Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 05:45
Behavioral task
behavioral1
Sample
2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
General
-
Target
2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
06f8d8aae36ec27d193903d544cd9ecb
-
SHA1
6f418cab0e3be93f50ba6d47e95072fd35525380
-
SHA256
dae583eaf154b9870a017c5c2f68ce5cc4c3ba9ac4cd097ca8b6f09a531a7fdc
-
SHA512
3e908e2008d21120c109b8437d90f2777efd7134714e059940ed19f89768f2ea6c7d02a759f48c79e318ef9119567d6b1b44a5c85e4a61406ddbdbc990c695af
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUZ:Q+856utgpPF8u/7Z
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\FRngiHc.exe cobalt_reflective_dll C:\Windows\System\viRJKZJ.exe cobalt_reflective_dll C:\Windows\System\tjKiDxQ.exe cobalt_reflective_dll C:\Windows\System\flBdXke.exe cobalt_reflective_dll C:\Windows\System\iFFrLbX.exe cobalt_reflective_dll C:\Windows\System\YCfblCu.exe cobalt_reflective_dll C:\Windows\System\LJJWmZM.exe cobalt_reflective_dll C:\Windows\System\qnJzXlY.exe cobalt_reflective_dll C:\Windows\System\RWVDarU.exe cobalt_reflective_dll C:\Windows\System\TOTDoIC.exe cobalt_reflective_dll C:\Windows\System\GyXxVdX.exe cobalt_reflective_dll C:\Windows\System\jkTIhbx.exe cobalt_reflective_dll C:\Windows\System\uqsiuLj.exe cobalt_reflective_dll C:\Windows\System\RHvqXGl.exe cobalt_reflective_dll C:\Windows\System\tVeIcBx.exe cobalt_reflective_dll C:\Windows\System\XMgvgNU.exe cobalt_reflective_dll C:\Windows\System\SGFqcep.exe cobalt_reflective_dll C:\Windows\System\LRHyXdv.exe cobalt_reflective_dll C:\Windows\System\CZodZmn.exe cobalt_reflective_dll C:\Windows\System\IJNyWyd.exe cobalt_reflective_dll C:\Windows\System\MBIqhBq.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2160-0-0x00007FF701A40000-0x00007FF701D94000-memory.dmp xmrig C:\Windows\System\FRngiHc.exe xmrig behavioral2/memory/5056-7-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmp xmrig C:\Windows\System\viRJKZJ.exe xmrig C:\Windows\System\tjKiDxQ.exe xmrig behavioral2/memory/4740-14-0x00007FF765120000-0x00007FF765474000-memory.dmp xmrig C:\Windows\System\flBdXke.exe xmrig behavioral2/memory/5104-27-0x00007FF746140000-0x00007FF746494000-memory.dmp xmrig C:\Windows\System\iFFrLbX.exe xmrig behavioral2/memory/1524-30-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmp xmrig behavioral2/memory/4816-22-0x00007FF61F100000-0x00007FF61F454000-memory.dmp xmrig C:\Windows\System\YCfblCu.exe xmrig C:\Windows\System\LJJWmZM.exe xmrig behavioral2/memory/3244-43-0x00007FF6F8870000-0x00007FF6F8BC4000-memory.dmp xmrig C:\Windows\System\qnJzXlY.exe xmrig behavioral2/memory/4576-49-0x00007FF6F25E0000-0x00007FF6F2934000-memory.dmp xmrig C:\Windows\System\RWVDarU.exe xmrig C:\Windows\System\TOTDoIC.exe xmrig behavioral2/memory/3056-59-0x00007FF787F70000-0x00007FF7882C4000-memory.dmp xmrig C:\Windows\System\GyXxVdX.exe xmrig C:\Windows\System\jkTIhbx.exe xmrig C:\Windows\System\uqsiuLj.exe xmrig C:\Windows\System\RHvqXGl.exe xmrig C:\Windows\System\tVeIcBx.exe xmrig C:\Windows\System\XMgvgNU.exe xmrig C:\Windows\System\SGFqcep.exe xmrig C:\Windows\System\LRHyXdv.exe xmrig C:\Windows\System\CZodZmn.exe xmrig C:\Windows\System\IJNyWyd.exe xmrig C:\Windows\System\MBIqhBq.exe xmrig behavioral2/memory/2256-60-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmp xmrig behavioral2/memory/3956-51-0x00007FF7FE1E0000-0x00007FF7FE534000-memory.dmp xmrig behavioral2/memory/1408-117-0x00007FF614780000-0x00007FF614AD4000-memory.dmp xmrig behavioral2/memory/4860-119-0x00007FF734260000-0x00007FF7345B4000-memory.dmp xmrig behavioral2/memory/3564-118-0x00007FF6901D0000-0x00007FF690524000-memory.dmp xmrig behavioral2/memory/1232-120-0x00007FF7B9A10000-0x00007FF7B9D64000-memory.dmp xmrig behavioral2/memory/4268-121-0x00007FF7205D0000-0x00007FF720924000-memory.dmp xmrig behavioral2/memory/3260-122-0x00007FF74AFF0000-0x00007FF74B344000-memory.dmp xmrig behavioral2/memory/3020-123-0x00007FF61A5B0000-0x00007FF61A904000-memory.dmp xmrig behavioral2/memory/1008-125-0x00007FF665230000-0x00007FF665584000-memory.dmp xmrig behavioral2/memory/3992-124-0x00007FF6A7C20000-0x00007FF6A7F74000-memory.dmp xmrig behavioral2/memory/3928-126-0x00007FF76D3E0000-0x00007FF76D734000-memory.dmp xmrig behavioral2/memory/3100-127-0x00007FF72DB30000-0x00007FF72DE84000-memory.dmp xmrig behavioral2/memory/2160-128-0x00007FF701A40000-0x00007FF701D94000-memory.dmp xmrig behavioral2/memory/5056-129-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmp xmrig behavioral2/memory/4740-130-0x00007FF765120000-0x00007FF765474000-memory.dmp xmrig behavioral2/memory/5104-131-0x00007FF746140000-0x00007FF746494000-memory.dmp xmrig behavioral2/memory/1524-132-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmp xmrig behavioral2/memory/2256-133-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmp xmrig behavioral2/memory/5056-134-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmp xmrig behavioral2/memory/4740-135-0x00007FF765120000-0x00007FF765474000-memory.dmp xmrig behavioral2/memory/4816-136-0x00007FF61F100000-0x00007FF61F454000-memory.dmp xmrig behavioral2/memory/5104-137-0x00007FF746140000-0x00007FF746494000-memory.dmp xmrig behavioral2/memory/1524-138-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmp xmrig behavioral2/memory/3244-139-0x00007FF6F8870000-0x00007FF6F8BC4000-memory.dmp xmrig behavioral2/memory/4576-140-0x00007FF6F25E0000-0x00007FF6F2934000-memory.dmp xmrig behavioral2/memory/3956-141-0x00007FF7FE1E0000-0x00007FF7FE534000-memory.dmp xmrig behavioral2/memory/3056-142-0x00007FF787F70000-0x00007FF7882C4000-memory.dmp xmrig behavioral2/memory/2256-143-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmp xmrig behavioral2/memory/1408-144-0x00007FF614780000-0x00007FF614AD4000-memory.dmp xmrig behavioral2/memory/3564-145-0x00007FF6901D0000-0x00007FF690524000-memory.dmp xmrig behavioral2/memory/4860-146-0x00007FF734260000-0x00007FF7345B4000-memory.dmp xmrig behavioral2/memory/1232-147-0x00007FF7B9A10000-0x00007FF7B9D64000-memory.dmp xmrig behavioral2/memory/4268-148-0x00007FF7205D0000-0x00007FF720924000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
FRngiHc.exetjKiDxQ.exeviRJKZJ.exeflBdXke.exeiFFrLbX.exeLJJWmZM.exeYCfblCu.exeqnJzXlY.exeRWVDarU.exeTOTDoIC.exeGyXxVdX.exeMBIqhBq.exeIJNyWyd.exejkTIhbx.exeCZodZmn.exeuqsiuLj.exeLRHyXdv.exeSGFqcep.exeRHvqXGl.exeXMgvgNU.exetVeIcBx.exepid process 5056 FRngiHc.exe 4740 tjKiDxQ.exe 4816 viRJKZJ.exe 5104 flBdXke.exe 1524 iFFrLbX.exe 3244 LJJWmZM.exe 4576 YCfblCu.exe 3956 qnJzXlY.exe 3056 RWVDarU.exe 2256 TOTDoIC.exe 1408 GyXxVdX.exe 3564 MBIqhBq.exe 4860 IJNyWyd.exe 1232 jkTIhbx.exe 4268 CZodZmn.exe 3260 uqsiuLj.exe 3020 LRHyXdv.exe 3992 SGFqcep.exe 1008 RHvqXGl.exe 3928 XMgvgNU.exe 3100 tVeIcBx.exe -
Processes:
resource yara_rule behavioral2/memory/2160-0-0x00007FF701A40000-0x00007FF701D94000-memory.dmp upx C:\Windows\System\FRngiHc.exe upx behavioral2/memory/5056-7-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmp upx C:\Windows\System\viRJKZJ.exe upx C:\Windows\System\tjKiDxQ.exe upx behavioral2/memory/4740-14-0x00007FF765120000-0x00007FF765474000-memory.dmp upx C:\Windows\System\flBdXke.exe upx behavioral2/memory/5104-27-0x00007FF746140000-0x00007FF746494000-memory.dmp upx C:\Windows\System\iFFrLbX.exe upx behavioral2/memory/1524-30-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmp upx behavioral2/memory/4816-22-0x00007FF61F100000-0x00007FF61F454000-memory.dmp upx C:\Windows\System\YCfblCu.exe upx C:\Windows\System\LJJWmZM.exe upx behavioral2/memory/3244-43-0x00007FF6F8870000-0x00007FF6F8BC4000-memory.dmp upx C:\Windows\System\qnJzXlY.exe upx behavioral2/memory/4576-49-0x00007FF6F25E0000-0x00007FF6F2934000-memory.dmp upx C:\Windows\System\RWVDarU.exe upx C:\Windows\System\TOTDoIC.exe upx behavioral2/memory/3056-59-0x00007FF787F70000-0x00007FF7882C4000-memory.dmp upx C:\Windows\System\GyXxVdX.exe upx C:\Windows\System\jkTIhbx.exe upx C:\Windows\System\uqsiuLj.exe upx C:\Windows\System\RHvqXGl.exe upx C:\Windows\System\tVeIcBx.exe upx C:\Windows\System\XMgvgNU.exe upx C:\Windows\System\SGFqcep.exe upx C:\Windows\System\LRHyXdv.exe upx C:\Windows\System\CZodZmn.exe upx C:\Windows\System\IJNyWyd.exe upx C:\Windows\System\MBIqhBq.exe upx behavioral2/memory/2256-60-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmp upx behavioral2/memory/3956-51-0x00007FF7FE1E0000-0x00007FF7FE534000-memory.dmp upx behavioral2/memory/1408-117-0x00007FF614780000-0x00007FF614AD4000-memory.dmp upx behavioral2/memory/4860-119-0x00007FF734260000-0x00007FF7345B4000-memory.dmp upx behavioral2/memory/3564-118-0x00007FF6901D0000-0x00007FF690524000-memory.dmp upx behavioral2/memory/1232-120-0x00007FF7B9A10000-0x00007FF7B9D64000-memory.dmp upx behavioral2/memory/4268-121-0x00007FF7205D0000-0x00007FF720924000-memory.dmp upx behavioral2/memory/3260-122-0x00007FF74AFF0000-0x00007FF74B344000-memory.dmp upx behavioral2/memory/3020-123-0x00007FF61A5B0000-0x00007FF61A904000-memory.dmp upx behavioral2/memory/1008-125-0x00007FF665230000-0x00007FF665584000-memory.dmp upx behavioral2/memory/3992-124-0x00007FF6A7C20000-0x00007FF6A7F74000-memory.dmp upx behavioral2/memory/3928-126-0x00007FF76D3E0000-0x00007FF76D734000-memory.dmp upx behavioral2/memory/3100-127-0x00007FF72DB30000-0x00007FF72DE84000-memory.dmp upx behavioral2/memory/2160-128-0x00007FF701A40000-0x00007FF701D94000-memory.dmp upx behavioral2/memory/5056-129-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmp upx behavioral2/memory/4740-130-0x00007FF765120000-0x00007FF765474000-memory.dmp upx behavioral2/memory/5104-131-0x00007FF746140000-0x00007FF746494000-memory.dmp upx behavioral2/memory/1524-132-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmp upx behavioral2/memory/2256-133-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmp upx behavioral2/memory/5056-134-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmp upx behavioral2/memory/4740-135-0x00007FF765120000-0x00007FF765474000-memory.dmp upx behavioral2/memory/4816-136-0x00007FF61F100000-0x00007FF61F454000-memory.dmp upx behavioral2/memory/5104-137-0x00007FF746140000-0x00007FF746494000-memory.dmp upx behavioral2/memory/1524-138-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmp upx behavioral2/memory/3244-139-0x00007FF6F8870000-0x00007FF6F8BC4000-memory.dmp upx behavioral2/memory/4576-140-0x00007FF6F25E0000-0x00007FF6F2934000-memory.dmp upx behavioral2/memory/3956-141-0x00007FF7FE1E0000-0x00007FF7FE534000-memory.dmp upx behavioral2/memory/3056-142-0x00007FF787F70000-0x00007FF7882C4000-memory.dmp upx behavioral2/memory/2256-143-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmp upx behavioral2/memory/1408-144-0x00007FF614780000-0x00007FF614AD4000-memory.dmp upx behavioral2/memory/3564-145-0x00007FF6901D0000-0x00007FF690524000-memory.dmp upx behavioral2/memory/4860-146-0x00007FF734260000-0x00007FF7345B4000-memory.dmp upx behavioral2/memory/1232-147-0x00007FF7B9A10000-0x00007FF7B9D64000-memory.dmp upx behavioral2/memory/4268-148-0x00007FF7205D0000-0x00007FF720924000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\XMgvgNU.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\viRJKZJ.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TOTDoIC.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\MBIqhBq.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\uqsiuLj.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IJNyWyd.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CZodZmn.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\tVeIcBx.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\tjKiDxQ.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\flBdXke.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\iFFrLbX.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\qnJzXlY.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GyXxVdX.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LRHyXdv.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RHvqXGl.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FRngiHc.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LJJWmZM.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YCfblCu.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RWVDarU.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\jkTIhbx.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SGFqcep.exe 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2160 wrote to memory of 5056 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe FRngiHc.exe PID 2160 wrote to memory of 5056 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe FRngiHc.exe PID 2160 wrote to memory of 4740 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe tjKiDxQ.exe PID 2160 wrote to memory of 4740 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe tjKiDxQ.exe PID 2160 wrote to memory of 4816 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe viRJKZJ.exe PID 2160 wrote to memory of 4816 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe viRJKZJ.exe PID 2160 wrote to memory of 5104 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe flBdXke.exe PID 2160 wrote to memory of 5104 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe flBdXke.exe PID 2160 wrote to memory of 1524 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe iFFrLbX.exe PID 2160 wrote to memory of 1524 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe iFFrLbX.exe PID 2160 wrote to memory of 3244 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe LJJWmZM.exe PID 2160 wrote to memory of 3244 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe LJJWmZM.exe PID 2160 wrote to memory of 4576 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe YCfblCu.exe PID 2160 wrote to memory of 4576 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe YCfblCu.exe PID 2160 wrote to memory of 3956 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe qnJzXlY.exe PID 2160 wrote to memory of 3956 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe qnJzXlY.exe PID 2160 wrote to memory of 3056 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe RWVDarU.exe PID 2160 wrote to memory of 3056 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe RWVDarU.exe PID 2160 wrote to memory of 2256 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe TOTDoIC.exe PID 2160 wrote to memory of 2256 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe TOTDoIC.exe PID 2160 wrote to memory of 1408 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe GyXxVdX.exe PID 2160 wrote to memory of 1408 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe GyXxVdX.exe PID 2160 wrote to memory of 3564 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe MBIqhBq.exe PID 2160 wrote to memory of 3564 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe MBIqhBq.exe PID 2160 wrote to memory of 4860 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe IJNyWyd.exe PID 2160 wrote to memory of 4860 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe IJNyWyd.exe PID 2160 wrote to memory of 1232 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe jkTIhbx.exe PID 2160 wrote to memory of 1232 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe jkTIhbx.exe PID 2160 wrote to memory of 4268 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe CZodZmn.exe PID 2160 wrote to memory of 4268 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe CZodZmn.exe PID 2160 wrote to memory of 3260 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe uqsiuLj.exe PID 2160 wrote to memory of 3260 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe uqsiuLj.exe PID 2160 wrote to memory of 3020 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe LRHyXdv.exe PID 2160 wrote to memory of 3020 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe LRHyXdv.exe PID 2160 wrote to memory of 3992 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe SGFqcep.exe PID 2160 wrote to memory of 3992 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe SGFqcep.exe PID 2160 wrote to memory of 1008 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe RHvqXGl.exe PID 2160 wrote to memory of 1008 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe RHvqXGl.exe PID 2160 wrote to memory of 3928 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe XMgvgNU.exe PID 2160 wrote to memory of 3928 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe XMgvgNU.exe PID 2160 wrote to memory of 3100 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe tVeIcBx.exe PID 2160 wrote to memory of 3100 2160 2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe tVeIcBx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-30_06f8d8aae36ec27d193903d544cd9ecb_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\FRngiHc.exeC:\Windows\System\FRngiHc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tjKiDxQ.exeC:\Windows\System\tjKiDxQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\viRJKZJ.exeC:\Windows\System\viRJKZJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\flBdXke.exeC:\Windows\System\flBdXke.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iFFrLbX.exeC:\Windows\System\iFFrLbX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LJJWmZM.exeC:\Windows\System\LJJWmZM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YCfblCu.exeC:\Windows\System\YCfblCu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qnJzXlY.exeC:\Windows\System\qnJzXlY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RWVDarU.exeC:\Windows\System\RWVDarU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TOTDoIC.exeC:\Windows\System\TOTDoIC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GyXxVdX.exeC:\Windows\System\GyXxVdX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MBIqhBq.exeC:\Windows\System\MBIqhBq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IJNyWyd.exeC:\Windows\System\IJNyWyd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jkTIhbx.exeC:\Windows\System\jkTIhbx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CZodZmn.exeC:\Windows\System\CZodZmn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uqsiuLj.exeC:\Windows\System\uqsiuLj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LRHyXdv.exeC:\Windows\System\LRHyXdv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SGFqcep.exeC:\Windows\System\SGFqcep.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RHvqXGl.exeC:\Windows\System\RHvqXGl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XMgvgNU.exeC:\Windows\System\XMgvgNU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tVeIcBx.exeC:\Windows\System\tVeIcBx.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\CZodZmn.exeFilesize
5.9MB
MD5f3f6b3eea6cbf00474e2fe806ef8c58d
SHA1d4fb74278e518f8df2694a83361a5e7124e43dbd
SHA2563f03f6fda85dc284c0502db80a229e2ab732bb4da4b5301343cd544e9861fc74
SHA512571791188319e0ad61683dc4b51d2a931ea04ea337ab63f8c3e1302da81e335b502d8d77d392a968a1d3cbf9e63468172e4002364a10ea71f684366133b24e32
-
C:\Windows\System\FRngiHc.exeFilesize
5.9MB
MD5cf8b9c536072e9c2adc0ac7e9b17b5ee
SHA1d548f027c103fcbbe3297606c381ce3a199a9667
SHA256af1e2b4fc9afa85aef56a94718fea087a12553243e2d2c4908b531dbf39d9b46
SHA512428a099a711ac905a753dcfed845027eb56a803d966681bca6dbf5762f62f65a3edae4dcc78df0331424463d47935bf87d26e4464efb30d7d54227734391992e
-
C:\Windows\System\GyXxVdX.exeFilesize
5.9MB
MD57f9af53cd53e2f640ec39902c29b661f
SHA1cc87ad943174a96cf183c512b6df363013c08e3a
SHA25634dd39c638ace0b2fa42bf36b6586ca6ec7fa8072b6abfe88933c4b15a39b9f4
SHA512273c91402cd5bc15b91e2ac7b029eda4d8e00763227e01ad785cb1cdba82f73fab0fd054123350475d6c4c8392a7fd9f32ce29d6469f84c8674adf50afe8a8e0
-
C:\Windows\System\IJNyWyd.exeFilesize
5.9MB
MD5a346222c88ee2df031fd9b28e6402162
SHA14b5b9c723c3857e39a907992faadd87e8ac67a26
SHA2565e8f2bc6ef42c927d31a5733188b341fbfcc787c6fbad0a16dc5ffc0e5e33796
SHA5123e5874eef8949fa2e2cefd8b021ed61ca1a0db5d3856f730af5859a4ac9ecdb80c256c2409f667e0d14f5613933ffc73549d18e30dbbc450ffd42814fa6fcb70
-
C:\Windows\System\LJJWmZM.exeFilesize
5.9MB
MD5cf03975a361640412c43ed0c48d9e55e
SHA10fee1ee954377ffa7afc022bd9465d83b0a89811
SHA256f956da0063363ac6c25afebe10f7c3ecbda3986e1670c796e9e479cb8fc79f02
SHA512027e52c6472533347fa1c9b87774b0d42e819a5097d1ce8f872212010b671ef463b2f6845abc3fdaaa1eb22ab3909d364d821847a85b78d3109bcfa0278101d4
-
C:\Windows\System\LRHyXdv.exeFilesize
5.9MB
MD56b5a7903dcbc7ed152921739986ffbdf
SHA1df48432386828a095146c6830a046352c269d49b
SHA25678cfca2fe8e75f1a7fb38b18de7c66e0e133da50d025bc38ae60ee4bb44131fe
SHA512028b515573a0a91b8f355cbf0da961f0e4e779d4a4dcf7a03640caf6408996ce97ae256dc6cc61c7bf7f485a9d72348fcbb012d62cdf8de9e270b5eaf1a9fbaa
-
C:\Windows\System\MBIqhBq.exeFilesize
5.9MB
MD5d914795c0ce77812a276ed1b258230d2
SHA143f3bc813523531d3d369df7626a94b7cc7cb717
SHA256f3eac2a51c5f7233e155e92e22660c3607ded4eb41f15b792c7ebd55962acfac
SHA512a5b7b79fe7dc6c3830d00a0866427badcd78f7183bbdc8363e5adb498a5397206398fc55ef4203d5c2e4a7e4015ea0fb4483035801aeafcdc714a188b2301a09
-
C:\Windows\System\RHvqXGl.exeFilesize
5.9MB
MD565105ae46e1930d8986da63a4804b76c
SHA16b6e71597fa7f538f0220932010ebac34e84383b
SHA2568a9a50a8b1a22b5c9e60314d862936449e16586e6669a8d7dddb52db61492933
SHA5122bb10422fff5a4d212baafa95c1914a53146307d10bee26072591c89ae41baef4d291fdc79b7068b2cfecd6e690b75a1f2f74544304d6cd663fdaec679f59556
-
C:\Windows\System\RWVDarU.exeFilesize
5.9MB
MD5d05e9070b74fead9cd41593fc93024cf
SHA18be3bde35f35156aa0c2495e5bd8344cba21296d
SHA256f18c273890ddfbeceb7db2cc1b9c0c209757d8e855ea2d80efd95134f965ddb8
SHA5120846ef2a781fdf79b5f0ca189cbeb34109c9d20409547a40e1569c7836f47a7c46192c6818a5d06829e6b6a651721230e120b3e251459f913e9fbb3b2e8141dd
-
C:\Windows\System\SGFqcep.exeFilesize
5.9MB
MD5256b1a15787e4a380ef977258ab5061f
SHA1d8ab54128e2c20d0efc3633db17c7d3502db57ad
SHA256a04c20239fd56182ed26933e68f7583f5089d373de0c69023268db444fb803aa
SHA51251ba94d494d977d94368852ad1fde3f558118041f554a16aebe50bb94462b288d7c253ed11fc4028e2a5c5e3c156840bf54a525db351469218bcf61d1e2da777
-
C:\Windows\System\TOTDoIC.exeFilesize
5.9MB
MD58847df65dd0d92dab566eeec1c52ef27
SHA1553d6ffa79ca6900920ec394aab82c1eef60f7b7
SHA256b5be397adeab9d56d924b2655603c795f7fd6db97577d70f66fe4d2bee31ac36
SHA512918c3d266350090f7bec733fce0975407963319e4f93df5dd53032a2e5b63417155ff28a310117d9c879c54ca5a71c6b08cfb6fd1b96708af7d17ea948afc5f4
-
C:\Windows\System\XMgvgNU.exeFilesize
5.9MB
MD5706fbf9521dda484c547bc53e70c482b
SHA1dd6c2a1f957d9ce2af1f29a5721a23d3d835ecbb
SHA256948d2e5fe038006626106c98b3ad649a393a00f1bf9a022a4ced0517c2db9ed6
SHA512e13ec6f153e384a037ae96d22f149e518fd4032c9076db3323a31bb2886b7cf1961c3ae56a170e72b706bfff4e6248c82741f1ce5cc72b33fac4d73d98b9be97
-
C:\Windows\System\YCfblCu.exeFilesize
5.9MB
MD5d5ddde8c6bd35daf8ff0d2194446c439
SHA174529f475697465f999143b5d400206394fbf64f
SHA25693067b16b64777b5f943f1b375e68257d063eebd67d9e2b0d571de7c4253ed29
SHA512b852015fee1649c6daccf6a417308986d87523eb5ef4d04d91ac9508f60a099b11e71e85c864994f6ef970403dbd63f7c6b5feb6534296f487c7dae3fceaba99
-
C:\Windows\System\flBdXke.exeFilesize
5.9MB
MD5dcb234ef7ed53ad6dda13514e2849bee
SHA1a1cacef38f796ccc759643b5355ddd2d58d81616
SHA256b1be3b93b782027b473e6c7aa50847c63b4ad77ea53791f1250a92c344c67950
SHA5120ccd6600e12babf7aba08b4bf741febf1c5177c3039a14bbae841115fc8fce71a951aacf3b54459b7f7ba105f8cac391208978b157043b9d0a8a0fe50242962c
-
C:\Windows\System\iFFrLbX.exeFilesize
5.9MB
MD5f385ae1612d0e19aa9568bc332543662
SHA11f07d2ebc25768520da6e5139cc0880c7d9dd941
SHA256e3f8313bff3c5b148c0f6cfd2781cbd7d1d7562b3057666eec9ac6794d2410d7
SHA512e4a906c020a8f4d734a1b10ae51ae527531b7d36a41a2fd02e37da56ad9de887cfc47f299509333a7a5a0285f72cf7d3fcb6819445fcd2285443b566c72dd287
-
C:\Windows\System\jkTIhbx.exeFilesize
5.9MB
MD52dd447702f5466cc1445701472f5a685
SHA1c507735d860476e611a7ea06b73433d678a44d16
SHA25677f778238a945a4a69b319911b99f1726d9f545b4f93c68c4bb3ba4f01eaba91
SHA512ef67185c63a51e555b99997f4c05d661f593942e7f822feaaa80dd22a5a84581f569cd8c170cf8a2316514ab2ab0b60e75da719409e0d67ec18661ee451fe13c
-
C:\Windows\System\qnJzXlY.exeFilesize
5.9MB
MD575914cf7b1f341f0860ebd71f4251c6a
SHA153e61fc893bdeba0a497d5121972618dd476358a
SHA25659871ceda7e8a18539fb725b93ecdf75d60b4eca115c8cb363304e0003b94366
SHA512c48524268040dee5e99425b0db747a631e237d1bbe0b17f1c50126425992493f1c7c8fa0e4c8a4385bd1ec194ac6db7314487bf5274f90034e850ed01e0e4a55
-
C:\Windows\System\tVeIcBx.exeFilesize
5.9MB
MD5dcc98e0e17d43fdd196b513fe905eeb2
SHA1a99f0f10a6d81f0a1aed715eaae0c50ac305f3d2
SHA256c423076a0cfd16814d56ac4cd3e14514d63fec4250bd402c28d81acc7c438c42
SHA5125fbc54fe4aaed829c2194eac9675fc8999c555b9541986d5788d919714f095178d327f253132992079e5e4246cc25866fe32f919807f6e240a60529f1f9d8a91
-
C:\Windows\System\tjKiDxQ.exeFilesize
5.9MB
MD5ae4e287ed5f4d8da1d1cfc47dbe48c47
SHA13c74c6fe601e53e8a3359deeb02e384227598af9
SHA25615221d3db9954119e9e7f4aaa01673b3966d85061cc5065addf99664eef1ec18
SHA512d550bbc1b29780f350cf15fb8b69e592fbc672993caa25429b3d51b212b9dbcda23b5bf8e6b27d90f13d46a5bcd6650fa26167c507bbd0204208ad29c084879b
-
C:\Windows\System\uqsiuLj.exeFilesize
5.9MB
MD5590e101148df6022bfaed1ed03c3099b
SHA1d9c77430e529fa53635139df77bcb3e4a5d51522
SHA2562c8e47c6b44b9f8909894b2b6c300d86fb4ab67fd516231de044fea1afe9e14b
SHA5122ed62faade74cc428186218812a4df61af506be262fee346563484495fc0dc9f2ed46f3a39af35a64c682180b7889da4a3d2fbf63a41ba02553b90d74772872d
-
C:\Windows\System\viRJKZJ.exeFilesize
5.9MB
MD589d5a3db6e6b0599135cb23dec996c86
SHA151d312d509b3e6ef7e3ba5ed591bab215041006d
SHA2569e9d9b252e0668f8167dd628f623e36cd8f51e3e942f6d7e8e975b373a2dfec8
SHA512c9b31ff6226199e0c4da051ed933b91a5cd6444562bb128e32fc837026b2d94ef86c7a215e7dc282c3acf99cf366b3b2afd18ba05b22f315e97346a280cb10da
-
memory/1008-152-0x00007FF665230000-0x00007FF665584000-memory.dmpFilesize
3.3MB
-
memory/1008-125-0x00007FF665230000-0x00007FF665584000-memory.dmpFilesize
3.3MB
-
memory/1232-147-0x00007FF7B9A10000-0x00007FF7B9D64000-memory.dmpFilesize
3.3MB
-
memory/1232-120-0x00007FF7B9A10000-0x00007FF7B9D64000-memory.dmpFilesize
3.3MB
-
memory/1408-117-0x00007FF614780000-0x00007FF614AD4000-memory.dmpFilesize
3.3MB
-
memory/1408-144-0x00007FF614780000-0x00007FF614AD4000-memory.dmpFilesize
3.3MB
-
memory/1524-30-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmpFilesize
3.3MB
-
memory/1524-132-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmpFilesize
3.3MB
-
memory/1524-138-0x00007FF67C190000-0x00007FF67C4E4000-memory.dmpFilesize
3.3MB
-
memory/2160-128-0x00007FF701A40000-0x00007FF701D94000-memory.dmpFilesize
3.3MB
-
memory/2160-1-0x000001D0229C0000-0x000001D0229D0000-memory.dmpFilesize
64KB
-
memory/2160-0-0x00007FF701A40000-0x00007FF701D94000-memory.dmpFilesize
3.3MB
-
memory/2256-60-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmpFilesize
3.3MB
-
memory/2256-133-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmpFilesize
3.3MB
-
memory/2256-143-0x00007FF6BD590000-0x00007FF6BD8E4000-memory.dmpFilesize
3.3MB
-
memory/3020-150-0x00007FF61A5B0000-0x00007FF61A904000-memory.dmpFilesize
3.3MB
-
memory/3020-123-0x00007FF61A5B0000-0x00007FF61A904000-memory.dmpFilesize
3.3MB
-
memory/3056-59-0x00007FF787F70000-0x00007FF7882C4000-memory.dmpFilesize
3.3MB
-
memory/3056-142-0x00007FF787F70000-0x00007FF7882C4000-memory.dmpFilesize
3.3MB
-
memory/3100-154-0x00007FF72DB30000-0x00007FF72DE84000-memory.dmpFilesize
3.3MB
-
memory/3100-127-0x00007FF72DB30000-0x00007FF72DE84000-memory.dmpFilesize
3.3MB
-
memory/3244-139-0x00007FF6F8870000-0x00007FF6F8BC4000-memory.dmpFilesize
3.3MB
-
memory/3244-43-0x00007FF6F8870000-0x00007FF6F8BC4000-memory.dmpFilesize
3.3MB
-
memory/3260-122-0x00007FF74AFF0000-0x00007FF74B344000-memory.dmpFilesize
3.3MB
-
memory/3260-149-0x00007FF74AFF0000-0x00007FF74B344000-memory.dmpFilesize
3.3MB
-
memory/3564-118-0x00007FF6901D0000-0x00007FF690524000-memory.dmpFilesize
3.3MB
-
memory/3564-145-0x00007FF6901D0000-0x00007FF690524000-memory.dmpFilesize
3.3MB
-
memory/3928-153-0x00007FF76D3E0000-0x00007FF76D734000-memory.dmpFilesize
3.3MB
-
memory/3928-126-0x00007FF76D3E0000-0x00007FF76D734000-memory.dmpFilesize
3.3MB
-
memory/3956-51-0x00007FF7FE1E0000-0x00007FF7FE534000-memory.dmpFilesize
3.3MB
-
memory/3956-141-0x00007FF7FE1E0000-0x00007FF7FE534000-memory.dmpFilesize
3.3MB
-
memory/3992-151-0x00007FF6A7C20000-0x00007FF6A7F74000-memory.dmpFilesize
3.3MB
-
memory/3992-124-0x00007FF6A7C20000-0x00007FF6A7F74000-memory.dmpFilesize
3.3MB
-
memory/4268-121-0x00007FF7205D0000-0x00007FF720924000-memory.dmpFilesize
3.3MB
-
memory/4268-148-0x00007FF7205D0000-0x00007FF720924000-memory.dmpFilesize
3.3MB
-
memory/4576-49-0x00007FF6F25E0000-0x00007FF6F2934000-memory.dmpFilesize
3.3MB
-
memory/4576-140-0x00007FF6F25E0000-0x00007FF6F2934000-memory.dmpFilesize
3.3MB
-
memory/4740-135-0x00007FF765120000-0x00007FF765474000-memory.dmpFilesize
3.3MB
-
memory/4740-14-0x00007FF765120000-0x00007FF765474000-memory.dmpFilesize
3.3MB
-
memory/4740-130-0x00007FF765120000-0x00007FF765474000-memory.dmpFilesize
3.3MB
-
memory/4816-22-0x00007FF61F100000-0x00007FF61F454000-memory.dmpFilesize
3.3MB
-
memory/4816-136-0x00007FF61F100000-0x00007FF61F454000-memory.dmpFilesize
3.3MB
-
memory/4860-119-0x00007FF734260000-0x00007FF7345B4000-memory.dmpFilesize
3.3MB
-
memory/4860-146-0x00007FF734260000-0x00007FF7345B4000-memory.dmpFilesize
3.3MB
-
memory/5056-134-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmpFilesize
3.3MB
-
memory/5056-129-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmpFilesize
3.3MB
-
memory/5056-7-0x00007FF63CEB0000-0x00007FF63D204000-memory.dmpFilesize
3.3MB
-
memory/5104-131-0x00007FF746140000-0x00007FF746494000-memory.dmpFilesize
3.3MB
-
memory/5104-27-0x00007FF746140000-0x00007FF746494000-memory.dmpFilesize
3.3MB
-
memory/5104-137-0x00007FF746140000-0x00007FF746494000-memory.dmpFilesize
3.3MB