Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 06:45
Behavioral task
behavioral1
Sample
2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240419-en
General
-
Target
2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
03f72815581f3b582e9f2b9ab3eb02c9
-
SHA1
c9fddba1d1107079320c41b71a51de0f0021ac67
-
SHA256
8311e443f96e95e8a9c1735b352706688e7cf1f34dcfa8e3d7825d5c7db8727d
-
SHA512
900a9b8dda0a310b7c4debb5fbbf3aa217c2563060d690c7113165877b58907b2a335dd23594bf9b4ecf82ad257921e0dc5305e774571e69d5d92f2f56fec571
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lU9:Q+856utgpPF8u/79
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\LzCFmEM.exe cobalt_reflective_dll C:\Windows\System\eXbOzqe.exe cobalt_reflective_dll C:\Windows\System\suuizFR.exe cobalt_reflective_dll C:\Windows\System\aiFCTkg.exe cobalt_reflective_dll C:\Windows\System\aWBglaM.exe cobalt_reflective_dll C:\Windows\System\YVYKDUb.exe cobalt_reflective_dll C:\Windows\System\FMRGIVh.exe cobalt_reflective_dll C:\Windows\System\bMltfMi.exe cobalt_reflective_dll C:\Windows\System\uHrovZX.exe cobalt_reflective_dll C:\Windows\System\wWOvAXm.exe cobalt_reflective_dll C:\Windows\System\EUpwJap.exe cobalt_reflective_dll C:\Windows\System\SMZEyWX.exe cobalt_reflective_dll C:\Windows\System\UTKOfIo.exe cobalt_reflective_dll C:\Windows\System\GynxLnm.exe cobalt_reflective_dll C:\Windows\System\yhDvNNP.exe cobalt_reflective_dll C:\Windows\System\kzgMnYw.exe cobalt_reflective_dll C:\Windows\System\myEpjcZ.exe cobalt_reflective_dll C:\Windows\System\VsVBCXT.exe cobalt_reflective_dll C:\Windows\System\oaObGXR.exe cobalt_reflective_dll C:\Windows\System\nbpJKIV.exe cobalt_reflective_dll C:\Windows\System\jOVdRIk.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3760-0-0x00007FF752000000-0x00007FF752354000-memory.dmp xmrig C:\Windows\System\LzCFmEM.exe xmrig C:\Windows\System\eXbOzqe.exe xmrig C:\Windows\System\suuizFR.exe xmrig C:\Windows\System\aiFCTkg.exe xmrig C:\Windows\System\aWBglaM.exe xmrig behavioral2/memory/1436-40-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp xmrig C:\Windows\System\YVYKDUb.exe xmrig C:\Windows\System\FMRGIVh.exe xmrig C:\Windows\System\bMltfMi.exe xmrig behavioral2/memory/1676-60-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmp xmrig behavioral2/memory/3256-57-0x00007FF727EB0000-0x00007FF728204000-memory.dmp xmrig behavioral2/memory/3684-53-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmp xmrig behavioral2/memory/3540-49-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmp xmrig C:\Windows\System\uHrovZX.exe xmrig C:\Windows\System\wWOvAXm.exe xmrig behavioral2/memory/2264-35-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp xmrig behavioral2/memory/1760-34-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp xmrig behavioral2/memory/3448-28-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmp xmrig behavioral2/memory/4084-19-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmp xmrig C:\Windows\System\EUpwJap.exe xmrig C:\Windows\System\SMZEyWX.exe xmrig behavioral2/memory/1912-86-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmp xmrig behavioral2/memory/4200-84-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmp xmrig behavioral2/memory/1736-81-0x00007FF7D4000000-0x00007FF7D4354000-memory.dmp xmrig C:\Windows\System\UTKOfIo.exe xmrig C:\Windows\System\GynxLnm.exe xmrig C:\Windows\System\yhDvNNP.exe xmrig behavioral2/memory/2108-115-0x00007FF623FD0000-0x00007FF624324000-memory.dmp xmrig behavioral2/memory/2852-120-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmp xmrig behavioral2/memory/3416-131-0x00007FF773C60000-0x00007FF773FB4000-memory.dmp xmrig C:\Windows\System\kzgMnYw.exe xmrig behavioral2/memory/2264-128-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp xmrig behavioral2/memory/460-127-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmp xmrig C:\Windows\System\myEpjcZ.exe xmrig C:\Windows\System\VsVBCXT.exe xmrig behavioral2/memory/5080-118-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmp xmrig behavioral2/memory/1436-114-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp xmrig C:\Windows\System\oaObGXR.exe xmrig behavioral2/memory/4652-98-0x00007FF709B10000-0x00007FF709E64000-memory.dmp xmrig behavioral2/memory/1760-97-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp xmrig behavioral2/memory/4388-90-0x00007FF686780000-0x00007FF686AD4000-memory.dmp xmrig C:\Windows\System\nbpJKIV.exe xmrig behavioral2/memory/3760-76-0x00007FF752000000-0x00007FF752354000-memory.dmp xmrig behavioral2/memory/4548-70-0x00007FF6D27A0000-0x00007FF6D2AF4000-memory.dmp xmrig C:\Windows\System\jOVdRIk.exe xmrig behavioral2/memory/2412-8-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmp xmrig behavioral2/memory/3684-132-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmp xmrig behavioral2/memory/3256-133-0x00007FF727EB0000-0x00007FF728204000-memory.dmp xmrig behavioral2/memory/1676-134-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmp xmrig behavioral2/memory/4200-135-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmp xmrig behavioral2/memory/1912-136-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmp xmrig behavioral2/memory/4388-137-0x00007FF686780000-0x00007FF686AD4000-memory.dmp xmrig behavioral2/memory/4652-138-0x00007FF709B10000-0x00007FF709E64000-memory.dmp xmrig behavioral2/memory/2852-139-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmp xmrig behavioral2/memory/5080-140-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmp xmrig behavioral2/memory/460-141-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmp xmrig behavioral2/memory/2412-142-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmp xmrig behavioral2/memory/4084-143-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmp xmrig behavioral2/memory/3448-144-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmp xmrig behavioral2/memory/1760-145-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp xmrig behavioral2/memory/2264-146-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp xmrig behavioral2/memory/3540-147-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmp xmrig behavioral2/memory/1436-148-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
LzCFmEM.exeeXbOzqe.exesuuizFR.exeaiFCTkg.exeaWBglaM.exeuHrovZX.exewWOvAXm.exeFMRGIVh.exeYVYKDUb.exebMltfMi.exejOVdRIk.exeEUpwJap.exeSMZEyWX.exenbpJKIV.exeUTKOfIo.exeGynxLnm.exeoaObGXR.exeVsVBCXT.exeyhDvNNP.exemyEpjcZ.exekzgMnYw.exepid process 2412 LzCFmEM.exe 4084 eXbOzqe.exe 3448 suuizFR.exe 1760 aiFCTkg.exe 2264 aWBglaM.exe 1436 uHrovZX.exe 3540 wWOvAXm.exe 3684 FMRGIVh.exe 3256 YVYKDUb.exe 1676 bMltfMi.exe 4548 jOVdRIk.exe 1736 EUpwJap.exe 1912 SMZEyWX.exe 4200 nbpJKIV.exe 4388 UTKOfIo.exe 4652 GynxLnm.exe 2108 oaObGXR.exe 5080 VsVBCXT.exe 2852 yhDvNNP.exe 460 myEpjcZ.exe 3416 kzgMnYw.exe -
Processes:
resource yara_rule behavioral2/memory/3760-0-0x00007FF752000000-0x00007FF752354000-memory.dmp upx C:\Windows\System\LzCFmEM.exe upx C:\Windows\System\eXbOzqe.exe upx C:\Windows\System\suuizFR.exe upx C:\Windows\System\aiFCTkg.exe upx C:\Windows\System\aWBglaM.exe upx behavioral2/memory/1436-40-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp upx C:\Windows\System\YVYKDUb.exe upx C:\Windows\System\FMRGIVh.exe upx C:\Windows\System\bMltfMi.exe upx behavioral2/memory/1676-60-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmp upx behavioral2/memory/3256-57-0x00007FF727EB0000-0x00007FF728204000-memory.dmp upx behavioral2/memory/3684-53-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmp upx behavioral2/memory/3540-49-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmp upx C:\Windows\System\uHrovZX.exe upx C:\Windows\System\wWOvAXm.exe upx behavioral2/memory/2264-35-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp upx behavioral2/memory/1760-34-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp upx behavioral2/memory/3448-28-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmp upx behavioral2/memory/4084-19-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmp upx C:\Windows\System\EUpwJap.exe upx C:\Windows\System\SMZEyWX.exe upx behavioral2/memory/1912-86-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmp upx behavioral2/memory/4200-84-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmp upx behavioral2/memory/1736-81-0x00007FF7D4000000-0x00007FF7D4354000-memory.dmp upx C:\Windows\System\UTKOfIo.exe upx C:\Windows\System\GynxLnm.exe upx C:\Windows\System\yhDvNNP.exe upx behavioral2/memory/2108-115-0x00007FF623FD0000-0x00007FF624324000-memory.dmp upx behavioral2/memory/2852-120-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmp upx behavioral2/memory/3416-131-0x00007FF773C60000-0x00007FF773FB4000-memory.dmp upx C:\Windows\System\kzgMnYw.exe upx behavioral2/memory/2264-128-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp upx behavioral2/memory/460-127-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmp upx C:\Windows\System\myEpjcZ.exe upx C:\Windows\System\VsVBCXT.exe upx behavioral2/memory/5080-118-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmp upx behavioral2/memory/1436-114-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp upx C:\Windows\System\oaObGXR.exe upx behavioral2/memory/4652-98-0x00007FF709B10000-0x00007FF709E64000-memory.dmp upx behavioral2/memory/1760-97-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp upx behavioral2/memory/4388-90-0x00007FF686780000-0x00007FF686AD4000-memory.dmp upx C:\Windows\System\nbpJKIV.exe upx behavioral2/memory/3760-76-0x00007FF752000000-0x00007FF752354000-memory.dmp upx behavioral2/memory/4548-70-0x00007FF6D27A0000-0x00007FF6D2AF4000-memory.dmp upx C:\Windows\System\jOVdRIk.exe upx behavioral2/memory/2412-8-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmp upx behavioral2/memory/3684-132-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmp upx behavioral2/memory/3256-133-0x00007FF727EB0000-0x00007FF728204000-memory.dmp upx behavioral2/memory/1676-134-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmp upx behavioral2/memory/4200-135-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmp upx behavioral2/memory/1912-136-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmp upx behavioral2/memory/4388-137-0x00007FF686780000-0x00007FF686AD4000-memory.dmp upx behavioral2/memory/4652-138-0x00007FF709B10000-0x00007FF709E64000-memory.dmp upx behavioral2/memory/2852-139-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmp upx behavioral2/memory/5080-140-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmp upx behavioral2/memory/460-141-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmp upx behavioral2/memory/2412-142-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmp upx behavioral2/memory/4084-143-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmp upx behavioral2/memory/3448-144-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmp upx behavioral2/memory/1760-145-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmp upx behavioral2/memory/2264-146-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmp upx behavioral2/memory/3540-147-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmp upx behavioral2/memory/1436-148-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\wWOvAXm.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FMRGIVh.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oaObGXR.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SMZEyWX.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\myEpjcZ.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\suuizFR.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aiFCTkg.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aWBglaM.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YVYKDUb.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GynxLnm.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kzgMnYw.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UTKOfIo.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LzCFmEM.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\eXbOzqe.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\uHrovZX.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bMltfMi.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jOVdRIk.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\EUpwJap.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\nbpJKIV.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VsVBCXT.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\yhDvNNP.exe 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 3760 wrote to memory of 2412 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe LzCFmEM.exe PID 3760 wrote to memory of 2412 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe LzCFmEM.exe PID 3760 wrote to memory of 4084 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe eXbOzqe.exe PID 3760 wrote to memory of 4084 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe eXbOzqe.exe PID 3760 wrote to memory of 3448 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe suuizFR.exe PID 3760 wrote to memory of 3448 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe suuizFR.exe PID 3760 wrote to memory of 1760 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe aiFCTkg.exe PID 3760 wrote to memory of 1760 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe aiFCTkg.exe PID 3760 wrote to memory of 2264 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe aWBglaM.exe PID 3760 wrote to memory of 2264 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe aWBglaM.exe PID 3760 wrote to memory of 1436 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe uHrovZX.exe PID 3760 wrote to memory of 1436 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe uHrovZX.exe PID 3760 wrote to memory of 3540 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe wWOvAXm.exe PID 3760 wrote to memory of 3540 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe wWOvAXm.exe PID 3760 wrote to memory of 3684 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe FMRGIVh.exe PID 3760 wrote to memory of 3684 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe FMRGIVh.exe PID 3760 wrote to memory of 3256 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe YVYKDUb.exe PID 3760 wrote to memory of 3256 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe YVYKDUb.exe PID 3760 wrote to memory of 1676 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe bMltfMi.exe PID 3760 wrote to memory of 1676 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe bMltfMi.exe PID 3760 wrote to memory of 4548 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe jOVdRIk.exe PID 3760 wrote to memory of 4548 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe jOVdRIk.exe PID 3760 wrote to memory of 1736 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe EUpwJap.exe PID 3760 wrote to memory of 1736 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe EUpwJap.exe PID 3760 wrote to memory of 1912 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe SMZEyWX.exe PID 3760 wrote to memory of 1912 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe SMZEyWX.exe PID 3760 wrote to memory of 4200 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe nbpJKIV.exe PID 3760 wrote to memory of 4200 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe nbpJKIV.exe PID 3760 wrote to memory of 4388 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe UTKOfIo.exe PID 3760 wrote to memory of 4388 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe UTKOfIo.exe PID 3760 wrote to memory of 4652 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe GynxLnm.exe PID 3760 wrote to memory of 4652 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe GynxLnm.exe PID 3760 wrote to memory of 2108 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe oaObGXR.exe PID 3760 wrote to memory of 2108 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe oaObGXR.exe PID 3760 wrote to memory of 5080 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe VsVBCXT.exe PID 3760 wrote to memory of 5080 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe VsVBCXT.exe PID 3760 wrote to memory of 2852 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe yhDvNNP.exe PID 3760 wrote to memory of 2852 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe yhDvNNP.exe PID 3760 wrote to memory of 460 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe myEpjcZ.exe PID 3760 wrote to memory of 460 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe myEpjcZ.exe PID 3760 wrote to memory of 3416 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe kzgMnYw.exe PID 3760 wrote to memory of 3416 3760 2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe kzgMnYw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_03f72815581f3b582e9f2b9ab3eb02c9_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\LzCFmEM.exeC:\Windows\System\LzCFmEM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\eXbOzqe.exeC:\Windows\System\eXbOzqe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\suuizFR.exeC:\Windows\System\suuizFR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aiFCTkg.exeC:\Windows\System\aiFCTkg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aWBglaM.exeC:\Windows\System\aWBglaM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uHrovZX.exeC:\Windows\System\uHrovZX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wWOvAXm.exeC:\Windows\System\wWOvAXm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FMRGIVh.exeC:\Windows\System\FMRGIVh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YVYKDUb.exeC:\Windows\System\YVYKDUb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bMltfMi.exeC:\Windows\System\bMltfMi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jOVdRIk.exeC:\Windows\System\jOVdRIk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EUpwJap.exeC:\Windows\System\EUpwJap.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SMZEyWX.exeC:\Windows\System\SMZEyWX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nbpJKIV.exeC:\Windows\System\nbpJKIV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UTKOfIo.exeC:\Windows\System\UTKOfIo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GynxLnm.exeC:\Windows\System\GynxLnm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oaObGXR.exeC:\Windows\System\oaObGXR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VsVBCXT.exeC:\Windows\System\VsVBCXT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yhDvNNP.exeC:\Windows\System\yhDvNNP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\myEpjcZ.exeC:\Windows\System\myEpjcZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kzgMnYw.exeC:\Windows\System\kzgMnYw.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\EUpwJap.exeFilesize
5.9MB
MD52cb5ec22def54a743414249a7dc25e74
SHA117a00846108b1fb9abde10fc3f5e09f65a5dc3c6
SHA25620a4f049320ebaaef95da98646f63d58f783fa426f160ff9de598a6f2d3e5e0f
SHA51244043969b552cf1cb23879c3f276d4c5c681410e423698f90603a21ef9b93321000e673fcd84fb89e1b1a608d359d3fa5f11b40fb0ee3de47a9f2a50d9d94324
-
C:\Windows\System\FMRGIVh.exeFilesize
5.9MB
MD561c1f14960949639993010e6f24320d9
SHA17cb324f1756d70cff2dff593a207cfd75927d089
SHA256fa620d2a095a168d4d95dfa88b49e6b1ce7d11763d47bbd3393410863f255920
SHA512201c1aa42d2d284d0916ea33ec4b73a5f112c923529604d29234e2cff290c71c3a64fb8ae3d8f5b9b0dc8e15c653ffdf38f0d76d495a54eb1c847036ff8fda2a
-
C:\Windows\System\GynxLnm.exeFilesize
5.9MB
MD539854d1e6a3857b8ee6830860ce5ad90
SHA12c7e5fc68e9b2b0bb54f808c3232cd573e1c2336
SHA2560b552f1003e66836dc805b24f8716fe6dfbf0607bb4cc25c3c412efb4ab58cb7
SHA512265d52a5127771f763f208b95cd3e79f892c2be0d340ee0de50a5ed70a3c9cac90ebcb6a54a814123e4ffa935c9c91d7dde2159135ee9c0fc81ea4eeb8d21534
-
C:\Windows\System\LzCFmEM.exeFilesize
5.9MB
MD58c4add64c1e5350e3d8b3faeba233486
SHA17c4a4643d74a4a033a1e765ee659ed04dedcdde9
SHA25643c6b9f16aead7873b68721d86d79673102c947cb3daf74e30dc8f0a63f88c99
SHA51237be5f4db501429a85fbd9eeeb9528374eaad5583b6a523f2cfae6731a93c64c928a4b556dae2fa467db23544405668004e240fd8649cf7510d71f41b198563d
-
C:\Windows\System\SMZEyWX.exeFilesize
5.9MB
MD5a2e1243d572244a35eb3a6112b79b580
SHA1b9430e0bb5fb0cfc670a228d7d766fc76697d11c
SHA25643655e87a6022edd597774632310cbd27558d8e4a0d5ea86b29620b40030319d
SHA5120db95e44b7f4a2660bbb63f72710b39e1eb84ae7adbe24834a637e039d996146616080c1e09f9e72c5766d2f79b4247a76994c5254cc7d726604dad32d98a064
-
C:\Windows\System\UTKOfIo.exeFilesize
5.9MB
MD55a6df708637e6fe8d65a7c9d98c4c1e7
SHA1e0498273745a657674beb0ba987d92170e113383
SHA256403a95c15ff07d5d54184e80477acc3522b193007653edeea3b2f5e847b4e9f5
SHA512e1aa356d10710fd4b8943cb25a2047cacccfb7920f6b473d309bc5f3f577f0a6c3d334b9ec1a56b90c1af7a564b532e7c2bc5344fa8da12a25df5c86ff160473
-
C:\Windows\System\VsVBCXT.exeFilesize
5.9MB
MD55913462cc5166fe520272ace21a3d8e2
SHA1ae1302888aea2675a48bf51210f610f4b02d7784
SHA2565044ee7935f9d41aab6eddeea9845c62b2ae64d3ae415146ccc099b7f5c4d6fb
SHA512e07270057a474e95e1f2a517c2b476d7ad3a4fe4a0d2aec0078200e851e3ccd963ecc420dee4ab48e15277c84d688c461ce1bb62baf73be4be98f4d8d6f7c5a4
-
C:\Windows\System\YVYKDUb.exeFilesize
5.9MB
MD53bc93546776079eb9d7cdbf454ef81eb
SHA141130d6f723aac8bd284ecc68f6212f7c4dade97
SHA256664f6508376026db6f09b22bf30ddf29205f683cbc76d6d78f56da1c5c963144
SHA512412922577631e737f51102a52c5fdecfdfb9ca893356e2e9a18f29eebc6cc1e8c528e877c52d587cc44bd8eb870149ccef84135883bce2073ae1c6c91e0db862
-
C:\Windows\System\aWBglaM.exeFilesize
5.9MB
MD508e76806c93813d37eb2bca2a1e4d783
SHA15dbb08adade72ea0ef0ed77c080a177f78dd4721
SHA25649acbfebb90e9d80556cc072578d0d81deea4c6b0a50265f4f34b1f7b14cf342
SHA51211907a6e0ce83c4064a1c74dc50ce71926b5a4c86b947b00616511042a9c7302efe13643a41922c33fcc006e6a9b0a3268fc6df055a3ce0b5c799b00a2b9444c
-
C:\Windows\System\aiFCTkg.exeFilesize
5.9MB
MD59229a2dfebde72e87526c9419aa113be
SHA151678b941bfa23245d353b426f81160052bd9f63
SHA256e2af5883f8e196f33a0a0be10ba8ad82fd44a35ad97ad26398c1ee876b354de8
SHA512cef5a28b03a797644ff401375f2eb9f6e0d01bfd07c42682dfda84c7dff460c7e8be17985cd04d135b178f2e292ca60a0dba436a28935d2f0068fd9f7b6876a9
-
C:\Windows\System\bMltfMi.exeFilesize
5.9MB
MD51b91228accc8baef822539895271674d
SHA13d32c72816942e5dd7f5c3dea81328347df6f26b
SHA2568f10c6779a7379a6feced57d2a10f276175aa96676037a1375ed4490929ee843
SHA5123b31406568dddea32d725f9d4275a3ca8f68f3e2d09977f28a4f03bca2404d60fb3d032c4be7109bd27ca5b4072e7dac0e2c1b968c60d919c4330412ae2c3962
-
C:\Windows\System\eXbOzqe.exeFilesize
5.9MB
MD5706c7b184ade147e67b2491a30bcfb8c
SHA1de6486f0ba6e26ba76235cc81dabf6469b57d747
SHA2569036ab4b06843b479d25c5a333f933b19a9734f8a7387bd781eeebf5b96566b7
SHA512fd18de3a604552f490b7fda24b25da574dbc8dfe11335811a9266a4fe83184af537dfcf015611c5d621551d26521ab3edef9ab85afb5641750261e4f48213aa7
-
C:\Windows\System\jOVdRIk.exeFilesize
5.9MB
MD57c8069bf951cc7f995d78bf6c05c5734
SHA15e353938785b282081ac020f3da30f753866ab1d
SHA25603e01cfa084cf79fcb0338b6d4cb4606c13cb0fc70e4e400c9d032d58e2cf7cd
SHA5120805d1d0e3ac8374e2a80a4c98401888c074ad67f058bd39678b8b360179aa32301313b69502c8a730e9f6b26fe3030f266c0703253f5b113e1db191f2c024a2
-
C:\Windows\System\kzgMnYw.exeFilesize
5.9MB
MD51b955eb68a34782a5171a49f15576a0b
SHA1c116aa212a1f604b4751909dfc393551bacdfc78
SHA2565ed2c776666e1de0d9d99fb2312df31183a7c47bb794059f8a4d7be5ad3092c8
SHA512558078ce3d0e2d016572c070a7214a6349ad9019632218175b87eedbe3b24d92202dbf5bde59823636dc8eb8244ca5949a59b36c4c915bda58daa408b474bea9
-
C:\Windows\System\myEpjcZ.exeFilesize
5.9MB
MD5b1bc0046d28f3f673bc48037f64d8a51
SHA1b55b6451fe4e53b0ea45effce3ff26a513f69d15
SHA256d6b2119324cf316e7a855221633558978d336901d546219a855936a357f4ebca
SHA512805f554d7dc548cf53b269fd106c3cd0b9126e897893b4a765c51427524e0dbb540793f39530e439317eb6604199b996b70071189f7edc52febb2a6bd424519e
-
C:\Windows\System\nbpJKIV.exeFilesize
5.9MB
MD50e90db32ac3688955d212816dea0d21f
SHA1598652480d0385aa4f1e266ae166ca3c0e0f0545
SHA25686571819530179ec61523ee8afb7cd0dba35c0b18baec5b219819f2243d85357
SHA5129b4a4d4da5c42f4d4dddd9f78c9eda2ed3bf0e4d11b45ed5aac24ae173020f15f8add36ab8b815d8275b53cc4c687721cd57ff235856b06e074f460a223e63d8
-
C:\Windows\System\oaObGXR.exeFilesize
5.9MB
MD565aeb1f03dd7cb1e8849e8db3a869782
SHA195c0f05b9e97a04433519edfee8f915bfebbc66a
SHA256c051a39d999741e1f25552be7de09df9efb55183ce2a2b6e1bccb5f25107c9db
SHA5124d5c9da14a3bcf3b0814c6d25c0aa5f6d570f1e70a7e7e449d55d545e0071cfbdd4a2cf57a3ee04d1ff94292c455f4262ea5cf3f7de18071102790fcd0ee0b9f
-
C:\Windows\System\suuizFR.exeFilesize
5.9MB
MD5a81334358994239ac59f61975b1c5fae
SHA17ba11a9659f2f87e60970aee068836517a560fbf
SHA256afc46914b6f5b2da67dec8862934d940fe240d34fcc83584c6f0930c8f324c38
SHA51296ab565598b2db6a3749a6a2a48970812c2c0d469b6b714300df53847eda283dcc5136cafaedae31b32b6cfc46469edbcc6678b158073974e7b0b1b1c28d0f96
-
C:\Windows\System\uHrovZX.exeFilesize
5.9MB
MD55c38284ba12718fec44cd68ec11c0833
SHA1b9c6991b2cdc4a8fad94f4b19a06091270fdbfaf
SHA256fd34758e091833ec1cd3806d8080dc9eb1a97350aee3d4620b12650b767403b5
SHA512deb9d0015368f4e19c98f277b7eee3e782f8f1a9c5b97c6fb208a977d2c522850571d3009d6011a0d1adfb048cd7f0ac0cc0cb0b2c59f57c85ce91a08b9437b7
-
C:\Windows\System\wWOvAXm.exeFilesize
5.9MB
MD53108cb3326bf01b9c312d559eaedf4a0
SHA13ed0e84897f7fe330c288c39e0bb607a6194d60a
SHA2564fbc51ee9b41cdf5eaef971f64de6e5e4accaec76082ee4b5d42a2d593e2e2e4
SHA5127e34d37c262c94accdf13a62de4edd5433386f73f98f5ba549df5ba9ab7c24387711b4ab23a2c091864ca6fad211c6e1143a12bd885e7633cb35aa2a5d99b53c
-
C:\Windows\System\yhDvNNP.exeFilesize
5.9MB
MD5c1d5808a958e994e62a1fd2200398afc
SHA1531a38398f11993de8aacc2a5bd5895d91fe01e3
SHA256a218a73a00f4d3bacb1e1b45c094cd2b7356a56cc031da7c9c497f65604f34a1
SHA51237baf93dafd651a70afdd3702803163b548321ef8edc5d7e464d6864c12c841dc4007f097368a7c35e03f0b02b02cba16e2c41d0c60ef0cb62e7665f5b3e49af
-
memory/460-141-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmpFilesize
3.3MB
-
memory/460-127-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmpFilesize
3.3MB
-
memory/460-161-0x00007FF6063A0000-0x00007FF6066F4000-memory.dmpFilesize
3.3MB
-
memory/1436-148-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmpFilesize
3.3MB
-
memory/1436-40-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmpFilesize
3.3MB
-
memory/1436-114-0x00007FF636BA0000-0x00007FF636EF4000-memory.dmpFilesize
3.3MB
-
memory/1676-134-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmpFilesize
3.3MB
-
memory/1676-60-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmpFilesize
3.3MB
-
memory/1676-151-0x00007FF7A00F0000-0x00007FF7A0444000-memory.dmpFilesize
3.3MB
-
memory/1736-153-0x00007FF7D4000000-0x00007FF7D4354000-memory.dmpFilesize
3.3MB
-
memory/1736-81-0x00007FF7D4000000-0x00007FF7D4354000-memory.dmpFilesize
3.3MB
-
memory/1760-34-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmpFilesize
3.3MB
-
memory/1760-97-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmpFilesize
3.3MB
-
memory/1760-145-0x00007FF7A16B0000-0x00007FF7A1A04000-memory.dmpFilesize
3.3MB
-
memory/1912-155-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmpFilesize
3.3MB
-
memory/1912-86-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmpFilesize
3.3MB
-
memory/1912-136-0x00007FF6DA860000-0x00007FF6DABB4000-memory.dmpFilesize
3.3MB
-
memory/2108-115-0x00007FF623FD0000-0x00007FF624324000-memory.dmpFilesize
3.3MB
-
memory/2108-156-0x00007FF623FD0000-0x00007FF624324000-memory.dmpFilesize
3.3MB
-
memory/2264-128-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmpFilesize
3.3MB
-
memory/2264-35-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmpFilesize
3.3MB
-
memory/2264-146-0x00007FF658CA0000-0x00007FF658FF4000-memory.dmpFilesize
3.3MB
-
memory/2412-142-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmpFilesize
3.3MB
-
memory/2412-8-0x00007FF6A3E40000-0x00007FF6A4194000-memory.dmpFilesize
3.3MB
-
memory/2852-159-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmpFilesize
3.3MB
-
memory/2852-120-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmpFilesize
3.3MB
-
memory/2852-139-0x00007FF7BE010000-0x00007FF7BE364000-memory.dmpFilesize
3.3MB
-
memory/3256-57-0x00007FF727EB0000-0x00007FF728204000-memory.dmpFilesize
3.3MB
-
memory/3256-150-0x00007FF727EB0000-0x00007FF728204000-memory.dmpFilesize
3.3MB
-
memory/3256-133-0x00007FF727EB0000-0x00007FF728204000-memory.dmpFilesize
3.3MB
-
memory/3416-162-0x00007FF773C60000-0x00007FF773FB4000-memory.dmpFilesize
3.3MB
-
memory/3416-131-0x00007FF773C60000-0x00007FF773FB4000-memory.dmpFilesize
3.3MB
-
memory/3448-144-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmpFilesize
3.3MB
-
memory/3448-28-0x00007FF71EB10000-0x00007FF71EE64000-memory.dmpFilesize
3.3MB
-
memory/3540-49-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmpFilesize
3.3MB
-
memory/3540-147-0x00007FF7EC6F0000-0x00007FF7ECA44000-memory.dmpFilesize
3.3MB
-
memory/3684-149-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmpFilesize
3.3MB
-
memory/3684-132-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmpFilesize
3.3MB
-
memory/3684-53-0x00007FF6FE1A0000-0x00007FF6FE4F4000-memory.dmpFilesize
3.3MB
-
memory/3760-0-0x00007FF752000000-0x00007FF752354000-memory.dmpFilesize
3.3MB
-
memory/3760-1-0x0000028E283A0000-0x0000028E283B0000-memory.dmpFilesize
64KB
-
memory/3760-76-0x00007FF752000000-0x00007FF752354000-memory.dmpFilesize
3.3MB
-
memory/4084-143-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmpFilesize
3.3MB
-
memory/4084-19-0x00007FF6EFA60000-0x00007FF6EFDB4000-memory.dmpFilesize
3.3MB
-
memory/4200-84-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmpFilesize
3.3MB
-
memory/4200-135-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmpFilesize
3.3MB
-
memory/4200-154-0x00007FF7C9500000-0x00007FF7C9854000-memory.dmpFilesize
3.3MB
-
memory/4388-158-0x00007FF686780000-0x00007FF686AD4000-memory.dmpFilesize
3.3MB
-
memory/4388-137-0x00007FF686780000-0x00007FF686AD4000-memory.dmpFilesize
3.3MB
-
memory/4388-90-0x00007FF686780000-0x00007FF686AD4000-memory.dmpFilesize
3.3MB
-
memory/4548-152-0x00007FF6D27A0000-0x00007FF6D2AF4000-memory.dmpFilesize
3.3MB
-
memory/4548-70-0x00007FF6D27A0000-0x00007FF6D2AF4000-memory.dmpFilesize
3.3MB
-
memory/4652-157-0x00007FF709B10000-0x00007FF709E64000-memory.dmpFilesize
3.3MB
-
memory/4652-138-0x00007FF709B10000-0x00007FF709E64000-memory.dmpFilesize
3.3MB
-
memory/4652-98-0x00007FF709B10000-0x00007FF709E64000-memory.dmpFilesize
3.3MB
-
memory/5080-140-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmpFilesize
3.3MB
-
memory/5080-118-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmpFilesize
3.3MB
-
memory/5080-160-0x00007FF6D1D10000-0x00007FF6D2064000-memory.dmpFilesize
3.3MB