Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 21:53
Behavioral task
behavioral1
Sample
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe
Resource
win7-20240220-en
General
-
Target
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe
-
Size
5.2MB
-
MD5
61e26f7e69c3c9693997cdce2ef6e5e5
-
SHA1
be3ad5fd6ff9eaa2a2a67c21917a6b8a2a15df1a
-
SHA256
d6f2e59903ba7e920aba30a1877793754c108272f87b296bb13d56f18e633b5d
-
SHA512
4b50d6bfcad7934441358684e44b0fb8c92394ec71f3834eff34aed9825542bd548a8c199050ec2520c73c2669ef3ec07ca996e9fa26e301bbc6d4b001f348cc
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6ll:RWWBibf56utgpPFotBER/mQ32lUp
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\JjEdZkS.exe cobalt_reflective_dll C:\Windows\System\CeSwosK.exe cobalt_reflective_dll C:\Windows\System\tzqgsnl.exe cobalt_reflective_dll C:\Windows\System\OomUhIy.exe cobalt_reflective_dll C:\Windows\System\VnaKJrW.exe cobalt_reflective_dll C:\Windows\System\ISEhTXq.exe cobalt_reflective_dll C:\Windows\System\FZBiNsV.exe cobalt_reflective_dll C:\Windows\System\zqYeCBh.exe cobalt_reflective_dll C:\Windows\System\zWDkeWh.exe cobalt_reflective_dll C:\Windows\System\RDfmSWK.exe cobalt_reflective_dll C:\Windows\System\sxxZkKM.exe cobalt_reflective_dll C:\Windows\System\koPPUwj.exe cobalt_reflective_dll C:\Windows\System\EwkCXxJ.exe cobalt_reflective_dll C:\Windows\System\lXmTHnG.exe cobalt_reflective_dll C:\Windows\System\tCofnWm.exe cobalt_reflective_dll C:\Windows\System\NGCXxol.exe cobalt_reflective_dll C:\Windows\System\ElhvJlg.exe cobalt_reflective_dll C:\Windows\System\XZPIqKB.exe cobalt_reflective_dll C:\Windows\System\FfceyfW.exe cobalt_reflective_dll C:\Windows\System\vgfjUJs.exe cobalt_reflective_dll C:\Windows\System\rBAwkqd.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule C:\Windows\System\JjEdZkS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\CeSwosK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\tzqgsnl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\OomUhIy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\VnaKJrW.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\ISEhTXq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\FZBiNsV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\zqYeCBh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\zWDkeWh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\RDfmSWK.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\sxxZkKM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\koPPUwj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\EwkCXxJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\lXmTHnG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\tCofnWm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\NGCXxol.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\ElhvJlg.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\XZPIqKB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\FfceyfW.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\vgfjUJs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\rBAwkqd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2968-0-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp UPX C:\Windows\System\JjEdZkS.exe UPX behavioral2/memory/2216-8-0x00007FF6184E0000-0x00007FF618831000-memory.dmp UPX C:\Windows\System\CeSwosK.exe UPX C:\Windows\System\tzqgsnl.exe UPX behavioral2/memory/3428-16-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp UPX behavioral2/memory/3824-20-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp UPX C:\Windows\System\OomUhIy.exe UPX behavioral2/memory/3568-26-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp UPX C:\Windows\System\VnaKJrW.exe UPX C:\Windows\System\ISEhTXq.exe UPX behavioral2/memory/4032-35-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp UPX C:\Windows\System\FZBiNsV.exe UPX behavioral2/memory/4512-40-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp UPX behavioral2/memory/5052-45-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp UPX C:\Windows\System\zqYeCBh.exe UPX C:\Windows\System\zWDkeWh.exe UPX behavioral2/memory/2632-55-0x00007FF61FE10000-0x00007FF620161000-memory.dmp UPX C:\Windows\System\RDfmSWK.exe UPX C:\Windows\System\sxxZkKM.exe UPX C:\Windows\System\koPPUwj.exe UPX behavioral2/memory/2216-74-0x00007FF6184E0000-0x00007FF618831000-memory.dmp UPX behavioral2/memory/3428-78-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp UPX C:\Windows\System\EwkCXxJ.exe UPX behavioral2/memory/1864-85-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp UPX behavioral2/memory/2348-89-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp UPX C:\Windows\System\lXmTHnG.exe UPX C:\Windows\System\tCofnWm.exe UPX C:\Windows\System\NGCXxol.exe UPX C:\Windows\System\ElhvJlg.exe UPX C:\Windows\System\XZPIqKB.exe UPX C:\Windows\System\FfceyfW.exe UPX C:\Windows\System\vgfjUJs.exe UPX behavioral2/memory/3568-98-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp UPX behavioral2/memory/1036-94-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp UPX C:\Windows\System\rBAwkqd.exe UPX behavioral2/memory/3292-79-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmp UPX behavioral2/memory/1716-70-0x00007FF608230000-0x00007FF608581000-memory.dmp UPX behavioral2/memory/1212-68-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp UPX behavioral2/memory/2968-64-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp UPX behavioral2/memory/1612-59-0x00007FF790580000-0x00007FF7908D1000-memory.dmp UPX behavioral2/memory/2968-126-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp UPX behavioral2/memory/4512-132-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp UPX behavioral2/memory/5052-133-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp UPX behavioral2/memory/2632-134-0x00007FF61FE10000-0x00007FF620161000-memory.dmp UPX behavioral2/memory/1212-136-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp UPX behavioral2/memory/1716-137-0x00007FF608230000-0x00007FF608581000-memory.dmp UPX behavioral2/memory/1864-139-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp UPX behavioral2/memory/2348-140-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp UPX behavioral2/memory/1036-141-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp UPX behavioral2/memory/3668-142-0x00007FF7047E0000-0x00007FF704B31000-memory.dmp UPX behavioral2/memory/412-143-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmp UPX behavioral2/memory/2920-144-0x00007FF784B50000-0x00007FF784EA1000-memory.dmp UPX behavioral2/memory/932-145-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmp UPX behavioral2/memory/4844-146-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmp UPX behavioral2/memory/876-147-0x00007FF765710000-0x00007FF765A61000-memory.dmp UPX behavioral2/memory/2968-148-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp UPX behavioral2/memory/2216-193-0x00007FF6184E0000-0x00007FF618831000-memory.dmp UPX behavioral2/memory/3428-195-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp UPX behavioral2/memory/3824-198-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp UPX behavioral2/memory/3568-200-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp UPX behavioral2/memory/4032-202-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp UPX behavioral2/memory/4512-204-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp UPX behavioral2/memory/5052-208-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp UPX -
XMRig Miner payload 52 IoCs
Processes:
resource yara_rule behavioral2/memory/2216-8-0x00007FF6184E0000-0x00007FF618831000-memory.dmp xmrig behavioral2/memory/3428-16-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp xmrig behavioral2/memory/3824-20-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp xmrig behavioral2/memory/3568-26-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp xmrig behavioral2/memory/4032-35-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp xmrig behavioral2/memory/5052-45-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp xmrig behavioral2/memory/2632-55-0x00007FF61FE10000-0x00007FF620161000-memory.dmp xmrig behavioral2/memory/2216-74-0x00007FF6184E0000-0x00007FF618831000-memory.dmp xmrig behavioral2/memory/3428-78-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp xmrig behavioral2/memory/1864-85-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp xmrig behavioral2/memory/3568-98-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp xmrig behavioral2/memory/3292-79-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmp xmrig behavioral2/memory/1212-68-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp xmrig behavioral2/memory/2968-64-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp xmrig behavioral2/memory/1612-59-0x00007FF790580000-0x00007FF7908D1000-memory.dmp xmrig behavioral2/memory/2968-126-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp xmrig behavioral2/memory/4512-132-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp xmrig behavioral2/memory/5052-133-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp xmrig behavioral2/memory/2632-134-0x00007FF61FE10000-0x00007FF620161000-memory.dmp xmrig behavioral2/memory/1212-136-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp xmrig behavioral2/memory/1716-137-0x00007FF608230000-0x00007FF608581000-memory.dmp xmrig behavioral2/memory/1864-139-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp xmrig behavioral2/memory/2348-140-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp xmrig behavioral2/memory/1036-141-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp xmrig behavioral2/memory/3668-142-0x00007FF7047E0000-0x00007FF704B31000-memory.dmp xmrig behavioral2/memory/412-143-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmp xmrig behavioral2/memory/2920-144-0x00007FF784B50000-0x00007FF784EA1000-memory.dmp xmrig behavioral2/memory/932-145-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmp xmrig behavioral2/memory/4844-146-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmp xmrig behavioral2/memory/876-147-0x00007FF765710000-0x00007FF765A61000-memory.dmp xmrig behavioral2/memory/2968-148-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp xmrig behavioral2/memory/2216-193-0x00007FF6184E0000-0x00007FF618831000-memory.dmp xmrig behavioral2/memory/3428-195-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp xmrig behavioral2/memory/3824-198-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp xmrig behavioral2/memory/3568-200-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp xmrig behavioral2/memory/4032-202-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp xmrig behavioral2/memory/4512-204-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp xmrig behavioral2/memory/5052-208-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp xmrig behavioral2/memory/2632-212-0x00007FF61FE10000-0x00007FF620161000-memory.dmp xmrig behavioral2/memory/1612-217-0x00007FF790580000-0x00007FF7908D1000-memory.dmp xmrig behavioral2/memory/1716-226-0x00007FF608230000-0x00007FF608581000-memory.dmp xmrig behavioral2/memory/1864-228-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp xmrig behavioral2/memory/3292-229-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmp xmrig behavioral2/memory/1212-231-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp xmrig behavioral2/memory/1036-244-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp xmrig behavioral2/memory/932-245-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmp xmrig behavioral2/memory/4844-247-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmp xmrig behavioral2/memory/3668-243-0x00007FF7047E0000-0x00007FF704B31000-memory.dmp xmrig behavioral2/memory/2348-242-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp xmrig behavioral2/memory/412-240-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmp xmrig behavioral2/memory/2920-241-0x00007FF784B50000-0x00007FF784EA1000-memory.dmp xmrig behavioral2/memory/876-249-0x00007FF765710000-0x00007FF765A61000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
JjEdZkS.exeCeSwosK.exetzqgsnl.exeOomUhIy.exeVnaKJrW.exeISEhTXq.exeFZBiNsV.exezqYeCBh.exezWDkeWh.exeRDfmSWK.exesxxZkKM.exekoPPUwj.exeEwkCXxJ.exerBAwkqd.exelXmTHnG.exetCofnWm.exevgfjUJs.exeNGCXxol.exeElhvJlg.exeFfceyfW.exeXZPIqKB.exepid process 2216 JjEdZkS.exe 3428 CeSwosK.exe 3824 tzqgsnl.exe 3568 OomUhIy.exe 4032 VnaKJrW.exe 4512 ISEhTXq.exe 5052 FZBiNsV.exe 2632 zqYeCBh.exe 1612 zWDkeWh.exe 1212 RDfmSWK.exe 1716 sxxZkKM.exe 3292 koPPUwj.exe 1864 EwkCXxJ.exe 2348 rBAwkqd.exe 1036 lXmTHnG.exe 3668 tCofnWm.exe 2920 vgfjUJs.exe 412 NGCXxol.exe 932 ElhvJlg.exe 4844 FfceyfW.exe 876 XZPIqKB.exe -
Processes:
resource yara_rule behavioral2/memory/2968-0-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp upx C:\Windows\System\JjEdZkS.exe upx behavioral2/memory/2216-8-0x00007FF6184E0000-0x00007FF618831000-memory.dmp upx C:\Windows\System\CeSwosK.exe upx C:\Windows\System\tzqgsnl.exe upx behavioral2/memory/3428-16-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp upx behavioral2/memory/3824-20-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp upx C:\Windows\System\OomUhIy.exe upx behavioral2/memory/3568-26-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp upx C:\Windows\System\VnaKJrW.exe upx C:\Windows\System\ISEhTXq.exe upx behavioral2/memory/4032-35-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp upx C:\Windows\System\FZBiNsV.exe upx behavioral2/memory/4512-40-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp upx behavioral2/memory/5052-45-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp upx C:\Windows\System\zqYeCBh.exe upx C:\Windows\System\zWDkeWh.exe upx behavioral2/memory/2632-55-0x00007FF61FE10000-0x00007FF620161000-memory.dmp upx C:\Windows\System\RDfmSWK.exe upx C:\Windows\System\sxxZkKM.exe upx C:\Windows\System\koPPUwj.exe upx behavioral2/memory/2216-74-0x00007FF6184E0000-0x00007FF618831000-memory.dmp upx behavioral2/memory/3428-78-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp upx C:\Windows\System\EwkCXxJ.exe upx behavioral2/memory/1864-85-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp upx behavioral2/memory/2348-89-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp upx C:\Windows\System\lXmTHnG.exe upx C:\Windows\System\tCofnWm.exe upx C:\Windows\System\NGCXxol.exe upx C:\Windows\System\ElhvJlg.exe upx C:\Windows\System\XZPIqKB.exe upx C:\Windows\System\FfceyfW.exe upx C:\Windows\System\vgfjUJs.exe upx behavioral2/memory/3568-98-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp upx behavioral2/memory/1036-94-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp upx C:\Windows\System\rBAwkqd.exe upx behavioral2/memory/3292-79-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmp upx behavioral2/memory/1716-70-0x00007FF608230000-0x00007FF608581000-memory.dmp upx behavioral2/memory/1212-68-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp upx behavioral2/memory/2968-64-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp upx behavioral2/memory/1612-59-0x00007FF790580000-0x00007FF7908D1000-memory.dmp upx behavioral2/memory/2968-126-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp upx behavioral2/memory/4512-132-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp upx behavioral2/memory/5052-133-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp upx behavioral2/memory/2632-134-0x00007FF61FE10000-0x00007FF620161000-memory.dmp upx behavioral2/memory/1212-136-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmp upx behavioral2/memory/1716-137-0x00007FF608230000-0x00007FF608581000-memory.dmp upx behavioral2/memory/1864-139-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmp upx behavioral2/memory/2348-140-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmp upx behavioral2/memory/1036-141-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmp upx behavioral2/memory/3668-142-0x00007FF7047E0000-0x00007FF704B31000-memory.dmp upx behavioral2/memory/412-143-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmp upx behavioral2/memory/2920-144-0x00007FF784B50000-0x00007FF784EA1000-memory.dmp upx behavioral2/memory/932-145-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmp upx behavioral2/memory/4844-146-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmp upx behavioral2/memory/876-147-0x00007FF765710000-0x00007FF765A61000-memory.dmp upx behavioral2/memory/2968-148-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmp upx behavioral2/memory/2216-193-0x00007FF6184E0000-0x00007FF618831000-memory.dmp upx behavioral2/memory/3428-195-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmp upx behavioral2/memory/3824-198-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmp upx behavioral2/memory/3568-200-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmp upx behavioral2/memory/4032-202-0x00007FF77E740000-0x00007FF77EA91000-memory.dmp upx behavioral2/memory/4512-204-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmp upx behavioral2/memory/5052-208-0x00007FF74D730000-0x00007FF74DA81000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\EwkCXxJ.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\rBAwkqd.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\lXmTHnG.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\NGCXxol.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\JjEdZkS.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\tzqgsnl.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\zqYeCBh.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\sxxZkKM.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\FfceyfW.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\zWDkeWh.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\tCofnWm.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ElhvJlg.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\CeSwosK.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\OomUhIy.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\VnaKJrW.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\FZBiNsV.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RDfmSWK.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\koPPUwj.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ISEhTXq.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\vgfjUJs.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XZPIqKB.exe 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exedescription pid process target process PID 2968 wrote to memory of 2216 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe JjEdZkS.exe PID 2968 wrote to memory of 2216 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe JjEdZkS.exe PID 2968 wrote to memory of 3428 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe CeSwosK.exe PID 2968 wrote to memory of 3428 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe CeSwosK.exe PID 2968 wrote to memory of 3824 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe tzqgsnl.exe PID 2968 wrote to memory of 3824 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe tzqgsnl.exe PID 2968 wrote to memory of 3568 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe OomUhIy.exe PID 2968 wrote to memory of 3568 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe OomUhIy.exe PID 2968 wrote to memory of 4032 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe VnaKJrW.exe PID 2968 wrote to memory of 4032 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe VnaKJrW.exe PID 2968 wrote to memory of 4512 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe ISEhTXq.exe PID 2968 wrote to memory of 4512 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe ISEhTXq.exe PID 2968 wrote to memory of 5052 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FZBiNsV.exe PID 2968 wrote to memory of 5052 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FZBiNsV.exe PID 2968 wrote to memory of 2632 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe zqYeCBh.exe PID 2968 wrote to memory of 2632 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe zqYeCBh.exe PID 2968 wrote to memory of 1612 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe zWDkeWh.exe PID 2968 wrote to memory of 1612 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe zWDkeWh.exe PID 2968 wrote to memory of 1212 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe RDfmSWK.exe PID 2968 wrote to memory of 1212 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe RDfmSWK.exe PID 2968 wrote to memory of 1716 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe sxxZkKM.exe PID 2968 wrote to memory of 1716 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe sxxZkKM.exe PID 2968 wrote to memory of 3292 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe koPPUwj.exe PID 2968 wrote to memory of 3292 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe koPPUwj.exe PID 2968 wrote to memory of 1864 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe EwkCXxJ.exe PID 2968 wrote to memory of 1864 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe EwkCXxJ.exe PID 2968 wrote to memory of 2348 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe rBAwkqd.exe PID 2968 wrote to memory of 2348 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe rBAwkqd.exe PID 2968 wrote to memory of 1036 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe lXmTHnG.exe PID 2968 wrote to memory of 1036 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe lXmTHnG.exe PID 2968 wrote to memory of 3668 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe tCofnWm.exe PID 2968 wrote to memory of 3668 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe tCofnWm.exe PID 2968 wrote to memory of 412 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe NGCXxol.exe PID 2968 wrote to memory of 412 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe NGCXxol.exe PID 2968 wrote to memory of 2920 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe vgfjUJs.exe PID 2968 wrote to memory of 2920 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe vgfjUJs.exe PID 2968 wrote to memory of 932 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe ElhvJlg.exe PID 2968 wrote to memory of 932 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe ElhvJlg.exe PID 2968 wrote to memory of 4844 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FfceyfW.exe PID 2968 wrote to memory of 4844 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe FfceyfW.exe PID 2968 wrote to memory of 876 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe XZPIqKB.exe PID 2968 wrote to memory of 876 2968 2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe XZPIqKB.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_61e26f7e69c3c9693997cdce2ef6e5e5_cobalt-strike_cobaltstrike.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\JjEdZkS.exeC:\Windows\System\JjEdZkS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CeSwosK.exeC:\Windows\System\CeSwosK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tzqgsnl.exeC:\Windows\System\tzqgsnl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OomUhIy.exeC:\Windows\System\OomUhIy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VnaKJrW.exeC:\Windows\System\VnaKJrW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ISEhTXq.exeC:\Windows\System\ISEhTXq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FZBiNsV.exeC:\Windows\System\FZBiNsV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zqYeCBh.exeC:\Windows\System\zqYeCBh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zWDkeWh.exeC:\Windows\System\zWDkeWh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RDfmSWK.exeC:\Windows\System\RDfmSWK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sxxZkKM.exeC:\Windows\System\sxxZkKM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\koPPUwj.exeC:\Windows\System\koPPUwj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EwkCXxJ.exeC:\Windows\System\EwkCXxJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rBAwkqd.exeC:\Windows\System\rBAwkqd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lXmTHnG.exeC:\Windows\System\lXmTHnG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tCofnWm.exeC:\Windows\System\tCofnWm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NGCXxol.exeC:\Windows\System\NGCXxol.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vgfjUJs.exeC:\Windows\System\vgfjUJs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ElhvJlg.exeC:\Windows\System\ElhvJlg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FfceyfW.exeC:\Windows\System\FfceyfW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XZPIqKB.exeC:\Windows\System\XZPIqKB.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4292,i,17229298512878960157,13441031190071685883,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\CeSwosK.exeFilesize
5.2MB
MD58f03fab20b7a50f6b642db9706e2658a
SHA14a97f4ca7b728c77701b85b5a9ce4e61ea370326
SHA2560edeeba508e7ad24b16c6e90af40f30267916c966c4b9bc747abfe159d0d3042
SHA512e7726635c5174c45ca51a0484707cd58eef96ac159a4ca8f45270a8fe301a5c69f3560d00e5a8029e72afdb408a28c848fbb561c7878b2cb383d602510078d5d
-
C:\Windows\System\ElhvJlg.exeFilesize
5.2MB
MD57c8558e2b84c6c44d5c5042d25484f33
SHA18113e687ab39bb237826f0c0fd8213b977dfb35f
SHA25621a48b9d8a8c3b0f66555ff5384c0d0062a0d4bd7206d27384d9eac624938c2f
SHA512e1d4b215a90b8249d17d5f9953322f5a00e7511949066ec0d17c90f78a46481e39d040c46ecbd9c01498e88a69470f49b168718f46491c09e4d0a9ac86e6b633
-
C:\Windows\System\EwkCXxJ.exeFilesize
5.2MB
MD5ed2ea20d6a2c464dbd1c2b9416ea5567
SHA17c0e8b5dae1a839571324bca27555e1919cba799
SHA2569dc919530f41d7f12e86118989e76b4ad58aa8509ef67018888b032ed94b212e
SHA51206193afd6f90fd6a22f49f0ef14af2dc36f254f897f68dc1cfb686bc51716d67c00e19688bc35ff5ebf3480376fab191c29ec6749a988e05b05777347eac6a43
-
C:\Windows\System\FZBiNsV.exeFilesize
5.2MB
MD584cb75d59db5a803a74b74fa2fcb3270
SHA1abdb93b86355e34b79ebc4c0e54f2ec7cf3a7c57
SHA256c598aab32712415a760af402dcad0db60895712f140a622f06dba26169a34bdc
SHA512d3668b96403862d6d386d348b3d0cfcd5b8c8c14f129e2c23a53cf9ad25d40879cb889db142d1e05e9e682585938962a2323de47cb003ada879e602230272bed
-
C:\Windows\System\FfceyfW.exeFilesize
5.2MB
MD5d84bb3cf8f989ee9caecaea93f9ab695
SHA1d2b5c0a9fe3aa6fb5d764b9b8eb0d78c52a11676
SHA25623ad37c8f6b549e7f3c5e5bd29943136c589df0456a9c426dcd919909d6ba818
SHA51255e3c8bf7b4a15a2fd1b4f826b37fa8bea4992ba90aa2cc884abaa3d50618a4581179ba288fb443cf3acfead1a4f476096e6caadb72150480930653f1922db08
-
C:\Windows\System\ISEhTXq.exeFilesize
5.2MB
MD5e42e104db2c9b20dc10de639e58930a0
SHA134db7ccd4d2268e66ec32f442ae3573336d1ae0e
SHA2568b0c9dc296895781e8a04ed7095dcc5328769c009ed2d281b073a16030f5d482
SHA5126c5eecc3af2811e9e5b1b4b59a3e26aee81ea98ca3d4447f10b0e77768087982fb9c670d6971ae0fb6936bdb4a66d90654150f812f78cf843d1edf48adf4bd1b
-
C:\Windows\System\JjEdZkS.exeFilesize
5.2MB
MD55a5a8003d67f56c76fe500e3049d6621
SHA1b7fa41260448d80b7b9adadab621c6f9aef3f16a
SHA256249aeee9ab9c2ba9c0a7887ef7cbe5d629ccf56f148d5f74a664ccf5077d4799
SHA5129b49cfb58dcb1d8becf50d115bdbf8e168bae12e445583b1f7e0b3f9956fd70e357a8b9df3cd714b1b6a24238bec147749844ef30bff24b64e1a858a51bd511e
-
C:\Windows\System\NGCXxol.exeFilesize
5.2MB
MD580e5eb84a44802c849a405fa35d264a8
SHA1e0d7551fd2040558816500b4ecc79d47042d75f5
SHA256dc4088a5241bca305ee550fffc8af9d90a8a024836908f267b363abe8fa2bc14
SHA51297aeae8849783646cab49bc92212e98cb3cd6a61893ae4ad284e5129b2ae9dd8066324a654ce58b78672195bef567f5987bd2e615d7393c6f6ec1bdb7a947a94
-
C:\Windows\System\OomUhIy.exeFilesize
5.2MB
MD552e0f40cee954529e0c2f2abbf1c63a5
SHA15f6b9d98e83562c3bec1bf327b5b0c96897c7254
SHA256b7a9b74a4162b08c98e0f3b71d4da51e4aa65298630c65e72bea34408d1f1960
SHA5123c4fd7ddf8d4abef6b349be5397d2695f4340cc23f1e4a459f8dd7e473bc7a5db4424658912188ffb0a087db6bf4c55e8dc30bbcb86d078f1d2215e45a02c81f
-
C:\Windows\System\RDfmSWK.exeFilesize
5.2MB
MD57d83519812aedd4b4899c05c1ac0b8c0
SHA172843c5b66cd23bff311858df2beeae161c3dfd8
SHA2567d30ad6b98ccbec5b0a4cb9a835992ec4851ebdb96a4b7cc1ab0b90140b87bd1
SHA512536eeea1c99e4e0de663c5881e43c488b87a351869fe849c9c789de053a48a5fb9258bd6d61591f15653ffb04e439ca8e76fb9ae5732ef18069440c592229eaf
-
C:\Windows\System\VnaKJrW.exeFilesize
5.2MB
MD52ed25621bad4586046f42c5bf08f8aab
SHA1100f06d0d8268e87e81f00118ff5f2a91dece8b3
SHA2564fd81792cbda700d1bafb0d921d2f365560eb75a00f72c44bab90dddf4798618
SHA51256f32e4aa0083ba7c526d39c0f27b7479827a09c72d6abbb9de6c46d8d582d9a6a875cf7e13f46a3ec525d5890950d88555d403763716b68b530520971d94f48
-
C:\Windows\System\XZPIqKB.exeFilesize
5.2MB
MD5dec48c73fd3248a93e1b0fb5f7e64f3c
SHA1fc8aa08735743f16e394959e51f885c0bb2049ad
SHA256fc17c63a284e09881274f274b6a3b3e33c01e2bbd6d695e7827cebf500d17e38
SHA51247cdf65edec723b475a165514212c89b4c24e241456e9f4e7aaeb3d4ae8c5b77d6830e356cfa1df88d738cf14cb892f53dd4130311feabb598e60a3992d99775
-
C:\Windows\System\koPPUwj.exeFilesize
5.2MB
MD5a0909ad13a7bc76ffbf49dd7bb4cb5bf
SHA13bb5a1be537281b36b3b686ab66bcca9036a71cf
SHA25620fbb1056f256176369d32042d79aa96d8f90b476de88252d03c4f1bfb702eaf
SHA51251876f3b87822e252771e2ae073173fe5eee8011359f3cde69d3be931080f79395e61aab785c811c10b286d9e7a7c7d71f608202767f21d3576160139f65f756
-
C:\Windows\System\lXmTHnG.exeFilesize
5.2MB
MD5c1c6161aa4e05ea4bbaf963532d9ea31
SHA1d51faa715e1a7314f701afd705e988746a487972
SHA256441582dd6bffd5627b7f087cad091cdc6b55136778347b1a1eb57cf13f6840ae
SHA51207e124d10ec8626a8d692aa61dc5a817b350062f43c76c20a7f8b716d16440fc57387f5358c9ac4826175ff2a9af7a269aca5495f6a8f61fa87fc20a8e17402c
-
C:\Windows\System\rBAwkqd.exeFilesize
5.2MB
MD565eab2ab538883882bd267c5c9c7fa8e
SHA1897dce3acc0db6c7a14dd6342326011a59e0e4e0
SHA256e62832962d3b751e1cab8aa1304042cb8b0a272332f9fde8a194c45e95667127
SHA512ee777f80d010d36a22a3bac3e0fa48ee4776046a9d6d075fa876ff0272717a1e9a2a17ae9b1a9aabe951caea5f6c9a191c0b75ce45d664a8fa7131fe21e2b429
-
C:\Windows\System\sxxZkKM.exeFilesize
5.2MB
MD512e930a58a76f2a3f10e45e2c1d6b108
SHA1b1a954650ac0e14432b9f1b6753cc7cad97bd3f7
SHA256fa126de2e311ffe23efa238d32bc2e9863d16bf84cd1bd824e65006bfbb4d980
SHA512fc7ecace579d05000266cc75c9e048f0a7f16677715b7d817b281bf2f4e41f83a229653fcebee0e2503d1d60cd73367643b391e1d002093045bbffa9b03969e7
-
C:\Windows\System\tCofnWm.exeFilesize
5.2MB
MD5ce90490b48638249cd37b07f2e397bdf
SHA1150c8542ee546154806d5fd51af3444e3a1cc6ae
SHA256831fcd77013f567c484bfdd4cb184eb96bec56bcc3e3ba826129d0326a4c4d29
SHA512aa9c0980954ccab3fd6058168cb6e31535adb503a596f8abf9571b243afc4b636bd498ccd645f9072aa478909527a725adea7233c4b5d5c08d2a87012ae668ae
-
C:\Windows\System\tzqgsnl.exeFilesize
5.2MB
MD5c276d2af36d61907947877b55f370991
SHA19be6ec5cabcdd306b15ef69e073227345c3668ac
SHA2560ddc95a4a3240544de68746146b7593f5badd38251334544db721edc84e06dc3
SHA5129e1f66b627e2cfcffb4369b32941636f54b849b2a7e2877d6bfd63cfcebf12035acd5c7777477ede49ed969c3efe813c72a6267e6120f3ef33197283da7be384
-
C:\Windows\System\vgfjUJs.exeFilesize
5.2MB
MD565f6e90e2e7118b283c0d42b76f429bf
SHA1824ac1e592b06af49da316456eabd2e040a909bf
SHA2561a84a719171b8a0909f68d80b69dad43efc04226bb3173aac4abca455f709ca4
SHA512fab9c9ef429d92fa5ec8fd440a54bea848e27ba454ebc06bf36b2d82c15d4bc2e3ebcfd04294b0c51b5af275adb3a2e1f129cd2ebd9280ce8615e8e9b95aa33c
-
C:\Windows\System\zWDkeWh.exeFilesize
5.2MB
MD5dca558952389270ff6c2cf4b71808488
SHA1f775b5e809bdfc09a561ef8d955fc78dde2007fe
SHA2565ddcf7728ebf765bdb76df758fa85f4c1e58e042b0e6f6c040973243b1f36a8f
SHA512d831416da4a80fb33008fb18dc6f766d73bc96df0f6d2f7b2094809f8ec286526913ddfac07514857ddf292f0c2cc587d0a9d04367e1e16da66778c0294a72e4
-
C:\Windows\System\zqYeCBh.exeFilesize
5.2MB
MD5ac212c174a4a9fb86413360a3ec0d136
SHA126bf4cb48e839e64b1805635e43d4b43d588b85e
SHA256035de2681ff16e26fa57ce5a114c32e1a28a31f404a890d11bcf530d2ea09b84
SHA5122748dc0ba3c30fb3e3aba69346d1a1da77169e6c0b060a20a0650e943f6763dfe5a6ac42fa223a2e4db7d94bd887a224d10c6c40891b2f1fb349e3dc6c3bc673
-
memory/412-143-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmpFilesize
3.3MB
-
memory/412-240-0x00007FF76D7D0000-0x00007FF76DB21000-memory.dmpFilesize
3.3MB
-
memory/876-249-0x00007FF765710000-0x00007FF765A61000-memory.dmpFilesize
3.3MB
-
memory/876-147-0x00007FF765710000-0x00007FF765A61000-memory.dmpFilesize
3.3MB
-
memory/932-245-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmpFilesize
3.3MB
-
memory/932-145-0x00007FF7AFCA0000-0x00007FF7AFFF1000-memory.dmpFilesize
3.3MB
-
memory/1036-141-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmpFilesize
3.3MB
-
memory/1036-94-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmpFilesize
3.3MB
-
memory/1036-244-0x00007FF67B270000-0x00007FF67B5C1000-memory.dmpFilesize
3.3MB
-
memory/1212-68-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmpFilesize
3.3MB
-
memory/1212-231-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmpFilesize
3.3MB
-
memory/1212-136-0x00007FF7ECC60000-0x00007FF7ECFB1000-memory.dmpFilesize
3.3MB
-
memory/1612-59-0x00007FF790580000-0x00007FF7908D1000-memory.dmpFilesize
3.3MB
-
memory/1612-217-0x00007FF790580000-0x00007FF7908D1000-memory.dmpFilesize
3.3MB
-
memory/1716-70-0x00007FF608230000-0x00007FF608581000-memory.dmpFilesize
3.3MB
-
memory/1716-226-0x00007FF608230000-0x00007FF608581000-memory.dmpFilesize
3.3MB
-
memory/1716-137-0x00007FF608230000-0x00007FF608581000-memory.dmpFilesize
3.3MB
-
memory/1864-228-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmpFilesize
3.3MB
-
memory/1864-139-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmpFilesize
3.3MB
-
memory/1864-85-0x00007FF7DD860000-0x00007FF7DDBB1000-memory.dmpFilesize
3.3MB
-
memory/2216-8-0x00007FF6184E0000-0x00007FF618831000-memory.dmpFilesize
3.3MB
-
memory/2216-74-0x00007FF6184E0000-0x00007FF618831000-memory.dmpFilesize
3.3MB
-
memory/2216-193-0x00007FF6184E0000-0x00007FF618831000-memory.dmpFilesize
3.3MB
-
memory/2348-89-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmpFilesize
3.3MB
-
memory/2348-242-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmpFilesize
3.3MB
-
memory/2348-140-0x00007FF6D87B0000-0x00007FF6D8B01000-memory.dmpFilesize
3.3MB
-
memory/2632-134-0x00007FF61FE10000-0x00007FF620161000-memory.dmpFilesize
3.3MB
-
memory/2632-55-0x00007FF61FE10000-0x00007FF620161000-memory.dmpFilesize
3.3MB
-
memory/2632-212-0x00007FF61FE10000-0x00007FF620161000-memory.dmpFilesize
3.3MB
-
memory/2920-241-0x00007FF784B50000-0x00007FF784EA1000-memory.dmpFilesize
3.3MB
-
memory/2920-144-0x00007FF784B50000-0x00007FF784EA1000-memory.dmpFilesize
3.3MB
-
memory/2968-64-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmpFilesize
3.3MB
-
memory/2968-1-0x0000024A57DC0000-0x0000024A57DD0000-memory.dmpFilesize
64KB
-
memory/2968-0-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmpFilesize
3.3MB
-
memory/2968-148-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmpFilesize
3.3MB
-
memory/2968-126-0x00007FF7A0640000-0x00007FF7A0991000-memory.dmpFilesize
3.3MB
-
memory/3292-79-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmpFilesize
3.3MB
-
memory/3292-229-0x00007FF6C4CF0000-0x00007FF6C5041000-memory.dmpFilesize
3.3MB
-
memory/3428-195-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmpFilesize
3.3MB
-
memory/3428-16-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmpFilesize
3.3MB
-
memory/3428-78-0x00007FF7AB570000-0x00007FF7AB8C1000-memory.dmpFilesize
3.3MB
-
memory/3568-200-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmpFilesize
3.3MB
-
memory/3568-26-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmpFilesize
3.3MB
-
memory/3568-98-0x00007FF6258A0000-0x00007FF625BF1000-memory.dmpFilesize
3.3MB
-
memory/3668-142-0x00007FF7047E0000-0x00007FF704B31000-memory.dmpFilesize
3.3MB
-
memory/3668-243-0x00007FF7047E0000-0x00007FF704B31000-memory.dmpFilesize
3.3MB
-
memory/3824-198-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmpFilesize
3.3MB
-
memory/3824-20-0x00007FF7B8B90000-0x00007FF7B8EE1000-memory.dmpFilesize
3.3MB
-
memory/4032-35-0x00007FF77E740000-0x00007FF77EA91000-memory.dmpFilesize
3.3MB
-
memory/4032-202-0x00007FF77E740000-0x00007FF77EA91000-memory.dmpFilesize
3.3MB
-
memory/4512-204-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmpFilesize
3.3MB
-
memory/4512-40-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmpFilesize
3.3MB
-
memory/4512-132-0x00007FF6EE000000-0x00007FF6EE351000-memory.dmpFilesize
3.3MB
-
memory/4844-247-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmpFilesize
3.3MB
-
memory/4844-146-0x00007FF6A9BE0000-0x00007FF6A9F31000-memory.dmpFilesize
3.3MB
-
memory/5052-208-0x00007FF74D730000-0x00007FF74DA81000-memory.dmpFilesize
3.3MB
-
memory/5052-45-0x00007FF74D730000-0x00007FF74DA81000-memory.dmpFilesize
3.3MB
-
memory/5052-133-0x00007FF74D730000-0x00007FF74DA81000-memory.dmpFilesize
3.3MB