Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 18:09
Behavioral task
behavioral1
Sample
2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
General
-
Target
2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe
-
Size
5.2MB
-
MD5
ff125116f134e5a9eb784c333d90bdad
-
SHA1
5d02ff798199bc4bdd88a660e7d49aae53ff837c
-
SHA256
c7582440ac863d0f189018c4e6e51817e31c5d602547d401346b17abc4c5caed
-
SHA512
24f36338edecbbfbe1fab9f79a085318d44b95c92e5cc36c076649bbeb260f75b2ba4f25818054a796382d44dc498fee706e0d57d31d043b3f7ab582794d0b51
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lo:RWWBibf56utgpPFotBER/mQ32lUs
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\UMApVzY.exe cobalt_reflective_dll C:\Windows\system\WorrhJA.exe cobalt_reflective_dll C:\Windows\system\WlAlrfl.exe cobalt_reflective_dll C:\Windows\system\BzGiuTe.exe cobalt_reflective_dll C:\Windows\system\vnwhKsn.exe cobalt_reflective_dll \Windows\system\INjvExI.exe cobalt_reflective_dll C:\Windows\system\BFNIIRe.exe cobalt_reflective_dll \Windows\system\mTjtDkp.exe cobalt_reflective_dll C:\Windows\system\qbObIWk.exe cobalt_reflective_dll C:\Windows\system\almzEcM.exe cobalt_reflective_dll \Windows\system\YlBKhZn.exe cobalt_reflective_dll C:\Windows\system\qqszmRM.exe cobalt_reflective_dll \Windows\system\SakvLoG.exe cobalt_reflective_dll C:\Windows\system\uxeNmsr.exe cobalt_reflective_dll C:\Windows\system\UxKjqMy.exe cobalt_reflective_dll C:\Windows\system\JiconVF.exe cobalt_reflective_dll C:\Windows\system\JtmyZXp.exe cobalt_reflective_dll C:\Windows\system\PBJJhyO.exe cobalt_reflective_dll C:\Windows\system\OtGfaoq.exe cobalt_reflective_dll C:\Windows\system\RyAswko.exe cobalt_reflective_dll C:\Windows\system\uYZsEZD.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\UMApVzY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WorrhJA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WlAlrfl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\BzGiuTe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\vnwhKsn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\INjvExI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\BFNIIRe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\mTjtDkp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qbObIWk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\almzEcM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\YlBKhZn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qqszmRM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\SakvLoG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\uxeNmsr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\UxKjqMy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\JiconVF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\JtmyZXp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\PBJJhyO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\OtGfaoq.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\RyAswko.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\uYZsEZD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/1152-0-0x000000013FF70000-0x00000001402C1000-memory.dmp UPX \Windows\system\UMApVzY.exe UPX C:\Windows\system\WorrhJA.exe UPX C:\Windows\system\WlAlrfl.exe UPX behavioral1/memory/2820-25-0x000000013F300000-0x000000013F651000-memory.dmp UPX C:\Windows\system\BzGiuTe.exe UPX C:\Windows\system\vnwhKsn.exe UPX behavioral1/memory/1648-44-0x000000013F6A0000-0x000000013F9F1000-memory.dmp UPX behavioral1/memory/1152-43-0x0000000002530000-0x0000000002881000-memory.dmp UPX behavioral1/memory/2276-42-0x000000013F3C0000-0x000000013F711000-memory.dmp UPX \Windows\system\INjvExI.exe UPX behavioral1/memory/2876-28-0x000000013F6F0000-0x000000013FA41000-memory.dmp UPX C:\Windows\system\BFNIIRe.exe UPX behavioral1/memory/2252-15-0x000000013FBC0000-0x000000013FF11000-memory.dmp UPX behavioral1/memory/2228-13-0x000000013F760000-0x000000013FAB1000-memory.dmp UPX behavioral1/memory/1152-51-0x000000013F740000-0x000000013FA91000-memory.dmp UPX behavioral1/memory/2912-52-0x000000013FF40000-0x0000000140291000-memory.dmp UPX \Windows\system\mTjtDkp.exe UPX behavioral1/memory/1152-68-0x000000013FF70000-0x00000001402C1000-memory.dmp UPX C:\Windows\system\qbObIWk.exe UPX behavioral1/memory/2604-75-0x000000013F740000-0x000000013FA91000-memory.dmp UPX C:\Windows\system\almzEcM.exe UPX behavioral1/memory/2484-85-0x000000013F910000-0x000000013FC61000-memory.dmp UPX behavioral1/memory/2820-89-0x000000013F300000-0x000000013F651000-memory.dmp UPX behavioral1/memory/2768-87-0x000000013FC50000-0x000000013FFA1000-memory.dmp UPX \Windows\system\YlBKhZn.exe UPX C:\Windows\system\qqszmRM.exe UPX \Windows\system\SakvLoG.exe UPX C:\Windows\system\uxeNmsr.exe UPX C:\Windows\system\UxKjqMy.exe UPX C:\Windows\system\JiconVF.exe UPX behavioral1/memory/2396-96-0x000000013FC00000-0x000000013FF51000-memory.dmp UPX behavioral1/memory/1648-140-0x000000013F6A0000-0x000000013F9F1000-memory.dmp UPX behavioral1/memory/2876-95-0x000000013F6F0000-0x000000013FA41000-memory.dmp UPX C:\Windows\system\JtmyZXp.exe UPX C:\Windows\system\PBJJhyO.exe UPX behavioral1/memory/1152-141-0x000000013FF70000-0x00000001402C1000-memory.dmp UPX behavioral1/memory/2856-102-0x000000013FD20000-0x0000000140071000-memory.dmp UPX C:\Windows\system\OtGfaoq.exe UPX behavioral1/memory/2228-86-0x000000013F760000-0x000000013FAB1000-memory.dmp UPX behavioral1/memory/2620-84-0x000000013F760000-0x000000013FAB1000-memory.dmp UPX behavioral1/memory/2652-80-0x000000013FF90000-0x00000001402E1000-memory.dmp UPX C:\Windows\system\RyAswko.exe UPX C:\Windows\system\uYZsEZD.exe UPX behavioral1/memory/2396-153-0x000000013FC00000-0x000000013FF51000-memory.dmp UPX behavioral1/memory/1764-159-0x000000013FC70000-0x000000013FFC1000-memory.dmp UPX behavioral1/memory/1904-156-0x000000013FED0000-0x0000000140221000-memory.dmp UPX behavioral1/memory/1940-160-0x000000013F190000-0x000000013F4E1000-memory.dmp UPX behavioral1/memory/1920-161-0x000000013F970000-0x000000013FCC1000-memory.dmp UPX behavioral1/memory/1736-162-0x000000013F930000-0x000000013FC81000-memory.dmp UPX behavioral1/memory/1688-158-0x000000013F9A0000-0x000000013FCF1000-memory.dmp UPX behavioral1/memory/1092-157-0x000000013F180000-0x000000013F4D1000-memory.dmp UPX behavioral1/memory/2856-154-0x000000013FD20000-0x0000000140071000-memory.dmp UPX behavioral1/memory/1152-163-0x000000013FF70000-0x00000001402C1000-memory.dmp UPX behavioral1/memory/2768-171-0x000000013FC50000-0x000000013FFA1000-memory.dmp UPX behavioral1/memory/2252-213-0x000000013FBC0000-0x000000013FF11000-memory.dmp UPX behavioral1/memory/2228-214-0x000000013F760000-0x000000013FAB1000-memory.dmp UPX behavioral1/memory/2820-216-0x000000013F300000-0x000000013F651000-memory.dmp UPX behavioral1/memory/2876-218-0x000000013F6F0000-0x000000013FA41000-memory.dmp UPX behavioral1/memory/2276-220-0x000000013F3C0000-0x000000013F711000-memory.dmp UPX behavioral1/memory/1648-222-0x000000013F6A0000-0x000000013F9F1000-memory.dmp UPX behavioral1/memory/2912-226-0x000000013FF40000-0x0000000140291000-memory.dmp UPX behavioral1/memory/2604-228-0x000000013F740000-0x000000013FA91000-memory.dmp UPX behavioral1/memory/2652-231-0x000000013FF90000-0x00000001402E1000-memory.dmp UPX -
XMRig Miner payload 40 IoCs
Processes:
resource yara_rule behavioral1/memory/1648-44-0x000000013F6A0000-0x000000013F9F1000-memory.dmp xmrig behavioral1/memory/2276-42-0x000000013F3C0000-0x000000013F711000-memory.dmp xmrig behavioral1/memory/2252-15-0x000000013FBC0000-0x000000013FF11000-memory.dmp xmrig behavioral1/memory/2912-52-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/1152-68-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/2604-75-0x000000013F740000-0x000000013FA91000-memory.dmp xmrig behavioral1/memory/2484-85-0x000000013F910000-0x000000013FC61000-memory.dmp xmrig behavioral1/memory/2820-89-0x000000013F300000-0x000000013F651000-memory.dmp xmrig behavioral1/memory/1648-140-0x000000013F6A0000-0x000000013F9F1000-memory.dmp xmrig behavioral1/memory/2876-95-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/1152-141-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/2228-86-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/2620-84-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/2652-80-0x000000013FF90000-0x00000001402E1000-memory.dmp xmrig behavioral1/memory/2396-153-0x000000013FC00000-0x000000013FF51000-memory.dmp xmrig behavioral1/memory/1764-159-0x000000013FC70000-0x000000013FFC1000-memory.dmp xmrig behavioral1/memory/1904-156-0x000000013FED0000-0x0000000140221000-memory.dmp xmrig behavioral1/memory/1940-160-0x000000013F190000-0x000000013F4E1000-memory.dmp xmrig behavioral1/memory/1920-161-0x000000013F970000-0x000000013FCC1000-memory.dmp xmrig behavioral1/memory/1736-162-0x000000013F930000-0x000000013FC81000-memory.dmp xmrig behavioral1/memory/1688-158-0x000000013F9A0000-0x000000013FCF1000-memory.dmp xmrig behavioral1/memory/1092-157-0x000000013F180000-0x000000013F4D1000-memory.dmp xmrig behavioral1/memory/2856-154-0x000000013FD20000-0x0000000140071000-memory.dmp xmrig behavioral1/memory/1152-163-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/2768-171-0x000000013FC50000-0x000000013FFA1000-memory.dmp xmrig behavioral1/memory/1152-196-0x0000000002530000-0x0000000002881000-memory.dmp xmrig behavioral1/memory/2252-213-0x000000013FBC0000-0x000000013FF11000-memory.dmp xmrig behavioral1/memory/2228-214-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/2820-216-0x000000013F300000-0x000000013F651000-memory.dmp xmrig behavioral1/memory/2876-218-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/2276-220-0x000000013F3C0000-0x000000013F711000-memory.dmp xmrig behavioral1/memory/1648-222-0x000000013F6A0000-0x000000013F9F1000-memory.dmp xmrig behavioral1/memory/2912-226-0x000000013FF40000-0x0000000140291000-memory.dmp xmrig behavioral1/memory/2604-228-0x000000013F740000-0x000000013FA91000-memory.dmp xmrig behavioral1/memory/2652-231-0x000000013FF90000-0x00000001402E1000-memory.dmp xmrig behavioral1/memory/2484-236-0x000000013F910000-0x000000013FC61000-memory.dmp xmrig behavioral1/memory/2620-233-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/2396-242-0x000000013FC00000-0x000000013FF51000-memory.dmp xmrig behavioral1/memory/2856-244-0x000000013FD20000-0x0000000140071000-memory.dmp xmrig behavioral1/memory/2768-255-0x000000013FC50000-0x000000013FFA1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
UMApVzY.exeWorrhJA.exeWlAlrfl.exeBFNIIRe.exeBzGiuTe.exevnwhKsn.exeINjvExI.exemTjtDkp.exeuYZsEZD.exeqbObIWk.exeRyAswko.exealmzEcM.exeYlBKhZn.exeOtGfaoq.exeJiconVF.exePBJJhyO.exeJtmyZXp.exeUxKjqMy.exeuxeNmsr.exeqqszmRM.exeSakvLoG.exepid process 2228 UMApVzY.exe 2252 WorrhJA.exe 2820 WlAlrfl.exe 2876 BFNIIRe.exe 2276 BzGiuTe.exe 1648 vnwhKsn.exe 2912 INjvExI.exe 2604 mTjtDkp.exe 2620 uYZsEZD.exe 2652 qbObIWk.exe 2484 RyAswko.exe 2768 almzEcM.exe 2396 YlBKhZn.exe 2856 OtGfaoq.exe 1904 JiconVF.exe 1092 PBJJhyO.exe 1764 JtmyZXp.exe 1688 UxKjqMy.exe 1940 uxeNmsr.exe 1920 qqszmRM.exe 1736 SakvLoG.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exepid process 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/1152-0-0x000000013FF70000-0x00000001402C1000-memory.dmp upx \Windows\system\UMApVzY.exe upx C:\Windows\system\WorrhJA.exe upx C:\Windows\system\WlAlrfl.exe upx behavioral1/memory/2820-25-0x000000013F300000-0x000000013F651000-memory.dmp upx C:\Windows\system\BzGiuTe.exe upx C:\Windows\system\vnwhKsn.exe upx behavioral1/memory/1648-44-0x000000013F6A0000-0x000000013F9F1000-memory.dmp upx behavioral1/memory/1152-43-0x0000000002530000-0x0000000002881000-memory.dmp upx behavioral1/memory/2276-42-0x000000013F3C0000-0x000000013F711000-memory.dmp upx \Windows\system\INjvExI.exe upx behavioral1/memory/2876-28-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx C:\Windows\system\BFNIIRe.exe upx behavioral1/memory/2252-15-0x000000013FBC0000-0x000000013FF11000-memory.dmp upx behavioral1/memory/2228-13-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/1152-51-0x000000013F740000-0x000000013FA91000-memory.dmp upx behavioral1/memory/2912-52-0x000000013FF40000-0x0000000140291000-memory.dmp upx \Windows\system\mTjtDkp.exe upx behavioral1/memory/1152-68-0x000000013FF70000-0x00000001402C1000-memory.dmp upx C:\Windows\system\qbObIWk.exe upx behavioral1/memory/2604-75-0x000000013F740000-0x000000013FA91000-memory.dmp upx C:\Windows\system\almzEcM.exe upx behavioral1/memory/2484-85-0x000000013F910000-0x000000013FC61000-memory.dmp upx behavioral1/memory/2820-89-0x000000013F300000-0x000000013F651000-memory.dmp upx behavioral1/memory/2768-87-0x000000013FC50000-0x000000013FFA1000-memory.dmp upx \Windows\system\YlBKhZn.exe upx C:\Windows\system\qqszmRM.exe upx \Windows\system\SakvLoG.exe upx C:\Windows\system\uxeNmsr.exe upx C:\Windows\system\UxKjqMy.exe upx C:\Windows\system\JiconVF.exe upx behavioral1/memory/2396-96-0x000000013FC00000-0x000000013FF51000-memory.dmp upx behavioral1/memory/1648-140-0x000000013F6A0000-0x000000013F9F1000-memory.dmp upx behavioral1/memory/2876-95-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx C:\Windows\system\JtmyZXp.exe upx C:\Windows\system\PBJJhyO.exe upx behavioral1/memory/1152-141-0x000000013FF70000-0x00000001402C1000-memory.dmp upx behavioral1/memory/2856-102-0x000000013FD20000-0x0000000140071000-memory.dmp upx C:\Windows\system\OtGfaoq.exe upx behavioral1/memory/2228-86-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/2620-84-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/2652-80-0x000000013FF90000-0x00000001402E1000-memory.dmp upx C:\Windows\system\RyAswko.exe upx C:\Windows\system\uYZsEZD.exe upx behavioral1/memory/2396-153-0x000000013FC00000-0x000000013FF51000-memory.dmp upx behavioral1/memory/1764-159-0x000000013FC70000-0x000000013FFC1000-memory.dmp upx behavioral1/memory/1904-156-0x000000013FED0000-0x0000000140221000-memory.dmp upx behavioral1/memory/1940-160-0x000000013F190000-0x000000013F4E1000-memory.dmp upx behavioral1/memory/1920-161-0x000000013F970000-0x000000013FCC1000-memory.dmp upx behavioral1/memory/1736-162-0x000000013F930000-0x000000013FC81000-memory.dmp upx behavioral1/memory/1688-158-0x000000013F9A0000-0x000000013FCF1000-memory.dmp upx behavioral1/memory/1092-157-0x000000013F180000-0x000000013F4D1000-memory.dmp upx behavioral1/memory/2856-154-0x000000013FD20000-0x0000000140071000-memory.dmp upx behavioral1/memory/1152-163-0x000000013FF70000-0x00000001402C1000-memory.dmp upx behavioral1/memory/2768-171-0x000000013FC50000-0x000000013FFA1000-memory.dmp upx behavioral1/memory/2252-213-0x000000013FBC0000-0x000000013FF11000-memory.dmp upx behavioral1/memory/2228-214-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/2820-216-0x000000013F300000-0x000000013F651000-memory.dmp upx behavioral1/memory/2876-218-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/memory/2276-220-0x000000013F3C0000-0x000000013F711000-memory.dmp upx behavioral1/memory/1648-222-0x000000013F6A0000-0x000000013F9F1000-memory.dmp upx behavioral1/memory/2912-226-0x000000013FF40000-0x0000000140291000-memory.dmp upx behavioral1/memory/2604-228-0x000000013F740000-0x000000013FA91000-memory.dmp upx behavioral1/memory/2652-231-0x000000013FF90000-0x00000001402E1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\vnwhKsn.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RyAswko.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\JiconVF.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\uxeNmsr.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\UMApVzY.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\BzGiuTe.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\YlBKhZn.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\OtGfaoq.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qqszmRM.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\WorrhJA.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\WlAlrfl.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\INjvExI.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\uYZsEZD.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qbObIWk.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\JtmyZXp.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\SakvLoG.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\BFNIIRe.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\mTjtDkp.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\almzEcM.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\PBJJhyO.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\UxKjqMy.exe 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exedescription pid process target process PID 1152 wrote to memory of 2228 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe UMApVzY.exe PID 1152 wrote to memory of 2228 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe UMApVzY.exe PID 1152 wrote to memory of 2228 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe UMApVzY.exe PID 1152 wrote to memory of 2252 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe WorrhJA.exe PID 1152 wrote to memory of 2252 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe WorrhJA.exe PID 1152 wrote to memory of 2252 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe WorrhJA.exe PID 1152 wrote to memory of 2820 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe WlAlrfl.exe PID 1152 wrote to memory of 2820 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe WlAlrfl.exe PID 1152 wrote to memory of 2820 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe WlAlrfl.exe PID 1152 wrote to memory of 2876 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe BFNIIRe.exe PID 1152 wrote to memory of 2876 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe BFNIIRe.exe PID 1152 wrote to memory of 2876 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe BFNIIRe.exe PID 1152 wrote to memory of 1648 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe vnwhKsn.exe PID 1152 wrote to memory of 1648 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe vnwhKsn.exe PID 1152 wrote to memory of 1648 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe vnwhKsn.exe PID 1152 wrote to memory of 2276 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe BzGiuTe.exe PID 1152 wrote to memory of 2276 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe BzGiuTe.exe PID 1152 wrote to memory of 2276 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe BzGiuTe.exe PID 1152 wrote to memory of 2912 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe INjvExI.exe PID 1152 wrote to memory of 2912 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe INjvExI.exe PID 1152 wrote to memory of 2912 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe INjvExI.exe PID 1152 wrote to memory of 2604 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe mTjtDkp.exe PID 1152 wrote to memory of 2604 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe mTjtDkp.exe PID 1152 wrote to memory of 2604 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe mTjtDkp.exe PID 1152 wrote to memory of 2484 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe RyAswko.exe PID 1152 wrote to memory of 2484 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe RyAswko.exe PID 1152 wrote to memory of 2484 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe RyAswko.exe PID 1152 wrote to memory of 2620 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe uYZsEZD.exe PID 1152 wrote to memory of 2620 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe uYZsEZD.exe PID 1152 wrote to memory of 2620 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe uYZsEZD.exe PID 1152 wrote to memory of 2768 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe almzEcM.exe PID 1152 wrote to memory of 2768 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe almzEcM.exe PID 1152 wrote to memory of 2768 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe almzEcM.exe PID 1152 wrote to memory of 2652 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe qbObIWk.exe PID 1152 wrote to memory of 2652 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe qbObIWk.exe PID 1152 wrote to memory of 2652 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe qbObIWk.exe PID 1152 wrote to memory of 2396 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe YlBKhZn.exe PID 1152 wrote to memory of 2396 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe YlBKhZn.exe PID 1152 wrote to memory of 2396 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe YlBKhZn.exe PID 1152 wrote to memory of 2856 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe OtGfaoq.exe PID 1152 wrote to memory of 2856 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe OtGfaoq.exe PID 1152 wrote to memory of 2856 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe OtGfaoq.exe PID 1152 wrote to memory of 1904 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe JiconVF.exe PID 1152 wrote to memory of 1904 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe JiconVF.exe PID 1152 wrote to memory of 1904 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe JiconVF.exe PID 1152 wrote to memory of 1092 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe PBJJhyO.exe PID 1152 wrote to memory of 1092 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe PBJJhyO.exe PID 1152 wrote to memory of 1092 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe PBJJhyO.exe PID 1152 wrote to memory of 1688 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe UxKjqMy.exe PID 1152 wrote to memory of 1688 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe UxKjqMy.exe PID 1152 wrote to memory of 1688 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe UxKjqMy.exe PID 1152 wrote to memory of 1764 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe JtmyZXp.exe PID 1152 wrote to memory of 1764 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe JtmyZXp.exe PID 1152 wrote to memory of 1764 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe JtmyZXp.exe PID 1152 wrote to memory of 1940 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe uxeNmsr.exe PID 1152 wrote to memory of 1940 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe uxeNmsr.exe PID 1152 wrote to memory of 1940 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe uxeNmsr.exe PID 1152 wrote to memory of 1920 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe qqszmRM.exe PID 1152 wrote to memory of 1920 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe qqszmRM.exe PID 1152 wrote to memory of 1920 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe qqszmRM.exe PID 1152 wrote to memory of 1736 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe SakvLoG.exe PID 1152 wrote to memory of 1736 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe SakvLoG.exe PID 1152 wrote to memory of 1736 1152 2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe SakvLoG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-20_ff125116f134e5a9eb784c333d90bdad_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\UMApVzY.exeC:\Windows\System\UMApVzY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WorrhJA.exeC:\Windows\System\WorrhJA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WlAlrfl.exeC:\Windows\System\WlAlrfl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BFNIIRe.exeC:\Windows\System\BFNIIRe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vnwhKsn.exeC:\Windows\System\vnwhKsn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BzGiuTe.exeC:\Windows\System\BzGiuTe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\INjvExI.exeC:\Windows\System\INjvExI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mTjtDkp.exeC:\Windows\System\mTjtDkp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RyAswko.exeC:\Windows\System\RyAswko.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uYZsEZD.exeC:\Windows\System\uYZsEZD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\almzEcM.exeC:\Windows\System\almzEcM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qbObIWk.exeC:\Windows\System\qbObIWk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YlBKhZn.exeC:\Windows\System\YlBKhZn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OtGfaoq.exeC:\Windows\System\OtGfaoq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JiconVF.exeC:\Windows\System\JiconVF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PBJJhyO.exeC:\Windows\System\PBJJhyO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UxKjqMy.exeC:\Windows\System\UxKjqMy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JtmyZXp.exeC:\Windows\System\JtmyZXp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uxeNmsr.exeC:\Windows\System\uxeNmsr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qqszmRM.exeC:\Windows\System\qqszmRM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SakvLoG.exeC:\Windows\System\SakvLoG.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\BFNIIRe.exeFilesize
5.2MB
MD5ebda795e1167f614b5151afc93e41350
SHA1ddbf61a336e5a6c8fbf2bb7e40031d6afdf7a96c
SHA25633c0c8837226c2b6afc14fd63121364c11187efa31bdd67619f9c4b2ba75a92e
SHA51284b79316dba51669c3d2be0ae50f76c29a71b1cad227bdc8506d30b72b0818feaeb26e90646739474ee48dbee24d46d3264417035f43d149fe1b820836bdea4a
-
C:\Windows\system\BzGiuTe.exeFilesize
5.2MB
MD5fd2faefc4a50ee5ac4ff569e69ca0ce3
SHA1c75010fdc3db483ce0092119e8abffe06adf50eb
SHA25608266933a11b2a05de66a242586bdfd6e292ba304c3f4de67f12c7720134a256
SHA5125aa2019cb667de584ff85f32ae8650883ce137fa8dc8845784f60a5dec6be464794ed4d11a5b2b9604bdd8ce40982f80184b3d8f861e0f7bc9b5e66e6f434abd
-
C:\Windows\system\JiconVF.exeFilesize
5.2MB
MD50a1323b72b4bcb7f82dd986f35bc24ee
SHA102adc4ad8f69a97879e86d378d1bc8df1feaf192
SHA256e8352cfc91257eacd2908862a53564179cc993b4febc4ddb622f4972924d2428
SHA512810fe3a2f45cbb5a6b469b9e335fe6155e6ecec81587f2b3d093aeeabbdb3358bfb4a3ea458e79cd1733dd4ba439f7db6a7c2a8b4de16fc474bd1caa4f5644c2
-
C:\Windows\system\JtmyZXp.exeFilesize
5.2MB
MD50a1cc19bca9071260e8c6547e4b0554d
SHA1814f5e8211aeb932b2045a8e40e6058027fbccef
SHA256c55128ed250af8db77007195236ae5fe67a8985599e1e4cacd450e91a7a70121
SHA512a8b79eb79cd126e3d8b5f12b5e2a3dd390b14c178f7fe0ecf6203fb00354b0a1a48f5302c3e1b3202a6ca715a9768dd26a81ed03c9f3664b64a9bc1d7812b4e3
-
C:\Windows\system\OtGfaoq.exeFilesize
5.2MB
MD568e69df72b16edaaa62808dfd8b63a41
SHA1bc44897bc434bff44a98dad202b7fec1fbbdfaad
SHA25639528569ada4aac08f47c99a55c1a72c99a26a9df411444271eb9aef54217ec6
SHA512a02777c30a5c483d17602d39927a55f850f4fedc2c97f2b61f937d92ec975da5e77191f91bce6cdf32c15b315024425695611993e0268995abd5b7312f3194d7
-
C:\Windows\system\PBJJhyO.exeFilesize
5.2MB
MD539541532c32fcf2f6e3c7ca5edf1bf01
SHA1311f67aea0e883d7509ee4c9cb3f1cb6a194c8a2
SHA2568ffd73403332c2dad76fd054aa915d328ead8dac8e76f501d8394bdfb127dfe8
SHA512c150983ec0c8453cc34875b9e86653ede3a330bf27762bb7de8cc13c728fb8f527928e6de002cd09ba6683064f7147242a3db4400c46fec50b5dfa11a2fa82e8
-
C:\Windows\system\RyAswko.exeFilesize
5.2MB
MD566ceb16f1d9f22fc511b4cb7e611854d
SHA11381c62f15889a0a9d1c653b3a99eda6e932daf1
SHA256a7eabf071b5a3ba0f2b5850fe094eb45d30479d76b94de3ea18af846d937fe4a
SHA51201f0a289b2089be8afa87298fab6a665458f3b71332cd996c7ca4e1261bac83150d538baf1a0bcf4f04bfddb77a57aa1de69712dded74c72f91ebf74ba750d42
-
C:\Windows\system\UxKjqMy.exeFilesize
5.2MB
MD52cfb19edefe9d9b0d8255f063b4e36a9
SHA19017f8749169a38b26b520b7eaa24ddb47bca672
SHA2565411a312ad569ea8989183e5d63c85ab26e9e476fc6690175c3fd13def4344ab
SHA5124febf7a32bb3f02dc5542baf72a85522294268af3ddbbec0eb0991253fa91c20ff092c0e1eaddd2c06d2bc25aa19dd6f7ebc028883f5a5273d46367b742c0330
-
C:\Windows\system\WlAlrfl.exeFilesize
5.2MB
MD5bd1e043935018e125fe792e0ddab8f01
SHA1c14c8e39aea7c7a13a37d05c17556aec89616242
SHA25640d32d33b0ff03cc8e0c75b8149b1be6ee88577e8556b0dbd8dd7475ef159fe1
SHA5123739c1aeade035a1134d6734b511a3248ab7f56eb39cae3f48543bcdaa45ce86462f723e536e47a5e4b132ab2739212cf155b0ff1fb6408687ffb46d8047c0cf
-
C:\Windows\system\WorrhJA.exeFilesize
5.2MB
MD513a1e2f99d8db019d4397d1d1a94dd35
SHA10a6c8f9f925ba81c5ea7584f8766f9e20f42087b
SHA2568e807ee5810ff89b5bac272ae7cb2a10b3826d9c26f00e397b247d0e70acade0
SHA512963bd971cf7dcab8308ca266ccd3cb5b45097060746fdd5940443addb77d5a0c4639a888d8c9af0254d5cff879a709c40d2d0cd7d60342478fc50e9de443d206
-
C:\Windows\system\almzEcM.exeFilesize
5.2MB
MD5851427d043382f57c481a80fa8315087
SHA1c16b37bd45f5ab0a3f7b8ca1ba11ce7677bdc673
SHA256a1b20e03e9170c92b59200864281950030a7d67d8996710e900271c6f2cac23b
SHA5122ca9f2d73c0acd8f8df5c1e870a7dcd0748bbbf0096d4bf0bb2cbdf6d7d5922a651c399e2043a6266a9e7a436b59c273ba0de4ed89406fccbe5799877e615e64
-
C:\Windows\system\qbObIWk.exeFilesize
5.2MB
MD517da0dc2f0c31d5815d07daf074db22f
SHA144104a9a43a026095e48f7455d71dce65d26ceb6
SHA2560567ae61bc93572e83f34bb3bcc5f6f84fcec9dbebc8ef4adb926ffadd1a4574
SHA5128ef9830ff525db0a3befa5a45856d5a2352e053829c1504d04fd2c09db1a01920c998c621d1c77457362c099e459a055690989b12e72dbcb97bfea701f4ac7b7
-
C:\Windows\system\qqszmRM.exeFilesize
5.2MB
MD58df2529521dad49b8ec607365c4bf7bd
SHA16247156bcba7c0e35aaa18df7abb9840d15f662c
SHA25645d1812d723e0fab8b0d33f7944866834b5e15a58f14584c27cb975fdd6c016f
SHA512eda52be0985f4e650911e829c8caf9f6db2cc96f1e03b1b6432651399fd77676a4a0808247dddacbf2bc021ec5f04a7d67218f9e791159f2cbf8d9a2ed262c0b
-
C:\Windows\system\uYZsEZD.exeFilesize
5.2MB
MD5660a327fb0a866bf026e5dba7a8c0b35
SHA14d7695f3c4b6a7114278021b417c0877fb12cec6
SHA2561e28bad61425954335e64f74a61ad7ee473c19687966166c25a8fe06344ae4cc
SHA5129d38fce2fec3f3ceda5bdbd4f9530b03a007e97bbf3878e87dc8e29094e244886b23740298293138c27cdbcb87342727461d63c057608adc876d4fb1ced2f769
-
C:\Windows\system\uxeNmsr.exeFilesize
5.2MB
MD5e5aa20595659ca6e534b21eb1035fb08
SHA102bb0d0f3d7abb53eabcb0a46d87a90d82c78aaa
SHA256988c93a5244e220e2c05a9c0e8fe4754f665f1040cde7265881f26a7c7107dbb
SHA51212ac1fcc2eeebcedb91d1a96b31446c724756219250790ca1e4e1fbe209b5442e43202ff3becc6e60cac861a4c64f6b0209fe1a88dc57bcb60a09dc3269dd34a
-
C:\Windows\system\vnwhKsn.exeFilesize
5.2MB
MD573f978e4087b9a62b7c8bd28a1f3fe39
SHA17eb794f619c84a2a4e04707f96baf84375d18dd3
SHA2568fc1549f57c5d80c3836ae067caf03afbcae781bc51a0ae32100f92edaa84407
SHA512c03f844ac7f869e5361d5c56c5db74e5c0d5dac8cba5d1d40338970aba4d28cf8262f13981729368df62a487ddfb79f40812b05d9f37a00bbc0d8dae62a29b2e
-
\Windows\system\INjvExI.exeFilesize
5.2MB
MD53b37b24284fbef29771635437b1464f9
SHA15b8eebb5be33a3d1314b88c90533307462d26fcf
SHA25621d77f4f6f5f966e4bdac0323b6b0c1ed46df7d9541ff15e4b6c01661cfd978d
SHA512e816f4482ee707bd5adb35c02e06b58db0df696b56563548e466f8e9d9f6a9c9582bd08f56bfc2d3b065f24c82b1052eca18f156d0f7564a232881ec4b3202be
-
\Windows\system\SakvLoG.exeFilesize
5.2MB
MD59233e764b78b2c7613719fefdfdf9856
SHA12e6cb25a34b30a96d4a4156f3a6ae076d039a50e
SHA256f6bd94419180e58f575b8b371154d9b27a53cbc0bd0fcc5e5ffeb125c2ce94d1
SHA5120b88b9eaff477fa62a3a60a5220da455815d677cd31bf6516cdb85943879059d0c26da887bc260f53943a2992f26712595f2d637d2d34c1a04c46631030cdb26
-
\Windows\system\UMApVzY.exeFilesize
5.2MB
MD5a3347b27c80610747d50046192a79fef
SHA172e203379c99be3df4c301e343aa50007fe03ca8
SHA256c6c01e6143961c106a6b0b5b32116482f1687c8ab8a311aa6813f9376ea5fd9b
SHA512560d064042d01e29076e8618b79a4a5408aaa132f3cec44120f800672878b5d7bd8aed98222d63b8e5d8f1c03d92b4649a14ef324cfebfe1e153a8d7830efda2
-
\Windows\system\YlBKhZn.exeFilesize
5.2MB
MD5137588af73b60c96ae80ffa79cf444c4
SHA1d31e0252ba670247d35a54c9df1fd2d7b60cd54a
SHA256561e4d04b9833315dc41d2ec1b9d967e0d29ac30da27977deadddb7ef249a0ae
SHA512149ef396b2887460492ffa79a659232949236637da3a5a207d79f8e741fded9a53e279b6b6c1b3eb10d3b835ffa0ef66d9644a02cafd889955e9a7ba41916fb0
-
\Windows\system\mTjtDkp.exeFilesize
5.2MB
MD5ea21752cda4fe5a093f0991c4b2f0dad
SHA1f85c5751282f310ea3c27b1f90397b1adca2fc6d
SHA2569317487283159782deae9b888ff845cbf4d6d533225ac201624f4e50e65d63d8
SHA5121894e579e70d55f09589486343371ee26ac5bc0aa6b2c578e917cc9d888cfea1f270cc630b66b8d34bae7c40c58325e03b02d47cbe5b59f0666eccd8e4459c55
-
memory/1092-157-0x000000013F180000-0x000000013F4D1000-memory.dmpFilesize
3.3MB
-
memory/1152-196-0x0000000002530000-0x0000000002881000-memory.dmpFilesize
3.3MB
-
memory/1152-41-0x000000013F3C0000-0x000000013F711000-memory.dmpFilesize
3.3MB
-
memory/1152-68-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/1152-163-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/1152-76-0x000000013F910000-0x000000013FC61000-memory.dmpFilesize
3.3MB
-
memory/1152-78-0x0000000002530000-0x0000000002881000-memory.dmpFilesize
3.3MB
-
memory/1152-79-0x0000000002530000-0x0000000002881000-memory.dmpFilesize
3.3MB
-
memory/1152-81-0x000000013F760000-0x000000013FAB1000-memory.dmpFilesize
3.3MB
-
memory/1152-180-0x000000013FC00000-0x000000013FF51000-memory.dmpFilesize
3.3MB
-
memory/1152-1-0x00000000002F0000-0x0000000000300000-memory.dmpFilesize
64KB
-
memory/1152-88-0x000000013FBC0000-0x000000013FF11000-memory.dmpFilesize
3.3MB
-
memory/1152-0-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/1152-14-0x000000013FBC0000-0x000000013FF11000-memory.dmpFilesize
3.3MB
-
memory/1152-101-0x0000000002530000-0x0000000002881000-memory.dmpFilesize
3.3MB
-
memory/1152-195-0x0000000002530000-0x0000000002881000-memory.dmpFilesize
3.3MB
-
memory/1152-51-0x000000013F740000-0x000000013FA91000-memory.dmpFilesize
3.3MB
-
memory/1152-82-0x000000013F760000-0x000000013FAB1000-memory.dmpFilesize
3.3MB
-
memory/1152-43-0x0000000002530000-0x0000000002881000-memory.dmpFilesize
3.3MB
-
memory/1152-141-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/1152-35-0x000000013F6A0000-0x000000013F9F1000-memory.dmpFilesize
3.3MB
-
memory/1152-106-0x0000000002530000-0x0000000002881000-memory.dmpFilesize
3.3MB
-
memory/1152-22-0x000000013F300000-0x000000013F651000-memory.dmpFilesize
3.3MB
-
memory/1152-92-0x000000013FC00000-0x000000013FF51000-memory.dmpFilesize
3.3MB
-
memory/1152-27-0x000000013F6F0000-0x000000013FA41000-memory.dmpFilesize
3.3MB
-
memory/1648-140-0x000000013F6A0000-0x000000013F9F1000-memory.dmpFilesize
3.3MB
-
memory/1648-222-0x000000013F6A0000-0x000000013F9F1000-memory.dmpFilesize
3.3MB
-
memory/1648-44-0x000000013F6A0000-0x000000013F9F1000-memory.dmpFilesize
3.3MB
-
memory/1688-158-0x000000013F9A0000-0x000000013FCF1000-memory.dmpFilesize
3.3MB
-
memory/1736-162-0x000000013F930000-0x000000013FC81000-memory.dmpFilesize
3.3MB
-
memory/1764-159-0x000000013FC70000-0x000000013FFC1000-memory.dmpFilesize
3.3MB
-
memory/1904-156-0x000000013FED0000-0x0000000140221000-memory.dmpFilesize
3.3MB
-
memory/1920-161-0x000000013F970000-0x000000013FCC1000-memory.dmpFilesize
3.3MB
-
memory/1940-160-0x000000013F190000-0x000000013F4E1000-memory.dmpFilesize
3.3MB
-
memory/2228-214-0x000000013F760000-0x000000013FAB1000-memory.dmpFilesize
3.3MB
-
memory/2228-86-0x000000013F760000-0x000000013FAB1000-memory.dmpFilesize
3.3MB
-
memory/2228-13-0x000000013F760000-0x000000013FAB1000-memory.dmpFilesize
3.3MB
-
memory/2252-15-0x000000013FBC0000-0x000000013FF11000-memory.dmpFilesize
3.3MB
-
memory/2252-213-0x000000013FBC0000-0x000000013FF11000-memory.dmpFilesize
3.3MB
-
memory/2276-42-0x000000013F3C0000-0x000000013F711000-memory.dmpFilesize
3.3MB
-
memory/2276-220-0x000000013F3C0000-0x000000013F711000-memory.dmpFilesize
3.3MB
-
memory/2396-96-0x000000013FC00000-0x000000013FF51000-memory.dmpFilesize
3.3MB
-
memory/2396-242-0x000000013FC00000-0x000000013FF51000-memory.dmpFilesize
3.3MB
-
memory/2396-153-0x000000013FC00000-0x000000013FF51000-memory.dmpFilesize
3.3MB
-
memory/2484-236-0x000000013F910000-0x000000013FC61000-memory.dmpFilesize
3.3MB
-
memory/2484-85-0x000000013F910000-0x000000013FC61000-memory.dmpFilesize
3.3MB
-
memory/2604-228-0x000000013F740000-0x000000013FA91000-memory.dmpFilesize
3.3MB
-
memory/2604-75-0x000000013F740000-0x000000013FA91000-memory.dmpFilesize
3.3MB
-
memory/2620-84-0x000000013F760000-0x000000013FAB1000-memory.dmpFilesize
3.3MB
-
memory/2620-233-0x000000013F760000-0x000000013FAB1000-memory.dmpFilesize
3.3MB
-
memory/2652-80-0x000000013FF90000-0x00000001402E1000-memory.dmpFilesize
3.3MB
-
memory/2652-231-0x000000013FF90000-0x00000001402E1000-memory.dmpFilesize
3.3MB
-
memory/2768-171-0x000000013FC50000-0x000000013FFA1000-memory.dmpFilesize
3.3MB
-
memory/2768-255-0x000000013FC50000-0x000000013FFA1000-memory.dmpFilesize
3.3MB
-
memory/2768-87-0x000000013FC50000-0x000000013FFA1000-memory.dmpFilesize
3.3MB
-
memory/2820-89-0x000000013F300000-0x000000013F651000-memory.dmpFilesize
3.3MB
-
memory/2820-216-0x000000013F300000-0x000000013F651000-memory.dmpFilesize
3.3MB
-
memory/2820-25-0x000000013F300000-0x000000013F651000-memory.dmpFilesize
3.3MB
-
memory/2856-154-0x000000013FD20000-0x0000000140071000-memory.dmpFilesize
3.3MB
-
memory/2856-102-0x000000013FD20000-0x0000000140071000-memory.dmpFilesize
3.3MB
-
memory/2856-244-0x000000013FD20000-0x0000000140071000-memory.dmpFilesize
3.3MB
-
memory/2876-218-0x000000013F6F0000-0x000000013FA41000-memory.dmpFilesize
3.3MB
-
memory/2876-95-0x000000013F6F0000-0x000000013FA41000-memory.dmpFilesize
3.3MB
-
memory/2876-28-0x000000013F6F0000-0x000000013FA41000-memory.dmpFilesize
3.3MB
-
memory/2912-226-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB
-
memory/2912-52-0x000000013FF40000-0x0000000140291000-memory.dmpFilesize
3.3MB