Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 10:16
Behavioral task
behavioral1
Sample
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe
-
Size
5.9MB
-
MD5
31711f3522edff5d7b292a752af6e030
-
SHA1
0a6f61be74dfa5b96b8c9af95e04fe8ff7366500
-
SHA256
01067f3d3d36924125e9cdb4f8202d86d866263c86a09c7049b4660b995210c1
-
SHA512
d52c57c99cb9fcfaf99fbea0887428a934cb9b6db41343fa6c71d1eae066d8512113c2e1f8e6c016426cdb6552a62e79132e4c702ee74d292b7aa279b88c5863
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUi:Q+856utgpPF8u/7i
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\kLEoBfl.exe cobalt_reflective_dll C:\Windows\System\hYRRATM.exe cobalt_reflective_dll C:\Windows\System\YGeqhzV.exe cobalt_reflective_dll C:\Windows\System\kLEloqQ.exe cobalt_reflective_dll C:\Windows\System\ARAGOhS.exe cobalt_reflective_dll C:\Windows\System\WdLnuKT.exe cobalt_reflective_dll C:\Windows\System\CKeWnen.exe cobalt_reflective_dll C:\Windows\System\ghDnveD.exe cobalt_reflective_dll C:\Windows\System\JFgLYXZ.exe cobalt_reflective_dll C:\Windows\System\maNmYga.exe cobalt_reflective_dll C:\Windows\System\OhcPTDA.exe cobalt_reflective_dll C:\Windows\System\AvGtBrT.exe cobalt_reflective_dll C:\Windows\System\lQHjrKM.exe cobalt_reflective_dll C:\Windows\System\BmkKoNB.exe cobalt_reflective_dll C:\Windows\System\cNlClbN.exe cobalt_reflective_dll C:\Windows\System\PYGugHd.exe cobalt_reflective_dll C:\Windows\System\MyJunTd.exe cobalt_reflective_dll C:\Windows\System\CYPltuM.exe cobalt_reflective_dll C:\Windows\System\qnyPRia.exe cobalt_reflective_dll C:\Windows\System\yAyQxPZ.exe cobalt_reflective_dll C:\Windows\System\blBapvT.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4340-0-0x00007FF731650000-0x00007FF7319A4000-memory.dmp xmrig C:\Windows\System\kLEoBfl.exe xmrig behavioral2/memory/448-8-0x00007FF6C9B50000-0x00007FF6C9EA4000-memory.dmp xmrig C:\Windows\System\hYRRATM.exe xmrig C:\Windows\System\YGeqhzV.exe xmrig behavioral2/memory/3128-14-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmp xmrig behavioral2/memory/4928-20-0x00007FF660400000-0x00007FF660754000-memory.dmp xmrig C:\Windows\System\kLEloqQ.exe xmrig behavioral2/memory/456-26-0x00007FF617960000-0x00007FF617CB4000-memory.dmp xmrig C:\Windows\System\ARAGOhS.exe xmrig C:\Windows\System\WdLnuKT.exe xmrig C:\Windows\System\CKeWnen.exe xmrig C:\Windows\System\ghDnveD.exe xmrig C:\Windows\System\JFgLYXZ.exe xmrig C:\Windows\System\maNmYga.exe xmrig C:\Windows\System\OhcPTDA.exe xmrig C:\Windows\System\AvGtBrT.exe xmrig C:\Windows\System\lQHjrKM.exe xmrig C:\Windows\System\BmkKoNB.exe xmrig C:\Windows\System\cNlClbN.exe xmrig C:\Windows\System\PYGugHd.exe xmrig C:\Windows\System\MyJunTd.exe xmrig C:\Windows\System\CYPltuM.exe xmrig C:\Windows\System\qnyPRia.exe xmrig C:\Windows\System\yAyQxPZ.exe xmrig C:\Windows\System\blBapvT.exe xmrig behavioral2/memory/5088-111-0x00007FF624A30000-0x00007FF624D84000-memory.dmp xmrig behavioral2/memory/1060-113-0x00007FF711490000-0x00007FF7117E4000-memory.dmp xmrig behavioral2/memory/3116-114-0x00007FF69F490000-0x00007FF69F7E4000-memory.dmp xmrig behavioral2/memory/1012-116-0x00007FF6A8B30000-0x00007FF6A8E84000-memory.dmp xmrig behavioral2/memory/3944-117-0x00007FF781600000-0x00007FF781954000-memory.dmp xmrig behavioral2/memory/508-118-0x00007FF7FC810000-0x00007FF7FCB64000-memory.dmp xmrig behavioral2/memory/2616-119-0x00007FF7BE320000-0x00007FF7BE674000-memory.dmp xmrig behavioral2/memory/3924-121-0x00007FF7D2590000-0x00007FF7D28E4000-memory.dmp xmrig behavioral2/memory/4164-120-0x00007FF70CC10000-0x00007FF70CF64000-memory.dmp xmrig behavioral2/memory/5040-122-0x00007FF6C1CD0000-0x00007FF6C2024000-memory.dmp xmrig behavioral2/memory/1648-115-0x00007FF71E100000-0x00007FF71E454000-memory.dmp xmrig behavioral2/memory/4324-112-0x00007FF6FDBF0000-0x00007FF6FDF44000-memory.dmp xmrig behavioral2/memory/4640-123-0x00007FF78F4F0000-0x00007FF78F844000-memory.dmp xmrig behavioral2/memory/3692-124-0x00007FF613D30000-0x00007FF614084000-memory.dmp xmrig behavioral2/memory/4912-125-0x00007FF798070000-0x00007FF7983C4000-memory.dmp xmrig behavioral2/memory/4064-126-0x00007FF742960000-0x00007FF742CB4000-memory.dmp xmrig behavioral2/memory/2988-127-0x00007FF75A860000-0x00007FF75ABB4000-memory.dmp xmrig behavioral2/memory/4340-128-0x00007FF731650000-0x00007FF7319A4000-memory.dmp xmrig behavioral2/memory/3128-129-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmp xmrig behavioral2/memory/448-130-0x00007FF6C9B50000-0x00007FF6C9EA4000-memory.dmp xmrig behavioral2/memory/3128-131-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmp xmrig behavioral2/memory/4928-132-0x00007FF660400000-0x00007FF660754000-memory.dmp xmrig behavioral2/memory/456-133-0x00007FF617960000-0x00007FF617CB4000-memory.dmp xmrig behavioral2/memory/5088-134-0x00007FF624A30000-0x00007FF624D84000-memory.dmp xmrig behavioral2/memory/4324-135-0x00007FF6FDBF0000-0x00007FF6FDF44000-memory.dmp xmrig behavioral2/memory/1060-136-0x00007FF711490000-0x00007FF7117E4000-memory.dmp xmrig behavioral2/memory/3116-137-0x00007FF69F490000-0x00007FF69F7E4000-memory.dmp xmrig behavioral2/memory/1648-138-0x00007FF71E100000-0x00007FF71E454000-memory.dmp xmrig behavioral2/memory/1012-139-0x00007FF6A8B30000-0x00007FF6A8E84000-memory.dmp xmrig behavioral2/memory/3944-140-0x00007FF781600000-0x00007FF781954000-memory.dmp xmrig behavioral2/memory/508-141-0x00007FF7FC810000-0x00007FF7FCB64000-memory.dmp xmrig behavioral2/memory/2616-142-0x00007FF7BE320000-0x00007FF7BE674000-memory.dmp xmrig behavioral2/memory/4164-143-0x00007FF70CC10000-0x00007FF70CF64000-memory.dmp xmrig behavioral2/memory/3924-144-0x00007FF7D2590000-0x00007FF7D28E4000-memory.dmp xmrig behavioral2/memory/3692-146-0x00007FF613D30000-0x00007FF614084000-memory.dmp xmrig behavioral2/memory/4912-147-0x00007FF798070000-0x00007FF7983C4000-memory.dmp xmrig behavioral2/memory/4640-145-0x00007FF78F4F0000-0x00007FF78F844000-memory.dmp xmrig behavioral2/memory/5040-148-0x00007FF6C1CD0000-0x00007FF6C2024000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
kLEoBfl.exehYRRATM.exeYGeqhzV.exekLEloqQ.exeARAGOhS.exeWdLnuKT.exeCKeWnen.exeghDnveD.exeJFgLYXZ.exemaNmYga.exeOhcPTDA.exeAvGtBrT.exelQHjrKM.exeBmkKoNB.exeblBapvT.execNlClbN.exeyAyQxPZ.exePYGugHd.exeMyJunTd.exeCYPltuM.exeqnyPRia.exepid process 448 kLEoBfl.exe 3128 hYRRATM.exe 4928 YGeqhzV.exe 456 kLEloqQ.exe 5088 ARAGOhS.exe 4324 WdLnuKT.exe 1060 CKeWnen.exe 3116 ghDnveD.exe 1648 JFgLYXZ.exe 1012 maNmYga.exe 3944 OhcPTDA.exe 508 AvGtBrT.exe 2616 lQHjrKM.exe 4164 BmkKoNB.exe 3924 blBapvT.exe 5040 cNlClbN.exe 4640 yAyQxPZ.exe 3692 PYGugHd.exe 4912 MyJunTd.exe 4064 CYPltuM.exe 2988 qnyPRia.exe -
Processes:
resource yara_rule behavioral2/memory/4340-0-0x00007FF731650000-0x00007FF7319A4000-memory.dmp upx C:\Windows\System\kLEoBfl.exe upx behavioral2/memory/448-8-0x00007FF6C9B50000-0x00007FF6C9EA4000-memory.dmp upx C:\Windows\System\hYRRATM.exe upx C:\Windows\System\YGeqhzV.exe upx behavioral2/memory/3128-14-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmp upx behavioral2/memory/4928-20-0x00007FF660400000-0x00007FF660754000-memory.dmp upx C:\Windows\System\kLEloqQ.exe upx behavioral2/memory/456-26-0x00007FF617960000-0x00007FF617CB4000-memory.dmp upx C:\Windows\System\ARAGOhS.exe upx C:\Windows\System\WdLnuKT.exe upx C:\Windows\System\CKeWnen.exe upx C:\Windows\System\ghDnveD.exe upx C:\Windows\System\JFgLYXZ.exe upx C:\Windows\System\maNmYga.exe upx C:\Windows\System\OhcPTDA.exe upx C:\Windows\System\AvGtBrT.exe upx C:\Windows\System\lQHjrKM.exe upx C:\Windows\System\BmkKoNB.exe upx C:\Windows\System\cNlClbN.exe upx C:\Windows\System\PYGugHd.exe upx C:\Windows\System\MyJunTd.exe upx C:\Windows\System\CYPltuM.exe upx C:\Windows\System\qnyPRia.exe upx C:\Windows\System\yAyQxPZ.exe upx C:\Windows\System\blBapvT.exe upx behavioral2/memory/5088-111-0x00007FF624A30000-0x00007FF624D84000-memory.dmp upx behavioral2/memory/1060-113-0x00007FF711490000-0x00007FF7117E4000-memory.dmp upx behavioral2/memory/3116-114-0x00007FF69F490000-0x00007FF69F7E4000-memory.dmp upx behavioral2/memory/1012-116-0x00007FF6A8B30000-0x00007FF6A8E84000-memory.dmp upx behavioral2/memory/3944-117-0x00007FF781600000-0x00007FF781954000-memory.dmp upx behavioral2/memory/508-118-0x00007FF7FC810000-0x00007FF7FCB64000-memory.dmp upx behavioral2/memory/2616-119-0x00007FF7BE320000-0x00007FF7BE674000-memory.dmp upx behavioral2/memory/3924-121-0x00007FF7D2590000-0x00007FF7D28E4000-memory.dmp upx behavioral2/memory/4164-120-0x00007FF70CC10000-0x00007FF70CF64000-memory.dmp upx behavioral2/memory/5040-122-0x00007FF6C1CD0000-0x00007FF6C2024000-memory.dmp upx behavioral2/memory/1648-115-0x00007FF71E100000-0x00007FF71E454000-memory.dmp upx behavioral2/memory/4324-112-0x00007FF6FDBF0000-0x00007FF6FDF44000-memory.dmp upx behavioral2/memory/4640-123-0x00007FF78F4F0000-0x00007FF78F844000-memory.dmp upx behavioral2/memory/3692-124-0x00007FF613D30000-0x00007FF614084000-memory.dmp upx behavioral2/memory/4912-125-0x00007FF798070000-0x00007FF7983C4000-memory.dmp upx behavioral2/memory/4064-126-0x00007FF742960000-0x00007FF742CB4000-memory.dmp upx behavioral2/memory/2988-127-0x00007FF75A860000-0x00007FF75ABB4000-memory.dmp upx behavioral2/memory/4340-128-0x00007FF731650000-0x00007FF7319A4000-memory.dmp upx behavioral2/memory/3128-129-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmp upx behavioral2/memory/448-130-0x00007FF6C9B50000-0x00007FF6C9EA4000-memory.dmp upx behavioral2/memory/3128-131-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmp upx behavioral2/memory/4928-132-0x00007FF660400000-0x00007FF660754000-memory.dmp upx behavioral2/memory/456-133-0x00007FF617960000-0x00007FF617CB4000-memory.dmp upx behavioral2/memory/5088-134-0x00007FF624A30000-0x00007FF624D84000-memory.dmp upx behavioral2/memory/4324-135-0x00007FF6FDBF0000-0x00007FF6FDF44000-memory.dmp upx behavioral2/memory/1060-136-0x00007FF711490000-0x00007FF7117E4000-memory.dmp upx behavioral2/memory/3116-137-0x00007FF69F490000-0x00007FF69F7E4000-memory.dmp upx behavioral2/memory/1648-138-0x00007FF71E100000-0x00007FF71E454000-memory.dmp upx behavioral2/memory/1012-139-0x00007FF6A8B30000-0x00007FF6A8E84000-memory.dmp upx behavioral2/memory/3944-140-0x00007FF781600000-0x00007FF781954000-memory.dmp upx behavioral2/memory/508-141-0x00007FF7FC810000-0x00007FF7FCB64000-memory.dmp upx behavioral2/memory/2616-142-0x00007FF7BE320000-0x00007FF7BE674000-memory.dmp upx behavioral2/memory/4164-143-0x00007FF70CC10000-0x00007FF70CF64000-memory.dmp upx behavioral2/memory/3924-144-0x00007FF7D2590000-0x00007FF7D28E4000-memory.dmp upx behavioral2/memory/3692-146-0x00007FF613D30000-0x00007FF614084000-memory.dmp upx behavioral2/memory/4912-147-0x00007FF798070000-0x00007FF7983C4000-memory.dmp upx behavioral2/memory/4640-145-0x00007FF78F4F0000-0x00007FF78F844000-memory.dmp upx behavioral2/memory/5040-148-0x00007FF6C1CD0000-0x00007FF6C2024000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\ARAGOhS.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\WdLnuKT.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\OhcPTDA.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\yAyQxPZ.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\kLEoBfl.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\hYRRATM.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\lQHjrKM.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\BmkKoNB.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\cNlClbN.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\PYGugHd.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\qnyPRia.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\YGeqhzV.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\maNmYga.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\kLEloqQ.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\AvGtBrT.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\JFgLYXZ.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\blBapvT.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\MyJunTd.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\CYPltuM.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\CKeWnen.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe File created C:\Windows\System\ghDnveD.exe 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exedescription pid process target process PID 4340 wrote to memory of 448 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe kLEoBfl.exe PID 4340 wrote to memory of 448 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe kLEoBfl.exe PID 4340 wrote to memory of 3128 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe hYRRATM.exe PID 4340 wrote to memory of 3128 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe hYRRATM.exe PID 4340 wrote to memory of 4928 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YGeqhzV.exe PID 4340 wrote to memory of 4928 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe YGeqhzV.exe PID 4340 wrote to memory of 456 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe kLEloqQ.exe PID 4340 wrote to memory of 456 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe kLEloqQ.exe PID 4340 wrote to memory of 5088 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ARAGOhS.exe PID 4340 wrote to memory of 5088 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ARAGOhS.exe PID 4340 wrote to memory of 4324 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe WdLnuKT.exe PID 4340 wrote to memory of 4324 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe WdLnuKT.exe PID 4340 wrote to memory of 1060 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe CKeWnen.exe PID 4340 wrote to memory of 1060 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe CKeWnen.exe PID 4340 wrote to memory of 3116 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ghDnveD.exe PID 4340 wrote to memory of 3116 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe ghDnveD.exe PID 4340 wrote to memory of 1648 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe JFgLYXZ.exe PID 4340 wrote to memory of 1648 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe JFgLYXZ.exe PID 4340 wrote to memory of 1012 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe maNmYga.exe PID 4340 wrote to memory of 1012 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe maNmYga.exe PID 4340 wrote to memory of 3944 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe OhcPTDA.exe PID 4340 wrote to memory of 3944 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe OhcPTDA.exe PID 4340 wrote to memory of 508 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe AvGtBrT.exe PID 4340 wrote to memory of 508 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe AvGtBrT.exe PID 4340 wrote to memory of 2616 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe lQHjrKM.exe PID 4340 wrote to memory of 2616 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe lQHjrKM.exe PID 4340 wrote to memory of 4164 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe BmkKoNB.exe PID 4340 wrote to memory of 4164 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe BmkKoNB.exe PID 4340 wrote to memory of 3924 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe blBapvT.exe PID 4340 wrote to memory of 3924 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe blBapvT.exe PID 4340 wrote to memory of 5040 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe cNlClbN.exe PID 4340 wrote to memory of 5040 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe cNlClbN.exe PID 4340 wrote to memory of 4640 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe yAyQxPZ.exe PID 4340 wrote to memory of 4640 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe yAyQxPZ.exe PID 4340 wrote to memory of 3692 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe PYGugHd.exe PID 4340 wrote to memory of 3692 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe PYGugHd.exe PID 4340 wrote to memory of 4912 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe MyJunTd.exe PID 4340 wrote to memory of 4912 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe MyJunTd.exe PID 4340 wrote to memory of 4064 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe CYPltuM.exe PID 4340 wrote to memory of 4064 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe CYPltuM.exe PID 4340 wrote to memory of 2988 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe qnyPRia.exe PID 4340 wrote to memory of 2988 4340 31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe qnyPRia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\31711f3522edff5d7b292a752af6e030_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\kLEoBfl.exeC:\Windows\System\kLEoBfl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\hYRRATM.exeC:\Windows\System\hYRRATM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YGeqhzV.exeC:\Windows\System\YGeqhzV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kLEloqQ.exeC:\Windows\System\kLEloqQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ARAGOhS.exeC:\Windows\System\ARAGOhS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WdLnuKT.exeC:\Windows\System\WdLnuKT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CKeWnen.exeC:\Windows\System\CKeWnen.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ghDnveD.exeC:\Windows\System\ghDnveD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JFgLYXZ.exeC:\Windows\System\JFgLYXZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\maNmYga.exeC:\Windows\System\maNmYga.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OhcPTDA.exeC:\Windows\System\OhcPTDA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AvGtBrT.exeC:\Windows\System\AvGtBrT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lQHjrKM.exeC:\Windows\System\lQHjrKM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BmkKoNB.exeC:\Windows\System\BmkKoNB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\blBapvT.exeC:\Windows\System\blBapvT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cNlClbN.exeC:\Windows\System\cNlClbN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yAyQxPZ.exeC:\Windows\System\yAyQxPZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PYGugHd.exeC:\Windows\System\PYGugHd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MyJunTd.exeC:\Windows\System\MyJunTd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CYPltuM.exeC:\Windows\System\CYPltuM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qnyPRia.exeC:\Windows\System\qnyPRia.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\ARAGOhS.exeFilesize
5.9MB
MD505d711c42b74498f7fc678a14ad1f577
SHA13ea3187f715c68903fa2fc4f7f508a75e69d0add
SHA256c122316b4ecb5fa600c23444cc11a4b7c35681bb67d82219b4909ec8b0cf6ca4
SHA512d456944aacc89c06c90a4fcb884b26ffeeff6119919b4ba7d29be6ff40bf7e9a5de909b3d71301a162286579f7b4106a796cecd5004610fccdbe62419179c26a
-
C:\Windows\System\AvGtBrT.exeFilesize
5.9MB
MD5c0237f5d8b2729a82c6b693c3a2d569b
SHA121362fc841f62d095f83398b2ff59579a18ede39
SHA25630b62d2d02cefe30838f8033b11e04cc61de9058eb4666f0bcdeb48a544695e5
SHA512a87e3bbd62aa455944620d1c328a641c12b46efb1ae2b426af165ca060583aa362fcb5b398ec69ac1d482042a1d73c98ba35a36ba7a140d7e0b9196ef85afa24
-
C:\Windows\System\BmkKoNB.exeFilesize
5.9MB
MD54ad680d40054c60a95fcd565aaeb99c4
SHA124a679013c54cfca24531de70a03a2529bbd89ff
SHA256f9b73f87b64653b26e0a4569ece21f0b533dc2e9aa7345b78cb6be9adfc59841
SHA5125965a7d1384038d7cd53d03d99b1a61f3794c4bfe83339468896a2d3e184a5e3551ba9d8516cc2301a5dac868e627aeda303807c2ec1c6226e1f3c940f32aece
-
C:\Windows\System\CKeWnen.exeFilesize
5.9MB
MD54bf3b4106790557f11714fe46fbd1adf
SHA16e650aec68794e0360fdce7b8b169e3a11d020b1
SHA2563bd90508bdafb2cd1993dd0337c95ff65c5893773c78556d916f3d3075d16304
SHA512e65549635c2f345db9023322d8c4abd876a4fe6c2e9b93a089019cea9405dc71261e645b6de83266f4935d3d58a9e68ada83562ede446768179eb400cbf1f78f
-
C:\Windows\System\CYPltuM.exeFilesize
5.9MB
MD5cef527ab345f4a318b99438fc7ba9f9a
SHA1dd1cb1089a4197567b57bd2fd8fbd4ebf4ef24a2
SHA2569bd3f0896429d32f62ef4932f9c5c8953c06665826d167f74826b3bbea03ab80
SHA512f3fa4d15145591ec875159210e38ae885e72ebf548c4f0e576a9ebff52f455c7c25187637da129e8f20862b85f01c285ca4d8cb238c020c05e68d72e4ba29212
-
C:\Windows\System\JFgLYXZ.exeFilesize
5.9MB
MD5e684215598465301691be7cd87317d2b
SHA15fcc937e7883489ad4d5082d3563732c518385a5
SHA2561e5b0a837575b4d4834bdf606db18393c499fff77b5880229965c616575c3cbb
SHA51236437d545f6750416afa71891c8e7a448c5d92f6fe227bb7695fb59cd948487c04fd0cfb71441fef139c0af20ed873ed41346c242483e54669c2daa134be3e1a
-
C:\Windows\System\MyJunTd.exeFilesize
5.9MB
MD59d2def5b3be2ca8b9a2854f204f06527
SHA1d8cf5ea462eac19d5ae122d9e0edfc04d094765c
SHA25654c63c057e55c40799294b49c27854ff3d6bb160fc5e466c4e328c66533349c0
SHA5124a620ea201fc483c0b50f206c96852fe2efaa48a7de20b5a1506011691d9852be10e869005554b7e8ca4b1da73414a10859a72ca27b1ee5900df840690d23773
-
C:\Windows\System\OhcPTDA.exeFilesize
5.9MB
MD521a120dbb8fcfbb58a7cffc0a741f920
SHA10d825fc16e5afce87091f850244f52227a42b398
SHA256e350c1cad60261a49a3444b26edfa8a1220ecb69b204f3b0b6db88ecf3ecad46
SHA5122a7c596fff211d7659d92e277c63a4ab51d0d7df033336d3754c2d63e3e6129fc54d134a80f1223ecbcc6f6364715ba8582c8f94b5501e42e342c0099053d4e8
-
C:\Windows\System\PYGugHd.exeFilesize
5.9MB
MD549f316ff3e1e5da45c537103cd3bf88d
SHA18aada067f742a80d366df188ea0e98685cdc44ce
SHA2562c931343515fed9897e370a91c0e3b2712d3ad826a15ea381b19f997f394f382
SHA5120c76cce7fb636fb6c1a4f9a00bf2dc0994bf50f9fe784abfb07fdd46af78985ed5f2ad0f9514d4fa0398f5bfec5cb46e6e7729881c59f8010b3713dcd4cf524d
-
C:\Windows\System\WdLnuKT.exeFilesize
5.9MB
MD58b3de0be30f453e6c64addc457dbe042
SHA1689247fe308cd31d2b997fcdb4b2bfca3b7425cf
SHA25685f1387ed2a569fc4b59c596573291beac94a54140b17ee3be16cc01686d72c4
SHA5128dc8f4d2d5111f390b85c25529fac2b4485708fb5cf6d2b8b68f782111f7cb1bdb6cbe74efe65205d40335284fa1b710fa89372ae57e5b1267268a918159abff
-
C:\Windows\System\YGeqhzV.exeFilesize
5.9MB
MD5ff738f8e36895dc4abd4b8772fb50142
SHA18b6e46628baebca6c860f672484c5fba431d52fb
SHA256b376458910fbbf90be9d7d747973b534cee63ad48c125d55c55b72a57e84badd
SHA512e4996f26549177a52b51bb2fbb25ff0e7d819060ebc8f38d8cd7da0af6a8365287cc5558eef8f37e4622391b2cb7e033ed7de947290879759ededef2bafd767a
-
C:\Windows\System\blBapvT.exeFilesize
5.9MB
MD538a66a9f68417eea96c5d155bc71f04e
SHA1930da0533a11f346ca388dd380a390dfdd4538a7
SHA256c3b26b73a1ab9514f212959153925b945b4786dd0948d18cda4c384491357f04
SHA5128fd52b4d977f0068601f5becf008efc5daf0cf61a03bcd5ebbc9a8ed570680120d451699adfb628606de88e2d037c60d3878f7806a30ab016d6e7bc97249d2e7
-
C:\Windows\System\cNlClbN.exeFilesize
5.9MB
MD542ad9d53bc16a46f9ee0672b86e21ccf
SHA13307977fd5d8ee92b3410309e372db39db680f63
SHA256de610f13159fd5770edcb4643ffa73343fb30e2a9050d95dbe3b71995e4445de
SHA5128771cc4508acc55c6563421d761941c85f4daa5c5aab458125e0fa90234eec0a55d00f1c1c084eed21f66c82835e1e96b9cbe0c7a232fb6e0cb5ab666789f1d8
-
C:\Windows\System\ghDnveD.exeFilesize
5.9MB
MD50dfb441a9542163cf511c44df634ff3e
SHA11c9a5d4d000e8bf52eaa53c3a0de215aad25d2ae
SHA2560d15f9813571cb104b4658262da3a0bcf7a9458ea2cfb72b1b88d17585b183bc
SHA51284fd64fceb590ee36d22d496521e2747de46b1b82dc05a1b5350e77e0dbd7ebf984135b1c3beacfc353ef587d9dcfa9b17d4a184ae97a407683dcd25cd9895cd
-
C:\Windows\System\hYRRATM.exeFilesize
5.9MB
MD56abcad393febf0a6b8b4cd7c98756498
SHA1edc98c414179be45503df50bb74634cf918b2b0d
SHA256efe348b0913740d931e1b606e3d7789a56a0df6bba0523ae06078db9e499517c
SHA512cba19d4175281e8f9db678bde1f9d525f13fd8d4af8461e746bc34ad226251ee15ecf3f782c4a2e9abcf945bc2d2040ab3cbf3a1bdc81543907154d2b7474ff2
-
C:\Windows\System\kLEloqQ.exeFilesize
5.9MB
MD558fc1c9df377796ee8550180c47423c6
SHA12bb1f199a6c6f1a854c270978d80f77ef175b727
SHA2566806dcc3df78779f49d01daf7922c4615f298ec1201667049bcfe4680e6ebdf2
SHA512e66ee9ef20ecc6009f8a60ccdb32f90d5a10ffa1092ee6bde40ed355ab1d07ab28b1a93b4339d7005d1a77b7d56a0b7a34acfc697e1918cbb435f977046f90c3
-
C:\Windows\System\kLEoBfl.exeFilesize
5.9MB
MD590b64551c7dd70875b0eed09c78476b5
SHA1371cbe550e95c62ac6901fc8a5c5b918815f9bc4
SHA256dd1f00884047499a99116be126d1db1e0dcd95ab836b8a7749fec10d4ec2d34c
SHA512a69a7b02f6b1b9a144e5a9625c2ace9f9f4ce31c111a401b666d31e1676931b3f5fae58a3d3e13247bb0dae772b0da26b59c75d9e459f78f9af025ca0931633f
-
C:\Windows\System\lQHjrKM.exeFilesize
5.9MB
MD531fa30d4d97dc7a9cc51f954e545490e
SHA196eeee7fff38729cd1405e7feff1a35f8b675f01
SHA2561b2c810670f4c36662a28dd3e4ae229b046bc0b6893994302e98141da70ba4f9
SHA51213722987a98b473a428b33ed16b941be92c73f90cb7607ea2623b247cbe8a822f1df16ac89b9e1499782ee0d603deb39f417cfc1d82c752b9a8aed4e057023fe
-
C:\Windows\System\maNmYga.exeFilesize
5.9MB
MD54611ff5b72982dd7993f075454fea52b
SHA18c4897c24082e8915b354b70c0117b898f346882
SHA2569c3c47ada566c15becbffc41a5a625cc8e59fd91f488dd5ec800805525728183
SHA51225d86cfb7c74907d736cebe60c04a9cd93f0d0daa5d2f4d076747e3917fd2cd40e01429a8f3924595694c15207891b92d2f1ccf48c3ceae1f76148e88a2b1945
-
C:\Windows\System\qnyPRia.exeFilesize
5.9MB
MD55b084a57800ec939edcfaab5c690a4b3
SHA1e8f797c547a485d6eaffd9dfaadbdfa51c950895
SHA256f019d4285ce3db5f4ed85eefd01e4a872931185cdd4b03510e82514a5b25eb53
SHA512cc97ccc998efc156766c4d8f6197505a2b118bba30f7659c14a88648d1c3c80bf6186bf5cceb96b2cdcd9e9b4ffe279c06edcf9962b47d78fe20b66a18d61098
-
C:\Windows\System\yAyQxPZ.exeFilesize
5.9MB
MD5252f6862edd25661899d2bde2ac2d05a
SHA16cd183c49382c0a666f64c562b33e7f74e4477c8
SHA256db3808a5b61dcea8b4d43ce44b3d8d09ce1bda4260cd6ae612c9279547d9d546
SHA51267989e6c3978f552735d8220132284d17afdfbbce5fd5dd7e66ddf1f498b0fb66ecbba30401534fc04e70f4842115c3dd7116277f6b84c79aeca5339f767c66a
-
memory/448-8-0x00007FF6C9B50000-0x00007FF6C9EA4000-memory.dmpFilesize
3.3MB
-
memory/448-130-0x00007FF6C9B50000-0x00007FF6C9EA4000-memory.dmpFilesize
3.3MB
-
memory/456-133-0x00007FF617960000-0x00007FF617CB4000-memory.dmpFilesize
3.3MB
-
memory/456-26-0x00007FF617960000-0x00007FF617CB4000-memory.dmpFilesize
3.3MB
-
memory/508-118-0x00007FF7FC810000-0x00007FF7FCB64000-memory.dmpFilesize
3.3MB
-
memory/508-141-0x00007FF7FC810000-0x00007FF7FCB64000-memory.dmpFilesize
3.3MB
-
memory/1012-139-0x00007FF6A8B30000-0x00007FF6A8E84000-memory.dmpFilesize
3.3MB
-
memory/1012-116-0x00007FF6A8B30000-0x00007FF6A8E84000-memory.dmpFilesize
3.3MB
-
memory/1060-113-0x00007FF711490000-0x00007FF7117E4000-memory.dmpFilesize
3.3MB
-
memory/1060-136-0x00007FF711490000-0x00007FF7117E4000-memory.dmpFilesize
3.3MB
-
memory/1648-138-0x00007FF71E100000-0x00007FF71E454000-memory.dmpFilesize
3.3MB
-
memory/1648-115-0x00007FF71E100000-0x00007FF71E454000-memory.dmpFilesize
3.3MB
-
memory/2616-119-0x00007FF7BE320000-0x00007FF7BE674000-memory.dmpFilesize
3.3MB
-
memory/2616-142-0x00007FF7BE320000-0x00007FF7BE674000-memory.dmpFilesize
3.3MB
-
memory/2988-127-0x00007FF75A860000-0x00007FF75ABB4000-memory.dmpFilesize
3.3MB
-
memory/2988-149-0x00007FF75A860000-0x00007FF75ABB4000-memory.dmpFilesize
3.3MB
-
memory/3116-137-0x00007FF69F490000-0x00007FF69F7E4000-memory.dmpFilesize
3.3MB
-
memory/3116-114-0x00007FF69F490000-0x00007FF69F7E4000-memory.dmpFilesize
3.3MB
-
memory/3128-131-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmpFilesize
3.3MB
-
memory/3128-129-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmpFilesize
3.3MB
-
memory/3128-14-0x00007FF61CEE0000-0x00007FF61D234000-memory.dmpFilesize
3.3MB
-
memory/3692-124-0x00007FF613D30000-0x00007FF614084000-memory.dmpFilesize
3.3MB
-
memory/3692-146-0x00007FF613D30000-0x00007FF614084000-memory.dmpFilesize
3.3MB
-
memory/3924-121-0x00007FF7D2590000-0x00007FF7D28E4000-memory.dmpFilesize
3.3MB
-
memory/3924-144-0x00007FF7D2590000-0x00007FF7D28E4000-memory.dmpFilesize
3.3MB
-
memory/3944-140-0x00007FF781600000-0x00007FF781954000-memory.dmpFilesize
3.3MB
-
memory/3944-117-0x00007FF781600000-0x00007FF781954000-memory.dmpFilesize
3.3MB
-
memory/4064-126-0x00007FF742960000-0x00007FF742CB4000-memory.dmpFilesize
3.3MB
-
memory/4064-150-0x00007FF742960000-0x00007FF742CB4000-memory.dmpFilesize
3.3MB
-
memory/4164-120-0x00007FF70CC10000-0x00007FF70CF64000-memory.dmpFilesize
3.3MB
-
memory/4164-143-0x00007FF70CC10000-0x00007FF70CF64000-memory.dmpFilesize
3.3MB
-
memory/4324-112-0x00007FF6FDBF0000-0x00007FF6FDF44000-memory.dmpFilesize
3.3MB
-
memory/4324-135-0x00007FF6FDBF0000-0x00007FF6FDF44000-memory.dmpFilesize
3.3MB
-
memory/4340-1-0x0000014BD5EC0000-0x0000014BD5ED0000-memory.dmpFilesize
64KB
-
memory/4340-128-0x00007FF731650000-0x00007FF7319A4000-memory.dmpFilesize
3.3MB
-
memory/4340-0-0x00007FF731650000-0x00007FF7319A4000-memory.dmpFilesize
3.3MB
-
memory/4640-123-0x00007FF78F4F0000-0x00007FF78F844000-memory.dmpFilesize
3.3MB
-
memory/4640-145-0x00007FF78F4F0000-0x00007FF78F844000-memory.dmpFilesize
3.3MB
-
memory/4912-125-0x00007FF798070000-0x00007FF7983C4000-memory.dmpFilesize
3.3MB
-
memory/4912-147-0x00007FF798070000-0x00007FF7983C4000-memory.dmpFilesize
3.3MB
-
memory/4928-132-0x00007FF660400000-0x00007FF660754000-memory.dmpFilesize
3.3MB
-
memory/4928-20-0x00007FF660400000-0x00007FF660754000-memory.dmpFilesize
3.3MB
-
memory/5040-122-0x00007FF6C1CD0000-0x00007FF6C2024000-memory.dmpFilesize
3.3MB
-
memory/5040-148-0x00007FF6C1CD0000-0x00007FF6C2024000-memory.dmpFilesize
3.3MB
-
memory/5088-111-0x00007FF624A30000-0x00007FF624D84000-memory.dmpFilesize
3.3MB
-
memory/5088-134-0x00007FF624A30000-0x00007FF624D84000-memory.dmpFilesize
3.3MB