Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 07:59
Behavioral task
behavioral1
Sample
2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240508-en
General
-
Target
2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
33aef5f2f2b2addb213a26da2689869d
-
SHA1
4ea67994be0a828a3e545825f66c2aab7004020e
-
SHA256
0c9dc7e1727e86a482de0a82a32175a8774f23e162861c0ee13095985e0baf50
-
SHA512
2b7e558088b901011e2da547f316120f208793cdc3d01c82bc2f554f87a9643a95e811be64c40edcab2ba7c77e8f6004b48b700daf25233c4899437e2e2a6fbd
-
SSDEEP
98304:BemTLkNdfE0pZrT56utgpPFotBER/mQ32lU/:Q+u56utgpPF8u/7/
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\ITGzXxa.exe cobalt_reflective_dll C:\Windows\System\sECrgXi.exe cobalt_reflective_dll C:\Windows\System\qaQGgqH.exe cobalt_reflective_dll C:\Windows\System\DJUNxSO.exe cobalt_reflective_dll C:\Windows\System\DgoeyMw.exe cobalt_reflective_dll C:\Windows\System\ZRDIonj.exe cobalt_reflective_dll C:\Windows\System\aavDINR.exe cobalt_reflective_dll C:\Windows\System\YjnCMBA.exe cobalt_reflective_dll C:\Windows\System\aHEQFEB.exe cobalt_reflective_dll C:\Windows\System\nKrzbjT.exe cobalt_reflective_dll C:\Windows\System\AWofoKO.exe cobalt_reflective_dll C:\Windows\System\JIyQrJh.exe cobalt_reflective_dll C:\Windows\System\RpxxugP.exe cobalt_reflective_dll C:\Windows\System\COFtldo.exe cobalt_reflective_dll C:\Windows\System\LEuPuav.exe cobalt_reflective_dll C:\Windows\System\equNxDK.exe cobalt_reflective_dll C:\Windows\System\PsHgCqy.exe cobalt_reflective_dll C:\Windows\System\DZKDvaX.exe cobalt_reflective_dll C:\Windows\System\DYJSTAK.exe cobalt_reflective_dll C:\Windows\System\LeEqCGh.exe cobalt_reflective_dll C:\Windows\System\KsBLzxs.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4896-0-0x00007FF781620000-0x00007FF781974000-memory.dmp xmrig C:\Windows\System\ITGzXxa.exe xmrig behavioral2/memory/3348-8-0x00007FF6EA480000-0x00007FF6EA7D4000-memory.dmp xmrig C:\Windows\System\sECrgXi.exe xmrig behavioral2/memory/1620-12-0x00007FF721D00000-0x00007FF722054000-memory.dmp xmrig C:\Windows\System\qaQGgqH.exe xmrig C:\Windows\System\DJUNxSO.exe xmrig behavioral2/memory/220-20-0x00007FF60AF20000-0x00007FF60B274000-memory.dmp xmrig C:\Windows\System\DgoeyMw.exe xmrig behavioral2/memory/744-32-0x00007FF6DF310000-0x00007FF6DF664000-memory.dmp xmrig behavioral2/memory/3540-24-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmp xmrig C:\Windows\System\ZRDIonj.exe xmrig behavioral2/memory/1500-36-0x00007FF6127B0000-0x00007FF612B04000-memory.dmp xmrig C:\Windows\System\aavDINR.exe xmrig behavioral2/memory/1968-44-0x00007FF6FC840000-0x00007FF6FCB94000-memory.dmp xmrig C:\Windows\System\YjnCMBA.exe xmrig C:\Windows\System\aHEQFEB.exe xmrig behavioral2/memory/224-55-0x00007FF7053F0000-0x00007FF705744000-memory.dmp xmrig C:\Windows\System\nKrzbjT.exe xmrig C:\Windows\System\AWofoKO.exe xmrig C:\Windows\System\JIyQrJh.exe xmrig C:\Windows\System\RpxxugP.exe xmrig C:\Windows\System\COFtldo.exe xmrig C:\Windows\System\LEuPuav.exe xmrig C:\Windows\System\equNxDK.exe xmrig C:\Windows\System\PsHgCqy.exe xmrig C:\Windows\System\DZKDvaX.exe xmrig C:\Windows\System\DYJSTAK.exe xmrig C:\Windows\System\LeEqCGh.exe xmrig C:\Windows\System\KsBLzxs.exe xmrig behavioral2/memory/4168-73-0x00007FF633270000-0x00007FF6335C4000-memory.dmp xmrig behavioral2/memory/2752-70-0x00007FF759C40000-0x00007FF759F94000-memory.dmp xmrig behavioral2/memory/4108-69-0x00007FF7A3420000-0x00007FF7A3774000-memory.dmp xmrig behavioral2/memory/4896-67-0x00007FF781620000-0x00007FF781974000-memory.dmp xmrig behavioral2/memory/2312-50-0x00007FF7C4DA0000-0x00007FF7C50F4000-memory.dmp xmrig behavioral2/memory/3136-122-0x00007FF770DD0000-0x00007FF771124000-memory.dmp xmrig behavioral2/memory/1676-125-0x00007FF669920000-0x00007FF669C74000-memory.dmp xmrig behavioral2/memory/5108-123-0x00007FF6010A0000-0x00007FF6013F4000-memory.dmp xmrig behavioral2/memory/2484-126-0x00007FF7AE0B0000-0x00007FF7AE404000-memory.dmp xmrig behavioral2/memory/2956-124-0x00007FF6B5F60000-0x00007FF6B62B4000-memory.dmp xmrig behavioral2/memory/1096-120-0x00007FF6A0FE0000-0x00007FF6A1334000-memory.dmp xmrig behavioral2/memory/1560-121-0x00007FF60EBA0000-0x00007FF60EEF4000-memory.dmp xmrig behavioral2/memory/3972-127-0x00007FF6BE310000-0x00007FF6BE664000-memory.dmp xmrig behavioral2/memory/2636-128-0x00007FF62B770000-0x00007FF62BAC4000-memory.dmp xmrig behavioral2/memory/1620-129-0x00007FF721D00000-0x00007FF722054000-memory.dmp xmrig behavioral2/memory/3540-130-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmp xmrig behavioral2/memory/1500-131-0x00007FF6127B0000-0x00007FF612B04000-memory.dmp xmrig behavioral2/memory/224-132-0x00007FF7053F0000-0x00007FF705744000-memory.dmp xmrig behavioral2/memory/2752-133-0x00007FF759C40000-0x00007FF759F94000-memory.dmp xmrig behavioral2/memory/4168-134-0x00007FF633270000-0x00007FF6335C4000-memory.dmp xmrig behavioral2/memory/3348-135-0x00007FF6EA480000-0x00007FF6EA7D4000-memory.dmp xmrig behavioral2/memory/220-136-0x00007FF60AF20000-0x00007FF60B274000-memory.dmp xmrig behavioral2/memory/1620-137-0x00007FF721D00000-0x00007FF722054000-memory.dmp xmrig behavioral2/memory/3540-138-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmp xmrig behavioral2/memory/744-139-0x00007FF6DF310000-0x00007FF6DF664000-memory.dmp xmrig behavioral2/memory/1500-140-0x00007FF6127B0000-0x00007FF612B04000-memory.dmp xmrig behavioral2/memory/1968-141-0x00007FF6FC840000-0x00007FF6FCB94000-memory.dmp xmrig behavioral2/memory/2312-142-0x00007FF7C4DA0000-0x00007FF7C50F4000-memory.dmp xmrig behavioral2/memory/224-143-0x00007FF7053F0000-0x00007FF705744000-memory.dmp xmrig behavioral2/memory/4108-144-0x00007FF7A3420000-0x00007FF7A3774000-memory.dmp xmrig behavioral2/memory/2752-145-0x00007FF759C40000-0x00007FF759F94000-memory.dmp xmrig behavioral2/memory/4168-146-0x00007FF633270000-0x00007FF6335C4000-memory.dmp xmrig behavioral2/memory/1096-147-0x00007FF6A0FE0000-0x00007FF6A1334000-memory.dmp xmrig behavioral2/memory/1560-148-0x00007FF60EBA0000-0x00007FF60EEF4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
ITGzXxa.exesECrgXi.exeqaQGgqH.exeDJUNxSO.exeDgoeyMw.exeZRDIonj.exeaavDINR.exeYjnCMBA.exeaHEQFEB.exenKrzbjT.exeAWofoKO.exeJIyQrJh.exeRpxxugP.exeCOFtldo.exeKsBLzxs.exeLEuPuav.exeequNxDK.exePsHgCqy.exeLeEqCGh.exeDYJSTAK.exeDZKDvaX.exepid process 3348 ITGzXxa.exe 1620 sECrgXi.exe 220 qaQGgqH.exe 3540 DJUNxSO.exe 744 DgoeyMw.exe 1500 ZRDIonj.exe 1968 aavDINR.exe 2312 YjnCMBA.exe 224 aHEQFEB.exe 4108 nKrzbjT.exe 2752 AWofoKO.exe 4168 JIyQrJh.exe 1096 RpxxugP.exe 1560 COFtldo.exe 3136 KsBLzxs.exe 5108 LEuPuav.exe 2956 equNxDK.exe 1676 PsHgCqy.exe 2484 LeEqCGh.exe 3972 DYJSTAK.exe 2636 DZKDvaX.exe -
Processes:
resource yara_rule behavioral2/memory/4896-0-0x00007FF781620000-0x00007FF781974000-memory.dmp upx C:\Windows\System\ITGzXxa.exe upx behavioral2/memory/3348-8-0x00007FF6EA480000-0x00007FF6EA7D4000-memory.dmp upx C:\Windows\System\sECrgXi.exe upx behavioral2/memory/1620-12-0x00007FF721D00000-0x00007FF722054000-memory.dmp upx C:\Windows\System\qaQGgqH.exe upx C:\Windows\System\DJUNxSO.exe upx behavioral2/memory/220-20-0x00007FF60AF20000-0x00007FF60B274000-memory.dmp upx C:\Windows\System\DgoeyMw.exe upx behavioral2/memory/744-32-0x00007FF6DF310000-0x00007FF6DF664000-memory.dmp upx behavioral2/memory/3540-24-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmp upx C:\Windows\System\ZRDIonj.exe upx behavioral2/memory/1500-36-0x00007FF6127B0000-0x00007FF612B04000-memory.dmp upx C:\Windows\System\aavDINR.exe upx behavioral2/memory/1968-44-0x00007FF6FC840000-0x00007FF6FCB94000-memory.dmp upx C:\Windows\System\YjnCMBA.exe upx C:\Windows\System\aHEQFEB.exe upx behavioral2/memory/224-55-0x00007FF7053F0000-0x00007FF705744000-memory.dmp upx C:\Windows\System\nKrzbjT.exe upx C:\Windows\System\AWofoKO.exe upx C:\Windows\System\JIyQrJh.exe upx C:\Windows\System\RpxxugP.exe upx C:\Windows\System\COFtldo.exe upx C:\Windows\System\LEuPuav.exe upx C:\Windows\System\equNxDK.exe upx C:\Windows\System\PsHgCqy.exe upx C:\Windows\System\DZKDvaX.exe upx C:\Windows\System\DYJSTAK.exe upx C:\Windows\System\LeEqCGh.exe upx C:\Windows\System\KsBLzxs.exe upx behavioral2/memory/4168-73-0x00007FF633270000-0x00007FF6335C4000-memory.dmp upx behavioral2/memory/2752-70-0x00007FF759C40000-0x00007FF759F94000-memory.dmp upx behavioral2/memory/4108-69-0x00007FF7A3420000-0x00007FF7A3774000-memory.dmp upx behavioral2/memory/4896-67-0x00007FF781620000-0x00007FF781974000-memory.dmp upx behavioral2/memory/2312-50-0x00007FF7C4DA0000-0x00007FF7C50F4000-memory.dmp upx behavioral2/memory/3136-122-0x00007FF770DD0000-0x00007FF771124000-memory.dmp upx behavioral2/memory/1676-125-0x00007FF669920000-0x00007FF669C74000-memory.dmp upx behavioral2/memory/5108-123-0x00007FF6010A0000-0x00007FF6013F4000-memory.dmp upx behavioral2/memory/2484-126-0x00007FF7AE0B0000-0x00007FF7AE404000-memory.dmp upx behavioral2/memory/2956-124-0x00007FF6B5F60000-0x00007FF6B62B4000-memory.dmp upx behavioral2/memory/1096-120-0x00007FF6A0FE0000-0x00007FF6A1334000-memory.dmp upx behavioral2/memory/1560-121-0x00007FF60EBA0000-0x00007FF60EEF4000-memory.dmp upx behavioral2/memory/3972-127-0x00007FF6BE310000-0x00007FF6BE664000-memory.dmp upx behavioral2/memory/2636-128-0x00007FF62B770000-0x00007FF62BAC4000-memory.dmp upx behavioral2/memory/1620-129-0x00007FF721D00000-0x00007FF722054000-memory.dmp upx behavioral2/memory/3540-130-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmp upx behavioral2/memory/1500-131-0x00007FF6127B0000-0x00007FF612B04000-memory.dmp upx behavioral2/memory/224-132-0x00007FF7053F0000-0x00007FF705744000-memory.dmp upx behavioral2/memory/2752-133-0x00007FF759C40000-0x00007FF759F94000-memory.dmp upx behavioral2/memory/4168-134-0x00007FF633270000-0x00007FF6335C4000-memory.dmp upx behavioral2/memory/3348-135-0x00007FF6EA480000-0x00007FF6EA7D4000-memory.dmp upx behavioral2/memory/220-136-0x00007FF60AF20000-0x00007FF60B274000-memory.dmp upx behavioral2/memory/1620-137-0x00007FF721D00000-0x00007FF722054000-memory.dmp upx behavioral2/memory/3540-138-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmp upx behavioral2/memory/744-139-0x00007FF6DF310000-0x00007FF6DF664000-memory.dmp upx behavioral2/memory/1500-140-0x00007FF6127B0000-0x00007FF612B04000-memory.dmp upx behavioral2/memory/1968-141-0x00007FF6FC840000-0x00007FF6FCB94000-memory.dmp upx behavioral2/memory/2312-142-0x00007FF7C4DA0000-0x00007FF7C50F4000-memory.dmp upx behavioral2/memory/224-143-0x00007FF7053F0000-0x00007FF705744000-memory.dmp upx behavioral2/memory/4108-144-0x00007FF7A3420000-0x00007FF7A3774000-memory.dmp upx behavioral2/memory/2752-145-0x00007FF759C40000-0x00007FF759F94000-memory.dmp upx behavioral2/memory/4168-146-0x00007FF633270000-0x00007FF6335C4000-memory.dmp upx behavioral2/memory/1096-147-0x00007FF6A0FE0000-0x00007FF6A1334000-memory.dmp upx behavioral2/memory/1560-148-0x00007FF60EBA0000-0x00007FF60EEF4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\qaQGgqH.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZRDIonj.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aavDINR.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YjnCMBA.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AWofoKO.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\COFtldo.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RpxxugP.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LEuPuav.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LeEqCGh.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DZKDvaX.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ITGzXxa.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\sECrgXi.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DJUNxSO.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DgoeyMw.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aHEQFEB.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\nKrzbjT.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\equNxDK.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DYJSTAK.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JIyQrJh.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KsBLzxs.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PsHgCqy.exe 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 4896 wrote to memory of 3348 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe ITGzXxa.exe PID 4896 wrote to memory of 3348 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe ITGzXxa.exe PID 4896 wrote to memory of 1620 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe sECrgXi.exe PID 4896 wrote to memory of 1620 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe sECrgXi.exe PID 4896 wrote to memory of 220 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe qaQGgqH.exe PID 4896 wrote to memory of 220 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe qaQGgqH.exe PID 4896 wrote to memory of 3540 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DJUNxSO.exe PID 4896 wrote to memory of 3540 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DJUNxSO.exe PID 4896 wrote to memory of 744 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DgoeyMw.exe PID 4896 wrote to memory of 744 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DgoeyMw.exe PID 4896 wrote to memory of 1500 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe ZRDIonj.exe PID 4896 wrote to memory of 1500 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe ZRDIonj.exe PID 4896 wrote to memory of 1968 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe aavDINR.exe PID 4896 wrote to memory of 1968 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe aavDINR.exe PID 4896 wrote to memory of 2312 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe YjnCMBA.exe PID 4896 wrote to memory of 2312 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe YjnCMBA.exe PID 4896 wrote to memory of 224 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe aHEQFEB.exe PID 4896 wrote to memory of 224 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe aHEQFEB.exe PID 4896 wrote to memory of 4108 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe nKrzbjT.exe PID 4896 wrote to memory of 4108 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe nKrzbjT.exe PID 4896 wrote to memory of 2752 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe AWofoKO.exe PID 4896 wrote to memory of 2752 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe AWofoKO.exe PID 4896 wrote to memory of 4168 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe JIyQrJh.exe PID 4896 wrote to memory of 4168 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe JIyQrJh.exe PID 4896 wrote to memory of 1096 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe RpxxugP.exe PID 4896 wrote to memory of 1096 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe RpxxugP.exe PID 4896 wrote to memory of 1560 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe COFtldo.exe PID 4896 wrote to memory of 1560 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe COFtldo.exe PID 4896 wrote to memory of 3136 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe KsBLzxs.exe PID 4896 wrote to memory of 3136 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe KsBLzxs.exe PID 4896 wrote to memory of 5108 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe LEuPuav.exe PID 4896 wrote to memory of 5108 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe LEuPuav.exe PID 4896 wrote to memory of 2956 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe equNxDK.exe PID 4896 wrote to memory of 2956 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe equNxDK.exe PID 4896 wrote to memory of 1676 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe PsHgCqy.exe PID 4896 wrote to memory of 1676 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe PsHgCqy.exe PID 4896 wrote to memory of 2484 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe LeEqCGh.exe PID 4896 wrote to memory of 2484 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe LeEqCGh.exe PID 4896 wrote to memory of 3972 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DYJSTAK.exe PID 4896 wrote to memory of 3972 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DYJSTAK.exe PID 4896 wrote to memory of 2636 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DZKDvaX.exe PID 4896 wrote to memory of 2636 4896 2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe DZKDvaX.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_33aef5f2f2b2addb213a26da2689869d_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\ITGzXxa.exeC:\Windows\System\ITGzXxa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sECrgXi.exeC:\Windows\System\sECrgXi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qaQGgqH.exeC:\Windows\System\qaQGgqH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DJUNxSO.exeC:\Windows\System\DJUNxSO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DgoeyMw.exeC:\Windows\System\DgoeyMw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZRDIonj.exeC:\Windows\System\ZRDIonj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aavDINR.exeC:\Windows\System\aavDINR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YjnCMBA.exeC:\Windows\System\YjnCMBA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aHEQFEB.exeC:\Windows\System\aHEQFEB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nKrzbjT.exeC:\Windows\System\nKrzbjT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AWofoKO.exeC:\Windows\System\AWofoKO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JIyQrJh.exeC:\Windows\System\JIyQrJh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RpxxugP.exeC:\Windows\System\RpxxugP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\COFtldo.exeC:\Windows\System\COFtldo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KsBLzxs.exeC:\Windows\System\KsBLzxs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LEuPuav.exeC:\Windows\System\LEuPuav.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\equNxDK.exeC:\Windows\System\equNxDK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PsHgCqy.exeC:\Windows\System\PsHgCqy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LeEqCGh.exeC:\Windows\System\LeEqCGh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DYJSTAK.exeC:\Windows\System\DYJSTAK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DZKDvaX.exeC:\Windows\System\DZKDvaX.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3148,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\AWofoKO.exeFilesize
5.9MB
MD56587aaa0e504180e0433424e36737049
SHA139c20c0445a105ab3b52c7d4f85b7d17d18132df
SHA2569f0f90475f7b861144e47ff657dd5c180bfe6ab8da9ef27ff711a4ce887620d3
SHA51279c469c352217758012859c4444637b5144146d61db62bce0e5cdac2aa2a5eef22ebf9fa4c8e001233be05f718bd9f42f37ee42e36ebe9c25b46ee17c9af8822
-
C:\Windows\System\COFtldo.exeFilesize
5.9MB
MD51e1ad899e1722f6f387ca73829288725
SHA174306ded3bc6cfdab66baaf63c2406ee4ac30e27
SHA256526bdefb6e968fa08ee13038af7927c826e736516218afd57cc63a1cc0e34c3c
SHA512e0c7f7e816f6a6bcb66237812f74e83a082edc6a401959d96e740527bc07d6511f53ee1f924922dab354138a491b2351b904633dfd723cb045ace59422bc4fad
-
C:\Windows\System\DJUNxSO.exeFilesize
5.9MB
MD52ca001c36800d1db38ab3d7c95d6e51d
SHA10fe16f68d2ccd45a9930acd97828c498adaa6ae2
SHA2569e4e8b93e4cfeeb46a6125877492d7b14564f6287d3851c3b6ce6ea519b2acff
SHA512156dcd96589c07e0f7e2cbc115df596de3f227e3f5c91c1a05c2c68267bafffa07103c2539a68554446611d98911ed7a5a8d46e4cc92cf20ca303d3d33556d5c
-
C:\Windows\System\DYJSTAK.exeFilesize
5.9MB
MD556b47aa3e616b2bb98e6914c49c571fa
SHA1fb20d917c0c513141316a638212e272465d6b730
SHA2562c3bc54902d16e8bfe7734fc1922a800e948858c2ec9349235adbaa7d4a4f37f
SHA5122a93682e7f091e114aa285a642d42442efc2bc504536f3ebe5fd228d5137bd3a71700a41da0a70e32503913d381699553a2b4b274774beb7704ed54eb3da12c6
-
C:\Windows\System\DZKDvaX.exeFilesize
5.9MB
MD52d2f2a26b1e9686ca8c5623e310b4c5e
SHA1b39127ae89a741fbf5d9a2ccaa0c54d21f7f45d4
SHA25631a82c0413eb2ee4332aa063f293af1bafb82f52c054cd48fe848307f734100c
SHA51291f5d0857027a36d988b1105f7b7153bf79771dba41993c69fa794195d3487d1d382bf19713a4f5850cf95fa15855b5db29954052c5d25f709f223d5180bccf3
-
C:\Windows\System\DgoeyMw.exeFilesize
5.9MB
MD56b071fe1eb9bd3d6846288b30124b55a
SHA196702b042d6b7cac94737d78f3bb538c4f1f2153
SHA25673e554c9f713e73764b4ab1373098c552489738af6fbd64753de66550c603c12
SHA51228c90d4b0d69c32731e64e205417ecc5056e3d7bc7c6bab80174fabc4e89626a44c2949039ac27d4bc588e44a20ef758b6988c500e1514f8f18f8adaa560456b
-
C:\Windows\System\ITGzXxa.exeFilesize
5.9MB
MD5858024e8d97977c2940cb74a912e34c2
SHA17efe6434825ebc00d82c4afc0ff5028425462667
SHA2569d3e12bc459da215c5f435ef176bebd4fdc9f8677ee5153b2107eea4306865c2
SHA512874ce68a80bf9e77645dded0c613ebb0ea01f8f143b8435fbc5095fc6aec6444c6c0b51003feefb56c5e572d7110a0f09704622ef38d184c4b30babcf1c82c21
-
C:\Windows\System\JIyQrJh.exeFilesize
5.9MB
MD50fb3054a8f80d242775641b3d66819ee
SHA1ee17bbb4543b74c2818ba08db397c71ea366a825
SHA256b12fef98a63f7d88c553a7e0f9f7092d8fc2392193ec41b2d3eac71a1d9f83f7
SHA5122dfe21f9b5f753565d6a8d809053e4d07d54144b83f24cf1b4b8538fde46c9ab5e5ded5070c1aed4bb7579852845bcacc4b54f9b9527245aba8c2ee8eaf452fa
-
C:\Windows\System\KsBLzxs.exeFilesize
5.9MB
MD580f25cf5d714c9c4d93ec47149adf1ea
SHA18a438b17e0096cd04df5e6ad0f7756474d79cd92
SHA2567d4cb3d489657dfc72c621e4c285340be876cbafc2db0cf33ce945409b9a8ac6
SHA512384f45de5cba8f9e6c6848cbc57808ae676852cf7263522de2c902eb605e989092f623e0d0ff249c97698e4675b79cd7ea92198b3387f33d8e2b476024dabf3c
-
C:\Windows\System\LEuPuav.exeFilesize
5.9MB
MD509df0d2b42f7a3e7443b6cf7eb4a3c32
SHA1bd6ee8d1d6025faa31c18f67696beb9f29379a5a
SHA256e0d19ca6e17fcc3a431c8f0e670f99486abf5ea36b92baab0354469276ca82c5
SHA5121fd2c5e468e4685e61c3c607c81c5a3196f002784c4d81c68d24570c83c6714b65347d102194cfbc0826c74a2a86f5fe59dcc6fac8892b6768f0cbf6564131a9
-
C:\Windows\System\LeEqCGh.exeFilesize
5.9MB
MD5ddd8266e524043402f8311bff7074833
SHA1359f1e877da7c233746f23b59f750f9d01708380
SHA256d82c77aac139c9a49a0a2957d2b1d8aa38f6577d34ea6429029755e11e474b66
SHA512ae30bf755458064aaefcb799ecea448164f811b390ef20736183b902a86d901836653d7621c6fe3d9fe218ea0411580a5d3c3d6fa6f16dad456c165d9c2bd527
-
C:\Windows\System\PsHgCqy.exeFilesize
5.9MB
MD51ef372ec37bfd8da5e1b4b700699d99a
SHA1e4ac72919fb05fe778b0eb68de01ce9899d07133
SHA256a6486ec88f9a37427877564f580685da03d3f7a95aa8d941d88e3f22ddbe7c81
SHA512d2231af8ee1304f3c370c9d77e444eddcf6ec913b1007ce814e34c668137bae7376d1f77ccdf4b27f1bc60d0f32dccbe94fe0e1dca35376ed86f38d009582c71
-
C:\Windows\System\RpxxugP.exeFilesize
5.9MB
MD5fd4f714148f95a7c4e4d97a483f47770
SHA159d3e377ad1dc435c0fa5485934bd3df079a0abf
SHA2563c65670c20ef31f25e0ecf49fbec779f802e3f8f9edd863c67b54854cbf603f6
SHA5129c71f76a8045bc44365e0b6603cda8859422729e6a23a36f3baf19d724a342bebaa50938cb3b658f66e5377c0812f243465ef79c39418e6f800fa24181200af0
-
C:\Windows\System\YjnCMBA.exeFilesize
5.9MB
MD5b9993b901dadbb0500dee9acfbca11f3
SHA1d773dc878e80d2066fd15606822ba08609045520
SHA2569c57468d60c96b457650f777306881247889e8c9587dc4896e0dd921d3ceffb8
SHA5128b15abeac57a471ec44c8276da4af5ca82dd24a3bd09684c41fb919260cd743991720f63f03b1770c436b7cb06046d2e0c14515d38c61cca3a162c39b6c8fb7a
-
C:\Windows\System\ZRDIonj.exeFilesize
5.9MB
MD5e555074fcf66f0c950d397d3ddb63a95
SHA15289693a2dfad899cd2619c6c9a907a4b7433fd0
SHA256143861f07d5dd30dec9a5cae8c697f4f9c10f443cf6ef1dbdd63e803b83a614e
SHA512cab38a73ab415510e5bbe2fd931b80b5c6ba5669aa4df3205a3bb1e7a83d18ad3cabb643e13a62fc4f4e9a9623ebdddd53271ac2143d2c6f0b04f01d8a8122fb
-
C:\Windows\System\aHEQFEB.exeFilesize
5.9MB
MD54a512b681a646c5b29f088cf5c982ad5
SHA159184dd700d71a142640a387e96c345aba3f83bf
SHA256f9cd0e6ac7f77da4ab9e8e143c08ed65ab84b5c69f9a555afbacbed55acb8185
SHA51203b1538f540f7caf9fdffe51bb7adaaa46571409aa3dc791b7accf420d2085ddbb7eef23facbd133c1cb8f4c604e451f7af71a16c488716a72e43bf2d3020881
-
C:\Windows\System\aavDINR.exeFilesize
5.9MB
MD5bb14f8a80c5aacb87767c9c1e52eb767
SHA1c83dabf5433151ab1a937b9bea49644fcd41292d
SHA256839c9d1eae065077e3562184c9980f1b095b5694501ad7843c7533454a13bcb5
SHA5128b46e8d6ce329b9f9207d941359b181a4ff832aab0d0f8dc99ff94fe62cd4a5a6822d2137b52ac97b215df3d885df214dcdfe34ffcde613afe9e1839f811a741
-
C:\Windows\System\equNxDK.exeFilesize
5.9MB
MD5a36a6c01a6f96a6bcd9620684ee6fc78
SHA1e5a13fd8721d1c8f2ffc43193bda217f07de8f32
SHA25678945fd76190a0dd7b97ebfd10471d9429e3fd5dd6c78042990107d843c1d898
SHA512c5e1a271568ecf56896570cc27b7bcad0c1432fb6b46e1195d8e15df7ba8e52d1afde9f1cf5208382a6c6a080a9d41276448bd0275524cdba78c82536e4a23dc
-
C:\Windows\System\nKrzbjT.exeFilesize
5.9MB
MD526a01e27e38712686d0562fcf2d60cbc
SHA1c0006f1c47783e6d75b6b1948af8fcbcddbf3560
SHA256f2e521d136b5c19425fb45e6ae0703b9b889ada2474f07f99ed55e1944c2498f
SHA512a1a84f8cbcc9fc557dd23876e7474ad85d7defe02c696140363c4b5da873b890bff6c4b8d600df634858644a800b79fe7dc476231cb7f8ebbff06f6d2891dbc0
-
C:\Windows\System\qaQGgqH.exeFilesize
5.9MB
MD52eb76a440ce1719669ea61ae94ad1a9a
SHA1f0d1748342658265f7f5525c3f5221e7563d8b7c
SHA2564af912e090795c6e90188d33ec4d2dd6db37264521fbfa8ba099ae6f71a35d5c
SHA5128ae111b23eeed3f7ea3b8e4452bdc3c44ccb50e88fbaffc17a64579b8bde1333585e30ca82773fb890c5e4b75137ee2e073c7ce57d6e0300bef8a36e87c45573
-
C:\Windows\System\sECrgXi.exeFilesize
5.9MB
MD5aeaf5a8050be4d60ec260dcd42d63a94
SHA11127907ca10aa06902f28b2749e84a185b3a55e7
SHA2567a0d756c054ec5a236c242c8490e30424242f421918a51cc0e711316a0c62064
SHA512d64dfd63abca5958e7c71b2d0f0f1f65d2b0dbcc2677e0243288400737db52f8cbd3010558e3a11d183732151c52bfb4cdda5543ece353aaa933ba214c2fa950
-
memory/220-20-0x00007FF60AF20000-0x00007FF60B274000-memory.dmpFilesize
3.3MB
-
memory/220-136-0x00007FF60AF20000-0x00007FF60B274000-memory.dmpFilesize
3.3MB
-
memory/224-55-0x00007FF7053F0000-0x00007FF705744000-memory.dmpFilesize
3.3MB
-
memory/224-143-0x00007FF7053F0000-0x00007FF705744000-memory.dmpFilesize
3.3MB
-
memory/224-132-0x00007FF7053F0000-0x00007FF705744000-memory.dmpFilesize
3.3MB
-
memory/744-139-0x00007FF6DF310000-0x00007FF6DF664000-memory.dmpFilesize
3.3MB
-
memory/744-32-0x00007FF6DF310000-0x00007FF6DF664000-memory.dmpFilesize
3.3MB
-
memory/1096-120-0x00007FF6A0FE0000-0x00007FF6A1334000-memory.dmpFilesize
3.3MB
-
memory/1096-147-0x00007FF6A0FE0000-0x00007FF6A1334000-memory.dmpFilesize
3.3MB
-
memory/1500-36-0x00007FF6127B0000-0x00007FF612B04000-memory.dmpFilesize
3.3MB
-
memory/1500-140-0x00007FF6127B0000-0x00007FF612B04000-memory.dmpFilesize
3.3MB
-
memory/1500-131-0x00007FF6127B0000-0x00007FF612B04000-memory.dmpFilesize
3.3MB
-
memory/1560-148-0x00007FF60EBA0000-0x00007FF60EEF4000-memory.dmpFilesize
3.3MB
-
memory/1560-121-0x00007FF60EBA0000-0x00007FF60EEF4000-memory.dmpFilesize
3.3MB
-
memory/1620-137-0x00007FF721D00000-0x00007FF722054000-memory.dmpFilesize
3.3MB
-
memory/1620-129-0x00007FF721D00000-0x00007FF722054000-memory.dmpFilesize
3.3MB
-
memory/1620-12-0x00007FF721D00000-0x00007FF722054000-memory.dmpFilesize
3.3MB
-
memory/1676-125-0x00007FF669920000-0x00007FF669C74000-memory.dmpFilesize
3.3MB
-
memory/1676-150-0x00007FF669920000-0x00007FF669C74000-memory.dmpFilesize
3.3MB
-
memory/1968-44-0x00007FF6FC840000-0x00007FF6FCB94000-memory.dmpFilesize
3.3MB
-
memory/1968-141-0x00007FF6FC840000-0x00007FF6FCB94000-memory.dmpFilesize
3.3MB
-
memory/2312-50-0x00007FF7C4DA0000-0x00007FF7C50F4000-memory.dmpFilesize
3.3MB
-
memory/2312-142-0x00007FF7C4DA0000-0x00007FF7C50F4000-memory.dmpFilesize
3.3MB
-
memory/2484-155-0x00007FF7AE0B0000-0x00007FF7AE404000-memory.dmpFilesize
3.3MB
-
memory/2484-126-0x00007FF7AE0B0000-0x00007FF7AE404000-memory.dmpFilesize
3.3MB
-
memory/2636-153-0x00007FF62B770000-0x00007FF62BAC4000-memory.dmpFilesize
3.3MB
-
memory/2636-128-0x00007FF62B770000-0x00007FF62BAC4000-memory.dmpFilesize
3.3MB
-
memory/2752-70-0x00007FF759C40000-0x00007FF759F94000-memory.dmpFilesize
3.3MB
-
memory/2752-133-0x00007FF759C40000-0x00007FF759F94000-memory.dmpFilesize
3.3MB
-
memory/2752-145-0x00007FF759C40000-0x00007FF759F94000-memory.dmpFilesize
3.3MB
-
memory/2956-151-0x00007FF6B5F60000-0x00007FF6B62B4000-memory.dmpFilesize
3.3MB
-
memory/2956-124-0x00007FF6B5F60000-0x00007FF6B62B4000-memory.dmpFilesize
3.3MB
-
memory/3136-122-0x00007FF770DD0000-0x00007FF771124000-memory.dmpFilesize
3.3MB
-
memory/3136-149-0x00007FF770DD0000-0x00007FF771124000-memory.dmpFilesize
3.3MB
-
memory/3348-8-0x00007FF6EA480000-0x00007FF6EA7D4000-memory.dmpFilesize
3.3MB
-
memory/3348-135-0x00007FF6EA480000-0x00007FF6EA7D4000-memory.dmpFilesize
3.3MB
-
memory/3540-130-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmpFilesize
3.3MB
-
memory/3540-138-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmpFilesize
3.3MB
-
memory/3540-24-0x00007FF6D77E0000-0x00007FF6D7B34000-memory.dmpFilesize
3.3MB
-
memory/3972-154-0x00007FF6BE310000-0x00007FF6BE664000-memory.dmpFilesize
3.3MB
-
memory/3972-127-0x00007FF6BE310000-0x00007FF6BE664000-memory.dmpFilesize
3.3MB
-
memory/4108-144-0x00007FF7A3420000-0x00007FF7A3774000-memory.dmpFilesize
3.3MB
-
memory/4108-69-0x00007FF7A3420000-0x00007FF7A3774000-memory.dmpFilesize
3.3MB
-
memory/4168-134-0x00007FF633270000-0x00007FF6335C4000-memory.dmpFilesize
3.3MB
-
memory/4168-146-0x00007FF633270000-0x00007FF6335C4000-memory.dmpFilesize
3.3MB
-
memory/4168-73-0x00007FF633270000-0x00007FF6335C4000-memory.dmpFilesize
3.3MB
-
memory/4896-1-0x0000025A80050000-0x0000025A80060000-memory.dmpFilesize
64KB
-
memory/4896-0-0x00007FF781620000-0x00007FF781974000-memory.dmpFilesize
3.3MB
-
memory/4896-67-0x00007FF781620000-0x00007FF781974000-memory.dmpFilesize
3.3MB
-
memory/5108-152-0x00007FF6010A0000-0x00007FF6013F4000-memory.dmpFilesize
3.3MB
-
memory/5108-123-0x00007FF6010A0000-0x00007FF6013F4000-memory.dmpFilesize
3.3MB