bc6446690d3ea18b9d5000a0
SHA2566289759ab13a315ef75783a13b7ff5dd07cb730e9b8bab0a6e50e9c834dcc955
SHA5124b22bce3704b12a07a21db60c0551d277f6e5d4ad8632709e85b91ecc1d9425d13394e2665ede6113133c9ec6cdd2597748541163ffb6468f5c0ee92f2d5d4e8
-
C:\Windows\System\tvtoota.exeFilesize
5.2MB
MD5ec308ada3a50bfcef1e059b533fe6ff7
SHA186fedb3d6793fb8c42521cf7f257f528b7a05a7b
SHA25623a927236d699019ef5ca56286b2c859f1df57bb6d4e76e75f01c3f2c4c6c1da
SHA512a1783d5b94bc48d70c878b3b858c4644c548678678dacfae69918e36002365cdf4c1b63671eeaccb1fa1f6b2f46117a1eda715efad496ccacc797708476c15fd
-
C:\Windows\System\udidbUW.exeFilesize
5.2MB
MD5a1ba6daadc654f591870354b5ddbdacb
SHA1ee7d5b11f3a63285763257990736153a1eb9057e
SHA2568eee08633ee4ae0490c9d3064700bd7894b28279cb4d48fe35bb5d1c8ea11c01
SHA5128bf973f293a624d30eccaa443b59429b31a03051e43a61aa9bd21f0347fe37825c9da671eb53c94514000b408bdd8f6c2244829c470bde5d73a51a2e483d9075
-
C:\Windows\System\xudSJVt.exeFilesize
5.2MB
MD524bd55c2cfc26525cffefbb80ab3b23b
SHA1e20d5ef4b3b6a9c278b7ebe1e740be772920764f
SHA2565ff5f3e2869ff6e51a123b9fec5bd93ca8b5435f7944af3c1fd5115282e2ca92
SHA512a74e03367a8aef5e27c10287fdef2eb16e555bd02cbf3ab73eb4352fab55dc6e0c8cd214c65c87271a6a43bb27cf4292294d28c30b8e1731d8587f7d0380e165
-
C:\Windows\System\zDwJqeM.exeFilesize
5.2MB
MD51d35a0dbdc904b8a61c79eef38369747
SHA1301845cd2a6c1f58a88be6b1bf7034074e905448
SHA256526f36e4bc279fec3cb0e63bc33dc2b8c4757c084a184ac0bfe25e577eefcd30
SHA51226c95412ab2acb8809e77f0cb3fffabf22c60eee66a7a59cb63284c11da9d70f1525d02dbec5fea657de3e89108853124d4377ad5f3f262432350eff029b36f8
-
memory/388-224-0x00007FF698B20000-0x00007FF698E71000-memory.dmpFilesize
3.3MB
-
memory/388-119-0x00007FF698B20000-0x00007FF698E71000-memory.dmpFilesize
3.3MB
-
memory/1204-214-0x00007FF6A93E0000-0x00007FF6A9731000-memory.dmpFilesize
3.3MB
-
memory/1204-116-0x00007FF6A93E0000-0x00007FF6A9731000-memory.dmpFilesize
3.3MB
-
memory/1464-233-0x00007FF792070000-0x00007FF7923C1000-memory.dmpFilesize
3.3MB
-
memory/1464-122-0x00007FF792070000-0x00007FF7923C1000-memory.dmpFilesize
3.3MB
-
memory/1520-125-0x00007FF79B0D0000-0x00007FF79B421000-memory.dmpFilesize
3.3MB
-
memory/1520-226-0x00007FF79B0D0000-0x00007FF79B421000-memory.dmpFilesize
3.3MB
-
memory/1796-229-0x00007FF6AA370000-0x00007FF6AA6C1000-memory.dmpFilesize
3.3MB
-
memory/1796-124-0x00007FF6AA370000-0x00007FF6AA6C1000-memory.dmpFilesize
3.3MB
-
memory/2028-130-0x00007FF6247C0000-0x00007FF624B11000-memory.dmpFilesize
3.3MB
-
memory/2028-198-0x00007FF6247C0000-0x00007FF624B11000-memory.dmpFilesize
3.3MB
-
memory/2028-13-0x00007FF6247C0000-0x00007FF624B11000-memory.dmpFilesize
3.3MB
-
memory/2192-196-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmpFilesize
3.3MB
-
memory/2192-129-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmpFilesize
3.3MB
-
memory/2192-8-0x00007FF7B7160000-0x00007FF7B74B1000-memory.dmpFilesize
3.3MB
-
memory/2260-0-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmpFilesize
3.3MB
-
memory/2260-1-0x00000292EA640000-0x00000292EA650000-memory.dmpFilesize
64KB
-
memory/2260-150-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmpFilesize
3.3MB
-
memory/2260-151-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmpFilesize
3.3MB
-
memory/2260-128-0x00007FF78A750000-0x00007FF78AAA1000-memory.dmpFilesize
3.3MB
-
memory/2400-114-0x00007FF656F60000-0x00007FF6572B1000-memory.dmpFilesize
3.3MB
-
memory/2400-219-0x00007FF656F60000-0x00007FF6572B1000-memory.dmpFilesize
3.3MB
-
memory/2452-126-0x00007FF640CA0000-0x00007FF640FF1000-memory.dmpFilesize
3.3MB
-
memory/2452-212-0x00007FF640CA0000-0x00007FF640FF1000-memory.dmpFilesize
3.3MB
-
memory/2492-131-0x00007FF782880000-0x00007FF782BD1000-memory.dmpFilesize
3.3MB
-
memory/2492-20-0x00007FF782880000-0x00007FF782BD1000-memory.dmpFilesize
3.3MB
-
memory/2492-200-0x00007FF782880000-0x00007FF782BD1000-memory.dmpFilesize
3.3MB
-
memory/2936-136-0x00007FF725620000-0x00007FF725971000-memory.dmpFilesize
3.3MB
-
memory/2936-209-0x00007FF725620000-0x00007FF725971000-memory.dmpFilesize
3.3MB
-
memory/2936-113-0x00007FF725620000-0x00007FF725971000-memory.dmpFilesize
3.3MB
-
memory/3712-220-0x00007FF7A3F80000-0x00007FF7A42D1000-memory.dmpFilesize
3.3MB
-
memory/3712-117-0x00007FF7A3F80000-0x00007FF7A42D1000-memory.dmpFilesize
3.3MB
-
memory/4052-206-0x00007FF7CBB10000-0x00007FF7CBE61000-memory.dmpFilesize
3.3MB
-
memory/4052-40-0x00007FF7CBB10000-0x00007FF7CBE61000-memory.dmpFilesize
3.3MB
-
memory/4396-132-0x00007FF602A40000-0x00007FF602D91000-memory.dmpFilesize
3.3MB
-
memory/4396-26-0x00007FF602A40000-0x00007FF602D91000-memory.dmpFilesize
3.3MB
-
memory/4396-202-0x00007FF602A40000-0x00007FF602D91000-memory.dmpFilesize
3.3MB
-
memory/4488-222-0x00007FF624CF0000-0x00007FF625041000-memory.dmpFilesize
3.3MB
-
memory/4488-118-0x00007FF624CF0000-0x00007FF625041000-memory.dmpFilesize
3.3MB
-
memory/4496-133-0x00007FF621090000-0x00007FF6213E1000-memory.dmpFilesize
3.3MB
-
memory/4496-32-0x00007FF621090000-0x00007FF6213E1000-memory.dmpFilesize
3.3MB
-
memory/4496-204-0x00007FF621090000-0x00007FF6213E1000-memory.dmpFilesize
3.3MB
-
memory/4788-235-0x00007FF60FFF0000-0x00007FF610341000-memory.dmpFilesize
3.3MB
-
memory/4788-121-0x00007FF60FFF0000-0x00007FF610341000-memory.dmpFilesize
3.3MB
-
memory/4872-231-0x00007FF7A0AF0000-0x00007FF7A0E41000-memory.dmpFilesize
3.3MB
-
memory/4872-123-0x00007FF7A0AF0000-0x00007FF7A0E41000-memory.dmpFilesize
3.3MB
-
memory/4880-120-0x00007FF69FCC0000-0x00007FF6A0011000-memory.dmpFilesize
3.3MB
-
memory/4880-236-0x00007FF69FCC0000-0x00007FF6A0011000-memory.dmpFilesize
3.3MB
-
memory/4916-211-0x00007FF67A6C0000-0x00007FF67AA11000-memory.dmpFilesize
3.3MB
-
memory/4916-127-0x00007FF67A6C0000-0x00007FF67AA11000-memory.dmpFilesize
3.3MB
-
memory/5020-217-0x00007FF686380000-0x00007FF6866D1000-memory.dmpFilesize
3.3MB
-
memory/5020-115-0x00007FF686380000-0x00007FF6866D1000-memory.dmpFilesize
3.3MB