Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 06:00
Behavioral task
behavioral1
Sample
2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240419-en
General
-
Target
2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
f9715b1b48fc872ccd7b047a47c2041f
-
SHA1
6a4dcd9a3a775fb36dc973a58b9049ab6b2f68a9
-
SHA256
919061e0f610fc09ffc755cf23fa4a103c4cd1e6bf4b5063646de74693954f29
-
SHA512
781affb5f7170be94eec573ea82506c9d69f6e226ce32cc73c689f9d343358f480307a37c8ea0e0a01ad03dec15bb3060e9f957a80eac21ce99d06be54374b23
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lU1:T+856utgpPF8u/71
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\NIAfnLk.exe cobalt_reflective_dll C:\Windows\System\oTTxTXA.exe cobalt_reflective_dll C:\Windows\System\fCvQuFD.exe cobalt_reflective_dll C:\Windows\System\YJchbWL.exe cobalt_reflective_dll C:\Windows\System\AkZaJHl.exe cobalt_reflective_dll C:\Windows\System\oPIBTfu.exe cobalt_reflective_dll C:\Windows\System\nCkhcMo.exe cobalt_reflective_dll C:\Windows\System\FmjJLdV.exe cobalt_reflective_dll C:\Windows\System\ephcMTM.exe cobalt_reflective_dll C:\Windows\System\giKajcb.exe cobalt_reflective_dll C:\Windows\System\QcOiQWU.exe cobalt_reflective_dll C:\Windows\System\PPsspTS.exe cobalt_reflective_dll C:\Windows\System\WuiUqun.exe cobalt_reflective_dll C:\Windows\System\neALmKx.exe cobalt_reflective_dll C:\Windows\System\fZqLJoA.exe cobalt_reflective_dll C:\Windows\System\lmqENnA.exe cobalt_reflective_dll C:\Windows\System\lzKyuXJ.exe cobalt_reflective_dll C:\Windows\System\GALePLz.exe cobalt_reflective_dll C:\Windows\System\ayEBRAL.exe cobalt_reflective_dll C:\Windows\System\dEhTpfW.exe cobalt_reflective_dll C:\Windows\System\gjFwgdw.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2860-0-0x00007FF673520000-0x00007FF673874000-memory.dmp xmrig C:\Windows\System\NIAfnLk.exe xmrig C:\Windows\System\oTTxTXA.exe xmrig C:\Windows\System\fCvQuFD.exe xmrig behavioral2/memory/708-14-0x00007FF62FDF0000-0x00007FF630144000-memory.dmp xmrig behavioral2/memory/3664-9-0x00007FF6A01E0000-0x00007FF6A0534000-memory.dmp xmrig behavioral2/memory/1940-20-0x00007FF600F20000-0x00007FF601274000-memory.dmp xmrig C:\Windows\System\YJchbWL.exe xmrig behavioral2/memory/2548-28-0x00007FF65EAF0000-0x00007FF65EE44000-memory.dmp xmrig C:\Windows\System\AkZaJHl.exe xmrig C:\Windows\System\oPIBTfu.exe xmrig C:\Windows\System\nCkhcMo.exe xmrig behavioral2/memory/4652-49-0x00007FF782E00000-0x00007FF783154000-memory.dmp xmrig C:\Windows\System\FmjJLdV.exe xmrig behavioral2/memory/3672-56-0x00007FF68D480000-0x00007FF68D7D4000-memory.dmp xmrig C:\Windows\System\ephcMTM.exe xmrig C:\Windows\System\giKajcb.exe xmrig behavioral2/memory/2896-71-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmp xmrig C:\Windows\System\QcOiQWU.exe xmrig behavioral2/memory/3928-72-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmp xmrig behavioral2/memory/1728-69-0x00007FF60B980000-0x00007FF60BCD4000-memory.dmp xmrig C:\Windows\System\PPsspTS.exe xmrig behavioral2/memory/2920-89-0x00007FF6F0140000-0x00007FF6F0494000-memory.dmp xmrig behavioral2/memory/4592-90-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmp xmrig behavioral2/memory/3440-88-0x00007FF78DF90000-0x00007FF78E2E4000-memory.dmp xmrig C:\Windows\System\WuiUqun.exe xmrig C:\Windows\System\neALmKx.exe xmrig behavioral2/memory/3140-50-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmp xmrig behavioral2/memory/1476-45-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmp xmrig behavioral2/memory/540-40-0x00007FF609FD0000-0x00007FF60A324000-memory.dmp xmrig C:\Windows\System\fZqLJoA.exe xmrig C:\Windows\System\lmqENnA.exe xmrig C:\Windows\System\lzKyuXJ.exe xmrig behavioral2/memory/3812-104-0x00007FF722260000-0x00007FF7225B4000-memory.dmp xmrig C:\Windows\System\GALePLz.exe xmrig behavioral2/memory/2928-107-0x00007FF615430000-0x00007FF615784000-memory.dmp xmrig behavioral2/memory/2860-98-0x00007FF673520000-0x00007FF673874000-memory.dmp xmrig behavioral2/memory/3424-113-0x00007FF74E010000-0x00007FF74E364000-memory.dmp xmrig C:\Windows\System\ayEBRAL.exe xmrig C:\Windows\System\dEhTpfW.exe xmrig behavioral2/memory/2868-122-0x00007FF6874E0000-0x00007FF687834000-memory.dmp xmrig C:\Windows\System\gjFwgdw.exe xmrig behavioral2/memory/3444-125-0x00007FF67A790000-0x00007FF67AAE4000-memory.dmp xmrig behavioral2/memory/1476-128-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmp xmrig behavioral2/memory/2236-129-0x00007FF6D9930000-0x00007FF6D9C84000-memory.dmp xmrig behavioral2/memory/3140-130-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmp xmrig behavioral2/memory/2896-131-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmp xmrig behavioral2/memory/3928-132-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmp xmrig behavioral2/memory/4592-133-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmp xmrig behavioral2/memory/3664-134-0x00007FF6A01E0000-0x00007FF6A0534000-memory.dmp xmrig behavioral2/memory/708-135-0x00007FF62FDF0000-0x00007FF630144000-memory.dmp xmrig behavioral2/memory/1940-136-0x00007FF600F20000-0x00007FF601274000-memory.dmp xmrig behavioral2/memory/2548-137-0x00007FF65EAF0000-0x00007FF65EE44000-memory.dmp xmrig behavioral2/memory/540-138-0x00007FF609FD0000-0x00007FF60A324000-memory.dmp xmrig behavioral2/memory/4652-139-0x00007FF782E00000-0x00007FF783154000-memory.dmp xmrig behavioral2/memory/1476-140-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmp xmrig behavioral2/memory/3672-141-0x00007FF68D480000-0x00007FF68D7D4000-memory.dmp xmrig behavioral2/memory/3140-142-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmp xmrig behavioral2/memory/1728-143-0x00007FF60B980000-0x00007FF60BCD4000-memory.dmp xmrig behavioral2/memory/2896-144-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmp xmrig behavioral2/memory/3928-145-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmp xmrig behavioral2/memory/3440-146-0x00007FF78DF90000-0x00007FF78E2E4000-memory.dmp xmrig behavioral2/memory/2920-147-0x00007FF6F0140000-0x00007FF6F0494000-memory.dmp xmrig behavioral2/memory/4592-148-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
NIAfnLk.exefCvQuFD.exeoTTxTXA.exeYJchbWL.exefZqLJoA.exeAkZaJHl.exeoPIBTfu.exenCkhcMo.exeFmjJLdV.exeephcMTM.exegiKajcb.exeQcOiQWU.exeneALmKx.exeWuiUqun.exePPsspTS.exelmqENnA.exelzKyuXJ.exeGALePLz.exeayEBRAL.exedEhTpfW.exegjFwgdw.exepid process 3664 NIAfnLk.exe 708 fCvQuFD.exe 1940 oTTxTXA.exe 2548 YJchbWL.exe 540 fZqLJoA.exe 4652 AkZaJHl.exe 1476 oPIBTfu.exe 3140 nCkhcMo.exe 3672 FmjJLdV.exe 1728 ephcMTM.exe 2896 giKajcb.exe 3928 QcOiQWU.exe 3440 neALmKx.exe 2920 WuiUqun.exe 4592 PPsspTS.exe 3812 lmqENnA.exe 2928 lzKyuXJ.exe 3424 GALePLz.exe 2868 ayEBRAL.exe 3444 dEhTpfW.exe 2236 gjFwgdw.exe -
Processes:
resource yara_rule behavioral2/memory/2860-0-0x00007FF673520000-0x00007FF673874000-memory.dmp upx C:\Windows\System\NIAfnLk.exe upx C:\Windows\System\oTTxTXA.exe upx C:\Windows\System\fCvQuFD.exe upx behavioral2/memory/708-14-0x00007FF62FDF0000-0x00007FF630144000-memory.dmp upx behavioral2/memory/3664-9-0x00007FF6A01E0000-0x00007FF6A0534000-memory.dmp upx behavioral2/memory/1940-20-0x00007FF600F20000-0x00007FF601274000-memory.dmp upx C:\Windows\System\YJchbWL.exe upx behavioral2/memory/2548-28-0x00007FF65EAF0000-0x00007FF65EE44000-memory.dmp upx C:\Windows\System\AkZaJHl.exe upx C:\Windows\System\oPIBTfu.exe upx C:\Windows\System\nCkhcMo.exe upx behavioral2/memory/4652-49-0x00007FF782E00000-0x00007FF783154000-memory.dmp upx C:\Windows\System\FmjJLdV.exe upx behavioral2/memory/3672-56-0x00007FF68D480000-0x00007FF68D7D4000-memory.dmp upx C:\Windows\System\ephcMTM.exe upx C:\Windows\System\giKajcb.exe upx behavioral2/memory/2896-71-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmp upx C:\Windows\System\QcOiQWU.exe upx behavioral2/memory/3928-72-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmp upx behavioral2/memory/1728-69-0x00007FF60B980000-0x00007FF60BCD4000-memory.dmp upx C:\Windows\System\PPsspTS.exe upx behavioral2/memory/2920-89-0x00007FF6F0140000-0x00007FF6F0494000-memory.dmp upx behavioral2/memory/4592-90-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmp upx behavioral2/memory/3440-88-0x00007FF78DF90000-0x00007FF78E2E4000-memory.dmp upx C:\Windows\System\WuiUqun.exe upx C:\Windows\System\neALmKx.exe upx behavioral2/memory/3140-50-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmp upx behavioral2/memory/1476-45-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmp upx behavioral2/memory/540-40-0x00007FF609FD0000-0x00007FF60A324000-memory.dmp upx C:\Windows\System\fZqLJoA.exe upx C:\Windows\System\lmqENnA.exe upx C:\Windows\System\lzKyuXJ.exe upx behavioral2/memory/3812-104-0x00007FF722260000-0x00007FF7225B4000-memory.dmp upx C:\Windows\System\GALePLz.exe upx behavioral2/memory/2928-107-0x00007FF615430000-0x00007FF615784000-memory.dmp upx behavioral2/memory/2860-98-0x00007FF673520000-0x00007FF673874000-memory.dmp upx behavioral2/memory/3424-113-0x00007FF74E010000-0x00007FF74E364000-memory.dmp upx C:\Windows\System\ayEBRAL.exe upx C:\Windows\System\dEhTpfW.exe upx behavioral2/memory/2868-122-0x00007FF6874E0000-0x00007FF687834000-memory.dmp upx C:\Windows\System\gjFwgdw.exe upx behavioral2/memory/3444-125-0x00007FF67A790000-0x00007FF67AAE4000-memory.dmp upx behavioral2/memory/1476-128-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmp upx behavioral2/memory/2236-129-0x00007FF6D9930000-0x00007FF6D9C84000-memory.dmp upx behavioral2/memory/3140-130-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmp upx behavioral2/memory/2896-131-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmp upx behavioral2/memory/3928-132-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmp upx behavioral2/memory/4592-133-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmp upx behavioral2/memory/3664-134-0x00007FF6A01E0000-0x00007FF6A0534000-memory.dmp upx behavioral2/memory/708-135-0x00007FF62FDF0000-0x00007FF630144000-memory.dmp upx behavioral2/memory/1940-136-0x00007FF600F20000-0x00007FF601274000-memory.dmp upx behavioral2/memory/2548-137-0x00007FF65EAF0000-0x00007FF65EE44000-memory.dmp upx behavioral2/memory/540-138-0x00007FF609FD0000-0x00007FF60A324000-memory.dmp upx behavioral2/memory/4652-139-0x00007FF782E00000-0x00007FF783154000-memory.dmp upx behavioral2/memory/1476-140-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmp upx behavioral2/memory/3672-141-0x00007FF68D480000-0x00007FF68D7D4000-memory.dmp upx behavioral2/memory/3140-142-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmp upx behavioral2/memory/1728-143-0x00007FF60B980000-0x00007FF60BCD4000-memory.dmp upx behavioral2/memory/2896-144-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmp upx behavioral2/memory/3928-145-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmp upx behavioral2/memory/3440-146-0x00007FF78DF90000-0x00007FF78E2E4000-memory.dmp upx behavioral2/memory/2920-147-0x00007FF6F0140000-0x00007FF6F0494000-memory.dmp upx behavioral2/memory/4592-148-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\FmjJLdV.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\giKajcb.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\QcOiQWU.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\neALmKx.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lmqENnA.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lzKyuXJ.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\dEhTpfW.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\nCkhcMo.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GALePLz.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fZqLJoA.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oPIBTfu.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ephcMTM.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PPsspTS.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ayEBRAL.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\gjFwgdw.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\NIAfnLk.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\oTTxTXA.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\YJchbWL.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\AkZaJHl.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\WuiUqun.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\fCvQuFD.exe 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 2860 wrote to memory of 3664 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe NIAfnLk.exe PID 2860 wrote to memory of 3664 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe NIAfnLk.exe PID 2860 wrote to memory of 708 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe fCvQuFD.exe PID 2860 wrote to memory of 708 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe fCvQuFD.exe PID 2860 wrote to memory of 1940 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe oTTxTXA.exe PID 2860 wrote to memory of 1940 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe oTTxTXA.exe PID 2860 wrote to memory of 2548 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe YJchbWL.exe PID 2860 wrote to memory of 2548 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe YJchbWL.exe PID 2860 wrote to memory of 540 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe fZqLJoA.exe PID 2860 wrote to memory of 540 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe fZqLJoA.exe PID 2860 wrote to memory of 1476 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe oPIBTfu.exe PID 2860 wrote to memory of 1476 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe oPIBTfu.exe PID 2860 wrote to memory of 4652 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe AkZaJHl.exe PID 2860 wrote to memory of 4652 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe AkZaJHl.exe PID 2860 wrote to memory of 3140 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe nCkhcMo.exe PID 2860 wrote to memory of 3140 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe nCkhcMo.exe PID 2860 wrote to memory of 3672 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe FmjJLdV.exe PID 2860 wrote to memory of 3672 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe FmjJLdV.exe PID 2860 wrote to memory of 1728 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe ephcMTM.exe PID 2860 wrote to memory of 1728 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe ephcMTM.exe PID 2860 wrote to memory of 2896 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe giKajcb.exe PID 2860 wrote to memory of 2896 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe giKajcb.exe PID 2860 wrote to memory of 3928 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe QcOiQWU.exe PID 2860 wrote to memory of 3928 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe QcOiQWU.exe PID 2860 wrote to memory of 3440 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe neALmKx.exe PID 2860 wrote to memory of 3440 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe neALmKx.exe PID 2860 wrote to memory of 2920 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe WuiUqun.exe PID 2860 wrote to memory of 2920 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe WuiUqun.exe PID 2860 wrote to memory of 4592 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe PPsspTS.exe PID 2860 wrote to memory of 4592 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe PPsspTS.exe PID 2860 wrote to memory of 3812 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe lmqENnA.exe PID 2860 wrote to memory of 3812 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe lmqENnA.exe PID 2860 wrote to memory of 2928 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe lzKyuXJ.exe PID 2860 wrote to memory of 2928 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe lzKyuXJ.exe PID 2860 wrote to memory of 3424 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe GALePLz.exe PID 2860 wrote to memory of 3424 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe GALePLz.exe PID 2860 wrote to memory of 2868 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe ayEBRAL.exe PID 2860 wrote to memory of 2868 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe ayEBRAL.exe PID 2860 wrote to memory of 3444 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe dEhTpfW.exe PID 2860 wrote to memory of 3444 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe dEhTpfW.exe PID 2860 wrote to memory of 2236 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe gjFwgdw.exe PID 2860 wrote to memory of 2236 2860 2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe gjFwgdw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-30_f9715b1b48fc872ccd7b047a47c2041f_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\NIAfnLk.exeC:\Windows\System\NIAfnLk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fCvQuFD.exeC:\Windows\System\fCvQuFD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oTTxTXA.exeC:\Windows\System\oTTxTXA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YJchbWL.exeC:\Windows\System\YJchbWL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fZqLJoA.exeC:\Windows\System\fZqLJoA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oPIBTfu.exeC:\Windows\System\oPIBTfu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AkZaJHl.exeC:\Windows\System\AkZaJHl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nCkhcMo.exeC:\Windows\System\nCkhcMo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FmjJLdV.exeC:\Windows\System\FmjJLdV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ephcMTM.exeC:\Windows\System\ephcMTM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\giKajcb.exeC:\Windows\System\giKajcb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QcOiQWU.exeC:\Windows\System\QcOiQWU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\neALmKx.exeC:\Windows\System\neALmKx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WuiUqun.exeC:\Windows\System\WuiUqun.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PPsspTS.exeC:\Windows\System\PPsspTS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lmqENnA.exeC:\Windows\System\lmqENnA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lzKyuXJ.exeC:\Windows\System\lzKyuXJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GALePLz.exeC:\Windows\System\GALePLz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ayEBRAL.exeC:\Windows\System\ayEBRAL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dEhTpfW.exeC:\Windows\System\dEhTpfW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gjFwgdw.exeC:\Windows\System\gjFwgdw.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\AkZaJHl.exeFilesize
5.9MB
MD5003ce2917026118abd16182b5358c378
SHA198a5506d1671e5bba89244616e052cdc4328419a
SHA2567c49eb5cb058c6ed06c5453c311740271453e284d790b8864a3221200434d328
SHA51269b0cd6a26aea5af79f69b87d714856608a970b227c7d50c9acf86dca966aad6118426a0cc790c811c059ad451912c71d7abe574438794f14294dd1765a5648f
-
C:\Windows\System\FmjJLdV.exeFilesize
5.9MB
MD5f98681dd2ffc68b1e44544fc5cc5688c
SHA114d13b9e6480d88e5fdda6b37b868cc11195076f
SHA2560fc58cc66192c71937ec52ef5e7930c5b7c505a7a4b1e5b43fff07a049694d34
SHA512b1f0119083829b33db5cc7e7511526a37e2b799d6507b39b9cbdbacff45568db340b5ab1d52eb4f9cb2b392d116684d0639e39e68bc625d0a3fd9abdb061f0c4
-
C:\Windows\System\GALePLz.exeFilesize
5.9MB
MD56c8a495a11f202cfbfcb4dedde85394d
SHA1a285f462b1816b6a25268367a76f0513bc275624
SHA2565a1127412c45a6e95eaa2fa4761b7611dbcb03db62a6b116c01ef08cafa51177
SHA512e0b8374a25ec60da03b7b03a139df71fd261259075de159c387e65b997884ce7fabec3237cc6385a44cf0a8663b32233825cdce61fa8f541ea44bd52a837d439
-
C:\Windows\System\NIAfnLk.exeFilesize
5.9MB
MD5af05512d9ed8bbba7daac2ed94bae1ed
SHA14b02733cc104da69f10940caaaf3f08d5d7169c0
SHA2566b6b2fb689e014fccb924f424ba2fabce666d7b814763caff92f66525150dc1f
SHA51227b0ae3b14d17399224f765d89146c692ea3d9949394cda3a6c5d63d37df1c8525c417e9e61043cc5ad5ed72ca5c9967baaea1d300ea90283ab7523659d2d669
-
C:\Windows\System\PPsspTS.exeFilesize
5.9MB
MD500fdf98fb65de365fb2f3cb78850bb4b
SHA13c5d9b028e8f002c1866c059af211ef1fbd339c3
SHA256d05539d1bb3b6cb8c022549eb0d13373cfb915b13167126b16d701a9518fdbc3
SHA512f3b77832fc81551e0b8410143649cedf3e777f2474150456d197d32220a1f2aaf22a38366c1d9a9508fd1412ad378063574d4ae03e3cac079689728127264fa1
-
C:\Windows\System\QcOiQWU.exeFilesize
5.9MB
MD5ac142697a4329c302feedbd1d86e44ec
SHA1a26c022a23849617704356d6d5a128965e8a9801
SHA256f068ae21e7320f0b5cf80ae6bd86bf055f3adca583ab04257e118e20d5ef20f9
SHA5127932bfc063ff619789c984de9bd905d5f13ceb05c7e3c71f5b708867c6989b2f437b4662a1b751a554943f213e9552bd114df658598ee31e8ff4bcd47e4fce1b
-
C:\Windows\System\WuiUqun.exeFilesize
5.9MB
MD51950c9efd3cf6fd54c017eeac541070e
SHA1f41c85920924a1bb9fb58f12840107aa4d1f60f5
SHA2566929ac0323b28a9c2ce723575f6bd77e9811d52dec76db05e55456121b9c6428
SHA51230f8ddcbe5923c7ceba0421ff9db6de3972b24d2f6c1c6224679127a1f80df08bc689fa83d4fa8c716061b45cfbb7b7b17391aa0281b2da25c04c8935ec267f7
-
C:\Windows\System\YJchbWL.exeFilesize
5.9MB
MD587be3912f500a9a48e15b0895299bb13
SHA1cb810748afa2c9a124df057f3af4600e1c7b4c4f
SHA2569543ad835e3229bd8ae86cb321a5881ec50e31f630ded94f7fc18bd57bc6e2f2
SHA512a8578e80151aad7c29f8d5663b6608e757d5c541dd98c637c5d3e80820b4914fe666b0b959d4898bdd3562ddf30a48b19f9ebdc30adbbd8f91aceda118876e9a
-
C:\Windows\System\ayEBRAL.exeFilesize
5.9MB
MD58a96f582346e89b21bc99795603a2654
SHA1a61dc020de722a26cac26d0571014c1358ecb4aa
SHA25659726a1e6ba73772975e8df8accd30ef47e94128d85eda331e8e37d2de6085e8
SHA51219145f0e1b1a6d8b9326935e649eb4ed9243a64e9182556747e9e0490f1efdb40948fd38cccef977def9853f1a2495c19451781376b30871dc913a2f56c65c38
-
C:\Windows\System\dEhTpfW.exeFilesize
5.9MB
MD5f6635b881f4ed8f638780a384f65bb2e
SHA1114ab0b3febcbde5219d8c87dac0d698d9b6d4ef
SHA256453352603d9a7125e0ae74873c7b1d932ab3b327fa463c3f5850a0cd8a7f42e8
SHA512cc4810c01c41d57c35edf42e200322f9c075aeadd4ad2a4fb75b7776214685b6a37b274ad9996f8b846cc7fa6785a1bc1294575a0631b08a3dfdd9c34672ebeb
-
C:\Windows\System\ephcMTM.exeFilesize
5.9MB
MD53bf6824dcb99498cddaac77cb0d24141
SHA187f339a878e8df2b6be33d7f64ea354b7dd7b082
SHA2563f93605e7b040180dc21ae43bea6934b8d35782273861ee14780a3632830bd87
SHA5125f4c3c0bd3fd2a1cc3194356a9215aa83ee0d17f0c2f76dcc008d2e7a8e8099003cc108631e1b93f0fb3a1d5aa79fc1539669b2fc597ce6ae8fde8f730b298c1
-
C:\Windows\System\fCvQuFD.exeFilesize
5.9MB
MD521338d240293a92dc6a5f3d7434284c9
SHA1dbca9085a01a911fef0b22da29ef33d2f9d3c848
SHA256108b8d2855044e2bbf32609f439e0ed18b42eb8f8f32f7358093b5e28aaf0cfd
SHA51287b5ab7348e546843159e59c51dc61368504ae54597f6b3f9c94bf81ce21e4edcc13d748a4db9898b4af467875e1c545dedd395779c91ee5d9095348dd70092b
-
C:\Windows\System\fZqLJoA.exeFilesize
5.9MB
MD5c16fea80cb4a2b188a3d6f992d63d7f6
SHA13c5882042a62846a382c6b43c84c3181792f5a10
SHA25636b7deb3fedeaa67904d33f19a62a58fd398bd635e050df882f5f3a0a83ecf38
SHA512748cf764d493d7ca0f6c331452fe45cbfe8987b0bd817a39232801598f57930dd9d32c8a5f4c01413f09b55bae780fcf68591df2fb0791295d9c75ac8608cc95
-
C:\Windows\System\giKajcb.exeFilesize
5.9MB
MD57d8fe4846ed3aa3f14c9bf18f8b77faf
SHA1700b733e23c9c7888e80568526a85278d3f42707
SHA25628459a76e75d061bd9fdcba034a3f079a7ceacb687a6a89e3b0b9110d44be1ec
SHA512d83bac5dc46e3e3c43ef8a979ab085b7f394be8524ba846ec58cebc9ba96237fe4d525a292627b823669d0a36926d2105e9f916a6b170750a381a1d2344e693a
-
C:\Windows\System\gjFwgdw.exeFilesize
5.9MB
MD589f8a484468dd269c887a21df087d59a
SHA145fd05864cede98327ec2daacca98c23e51ce30f
SHA2569727c1d3438805db45d75026d9f164b35088ffd712155a8b2706c56c5db07b69
SHA512fc861c05d4d9406e4db5fd3496b7a149235c88aad96b3f342841909260e414d68ef4d952e584e565d32c05cc2b54c84e2392d23cccad47a32a6217b02eadf7a9
-
C:\Windows\System\lmqENnA.exeFilesize
5.9MB
MD52b9b839fd25dd7e35e00d8dae9f4373c
SHA13fddb94e2e2b6ebe7dd16354472936393ec2560a
SHA256d84b762f3a3367fa4e734fd0b106b872858558aee7472f0dcd5ea872103df7e4
SHA512c869271661d0ee6b33a2ae90e8fa23fb9924b2e61be00500123784ddaa1b6437032cebe827e9d07f7f2b869207500741d10d76722c51262c7269129c9628e788
-
C:\Windows\System\lzKyuXJ.exeFilesize
5.9MB
MD5720b04cf29b7e14be214c5a6e09b6a6c
SHA1718db2578f877c603f88dd49198b927ef8d9ea21
SHA256821042b7306fc9ae8e0705edf6bee7bd447252be4041b248c4a5611610388592
SHA51298abbaf9cad8ba88c9220b19ad4a6f62fc81863d0e0318aa73b53315636cddd39100914b64aaa4430cf39072f0348c6c26421a44b5b953130721de4984ac9a09
-
C:\Windows\System\nCkhcMo.exeFilesize
5.9MB
MD5a8945869a5a8419ad3244deee37e9e3c
SHA169632f5788fc743fc86bf185cdc35e077ba0b16d
SHA256921bdb3883e4f23ae21be6a0dcfa7b13092dafbba28e17a3c772edb6849953ec
SHA512d7289ede80a0eeea7b551969d95a3c6e263298140a37a6c431e51471346e14b87a542fd8d0cdc99d78381895fba6cd0aab584b3ca6de6412c9e89054363e672d
-
C:\Windows\System\neALmKx.exeFilesize
5.9MB
MD5a15e1daf1ee75b626b6b58f0938890dc
SHA1ff87918b74b665e358abb5e6c2b8d1cd9b8c134c
SHA25681db6c4e1bd7eae3b88dfc60699a6267b166a5b7be9d06f69b196f82a93aef3a
SHA512e53a49f7ecfb2f9ab8dd3a44b0a7f4ac494c9418af96a80ae5909e1c40c53f6b35de9705a64b18ceccdfdb99064b14019808daaeccbcf6c4ed6edc04c903ee25
-
C:\Windows\System\oPIBTfu.exeFilesize
5.9MB
MD5cbb6ba421cd488676d25ec3cc7f735c3
SHA1e267d2a0bc6d25c0758f616aeb86dca6f7dfc562
SHA256b39dd7fddf2a7abcd318949fb8f4807e4ed0da923239e2746c69b99900fe7df4
SHA51234d996b18efb61b10d3e29c5e754b9e4f6a095e4533eff836b4c58b5cadbd12af4c8875d2fe6b23938cebad779323143258fcb9560ae57e8d82bbf150e9876a5
-
C:\Windows\System\oTTxTXA.exeFilesize
5.9MB
MD53f4691dec619273e6370044cdd543bda
SHA14747cdd90e509bb2f8866ab9068d521b4e093c1b
SHA256d8be39621006302ca0bf2980e24a169a607b4f142633d249d4379095f8c770a6
SHA512d3de4d88dc73eae7d1e46d48715cec605ce8bccba0518740256d862f24baec97458d9c4479c5e1a4845a1138d8529e6e196caaed070a4356f5ef353329644b03
-
memory/540-138-0x00007FF609FD0000-0x00007FF60A324000-memory.dmpFilesize
3.3MB
-
memory/540-40-0x00007FF609FD0000-0x00007FF60A324000-memory.dmpFilesize
3.3MB
-
memory/708-135-0x00007FF62FDF0000-0x00007FF630144000-memory.dmpFilesize
3.3MB
-
memory/708-14-0x00007FF62FDF0000-0x00007FF630144000-memory.dmpFilesize
3.3MB
-
memory/1476-128-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmpFilesize
3.3MB
-
memory/1476-140-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmpFilesize
3.3MB
-
memory/1476-45-0x00007FF6FF070000-0x00007FF6FF3C4000-memory.dmpFilesize
3.3MB
-
memory/1728-69-0x00007FF60B980000-0x00007FF60BCD4000-memory.dmpFilesize
3.3MB
-
memory/1728-143-0x00007FF60B980000-0x00007FF60BCD4000-memory.dmpFilesize
3.3MB
-
memory/1940-136-0x00007FF600F20000-0x00007FF601274000-memory.dmpFilesize
3.3MB
-
memory/1940-20-0x00007FF600F20000-0x00007FF601274000-memory.dmpFilesize
3.3MB
-
memory/2236-129-0x00007FF6D9930000-0x00007FF6D9C84000-memory.dmpFilesize
3.3MB
-
memory/2236-154-0x00007FF6D9930000-0x00007FF6D9C84000-memory.dmpFilesize
3.3MB
-
memory/2548-137-0x00007FF65EAF0000-0x00007FF65EE44000-memory.dmpFilesize
3.3MB
-
memory/2548-28-0x00007FF65EAF0000-0x00007FF65EE44000-memory.dmpFilesize
3.3MB
-
memory/2860-1-0x000001BE44510000-0x000001BE44520000-memory.dmpFilesize
64KB
-
memory/2860-98-0x00007FF673520000-0x00007FF673874000-memory.dmpFilesize
3.3MB
-
memory/2860-0-0x00007FF673520000-0x00007FF673874000-memory.dmpFilesize
3.3MB
-
memory/2868-122-0x00007FF6874E0000-0x00007FF687834000-memory.dmpFilesize
3.3MB
-
memory/2868-152-0x00007FF6874E0000-0x00007FF687834000-memory.dmpFilesize
3.3MB
-
memory/2896-71-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmpFilesize
3.3MB
-
memory/2896-144-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmpFilesize
3.3MB
-
memory/2896-131-0x00007FF6AEBB0000-0x00007FF6AEF04000-memory.dmpFilesize
3.3MB
-
memory/2920-89-0x00007FF6F0140000-0x00007FF6F0494000-memory.dmpFilesize
3.3MB
-
memory/2920-147-0x00007FF6F0140000-0x00007FF6F0494000-memory.dmpFilesize
3.3MB
-
memory/2928-107-0x00007FF615430000-0x00007FF615784000-memory.dmpFilesize
3.3MB
-
memory/2928-150-0x00007FF615430000-0x00007FF615784000-memory.dmpFilesize
3.3MB
-
memory/3140-130-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmpFilesize
3.3MB
-
memory/3140-142-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmpFilesize
3.3MB
-
memory/3140-50-0x00007FF686EA0000-0x00007FF6871F4000-memory.dmpFilesize
3.3MB
-
memory/3424-113-0x00007FF74E010000-0x00007FF74E364000-memory.dmpFilesize
3.3MB
-
memory/3424-151-0x00007FF74E010000-0x00007FF74E364000-memory.dmpFilesize
3.3MB
-
memory/3440-146-0x00007FF78DF90000-0x00007FF78E2E4000-memory.dmpFilesize
3.3MB
-
memory/3440-88-0x00007FF78DF90000-0x00007FF78E2E4000-memory.dmpFilesize
3.3MB
-
memory/3444-125-0x00007FF67A790000-0x00007FF67AAE4000-memory.dmpFilesize
3.3MB
-
memory/3444-153-0x00007FF67A790000-0x00007FF67AAE4000-memory.dmpFilesize
3.3MB
-
memory/3664-134-0x00007FF6A01E0000-0x00007FF6A0534000-memory.dmpFilesize
3.3MB
-
memory/3664-9-0x00007FF6A01E0000-0x00007FF6A0534000-memory.dmpFilesize
3.3MB
-
memory/3672-141-0x00007FF68D480000-0x00007FF68D7D4000-memory.dmpFilesize
3.3MB
-
memory/3672-56-0x00007FF68D480000-0x00007FF68D7D4000-memory.dmpFilesize
3.3MB
-
memory/3812-149-0x00007FF722260000-0x00007FF7225B4000-memory.dmpFilesize
3.3MB
-
memory/3812-104-0x00007FF722260000-0x00007FF7225B4000-memory.dmpFilesize
3.3MB
-
memory/3928-145-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmpFilesize
3.3MB
-
memory/3928-72-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmpFilesize
3.3MB
-
memory/3928-132-0x00007FF67F670000-0x00007FF67F9C4000-memory.dmpFilesize
3.3MB
-
memory/4592-148-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmpFilesize
3.3MB
-
memory/4592-90-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmpFilesize
3.3MB
-
memory/4592-133-0x00007FF6C4C50000-0x00007FF6C4FA4000-memory.dmpFilesize
3.3MB
-
memory/4652-49-0x00007FF782E00000-0x00007FF783154000-memory.dmpFilesize
3.3MB
-
memory/4652-139-0x00007FF782E00000-0x00007FF783154000-memory.dmpFilesize
3.3MB