Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 05:57
Behavioral task
behavioral1
Sample
2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240220-en
General
-
Target
2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
c0e9564febe8466fc5ce08a30330f085
-
SHA1
975f9397ac2c072b4f5c8c73241ca30de47bbb65
-
SHA256
a1351634c1285d31df49a40a2927b49fcd07835a237aaa61c26d91ca2ece5c5e
-
SHA512
9865a1450c4a05f45874fd0c97d1c278b72a6e53430346ff42bf77153f7647f2e50de709650c598aeb459ed5ec0816d72f729f6c9a7ced3031d93a73b2a250b2
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUU:Q+856utgpPF8u/7U
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\xLlqEwW.exe cobalt_reflective_dll C:\Windows\System\OMLimYd.exe cobalt_reflective_dll C:\Windows\System\GdkuMmi.exe cobalt_reflective_dll C:\Windows\System\JYWmWBt.exe cobalt_reflective_dll C:\Windows\System\TtxYeAD.exe cobalt_reflective_dll C:\Windows\System\DzQcONg.exe cobalt_reflective_dll C:\Windows\System\gLLLllb.exe cobalt_reflective_dll C:\Windows\System\SrieiDg.exe cobalt_reflective_dll C:\Windows\System\lKRusFL.exe cobalt_reflective_dll C:\Windows\System\VtIoUNQ.exe cobalt_reflective_dll C:\Windows\System\PWllopJ.exe cobalt_reflective_dll C:\Windows\System\frWBZTr.exe cobalt_reflective_dll C:\Windows\System\TqvyzIg.exe cobalt_reflective_dll C:\Windows\System\fiYVrkA.exe cobalt_reflective_dll C:\Windows\System\kEmzDgq.exe cobalt_reflective_dll C:\Windows\System\IeXIduB.exe cobalt_reflective_dll C:\Windows\System\CfNWzzJ.exe cobalt_reflective_dll C:\Windows\System\JSwKegm.exe cobalt_reflective_dll C:\Windows\System\UkoBFIf.exe cobalt_reflective_dll C:\Windows\System\FWvcyQz.exe cobalt_reflective_dll C:\Windows\System\keNsuOJ.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1952-0-0x00007FF743D40000-0x00007FF744094000-memory.dmp xmrig C:\Windows\System\xLlqEwW.exe xmrig behavioral2/memory/4844-7-0x00007FF627D30000-0x00007FF628084000-memory.dmp xmrig C:\Windows\System\OMLimYd.exe xmrig C:\Windows\System\GdkuMmi.exe xmrig behavioral2/memory/2336-14-0x00007FF7A1B90000-0x00007FF7A1EE4000-memory.dmp xmrig C:\Windows\System\JYWmWBt.exe xmrig behavioral2/memory/4616-22-0x00007FF648600000-0x00007FF648954000-memory.dmp xmrig C:\Windows\System\TtxYeAD.exe xmrig behavioral2/memory/4648-32-0x00007FF72F500000-0x00007FF72F854000-memory.dmp xmrig C:\Windows\System\DzQcONg.exe xmrig C:\Windows\System\gLLLllb.exe xmrig behavioral2/memory/4212-46-0x00007FF7CB810000-0x00007FF7CBB64000-memory.dmp xmrig behavioral2/memory/2484-48-0x00007FF630DB0000-0x00007FF631104000-memory.dmp xmrig behavioral2/memory/4116-47-0x00007FF6E8F90000-0x00007FF6E92E4000-memory.dmp xmrig C:\Windows\System\SrieiDg.exe xmrig behavioral2/memory/112-27-0x00007FF7747B0000-0x00007FF774B04000-memory.dmp xmrig C:\Windows\System\lKRusFL.exe xmrig behavioral2/memory/8-56-0x00007FF753E20000-0x00007FF754174000-memory.dmp xmrig C:\Windows\System\VtIoUNQ.exe xmrig behavioral2/memory/2408-65-0x00007FF7943B0000-0x00007FF794704000-memory.dmp xmrig C:\Windows\System\PWllopJ.exe xmrig behavioral2/memory/1952-72-0x00007FF743D40000-0x00007FF744094000-memory.dmp xmrig C:\Windows\System\frWBZTr.exe xmrig behavioral2/memory/4200-73-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmp xmrig C:\Windows\System\TqvyzIg.exe xmrig behavioral2/memory/3940-66-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmp xmrig behavioral2/memory/4844-81-0x00007FF627D30000-0x00007FF628084000-memory.dmp xmrig behavioral2/memory/4808-83-0x00007FF733890000-0x00007FF733BE4000-memory.dmp xmrig C:\Windows\System\fiYVrkA.exe xmrig behavioral2/memory/4340-88-0x00007FF6B0CC0000-0x00007FF6B1014000-memory.dmp xmrig behavioral2/memory/2940-94-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmp xmrig C:\Windows\System\kEmzDgq.exe xmrig C:\Windows\System\IeXIduB.exe xmrig behavioral2/memory/1088-100-0x00007FF725130000-0x00007FF725484000-memory.dmp xmrig C:\Windows\System\CfNWzzJ.exe xmrig behavioral2/memory/3128-106-0x00007FF684D60000-0x00007FF6850B4000-memory.dmp xmrig C:\Windows\System\JSwKegm.exe xmrig behavioral2/memory/2484-117-0x00007FF630DB0000-0x00007FF631104000-memory.dmp xmrig C:\Windows\System\UkoBFIf.exe xmrig behavioral2/memory/5084-121-0x00007FF635210000-0x00007FF635564000-memory.dmp xmrig behavioral2/memory/1036-120-0x00007FF6F4EF0000-0x00007FF6F5244000-memory.dmp xmrig C:\Windows\System\FWvcyQz.exe xmrig C:\Windows\System\keNsuOJ.exe xmrig behavioral2/memory/3020-129-0x00007FF63F890000-0x00007FF63FBE4000-memory.dmp xmrig behavioral2/memory/3964-130-0x00007FF7E2C70000-0x00007FF7E2FC4000-memory.dmp xmrig behavioral2/memory/3940-131-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmp xmrig behavioral2/memory/4200-132-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmp xmrig behavioral2/memory/2940-133-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmp xmrig behavioral2/memory/4844-134-0x00007FF627D30000-0x00007FF628084000-memory.dmp xmrig behavioral2/memory/2336-135-0x00007FF7A1B90000-0x00007FF7A1EE4000-memory.dmp xmrig behavioral2/memory/4616-136-0x00007FF648600000-0x00007FF648954000-memory.dmp xmrig behavioral2/memory/112-137-0x00007FF7747B0000-0x00007FF774B04000-memory.dmp xmrig behavioral2/memory/4648-138-0x00007FF72F500000-0x00007FF72F854000-memory.dmp xmrig behavioral2/memory/4116-139-0x00007FF6E8F90000-0x00007FF6E92E4000-memory.dmp xmrig behavioral2/memory/4212-140-0x00007FF7CB810000-0x00007FF7CBB64000-memory.dmp xmrig behavioral2/memory/2484-141-0x00007FF630DB0000-0x00007FF631104000-memory.dmp xmrig behavioral2/memory/8-142-0x00007FF753E20000-0x00007FF754174000-memory.dmp xmrig behavioral2/memory/2408-143-0x00007FF7943B0000-0x00007FF794704000-memory.dmp xmrig behavioral2/memory/3940-144-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmp xmrig behavioral2/memory/4200-145-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmp xmrig behavioral2/memory/4808-146-0x00007FF733890000-0x00007FF733BE4000-memory.dmp xmrig behavioral2/memory/4340-147-0x00007FF6B0CC0000-0x00007FF6B1014000-memory.dmp xmrig behavioral2/memory/2940-148-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
xLlqEwW.exeOMLimYd.exeGdkuMmi.exeJYWmWBt.exeTtxYeAD.exeSrieiDg.exeDzQcONg.exegLLLllb.exelKRusFL.exeVtIoUNQ.exeTqvyzIg.exePWllopJ.exefrWBZTr.exefiYVrkA.exekEmzDgq.exeIeXIduB.exeCfNWzzJ.exeFWvcyQz.exeJSwKegm.exeUkoBFIf.exekeNsuOJ.exepid process 4844 xLlqEwW.exe 2336 OMLimYd.exe 4616 GdkuMmi.exe 112 JYWmWBt.exe 4648 TtxYeAD.exe 4212 SrieiDg.exe 4116 DzQcONg.exe 2484 gLLLllb.exe 8 lKRusFL.exe 2408 VtIoUNQ.exe 3940 TqvyzIg.exe 4200 PWllopJ.exe 4808 frWBZTr.exe 4340 fiYVrkA.exe 2940 kEmzDgq.exe 1088 IeXIduB.exe 3128 CfNWzzJ.exe 1036 FWvcyQz.exe 5084 JSwKegm.exe 3964 UkoBFIf.exe 3020 keNsuOJ.exe -
Processes:
resource yara_rule behavioral2/memory/1952-0-0x00007FF743D40000-0x00007FF744094000-memory.dmp upx C:\Windows\System\xLlqEwW.exe upx behavioral2/memory/4844-7-0x00007FF627D30000-0x00007FF628084000-memory.dmp upx C:\Windows\System\OMLimYd.exe upx C:\Windows\System\GdkuMmi.exe upx behavioral2/memory/2336-14-0x00007FF7A1B90000-0x00007FF7A1EE4000-memory.dmp upx C:\Windows\System\JYWmWBt.exe upx behavioral2/memory/4616-22-0x00007FF648600000-0x00007FF648954000-memory.dmp upx C:\Windows\System\TtxYeAD.exe upx behavioral2/memory/4648-32-0x00007FF72F500000-0x00007FF72F854000-memory.dmp upx C:\Windows\System\DzQcONg.exe upx C:\Windows\System\gLLLllb.exe upx behavioral2/memory/4212-46-0x00007FF7CB810000-0x00007FF7CBB64000-memory.dmp upx behavioral2/memory/2484-48-0x00007FF630DB0000-0x00007FF631104000-memory.dmp upx behavioral2/memory/4116-47-0x00007FF6E8F90000-0x00007FF6E92E4000-memory.dmp upx C:\Windows\System\SrieiDg.exe upx behavioral2/memory/112-27-0x00007FF7747B0000-0x00007FF774B04000-memory.dmp upx C:\Windows\System\lKRusFL.exe upx behavioral2/memory/8-56-0x00007FF753E20000-0x00007FF754174000-memory.dmp upx C:\Windows\System\VtIoUNQ.exe upx behavioral2/memory/2408-65-0x00007FF7943B0000-0x00007FF794704000-memory.dmp upx C:\Windows\System\PWllopJ.exe upx behavioral2/memory/1952-72-0x00007FF743D40000-0x00007FF744094000-memory.dmp upx C:\Windows\System\frWBZTr.exe upx behavioral2/memory/4200-73-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmp upx C:\Windows\System\TqvyzIg.exe upx behavioral2/memory/3940-66-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmp upx behavioral2/memory/4844-81-0x00007FF627D30000-0x00007FF628084000-memory.dmp upx behavioral2/memory/4808-83-0x00007FF733890000-0x00007FF733BE4000-memory.dmp upx C:\Windows\System\fiYVrkA.exe upx behavioral2/memory/4340-88-0x00007FF6B0CC0000-0x00007FF6B1014000-memory.dmp upx behavioral2/memory/2940-94-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmp upx C:\Windows\System\kEmzDgq.exe upx C:\Windows\System\IeXIduB.exe upx behavioral2/memory/1088-100-0x00007FF725130000-0x00007FF725484000-memory.dmp upx C:\Windows\System\CfNWzzJ.exe upx behavioral2/memory/3128-106-0x00007FF684D60000-0x00007FF6850B4000-memory.dmp upx C:\Windows\System\JSwKegm.exe upx behavioral2/memory/2484-117-0x00007FF630DB0000-0x00007FF631104000-memory.dmp upx C:\Windows\System\UkoBFIf.exe upx behavioral2/memory/5084-121-0x00007FF635210000-0x00007FF635564000-memory.dmp upx behavioral2/memory/1036-120-0x00007FF6F4EF0000-0x00007FF6F5244000-memory.dmp upx C:\Windows\System\FWvcyQz.exe upx C:\Windows\System\keNsuOJ.exe upx behavioral2/memory/3020-129-0x00007FF63F890000-0x00007FF63FBE4000-memory.dmp upx behavioral2/memory/3964-130-0x00007FF7E2C70000-0x00007FF7E2FC4000-memory.dmp upx behavioral2/memory/3940-131-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmp upx behavioral2/memory/4200-132-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmp upx behavioral2/memory/2940-133-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmp upx behavioral2/memory/4844-134-0x00007FF627D30000-0x00007FF628084000-memory.dmp upx behavioral2/memory/2336-135-0x00007FF7A1B90000-0x00007FF7A1EE4000-memory.dmp upx behavioral2/memory/4616-136-0x00007FF648600000-0x00007FF648954000-memory.dmp upx behavioral2/memory/112-137-0x00007FF7747B0000-0x00007FF774B04000-memory.dmp upx behavioral2/memory/4648-138-0x00007FF72F500000-0x00007FF72F854000-memory.dmp upx behavioral2/memory/4116-139-0x00007FF6E8F90000-0x00007FF6E92E4000-memory.dmp upx behavioral2/memory/4212-140-0x00007FF7CB810000-0x00007FF7CBB64000-memory.dmp upx behavioral2/memory/2484-141-0x00007FF630DB0000-0x00007FF631104000-memory.dmp upx behavioral2/memory/8-142-0x00007FF753E20000-0x00007FF754174000-memory.dmp upx behavioral2/memory/2408-143-0x00007FF7943B0000-0x00007FF794704000-memory.dmp upx behavioral2/memory/3940-144-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmp upx behavioral2/memory/4200-145-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmp upx behavioral2/memory/4808-146-0x00007FF733890000-0x00007FF733BE4000-memory.dmp upx behavioral2/memory/4340-147-0x00007FF6B0CC0000-0x00007FF6B1014000-memory.dmp upx behavioral2/memory/2940-148-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\xLlqEwW.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GdkuMmi.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\gLLLllb.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\VtIoUNQ.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\FWvcyQz.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JSwKegm.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\OMLimYd.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TqvyzIg.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PWllopJ.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\IeXIduB.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\UkoBFIf.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\keNsuOJ.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\JYWmWBt.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\TtxYeAD.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SrieiDg.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lKRusFL.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\frWBZTr.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fiYVrkA.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\CfNWzzJ.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\DzQcONg.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\kEmzDgq.exe 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 1952 wrote to memory of 4844 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe xLlqEwW.exe PID 1952 wrote to memory of 4844 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe xLlqEwW.exe PID 1952 wrote to memory of 2336 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe OMLimYd.exe PID 1952 wrote to memory of 2336 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe OMLimYd.exe PID 1952 wrote to memory of 4616 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe GdkuMmi.exe PID 1952 wrote to memory of 4616 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe GdkuMmi.exe PID 1952 wrote to memory of 112 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe JYWmWBt.exe PID 1952 wrote to memory of 112 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe JYWmWBt.exe PID 1952 wrote to memory of 4648 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe TtxYeAD.exe PID 1952 wrote to memory of 4648 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe TtxYeAD.exe PID 1952 wrote to memory of 4212 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe SrieiDg.exe PID 1952 wrote to memory of 4212 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe SrieiDg.exe PID 1952 wrote to memory of 4116 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe DzQcONg.exe PID 1952 wrote to memory of 4116 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe DzQcONg.exe PID 1952 wrote to memory of 2484 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe gLLLllb.exe PID 1952 wrote to memory of 2484 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe gLLLllb.exe PID 1952 wrote to memory of 8 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe lKRusFL.exe PID 1952 wrote to memory of 8 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe lKRusFL.exe PID 1952 wrote to memory of 2408 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe VtIoUNQ.exe PID 1952 wrote to memory of 2408 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe VtIoUNQ.exe PID 1952 wrote to memory of 3940 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe TqvyzIg.exe PID 1952 wrote to memory of 3940 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe TqvyzIg.exe PID 1952 wrote to memory of 4200 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe PWllopJ.exe PID 1952 wrote to memory of 4200 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe PWllopJ.exe PID 1952 wrote to memory of 4808 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe frWBZTr.exe PID 1952 wrote to memory of 4808 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe frWBZTr.exe PID 1952 wrote to memory of 4340 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe fiYVrkA.exe PID 1952 wrote to memory of 4340 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe fiYVrkA.exe PID 1952 wrote to memory of 2940 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe kEmzDgq.exe PID 1952 wrote to memory of 2940 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe kEmzDgq.exe PID 1952 wrote to memory of 1088 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe IeXIduB.exe PID 1952 wrote to memory of 1088 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe IeXIduB.exe PID 1952 wrote to memory of 3128 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe CfNWzzJ.exe PID 1952 wrote to memory of 3128 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe CfNWzzJ.exe PID 1952 wrote to memory of 1036 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe FWvcyQz.exe PID 1952 wrote to memory of 1036 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe FWvcyQz.exe PID 1952 wrote to memory of 5084 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe JSwKegm.exe PID 1952 wrote to memory of 5084 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe JSwKegm.exe PID 1952 wrote to memory of 3964 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe UkoBFIf.exe PID 1952 wrote to memory of 3964 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe UkoBFIf.exe PID 1952 wrote to memory of 3020 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe keNsuOJ.exe PID 1952 wrote to memory of 3020 1952 2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe keNsuOJ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-30_c0e9564febe8466fc5ce08a30330f085_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\xLlqEwW.exeC:\Windows\System\xLlqEwW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OMLimYd.exeC:\Windows\System\OMLimYd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GdkuMmi.exeC:\Windows\System\GdkuMmi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JYWmWBt.exeC:\Windows\System\JYWmWBt.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TtxYeAD.exeC:\Windows\System\TtxYeAD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SrieiDg.exeC:\Windows\System\SrieiDg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DzQcONg.exeC:\Windows\System\DzQcONg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gLLLllb.exeC:\Windows\System\gLLLllb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lKRusFL.exeC:\Windows\System\lKRusFL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VtIoUNQ.exeC:\Windows\System\VtIoUNQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TqvyzIg.exeC:\Windows\System\TqvyzIg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PWllopJ.exeC:\Windows\System\PWllopJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\frWBZTr.exeC:\Windows\System\frWBZTr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fiYVrkA.exeC:\Windows\System\fiYVrkA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kEmzDgq.exeC:\Windows\System\kEmzDgq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IeXIduB.exeC:\Windows\System\IeXIduB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CfNWzzJ.exeC:\Windows\System\CfNWzzJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FWvcyQz.exeC:\Windows\System\FWvcyQz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JSwKegm.exeC:\Windows\System\JSwKegm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UkoBFIf.exeC:\Windows\System\UkoBFIf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\keNsuOJ.exeC:\Windows\System\keNsuOJ.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4028,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\CfNWzzJ.exeFilesize
5.9MB
MD58ad5a61eb59ab2979e92e356b3773ba2
SHA1174f1bf6fd61a41976f49f1d3b25ed5ede7e9f76
SHA256bf8d3ac0451f952734cd28d2cdcf8206ce92ec159b41b26799c497eee79b0f71
SHA5125e51ccb85521e4bb98dbbdc085bd8289b58358923c6dd3010522e6fe79f1cfdea43996227294e9891c046b81c54da97d0753cdad6c5426fe777d4906cfdb0cf4
-
C:\Windows\System\DzQcONg.exeFilesize
5.9MB
MD5d59281b8c910fb166806d5d0791f5863
SHA193a16de4fc44d8cf7ba997874537e67d8a9f1c76
SHA25608dcf6391e9e44a823a5aa71ac8f2b284f7f99cb5b3a926a10e5b7a7ebf2a67d
SHA51208c2d15177740463569eacec237ccdf2113efcbd620cc263932ddccf82c8e3cee0962b8e3cf1a1e87b8e9cdfce625aa909f7251e33c9134a94304e5695af613f
-
C:\Windows\System\FWvcyQz.exeFilesize
5.9MB
MD58279bd1b8bbbd48d2135ad7529055aed
SHA1e54eba0758cb74d1a0643f42623a8a353ff955be
SHA25687db8a6be3ce6f45cb7ff07d237608d3d2c31afa299703a0ac4e3b4eb2bd1b34
SHA512318600209dec1277862ce2fb4ac64fe1fe441a6db27dd4d0c8e4eeb2f51aab63a90feb1277f5f4aafb17a686f62476a465e2262c24ef4f38326f78c70dbdb6b3
-
C:\Windows\System\GdkuMmi.exeFilesize
5.9MB
MD5b091081422c7a8878d65bcd152b5822e
SHA10587c7fdd0c539ee54efbb36815e7901b600d681
SHA2565aad0c714976ca4c616aac517d547e75236329085e13fcb40a38fb89f2f9d5ed
SHA51210fa86f9db894f54fb7fb57e827dda0e90fed2971e3f96033d997ce3bd34d1fe267a8ce08dab7b7c26d748723d8f37982eed8fb481ed241b5ae9c097f9c1ae7f
-
C:\Windows\System\IeXIduB.exeFilesize
5.9MB
MD5547da0adccaeae9cac0f145b9acc25d7
SHA167f0e1f4de328d094e06306a36d5c7c5e75f47b1
SHA2563cfa51337a70b7006ec45381744ffccd21daa688b4f0ffb1465b564f4ac67b38
SHA512f4fbf5c880bc99780d234237c73e8cac3d45a04c2c74a4604e8e4f922e7e6511ff7066144cbf303ec9c86b3eb2635367e0fb9d9f01fde7b61bb812f0f46b1a46
-
C:\Windows\System\JSwKegm.exeFilesize
5.9MB
MD53d7647e9641935cf0df834361dd07230
SHA13cfe189efcad6fb88b1737a518e79382913988c2
SHA256e56cbee6d03b11a446ea95862ad7ecb5351533235a21ccdb9b5aa8d7bdf73e5d
SHA5129727d9b595a9d01075fe2d571b94d0545fa0630276d357c5a046d3f7e4104a2570cd16d3a94bccbf63a99689076f8314c9c951da856fb2a3401252951ac021ec
-
C:\Windows\System\JYWmWBt.exeFilesize
5.9MB
MD5238791b02aec5b8f72a56732c014134d
SHA15d693092b3f2339162e25ee46aad31eef358b674
SHA256cbbeb3176d16831f385e9c053bb8374819d95ee6a2c10aba4ffa4b1925fec170
SHA512aaa11cea544815e765cb3d6327f4adba31537e97cd484f5ec53438d8775327131785f689a591da22c91a4538a823e68a5be474b813416713842b5b54aead8f92
-
C:\Windows\System\OMLimYd.exeFilesize
5.9MB
MD5728039a3bba472c604362efc468ca7ba
SHA152f9d6c9f27349751a273e4701107b1ab3a5c01b
SHA256aebb5ed8e570a8e23d61aba0ed4aa4b1578b32c105eb04dcd78bdafaab543258
SHA5127ee0ef420af23dfba17e1d99fc535324eb5a45bf6019ca1d40a568d7d5a6dbcd31f7f241bcb039f0a9306b04e4b33ba6b0b301604767b53fce52e5b752377ab6
-
C:\Windows\System\PWllopJ.exeFilesize
5.9MB
MD54f2535861f6c704380c2cc0bd908a138
SHA1f21746480b4b17dc0febd1a903adb327e06a2b4a
SHA256c00ff692b9ce1112cdeb38d7d4de21a1b57ddb4c68a9ff7260a507a59cd1db4e
SHA512117bbf0f2f9cfcc8795cffc218c503520eb9244ab018985ecc6fa7dcb82a6eb1e187f8ba81c6f876af463f591e8b097639aba8d32a03c12c7908effe4af94bb2
-
C:\Windows\System\SrieiDg.exeFilesize
5.9MB
MD5f4afecee7512b2573e51e5ee5d179207
SHA1d111133645fe753e8e4626e3b4225790dde5b86f
SHA256a817b2395dea20aa3a940124d408cf3895547a6119a47b3bfcbc22ddaca9c564
SHA5121e5a3c5d215bade5835ca0bc9c633800541bc651598c17d488040c3df72f683a2614e6477bbe7c537fdf482210f3a3f9a0b5dd911e54bd80fd3564fabc95295b
-
C:\Windows\System\TqvyzIg.exeFilesize
5.9MB
MD55ebf8bb68e07ad3bdca3a85f46c79480
SHA1954645a5480e5948a97ec38606e4143632a8b306
SHA2565d939b096f580379b636e83059c58d03d4c394bc62c5014e5ad17509b4011eb4
SHA5126a1854d8aa10f5796cc797bae8a53e8384e70855e974f2ecb0ae1cc156a929ca5a0c6e34d86df4bc3f7f4c06ad267c0be6263cfb10301658416f0c8a01668e70
-
C:\Windows\System\TtxYeAD.exeFilesize
5.9MB
MD5a74703c6db96ca2fbabd9531c67514a3
SHA163d1cfd7365cb91eb031e2f753dbc42be93e0380
SHA256e960f4cf3514c5ad91b16d04322e93ef3019bec7548b8ad0939eb2167ce722cb
SHA512b7c7a618efb73c923919fcf4f589c1d296a6e05101e35d569015f271bf5e13a29edf149d9f9a27e86e48d7a7412fc01ea9b344fe069b95fcefb1e3ab42757cb8
-
C:\Windows\System\UkoBFIf.exeFilesize
5.9MB
MD52da3354b013a9a4429422cf776027868
SHA15207a6550452a8dc97f891982e5bf729af5c7b40
SHA2565ba06a1a5a8b4665bdf86c1a6750f8ae2f2880adc5c0612330f1fa1c157a5828
SHA51263e6f792cef0f2d96351dc396fd3c218a73694991990841fbf3683514842cfa5508c27fabe6c74baa90df841cc469d95bfce0745b09b0739be79fd3dbfed266a
-
C:\Windows\System\VtIoUNQ.exeFilesize
5.9MB
MD54706c0aba55cf63fd08fef85bd18d2cb
SHA12f6d50d2709f531c5c9e5492fb21b92d319c2cdc
SHA256c3ecf3ac6b5aec4a2f54fcb659ca902016ca200707ace8187ea21de1102142df
SHA5121a6a2074b7f9fbac942a398eaf976d02175f33c36a8638663735bba0037ce0eae121c1a6e04d52d8fc0051051ac352574890c6c1c6f20a784621ac6eb1878014
-
C:\Windows\System\fiYVrkA.exeFilesize
5.9MB
MD5a767bd36d4c6606d74e62a15a797c90d
SHA166c259a8bd2af39aaf8b12a402d9fe283161fdad
SHA25686e87f3df26b9f80f5e7a73ab69ccab70efba4fbd115fd11c747251980a6d16b
SHA512b3d04fe49e6b598c834d72a2756d61a0be76d7b3aef467e04aa9c2b3592d70dd80b578f6b40879e41519046313a9a88156d98640f89e1597d1d25cdbd1c678cb
-
C:\Windows\System\frWBZTr.exeFilesize
5.9MB
MD5c17c87d7745bf69e987e18cc97a9a344
SHA1f95ae015f03f23f97a998872c9d7c42da606e259
SHA2562820e654c56ca518e130197750f348126f7f8aa32a2e61daa4aec0d61340195d
SHA512d56f46a7ef48639bcf9802534e958ed3a1b309405134750acbf406892d3fb7a2f2083a0eb9bc42e5c68931f56c1e51da18f657ac24928b79bc54bd06d839452a
-
C:\Windows\System\gLLLllb.exeFilesize
5.9MB
MD5e8a8ef5d1aabc2f6a44838d75cfd766a
SHA1d50797cbd46171ced83d1f6341a37f3284279064
SHA256a23e1999f6f634f02265849bea910f8226c52cb69f06dcf36a6c15de5d408dfa
SHA51246df9da825f4b741421be9cdcd1308c97114eb4c5691b6e3c6a95066685faaed64399c99dc56883d0b578b7a9fb76cd73e8043805281561de660011bb08219f0
-
C:\Windows\System\kEmzDgq.exeFilesize
5.9MB
MD5ab9c00d7a105013ed67ff55a88a30b95
SHA1c5d0f2d316ac5d00ee1f2ff46c679e30e64c2930
SHA256af29ab1a9dde4554ecf5fd813fbe5f1ea844882411e93d8f38d8787dac398efe
SHA512b0531c83516128927834f046b0a0f715de7142de3e7402a0ba70af50d05639e8328b7a8af0fd413ac44a0d774ed2e77314cb44f2a070f1bc115773efc3b40b4f
-
C:\Windows\System\keNsuOJ.exeFilesize
5.9MB
MD5d68dde64a15bafcfc903a3bb812c534d
SHA11d1f33f039adcb49010a85146eabfb87cb7b9f0c
SHA256508dcabbd283a3a2a40d05674f9eba9a6e4f55edf6e05fb713ce4bada56fe845
SHA5129336b76b04255325e26fa45f1dfa9fd9008e27809c4dd7dd977d012d79782e6982b0aa2a0e60f44f707b4a7a97c91ad0f2b4668b19f0d9cb05215eef59c0353e
-
C:\Windows\System\lKRusFL.exeFilesize
5.9MB
MD553ada25e38ff0dbfad1654e5322fd036
SHA1029bf017a3b099097a4fa55538cfd63ea9dc0817
SHA2561135c8b034421d48c8cf4d86be176b53f73a950fa22ca2a5157fd95fdec040cf
SHA51297f48c1c75e864e6adce6236f227720edfa8e3b261e84b9b5debae3b815fb18a65285f3f6a2a4cb63b8621e487f30c3c7ac8b14b065adb61da0f198298c703c0
-
C:\Windows\System\xLlqEwW.exeFilesize
5.9MB
MD594d2af031b17eb3c0a99938a043f1408
SHA1335e2a27594e4f86cedf3b1c344401471ed1ba49
SHA256fbc91bdd062ddb7cecdf8c71f6eb6a63c6ebfbb32113947fe97ec9991d99268d
SHA512581f8328d58c7b793c18c362d7083c9fe6f672aaf64fdc599049294b49813c69df29b08957e4e16ddd3eb4bc13f9b34bba5738d99954b3def12e437ad0ac59eb
-
memory/8-142-0x00007FF753E20000-0x00007FF754174000-memory.dmpFilesize
3.3MB
-
memory/8-56-0x00007FF753E20000-0x00007FF754174000-memory.dmpFilesize
3.3MB
-
memory/112-27-0x00007FF7747B0000-0x00007FF774B04000-memory.dmpFilesize
3.3MB
-
memory/112-137-0x00007FF7747B0000-0x00007FF774B04000-memory.dmpFilesize
3.3MB
-
memory/1036-120-0x00007FF6F4EF0000-0x00007FF6F5244000-memory.dmpFilesize
3.3MB
-
memory/1036-151-0x00007FF6F4EF0000-0x00007FF6F5244000-memory.dmpFilesize
3.3MB
-
memory/1088-100-0x00007FF725130000-0x00007FF725484000-memory.dmpFilesize
3.3MB
-
memory/1088-149-0x00007FF725130000-0x00007FF725484000-memory.dmpFilesize
3.3MB
-
memory/1952-1-0x000001748E660000-0x000001748E670000-memory.dmpFilesize
64KB
-
memory/1952-0-0x00007FF743D40000-0x00007FF744094000-memory.dmpFilesize
3.3MB
-
memory/1952-72-0x00007FF743D40000-0x00007FF744094000-memory.dmpFilesize
3.3MB
-
memory/2336-14-0x00007FF7A1B90000-0x00007FF7A1EE4000-memory.dmpFilesize
3.3MB
-
memory/2336-135-0x00007FF7A1B90000-0x00007FF7A1EE4000-memory.dmpFilesize
3.3MB
-
memory/2408-143-0x00007FF7943B0000-0x00007FF794704000-memory.dmpFilesize
3.3MB
-
memory/2408-65-0x00007FF7943B0000-0x00007FF794704000-memory.dmpFilesize
3.3MB
-
memory/2484-48-0x00007FF630DB0000-0x00007FF631104000-memory.dmpFilesize
3.3MB
-
memory/2484-117-0x00007FF630DB0000-0x00007FF631104000-memory.dmpFilesize
3.3MB
-
memory/2484-141-0x00007FF630DB0000-0x00007FF631104000-memory.dmpFilesize
3.3MB
-
memory/2940-94-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmpFilesize
3.3MB
-
memory/2940-148-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmpFilesize
3.3MB
-
memory/2940-133-0x00007FF7F8960000-0x00007FF7F8CB4000-memory.dmpFilesize
3.3MB
-
memory/3020-154-0x00007FF63F890000-0x00007FF63FBE4000-memory.dmpFilesize
3.3MB
-
memory/3020-129-0x00007FF63F890000-0x00007FF63FBE4000-memory.dmpFilesize
3.3MB
-
memory/3128-106-0x00007FF684D60000-0x00007FF6850B4000-memory.dmpFilesize
3.3MB
-
memory/3128-150-0x00007FF684D60000-0x00007FF6850B4000-memory.dmpFilesize
3.3MB
-
memory/3940-66-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmpFilesize
3.3MB
-
memory/3940-131-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmpFilesize
3.3MB
-
memory/3940-144-0x00007FF6D74F0000-0x00007FF6D7844000-memory.dmpFilesize
3.3MB
-
memory/3964-130-0x00007FF7E2C70000-0x00007FF7E2FC4000-memory.dmpFilesize
3.3MB
-
memory/3964-153-0x00007FF7E2C70000-0x00007FF7E2FC4000-memory.dmpFilesize
3.3MB
-
memory/4116-139-0x00007FF6E8F90000-0x00007FF6E92E4000-memory.dmpFilesize
3.3MB
-
memory/4116-47-0x00007FF6E8F90000-0x00007FF6E92E4000-memory.dmpFilesize
3.3MB
-
memory/4200-145-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmpFilesize
3.3MB
-
memory/4200-73-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmpFilesize
3.3MB
-
memory/4200-132-0x00007FF7ACE60000-0x00007FF7AD1B4000-memory.dmpFilesize
3.3MB
-
memory/4212-46-0x00007FF7CB810000-0x00007FF7CBB64000-memory.dmpFilesize
3.3MB
-
memory/4212-140-0x00007FF7CB810000-0x00007FF7CBB64000-memory.dmpFilesize
3.3MB
-
memory/4340-147-0x00007FF6B0CC0000-0x00007FF6B1014000-memory.dmpFilesize
3.3MB
-
memory/4340-88-0x00007FF6B0CC0000-0x00007FF6B1014000-memory.dmpFilesize
3.3MB
-
memory/4616-22-0x00007FF648600000-0x00007FF648954000-memory.dmpFilesize
3.3MB
-
memory/4616-136-0x00007FF648600000-0x00007FF648954000-memory.dmpFilesize
3.3MB
-
memory/4648-32-0x00007FF72F500000-0x00007FF72F854000-memory.dmpFilesize
3.3MB
-
memory/4648-138-0x00007FF72F500000-0x00007FF72F854000-memory.dmpFilesize
3.3MB
-
memory/4808-146-0x00007FF733890000-0x00007FF733BE4000-memory.dmpFilesize
3.3MB
-
memory/4808-83-0x00007FF733890000-0x00007FF733BE4000-memory.dmpFilesize
3.3MB
-
memory/4844-7-0x00007FF627D30000-0x00007FF628084000-memory.dmpFilesize
3.3MB
-
memory/4844-81-0x00007FF627D30000-0x00007FF628084000-memory.dmpFilesize
3.3MB
-
memory/4844-134-0x00007FF627D30000-0x00007FF628084000-memory.dmpFilesize
3.3MB
-
memory/5084-121-0x00007FF635210000-0x00007FF635564000-memory.dmpFilesize
3.3MB
-
memory/5084-152-0x00007FF635210000-0x00007FF635564000-memory.dmpFilesize
3.3MB