Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 10:16
Behavioral task
behavioral1
Sample
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe
-
Size
5.9MB
-
MD5
31711f3522edff5d7b292a752af6e030
-
SHA1
0a6f61be74dfa5b96b8c9af95e04fe8ff7366500
-
SHA256
01067f3d3d36924125e9cdb4f8202d86d866263c86a09c7049b4660b995210c1
-
SHA512
d52c57c99cb9fcfaf99fbea0887428a934cb9b6db41343fa6c71d1eae066d8512113c2e1f8e6c016426cdb6552a62e79132e4c702ee74d292b7aa279b88c5863
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUi:Q+856utgpPF8u/7i
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\UtrfUJX.exe cobalt_reflective_dll \Windows\system\zxxCpHH.exe cobalt_reflective_dll C:\Windows\system\uDEdvzU.exe cobalt_reflective_dll C:\Windows\system\ODirQzx.exe cobalt_reflective_dll \Windows\system\YWXgTlc.exe cobalt_reflective_dll C:\Windows\system\CKOoUFK.exe cobalt_reflective_dll C:\Windows\system\MxAFbuJ.exe cobalt_reflective_dll C:\Windows\system\ihRzBvk.exe cobalt_reflective_dll C:\Windows\system\PhnnmLm.exe cobalt_reflective_dll \Windows\system\zKXLQsh.exe cobalt_reflective_dll C:\Windows\system\wwhCpiL.exe cobalt_reflective_dll C:\Windows\system\equsSMw.exe cobalt_reflective_dll \Windows\system\lTTUmne.exe cobalt_reflective_dll C:\Windows\system\aCQqSen.exe cobalt_reflective_dll C:\Windows\system\VqRfjDl.exe cobalt_reflective_dll C:\Windows\system\boFhjEQ.exe cobalt_reflective_dll C:\Windows\system\biHZlPQ.exe cobalt_reflective_dll C:\Windows\system\YwBMKVR.exe cobalt_reflective_dll C:\Windows\system\NjXcfjP.exe cobalt_reflective_dll C:\Windows\system\IccFhru.exe cobalt_reflective_dll C:\Windows\system\HwOgKVX.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2400-1-0x000000013FD60000-0x00000001400B4000-memory.dmp xmrig \Windows\system\UtrfUJX.exe xmrig \Windows\system\zxxCpHH.exe xmrig behavioral1/memory/3036-13-0x000000013F620000-0x000000013F974000-memory.dmp xmrig C:\Windows\system\uDEdvzU.exe xmrig C:\Windows\system\ODirQzx.exe xmrig behavioral1/memory/2664-28-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/2704-26-0x000000013F370000-0x000000013F6C4000-memory.dmp xmrig \Windows\system\YWXgTlc.exe xmrig C:\Windows\system\CKOoUFK.exe xmrig behavioral1/memory/2504-41-0x000000013F410000-0x000000013F764000-memory.dmp xmrig C:\Windows\system\MxAFbuJ.exe xmrig behavioral1/memory/3064-57-0x000000013F3E0000-0x000000013F734000-memory.dmp xmrig behavioral1/memory/2468-60-0x000000013F410000-0x000000013F764000-memory.dmp xmrig behavioral1/memory/552-51-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig behavioral1/memory/2400-50-0x000000013FD60000-0x00000001400B4000-memory.dmp xmrig C:\Windows\system\ihRzBvk.exe xmrig C:\Windows\system\PhnnmLm.exe xmrig behavioral1/memory/2848-74-0x000000013F930000-0x000000013FC84000-memory.dmp xmrig \Windows\system\zKXLQsh.exe xmrig behavioral1/memory/2880-87-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig C:\Windows\system\wwhCpiL.exe xmrig C:\Windows\system\equsSMw.exe xmrig \Windows\system\lTTUmne.exe xmrig C:\Windows\system\aCQqSen.exe xmrig C:\Windows\system\VqRfjDl.exe xmrig C:\Windows\system\boFhjEQ.exe xmrig C:\Windows\system\biHZlPQ.exe xmrig behavioral1/memory/2468-129-0x000000013F410000-0x000000013F764000-memory.dmp xmrig behavioral1/memory/1608-101-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig C:\Windows\system\YwBMKVR.exe xmrig behavioral1/memory/2796-95-0x000000013F880000-0x000000013FBD4000-memory.dmp xmrig behavioral1/memory/2504-93-0x000000013F410000-0x000000013F764000-memory.dmp xmrig C:\Windows\system\NjXcfjP.exe xmrig behavioral1/memory/2568-88-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig C:\Windows\system\IccFhru.exe xmrig behavioral1/memory/2940-81-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig behavioral1/memory/2400-80-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig behavioral1/memory/2664-79-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/2592-142-0x000000013F2A0000-0x000000013F5F4000-memory.dmp xmrig behavioral1/memory/2592-66-0x000000013F2A0000-0x000000013F5F4000-memory.dmp xmrig behavioral1/memory/3036-65-0x000000013F620000-0x000000013F974000-memory.dmp xmrig C:\Windows\system\HwOgKVX.exe xmrig behavioral1/memory/2704-73-0x000000013F370000-0x000000013F6C4000-memory.dmp xmrig behavioral1/memory/2880-35-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/3064-22-0x000000013F3E0000-0x000000013F734000-memory.dmp xmrig behavioral1/memory/2848-144-0x000000013F930000-0x000000013FC84000-memory.dmp xmrig behavioral1/memory/2400-145-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig behavioral1/memory/2940-146-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig behavioral1/memory/2568-148-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2796-150-0x000000013F880000-0x000000013FBD4000-memory.dmp xmrig behavioral1/memory/1608-152-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/3036-153-0x000000013F620000-0x000000013F974000-memory.dmp xmrig behavioral1/memory/3064-154-0x000000013F3E0000-0x000000013F734000-memory.dmp xmrig behavioral1/memory/2704-156-0x000000013F370000-0x000000013F6C4000-memory.dmp xmrig behavioral1/memory/2664-155-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/2880-157-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2504-158-0x000000013F410000-0x000000013F764000-memory.dmp xmrig behavioral1/memory/552-159-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig behavioral1/memory/2468-160-0x000000013F410000-0x000000013F764000-memory.dmp xmrig behavioral1/memory/2592-161-0x000000013F2A0000-0x000000013F5F4000-memory.dmp xmrig behavioral1/memory/1608-163-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2568-162-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2940-165-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
UtrfUJX.exezxxCpHH.exeuDEdvzU.exeODirQzx.exeYWXgTlc.exeCKOoUFK.exeMxAFbuJ.exeihRzBvk.exeHwOgKVX.exePhnnmLm.exezKXLQsh.exeIccFhru.exeNjXcfjP.exeYwBMKVR.exewwhCpiL.exebiHZlPQ.exeboFhjEQ.exeVqRfjDl.exeaCQqSen.exeequsSMw.exelTTUmne.exepid process 3036 UtrfUJX.exe 3064 zxxCpHH.exe 2704 uDEdvzU.exe 2664 ODirQzx.exe 2880 YWXgTlc.exe 2504 CKOoUFK.exe 552 MxAFbuJ.exe 2468 ihRzBvk.exe 2592 HwOgKVX.exe 2848 PhnnmLm.exe 2940 zKXLQsh.exe 2568 IccFhru.exe 2796 NjXcfjP.exe 1608 YwBMKVR.exe 2520 wwhCpiL.exe 2812 biHZlPQ.exe 2000 boFhjEQ.exe 1968 VqRfjDl.exe 2140 aCQqSen.exe 2832 equsSMw.exe 1272 lTTUmne.exe -
Loads dropped DLL 21 IoCs
Processes:
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exepid process 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2400-1-0x000000013FD60000-0x00000001400B4000-memory.dmp upx \Windows\system\UtrfUJX.exe upx \Windows\system\zxxCpHH.exe upx behavioral1/memory/3036-13-0x000000013F620000-0x000000013F974000-memory.dmp upx C:\Windows\system\uDEdvzU.exe upx C:\Windows\system\ODirQzx.exe upx behavioral1/memory/2664-28-0x000000013F570000-0x000000013F8C4000-memory.dmp upx behavioral1/memory/2704-26-0x000000013F370000-0x000000013F6C4000-memory.dmp upx \Windows\system\YWXgTlc.exe upx C:\Windows\system\CKOoUFK.exe upx behavioral1/memory/2504-41-0x000000013F410000-0x000000013F764000-memory.dmp upx C:\Windows\system\MxAFbuJ.exe upx behavioral1/memory/3064-57-0x000000013F3E0000-0x000000013F734000-memory.dmp upx behavioral1/memory/2468-60-0x000000013F410000-0x000000013F764000-memory.dmp upx behavioral1/memory/552-51-0x000000013F2D0000-0x000000013F624000-memory.dmp upx behavioral1/memory/2400-50-0x000000013FD60000-0x00000001400B4000-memory.dmp upx C:\Windows\system\ihRzBvk.exe upx C:\Windows\system\PhnnmLm.exe upx behavioral1/memory/2848-74-0x000000013F930000-0x000000013FC84000-memory.dmp upx \Windows\system\zKXLQsh.exe upx behavioral1/memory/2880-87-0x000000013F4F0000-0x000000013F844000-memory.dmp upx C:\Windows\system\wwhCpiL.exe upx C:\Windows\system\equsSMw.exe upx \Windows\system\lTTUmne.exe upx C:\Windows\system\aCQqSen.exe upx C:\Windows\system\VqRfjDl.exe upx C:\Windows\system\boFhjEQ.exe upx C:\Windows\system\biHZlPQ.exe upx behavioral1/memory/2468-129-0x000000013F410000-0x000000013F764000-memory.dmp upx behavioral1/memory/1608-101-0x000000013FE90000-0x00000001401E4000-memory.dmp upx C:\Windows\system\YwBMKVR.exe upx behavioral1/memory/2796-95-0x000000013F880000-0x000000013FBD4000-memory.dmp upx behavioral1/memory/2504-93-0x000000013F410000-0x000000013F764000-memory.dmp upx C:\Windows\system\NjXcfjP.exe upx behavioral1/memory/2568-88-0x000000013F090000-0x000000013F3E4000-memory.dmp upx C:\Windows\system\IccFhru.exe upx behavioral1/memory/2940-81-0x000000013F2D0000-0x000000013F624000-memory.dmp upx behavioral1/memory/2664-79-0x000000013F570000-0x000000013F8C4000-memory.dmp upx behavioral1/memory/2592-142-0x000000013F2A0000-0x000000013F5F4000-memory.dmp upx behavioral1/memory/2592-66-0x000000013F2A0000-0x000000013F5F4000-memory.dmp upx behavioral1/memory/3036-65-0x000000013F620000-0x000000013F974000-memory.dmp upx C:\Windows\system\HwOgKVX.exe upx behavioral1/memory/2704-73-0x000000013F370000-0x000000013F6C4000-memory.dmp upx behavioral1/memory/2880-35-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/3064-22-0x000000013F3E0000-0x000000013F734000-memory.dmp upx behavioral1/memory/2400-6-0x000000013F620000-0x000000013F974000-memory.dmp upx behavioral1/memory/2848-144-0x000000013F930000-0x000000013FC84000-memory.dmp upx behavioral1/memory/2940-146-0x000000013F2D0000-0x000000013F624000-memory.dmp upx behavioral1/memory/2568-148-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2796-150-0x000000013F880000-0x000000013FBD4000-memory.dmp upx behavioral1/memory/1608-152-0x000000013FE90000-0x00000001401E4000-memory.dmp upx behavioral1/memory/3036-153-0x000000013F620000-0x000000013F974000-memory.dmp upx behavioral1/memory/3064-154-0x000000013F3E0000-0x000000013F734000-memory.dmp upx behavioral1/memory/2704-156-0x000000013F370000-0x000000013F6C4000-memory.dmp upx behavioral1/memory/2664-155-0x000000013F570000-0x000000013F8C4000-memory.dmp upx behavioral1/memory/2880-157-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2504-158-0x000000013F410000-0x000000013F764000-memory.dmp upx behavioral1/memory/552-159-0x000000013F2D0000-0x000000013F624000-memory.dmp upx behavioral1/memory/2468-160-0x000000013F410000-0x000000013F764000-memory.dmp upx behavioral1/memory/2592-161-0x000000013F2A0000-0x000000013F5F4000-memory.dmp upx behavioral1/memory/1608-163-0x000000013FE90000-0x00000001401E4000-memory.dmp upx behavioral1/memory/2568-162-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2940-165-0x000000013F2D0000-0x000000013F624000-memory.dmp upx behavioral1/memory/2796-166-0x000000013F880000-0x000000013FBD4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\ODirQzx.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\uDEdvzU.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\CKOoUFK.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\zKXLQsh.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\NjXcfjP.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\wwhCpiL.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\biHZlPQ.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\UtrfUJX.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\VqRfjDl.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\YwBMKVR.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\boFhjEQ.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\aCQqSen.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\equsSMw.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\ihRzBvk.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\PhnnmLm.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\lTTUmne.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\HwOgKVX.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\YWXgTlc.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\MxAFbuJ.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\IccFhru.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\zxxCpHH.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exedescription pid process target process PID 2400 wrote to memory of 3036 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe UtrfUJX.exe PID 2400 wrote to memory of 3036 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe UtrfUJX.exe PID 2400 wrote to memory of 3036 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe UtrfUJX.exe PID 2400 wrote to memory of 3064 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe zxxCpHH.exe PID 2400 wrote to memory of 3064 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe zxxCpHH.exe PID 2400 wrote to memory of 3064 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe zxxCpHH.exe PID 2400 wrote to memory of 2664 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ODirQzx.exe PID 2400 wrote to memory of 2664 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ODirQzx.exe PID 2400 wrote to memory of 2664 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ODirQzx.exe PID 2400 wrote to memory of 2704 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe uDEdvzU.exe PID 2400 wrote to memory of 2704 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe uDEdvzU.exe PID 2400 wrote to memory of 2704 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe uDEdvzU.exe PID 2400 wrote to memory of 2880 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YWXgTlc.exe PID 2400 wrote to memory of 2880 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YWXgTlc.exe PID 2400 wrote to memory of 2880 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YWXgTlc.exe PID 2400 wrote to memory of 2504 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe CKOoUFK.exe PID 2400 wrote to memory of 2504 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe CKOoUFK.exe PID 2400 wrote to memory of 2504 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe CKOoUFK.exe PID 2400 wrote to memory of 552 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe MxAFbuJ.exe PID 2400 wrote to memory of 552 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe MxAFbuJ.exe PID 2400 wrote to memory of 552 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe MxAFbuJ.exe PID 2400 wrote to memory of 2468 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ihRzBvk.exe PID 2400 wrote to memory of 2468 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ihRzBvk.exe PID 2400 wrote to memory of 2468 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ihRzBvk.exe PID 2400 wrote to memory of 2592 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe HwOgKVX.exe PID 2400 wrote to memory of 2592 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe HwOgKVX.exe PID 2400 wrote to memory of 2592 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe HwOgKVX.exe PID 2400 wrote to memory of 2848 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe PhnnmLm.exe PID 2400 wrote to memory of 2848 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe PhnnmLm.exe PID 2400 wrote to memory of 2848 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe PhnnmLm.exe PID 2400 wrote to memory of 2940 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe zKXLQsh.exe PID 2400 wrote to memory of 2940 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe zKXLQsh.exe PID 2400 wrote to memory of 2940 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe zKXLQsh.exe PID 2400 wrote to memory of 2568 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe IccFhru.exe PID 2400 wrote to memory of 2568 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe IccFhru.exe PID 2400 wrote to memory of 2568 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe IccFhru.exe PID 2400 wrote to memory of 2796 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe NjXcfjP.exe PID 2400 wrote to memory of 2796 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe NjXcfjP.exe PID 2400 wrote to memory of 2796 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe NjXcfjP.exe PID 2400 wrote to memory of 1608 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YwBMKVR.exe PID 2400 wrote to memory of 1608 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YwBMKVR.exe PID 2400 wrote to memory of 1608 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YwBMKVR.exe PID 2400 wrote to memory of 2520 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe wwhCpiL.exe PID 2400 wrote to memory of 2520 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe wwhCpiL.exe PID 2400 wrote to memory of 2520 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe wwhCpiL.exe PID 2400 wrote to memory of 2812 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe biHZlPQ.exe PID 2400 wrote to memory of 2812 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe biHZlPQ.exe PID 2400 wrote to memory of 2812 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe biHZlPQ.exe PID 2400 wrote to memory of 2000 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe boFhjEQ.exe PID 2400 wrote to memory of 2000 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe boFhjEQ.exe PID 2400 wrote to memory of 2000 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe boFhjEQ.exe PID 2400 wrote to memory of 1968 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe VqRfjDl.exe PID 2400 wrote to memory of 1968 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe VqRfjDl.exe PID 2400 wrote to memory of 1968 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe VqRfjDl.exe PID 2400 wrote to memory of 2140 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe aCQqSen.exe PID 2400 wrote to memory of 2140 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe aCQqSen.exe PID 2400 wrote to memory of 2140 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe aCQqSen.exe PID 2400 wrote to memory of 2832 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe equsSMw.exe PID 2400 wrote to memory of 2832 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe equsSMw.exe PID 2400 wrote to memory of 2832 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe equsSMw.exe PID 2400 wrote to memory of 1272 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe lTTUmne.exe PID 2400 wrote to memory of 1272 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe lTTUmne.exe PID 2400 wrote to memory of 1272 2400 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe lTTUmne.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\UtrfUJX.exeC:\Windows\System\UtrfUJX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zxxCpHH.exeC:\Windows\System\zxxCpHH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ODirQzx.exeC:\Windows\System\ODirQzx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uDEdvzU.exeC:\Windows\System\uDEdvzU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YWXgTlc.exeC:\Windows\System\YWXgTlc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CKOoUFK.exeC:\Windows\System\CKOoUFK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MxAFbuJ.exeC:\Windows\System\MxAFbuJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ihRzBvk.exeC:\Windows\System\ihRzBvk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HwOgKVX.exeC:\Windows\System\HwOgKVX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PhnnmLm.exeC:\Windows\System\PhnnmLm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zKXLQsh.exeC:\Windows\System\zKXLQsh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IccFhru.exeC:\Windows\System\IccFhru.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NjXcfjP.exeC:\Windows\System\NjXcfjP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YwBMKVR.exeC:\Windows\System\YwBMKVR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wwhCpiL.exeC:\Windows\System\wwhCpiL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\biHZlPQ.exeC:\Windows\System\biHZlPQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\boFhjEQ.exeC:\Windows\System\boFhjEQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VqRfjDl.exeC:\Windows\System\VqRfjDl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aCQqSen.exeC:\Windows\System\aCQqSen.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\equsSMw.exeC:\Windows\System\equsSMw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lTTUmne.exeC:\Windows\System\lTTUmne.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CKOoUFK.exeFilesize
5.9MB
MD5cce8e112ed227ec52508ae9cc34a26aa
SHA1637c56dab4c1ec0279266262a8323a73db5624a6
SHA2564e27e5953b6d8598b1a035b0bc0600f4f19bd21833182b60025350275849173f
SHA51265f997d618cee358fe555111e1cd824ce98064f6184ede214cf0a045d7bfacf6b3ab248a3036fe5522d92556d8ef4330bd5aac16632ad4d1a824749d79071fea
-
C:\Windows\system\HwOgKVX.exeFilesize
5.9MB
MD56887c2bf883bf1c6b6b7472e9f987fd6
SHA1338862b55c8a4b29482ab19dcb2b1b539060cd96
SHA2567540a1cf7921b3b7015e8ec3a8bf9d4ecc862eb09b28ee6f35db6a3d20ef8191
SHA512597be681c6c96c108b4dfd1f927e1465a525c44ae916656a743b53d828e5cd4986216ea6316baf1d7bcbafbe50eec46e637a9a40d9f6d892c8c09d083fd533a1
-
C:\Windows\system\IccFhru.exeFilesize
5.9MB
MD5d1a5bd42993856a893e0d86c1a007e9f
SHA1f11ca005f63b69ccf41be041c60410760a06efb0
SHA256ee69babf24837e389df3ba64daf21441f49fa9fef9ecd2e9bdefd1607effc1a7
SHA5125783f5de4cb31969291854066e9798e40b58a9d2c9b9f8f80e93f514c8a88538125bfd224f70b6a391197069b77a7de6067616ae07926dbb3a3171ba1e92b8e2
-
C:\Windows\system\MxAFbuJ.exeFilesize
5.9MB
MD58e84ed509d38ca25b40f11f613dc5d96
SHA1dd76eb2f7347a8d9869bded36d24d55417a8d34f
SHA256d7479076290f2b4891109f742c25b21f61bb9b079548e1f8e77642e7287766fe
SHA5127af1330c833084cf25adc9dd9f0fc837b9a49c6ae548c98af2d77fb42a6e1dc208ac49074e1a615c8bb618e9cac3d45b69c8b5f353a1afbba4174059ff716617
-
C:\Windows\system\NjXcfjP.exeFilesize
5.9MB
MD500f13d6401c7476487eaa481966d3aca
SHA16d1e3710cd9e2edc77886abf86ad3c3d0525827b
SHA2562dc5646f0cec521e929362aa4e134084d922503568efc3bb464fbc01955c48dd
SHA5123b0275408fac0b36d283c6b63b829e81ace8ca381d3ad6028c6fa8cc1cb1e33feefc34bee238dccf1e607ccde98c1688ab901f6ec2c89b9e29116a871755c587
-
C:\Windows\system\ODirQzx.exeFilesize
5.9MB
MD5639c0a5e87ef590e377778ccd2904e57
SHA14357b283cf8f7191fb46211a10537180bd6cd77d
SHA256cfda5828736d436ebe20d4ceda4c26514b83a5fc8adfa6c4bdc4eceadb5a46b0
SHA512bd094312b3ed4b8ab99a567cc06c826c704b72cc482dc45a10bd63a9093d97c575fe5236cf405a64f38c537da25c84bdc59b4088d703789060a922dab8f05d49
-
C:\Windows\system\PhnnmLm.exeFilesize
5.9MB
MD56d48db61b347094c6c3c9a6506a8a4fa
SHA1b2166af6a8f6db3348429bdc1942a80231469605
SHA256303d18e9056175632ea0fc90a09113d74f0356aeb0e3adeebc2b422830f0a2ad
SHA512260fce04f57d432f385dfbf76d4a3f55bd87c6be1ffb00388674def0f0f86b362daf386e6f02b1426993d22c8a8200655d65f4de23bc5651f721cb3b9eff9684
-
C:\Windows\system\VqRfjDl.exeFilesize
5.9MB
MD55e258a4c97325e1b3fc2f89dbc2da3fd
SHA10023b3ace6d325d98fa976dd78330a7ec99c0e32
SHA256652186723fd426290cbd1deaf0902ac72bf56f8bb51822d7abccb7c0ed74af60
SHA5126491f22055ddadd8adefa9e71795d275db487086c00f9dca437fd722130b04d3ec8159205210503f17321a640fff2a6db67a04ad34d79fe1c0ca765f823da3f5
-
C:\Windows\system\YwBMKVR.exeFilesize
5.9MB
MD5f88b42656cd9d092e304b2f34ff518cd
SHA1b3fdc94c5607fba8a86539e18b8353ee43c1be2a
SHA2568125bb6bac6473211b2c2b86c367d4317fc592fa7b0a6ab1ac49fbc973934f2c
SHA512766b205042c939f8ea7982d7aa6affb908cda9a0517c70458fc9488ee38e16bf1230e034f8d6ec92647715bf983b282ffa8531bc82481a3ae0b2e0fd8304b569
-
C:\Windows\system\aCQqSen.exeFilesize
5.9MB
MD5a7744f415d70234b5ea0223d7d70350b
SHA12ea5375faeedff049c30bcbf7b1de42c0a3b02ae
SHA256c101a49325c97a775f695cc62765aa6fa7fd53b191d71270685ca244183505f2
SHA512fd61adb76b91f53cafe5b87a47ebc03dfe23eb5e049c335a8dd872bd5c2908fc09b065c0b685409eca4a9ece6c4a26bd17a89cc2f69b4737f2b458197fc47b15
-
C:\Windows\system\biHZlPQ.exeFilesize
5.9MB
MD5e86dac802e77ff08928b8008720ab867
SHA117e7c008bfd0964e84a7ffc8063e9cacf061bb1d
SHA256ee8e3a2561dbabf0418d1c4ca016ed8d53d2acfee4c2b71888b6d513f65f5f4c
SHA512776b740943ef1217f793efd4ebfdd09ecec07b67277d5d955d9f80a78402b04f0f9f188cc92f14c9f2fc047ae5fbfc4bec1b411462069adbf387cd582cae7c72
-
C:\Windows\system\boFhjEQ.exeFilesize
5.9MB
MD5e109fd5ff72ab5531f8a3a80b603ff7d
SHA18c44cc2357e064e289cc3a9e19ac11bcf3f8ca13
SHA256b6fc48506977f625115f581f5ac14ce6be4bd1d29cc9148256b29a2bc462996f
SHA5128e0bc6644693ae91e1f0295a40a9909a64d80ff2c809c1dc01509132fec84276a7f12f864d2e7f7509c1145b7ca18f87f1faa192af10f8b58202df0a559febab
-
C:\Windows\system\equsSMw.exeFilesize
5.9MB
MD5c1da2d64a0af883ba795044dfd025b8b
SHA1f733cbfd75020cbccbdc0bd4aeb34c6d4de0f598
SHA2567390d3245dad119771b094ef8fb31a346c42cbaf635318536feaac722d313217
SHA5129b1bcc672e8ace6f1d0cd4279719bbe3e2604282caf9c34d3fe61f8e6b0c03d2085f8fb0bc73af478b8da098164ec4014b928cea8c3d7962a0647a2b3fbabad8
-
C:\Windows\system\ihRzBvk.exeFilesize
5.9MB
MD528cbd2cd44ce6f21e01f33c9aa226181
SHA1857923f5ff9c2fb79440810737615b1a8a41457e
SHA2569241bad8b8ad2289756295bc45df9649e71710cfe183096e3a8c306bfe7fbbdc
SHA512d1106d42cb4af3427ec237388b1a2e4d5eee4fc34127e290e5ca456134ac371461336b32a34bbe12e84ff33717dce61ff699226a3076e725ff8343d7052de844
-
C:\Windows\system\uDEdvzU.exeFilesize
5.9MB
MD5e72a6950741ee38d84d4d51a5aa8fba3
SHA1c6f1f0bd7834090f664d0f3ded911df5143c1951
SHA256159845457caffd6057052a7960c4de61ed1efa3cf826e50dee095b3590a2e9d4
SHA5126fbec4b54d3a7450633e1758cc0dfbb53b1394d57308772e3b49d11db3b6c27835d0f8f40f2bebb63b3e9ede576638856d95e8c2c48656b3fdbdba575fe7c43d
-
C:\Windows\system\wwhCpiL.exeFilesize
5.9MB
MD54b6b86da3e9ad801fc54b307dd78900b
SHA16cb8699bd6701f08358654495577b621447e2dd0
SHA25666b0d3fd6d76c236909e1c041c71f4806c773536fcc000e1f093b16789b84315
SHA512c733210a1eb9718544267329eee81d08a8677918eb7916d67ca3ca4ef0a61c187bb3b3c170aaa53a98f4034ab609145fd7685a0b1941c157297cae3dfe886488
-
\Windows\system\UtrfUJX.exeFilesize
5.9MB
MD5e58264044c1c3abb39a099c9373349e5
SHA1d29fa3c0dfc30f9088e412503603448204982c4f
SHA2565f023621d3028fd9936875655fe527e8cb079907883db38ca7200e1e3ff5dde3
SHA5122dbe7fafd0e0ec21c74a527b06394f84c24ff538e3720d3a542f565b1847610c81b4b72dccb899a30c33b7129d7073329b688b29592f61d93dc0cc42d73ab0be
-
\Windows\system\YWXgTlc.exeFilesize
5.9MB
MD59f81c3f276c30b41c7dd28eda09a6ffd
SHA13e7915422ba8499292d6ab311517f9a6106c73f5
SHA2569516bfff6b19b3847cc3a4218d76281723b6c43776a445d5676a10779619fd53
SHA512954cf4f2a37885b83ea968a05f98023ad17f37c8c51b345d399936d25bbca3786b4a0ad75bdac1b7eac1e27574b5e59109336e9b09a519d368091fb68698968e
-
\Windows\system\lTTUmne.exeFilesize
5.9MB
MD5d137c303628b069b37d2f5a1570cc808
SHA138987ba25010820edf7387d33fd61aa3e8ac5bc6
SHA256be6d09f2d1323450df41dc72f009006e0a6d4ee07da0c2a9258e55f5e514502c
SHA5128b3013703459d1d3ae852f3ee97e5034dfd24e0e40ad7dfb7dfb51104c120734d53f6889fc3ec2a39e8f040473613a25c113b54d689a6ab735d5a98aa4e8dd55
-
\Windows\system\zKXLQsh.exeFilesize
5.9MB
MD5eae5f39eb74c3d28af3b071d494a9267
SHA18e64b2ff6ec106956fac08bbeba272b5e84cfd0d
SHA2560a6e25e3ad93e427ed96bdf7e06fe2eb278778b6e335f0e09832be6b4b69f7a1
SHA5128e770e994afca7d326ff1a37d53f12afc205779119f177593cb92233baffcca6df1ee856bd6851a7307dbade473e428d412ac436a379f176e07d3d00950a0e29
-
\Windows\system\zxxCpHH.exeFilesize
5.9MB
MD510641e165b4655f8ef7cdc1b0a4c76ef
SHA11681cf2acc605967f983641dab7f675ab19e3f35
SHA2561c3c56ce5b3037192dfe4becb15bdf5fff9d37b3aa172a78c67f8a5ea8fd09b5
SHA512f09c96d5fddfa396efa55405d2dc4d645d73f214bb7649980f25a16d897f9741d367d8f3f1bd704eae74805bd28e640df90abcfbd85b19cb31fe425cb0492500
-
memory/552-51-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/552-159-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/1608-163-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/1608-101-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/1608-152-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/2400-94-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2400-147-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2400-0-0x00000000002F0000-0x0000000000300000-memory.dmpFilesize
64KB
-
memory/2400-45-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2400-50-0x000000013FD60000-0x00000001400B4000-memory.dmpFilesize
3.3MB
-
memory/2400-58-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2400-25-0x000000013F370000-0x000000013F6C4000-memory.dmpFilesize
3.3MB
-
memory/2400-23-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2400-6-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/2400-56-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/2400-100-0x00000000025F0000-0x0000000002944000-memory.dmpFilesize
3.3MB
-
memory/2400-40-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2400-17-0x000000013F3E0000-0x000000013F734000-memory.dmpFilesize
3.3MB
-
memory/2400-1-0x000000013FD60000-0x00000001400B4000-memory.dmpFilesize
3.3MB
-
memory/2400-151-0x00000000025F0000-0x0000000002944000-memory.dmpFilesize
3.3MB
-
memory/2400-149-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2400-70-0x000000013F930000-0x000000013FC84000-memory.dmpFilesize
3.3MB
-
memory/2400-145-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2400-83-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2400-143-0x000000013F930000-0x000000013FC84000-memory.dmpFilesize
3.3MB
-
memory/2400-80-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2468-129-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2468-160-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2468-60-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2504-41-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2504-93-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2504-158-0x000000013F410000-0x000000013F764000-memory.dmpFilesize
3.3MB
-
memory/2568-162-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2568-148-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2568-88-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2592-161-0x000000013F2A0000-0x000000013F5F4000-memory.dmpFilesize
3.3MB
-
memory/2592-66-0x000000013F2A0000-0x000000013F5F4000-memory.dmpFilesize
3.3MB
-
memory/2592-142-0x000000013F2A0000-0x000000013F5F4000-memory.dmpFilesize
3.3MB
-
memory/2664-155-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2664-79-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2664-28-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2704-26-0x000000013F370000-0x000000013F6C4000-memory.dmpFilesize
3.3MB
-
memory/2704-156-0x000000013F370000-0x000000013F6C4000-memory.dmpFilesize
3.3MB
-
memory/2704-73-0x000000013F370000-0x000000013F6C4000-memory.dmpFilesize
3.3MB
-
memory/2796-166-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2796-150-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2796-95-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2848-144-0x000000013F930000-0x000000013FC84000-memory.dmpFilesize
3.3MB
-
memory/2848-74-0x000000013F930000-0x000000013FC84000-memory.dmpFilesize
3.3MB
-
memory/2848-164-0x000000013F930000-0x000000013FC84000-memory.dmpFilesize
3.3MB
-
memory/2880-87-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2880-35-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2880-157-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2940-81-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2940-146-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2940-165-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/3036-13-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/3036-153-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/3036-65-0x000000013F620000-0x000000013F974000-memory.dmpFilesize
3.3MB
-
memory/3064-57-0x000000013F3E0000-0x000000013F734000-memory.dmpFilesize
3.3MB
-
memory/3064-154-0x000000013F3E0000-0x000000013F734000-memory.dmpFilesize
3.3MB
-
memory/3064-22-0x000000013F3E0000-0x000000013F734000-memory.dmpFilesize
3.3MB