Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 01:44
Behavioral task
behavioral1
Sample
2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe
Resource
win7-20240220-en
General
-
Target
2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe
-
Size
6.0MB
-
MD5
06f4de71f83e67abee02b8cd5e0467aa
-
SHA1
bd8eff3080ccc5b0d74421993e0f1dc15e0a036c
-
SHA256
5a4dd42687135133c0b1a500be7280b201a16183d373c65ff8db3236337dc90f
-
SHA512
154a33d27fef1653d8a3d0f6ef281c1393129e6365c2920d6a23dc05dd5f66f20b8506da3a822422b379ed3ba15dd91563ffa21d25ed6b005325ae77c452767b
-
SSDEEP
98304:demTLkNdfE0pZ3656utgpPFotBER/mQ32lUp:E+v56utgpPF8u/7p
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\RbeHyZU.exe cobalt_reflective_dll \Windows\system\XjQGNBS.exe cobalt_reflective_dll C:\Windows\system\DpPElcF.exe cobalt_reflective_dll \Windows\system\SbZAhzE.exe cobalt_reflective_dll \Windows\system\fEWqnPV.exe cobalt_reflective_dll \Windows\system\bjGnaBG.exe cobalt_reflective_dll C:\Windows\system\NMzMHaJ.exe cobalt_reflective_dll C:\Windows\system\jCvqNHD.exe cobalt_reflective_dll C:\Windows\system\iTYPfGN.exe cobalt_reflective_dll C:\Windows\system\iGOjQLI.exe cobalt_reflective_dll C:\Windows\system\ftOUaxM.exe cobalt_reflective_dll C:\Windows\system\thWYgwm.exe cobalt_reflective_dll C:\Windows\system\FbciQHE.exe cobalt_reflective_dll \Windows\system\aUBExrV.exe cobalt_reflective_dll C:\Windows\system\gcoHeAc.exe cobalt_reflective_dll C:\Windows\system\IxGlbON.exe cobalt_reflective_dll C:\Windows\system\QchQYKJ.exe cobalt_reflective_dll \Windows\system\TrWJSEm.exe cobalt_reflective_dll C:\Windows\system\ncHMiDf.exe cobalt_reflective_dll C:\Windows\system\cKfOQmM.exe cobalt_reflective_dll C:\Windows\system\qbtJDES.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\RbeHyZU.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\XjQGNBS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\DpPElcF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\SbZAhzE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\fEWqnPV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\bjGnaBG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\NMzMHaJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\jCvqNHD.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\iTYPfGN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\iGOjQLI.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ftOUaxM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\thWYgwm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\FbciQHE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\aUBExrV.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\gcoHeAc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\IxGlbON.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\QchQYKJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\TrWJSEm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ncHMiDf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cKfOQmM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qbtJDES.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 53 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-0-0x000000013FE90000-0x00000001401E4000-memory.dmp UPX \Windows\system\RbeHyZU.exe UPX \Windows\system\XjQGNBS.exe UPX C:\Windows\system\DpPElcF.exe UPX behavioral1/memory/2204-21-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX behavioral1/memory/2516-20-0x000000013F7E0000-0x000000013FB34000-memory.dmp UPX behavioral1/memory/2532-22-0x000000013F6F0000-0x000000013FA44000-memory.dmp UPX \Windows\system\SbZAhzE.exe UPX behavioral1/memory/2548-30-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX \Windows\system\fEWqnPV.exe UPX \Windows\system\bjGnaBG.exe UPX behavioral1/memory/2608-48-0x000000013FBA0000-0x000000013FEF4000-memory.dmp UPX behavioral1/memory/2464-50-0x000000013FFA0000-0x00000001402F4000-memory.dmp UPX C:\Windows\system\NMzMHaJ.exe UPX behavioral1/memory/1728-45-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX C:\Windows\system\jCvqNHD.exe UPX behavioral1/memory/2420-56-0x000000013FC60000-0x000000013FFB4000-memory.dmp UPX behavioral1/memory/1508-64-0x000000013FE90000-0x00000001401E4000-memory.dmp UPX C:\Windows\system\iTYPfGN.exe UPX behavioral1/memory/2592-65-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX C:\Windows\system\iGOjQLI.exe UPX behavioral1/memory/1748-69-0x000000013F450000-0x000000013F7A4000-memory.dmp UPX C:\Windows\system\ftOUaxM.exe UPX behavioral1/memory/1708-78-0x000000013F160000-0x000000013F4B4000-memory.dmp UPX C:\Windows\system\thWYgwm.exe UPX behavioral1/memory/2652-85-0x000000013F130000-0x000000013F484000-memory.dmp UPX C:\Windows\system\FbciQHE.exe UPX \Windows\system\aUBExrV.exe UPX behavioral1/memory/2340-99-0x000000013F920000-0x000000013FC74000-memory.dmp UPX behavioral1/memory/2304-92-0x000000013F310000-0x000000013F664000-memory.dmp UPX C:\Windows\system\gcoHeAc.exe UPX C:\Windows\system\IxGlbON.exe UPX C:\Windows\system\QchQYKJ.exe UPX \Windows\system\TrWJSEm.exe UPX C:\Windows\system\ncHMiDf.exe UPX C:\Windows\system\cKfOQmM.exe UPX C:\Windows\system\qbtJDES.exe UPX behavioral1/memory/2420-135-0x000000013FC60000-0x000000013FFB4000-memory.dmp UPX behavioral1/memory/1748-137-0x000000013F450000-0x000000013F7A4000-memory.dmp UPX behavioral1/memory/2516-144-0x000000013F7E0000-0x000000013FB34000-memory.dmp UPX behavioral1/memory/2532-143-0x000000013F6F0000-0x000000013FA44000-memory.dmp UPX behavioral1/memory/2204-145-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX behavioral1/memory/2548-146-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX behavioral1/memory/1728-147-0x000000013F2C0000-0x000000013F614000-memory.dmp UPX behavioral1/memory/2608-148-0x000000013FBA0000-0x000000013FEF4000-memory.dmp UPX behavioral1/memory/2464-149-0x000000013FFA0000-0x00000001402F4000-memory.dmp UPX behavioral1/memory/2420-150-0x000000013FC60000-0x000000013FFB4000-memory.dmp UPX behavioral1/memory/2592-151-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX behavioral1/memory/1748-152-0x000000013F450000-0x000000013F7A4000-memory.dmp UPX behavioral1/memory/1708-153-0x000000013F160000-0x000000013F4B4000-memory.dmp UPX behavioral1/memory/2652-154-0x000000013F130000-0x000000013F484000-memory.dmp UPX behavioral1/memory/2304-155-0x000000013F310000-0x000000013F664000-memory.dmp UPX behavioral1/memory/2340-156-0x000000013F920000-0x000000013FC74000-memory.dmp UPX -
XMRig Miner payload 58 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-0-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig \Windows\system\RbeHyZU.exe xmrig \Windows\system\XjQGNBS.exe xmrig C:\Windows\system\DpPElcF.exe xmrig behavioral1/memory/2204-21-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2516-20-0x000000013F7E0000-0x000000013FB34000-memory.dmp xmrig behavioral1/memory/1508-23-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2532-22-0x000000013F6F0000-0x000000013FA44000-memory.dmp xmrig \Windows\system\SbZAhzE.exe xmrig behavioral1/memory/2548-30-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig \Windows\system\fEWqnPV.exe xmrig \Windows\system\bjGnaBG.exe xmrig behavioral1/memory/2608-48-0x000000013FBA0000-0x000000013FEF4000-memory.dmp xmrig behavioral1/memory/1508-49-0x0000000002310000-0x0000000002664000-memory.dmp xmrig behavioral1/memory/2464-50-0x000000013FFA0000-0x00000001402F4000-memory.dmp xmrig C:\Windows\system\NMzMHaJ.exe xmrig behavioral1/memory/1728-45-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig C:\Windows\system\jCvqNHD.exe xmrig behavioral1/memory/2420-56-0x000000013FC60000-0x000000013FFB4000-memory.dmp xmrig behavioral1/memory/1508-64-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig C:\Windows\system\iTYPfGN.exe xmrig behavioral1/memory/2592-65-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig C:\Windows\system\iGOjQLI.exe xmrig behavioral1/memory/1748-69-0x000000013F450000-0x000000013F7A4000-memory.dmp xmrig behavioral1/memory/1508-77-0x000000013F160000-0x000000013F4B4000-memory.dmp xmrig C:\Windows\system\ftOUaxM.exe xmrig behavioral1/memory/1708-78-0x000000013F160000-0x000000013F4B4000-memory.dmp xmrig C:\Windows\system\thWYgwm.exe xmrig behavioral1/memory/2652-85-0x000000013F130000-0x000000013F484000-memory.dmp xmrig C:\Windows\system\FbciQHE.exe xmrig \Windows\system\aUBExrV.exe xmrig behavioral1/memory/2340-99-0x000000013F920000-0x000000013FC74000-memory.dmp xmrig behavioral1/memory/2304-92-0x000000013F310000-0x000000013F664000-memory.dmp xmrig C:\Windows\system\gcoHeAc.exe xmrig C:\Windows\system\IxGlbON.exe xmrig C:\Windows\system\QchQYKJ.exe xmrig \Windows\system\TrWJSEm.exe xmrig C:\Windows\system\ncHMiDf.exe xmrig C:\Windows\system\cKfOQmM.exe xmrig C:\Windows\system\qbtJDES.exe xmrig behavioral1/memory/2420-135-0x000000013FC60000-0x000000013FFB4000-memory.dmp xmrig behavioral1/memory/1508-138-0x000000013F160000-0x000000013F4B4000-memory.dmp xmrig behavioral1/memory/1748-137-0x000000013F450000-0x000000013F7A4000-memory.dmp xmrig behavioral1/memory/1508-141-0x000000013F920000-0x000000013FC74000-memory.dmp xmrig behavioral1/memory/2516-144-0x000000013F7E0000-0x000000013FB34000-memory.dmp xmrig behavioral1/memory/2532-143-0x000000013F6F0000-0x000000013FA44000-memory.dmp xmrig behavioral1/memory/2204-145-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2548-146-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig behavioral1/memory/1728-147-0x000000013F2C0000-0x000000013F614000-memory.dmp xmrig behavioral1/memory/2608-148-0x000000013FBA0000-0x000000013FEF4000-memory.dmp xmrig behavioral1/memory/2464-149-0x000000013FFA0000-0x00000001402F4000-memory.dmp xmrig behavioral1/memory/2420-150-0x000000013FC60000-0x000000013FFB4000-memory.dmp xmrig behavioral1/memory/2592-151-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/1748-152-0x000000013F450000-0x000000013F7A4000-memory.dmp xmrig behavioral1/memory/1708-153-0x000000013F160000-0x000000013F4B4000-memory.dmp xmrig behavioral1/memory/2652-154-0x000000013F130000-0x000000013F484000-memory.dmp xmrig behavioral1/memory/2304-155-0x000000013F310000-0x000000013F664000-memory.dmp xmrig behavioral1/memory/2340-156-0x000000013F920000-0x000000013FC74000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
RbeHyZU.exeXjQGNBS.exeDpPElcF.exeSbZAhzE.exefEWqnPV.exeNMzMHaJ.exebjGnaBG.exejCvqNHD.exeiTYPfGN.exeiGOjQLI.exeftOUaxM.exethWYgwm.exeFbciQHE.exeaUBExrV.exegcoHeAc.exeIxGlbON.exeQchQYKJ.exeqbtJDES.execKfOQmM.exeTrWJSEm.exencHMiDf.exepid process 2516 RbeHyZU.exe 2204 XjQGNBS.exe 2532 DpPElcF.exe 2548 SbZAhzE.exe 1728 fEWqnPV.exe 2608 NMzMHaJ.exe 2464 bjGnaBG.exe 2420 jCvqNHD.exe 2592 iTYPfGN.exe 1748 iGOjQLI.exe 1708 ftOUaxM.exe 2652 thWYgwm.exe 2304 FbciQHE.exe 2340 aUBExrV.exe 1852 gcoHeAc.exe 1192 IxGlbON.exe 1432 QchQYKJ.exe 352 qbtJDES.exe 2120 cKfOQmM.exe 2328 TrWJSEm.exe 2332 ncHMiDf.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exepid process 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/1508-0-0x000000013FE90000-0x00000001401E4000-memory.dmp upx \Windows\system\RbeHyZU.exe upx \Windows\system\XjQGNBS.exe upx C:\Windows\system\DpPElcF.exe upx behavioral1/memory/2204-21-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2516-20-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx behavioral1/memory/2532-22-0x000000013F6F0000-0x000000013FA44000-memory.dmp upx behavioral1/memory/1508-8-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx \Windows\system\SbZAhzE.exe upx behavioral1/memory/2548-30-0x000000013F490000-0x000000013F7E4000-memory.dmp upx \Windows\system\fEWqnPV.exe upx \Windows\system\bjGnaBG.exe upx behavioral1/memory/2608-48-0x000000013FBA0000-0x000000013FEF4000-memory.dmp upx behavioral1/memory/2464-50-0x000000013FFA0000-0x00000001402F4000-memory.dmp upx C:\Windows\system\NMzMHaJ.exe upx behavioral1/memory/1728-45-0x000000013F2C0000-0x000000013F614000-memory.dmp upx C:\Windows\system\jCvqNHD.exe upx behavioral1/memory/2420-56-0x000000013FC60000-0x000000013FFB4000-memory.dmp upx behavioral1/memory/1508-64-0x000000013FE90000-0x00000001401E4000-memory.dmp upx C:\Windows\system\iTYPfGN.exe upx behavioral1/memory/2592-65-0x000000013F4F0000-0x000000013F844000-memory.dmp upx C:\Windows\system\iGOjQLI.exe upx behavioral1/memory/1748-69-0x000000013F450000-0x000000013F7A4000-memory.dmp upx C:\Windows\system\ftOUaxM.exe upx behavioral1/memory/1708-78-0x000000013F160000-0x000000013F4B4000-memory.dmp upx C:\Windows\system\thWYgwm.exe upx behavioral1/memory/2652-85-0x000000013F130000-0x000000013F484000-memory.dmp upx C:\Windows\system\FbciQHE.exe upx \Windows\system\aUBExrV.exe upx behavioral1/memory/2340-99-0x000000013F920000-0x000000013FC74000-memory.dmp upx behavioral1/memory/2304-92-0x000000013F310000-0x000000013F664000-memory.dmp upx C:\Windows\system\gcoHeAc.exe upx C:\Windows\system\IxGlbON.exe upx C:\Windows\system\QchQYKJ.exe upx \Windows\system\TrWJSEm.exe upx C:\Windows\system\ncHMiDf.exe upx C:\Windows\system\cKfOQmM.exe upx C:\Windows\system\qbtJDES.exe upx behavioral1/memory/2420-135-0x000000013FC60000-0x000000013FFB4000-memory.dmp upx behavioral1/memory/1748-137-0x000000013F450000-0x000000013F7A4000-memory.dmp upx behavioral1/memory/2516-144-0x000000013F7E0000-0x000000013FB34000-memory.dmp upx behavioral1/memory/2532-143-0x000000013F6F0000-0x000000013FA44000-memory.dmp upx behavioral1/memory/2204-145-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2548-146-0x000000013F490000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/1728-147-0x000000013F2C0000-0x000000013F614000-memory.dmp upx behavioral1/memory/2608-148-0x000000013FBA0000-0x000000013FEF4000-memory.dmp upx behavioral1/memory/2464-149-0x000000013FFA0000-0x00000001402F4000-memory.dmp upx behavioral1/memory/2420-150-0x000000013FC60000-0x000000013FFB4000-memory.dmp upx behavioral1/memory/2592-151-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/1748-152-0x000000013F450000-0x000000013F7A4000-memory.dmp upx behavioral1/memory/1708-153-0x000000013F160000-0x000000013F4B4000-memory.dmp upx behavioral1/memory/2652-154-0x000000013F130000-0x000000013F484000-memory.dmp upx behavioral1/memory/2304-155-0x000000013F310000-0x000000013F664000-memory.dmp upx behavioral1/memory/2340-156-0x000000013F920000-0x000000013FC74000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\DpPElcF.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\jCvqNHD.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RbeHyZU.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\NMzMHaJ.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\FbciQHE.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\TrWJSEm.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\SbZAhzE.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\bjGnaBG.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ftOUaxM.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\QchQYKJ.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ncHMiDf.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XjQGNBS.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\iTYPfGN.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\iGOjQLI.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\thWYgwm.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\aUBExrV.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\gcoHeAc.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\IxGlbON.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qbtJDES.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\fEWqnPV.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\cKfOQmM.exe 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exedescription pid process target process PID 1508 wrote to memory of 2516 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe RbeHyZU.exe PID 1508 wrote to memory of 2516 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe RbeHyZU.exe PID 1508 wrote to memory of 2516 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe RbeHyZU.exe PID 1508 wrote to memory of 2532 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe DpPElcF.exe PID 1508 wrote to memory of 2532 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe DpPElcF.exe PID 1508 wrote to memory of 2532 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe DpPElcF.exe PID 1508 wrote to memory of 2204 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe XjQGNBS.exe PID 1508 wrote to memory of 2204 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe XjQGNBS.exe PID 1508 wrote to memory of 2204 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe XjQGNBS.exe PID 1508 wrote to memory of 2548 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe SbZAhzE.exe PID 1508 wrote to memory of 2548 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe SbZAhzE.exe PID 1508 wrote to memory of 2548 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe SbZAhzE.exe PID 1508 wrote to memory of 1728 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe fEWqnPV.exe PID 1508 wrote to memory of 1728 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe fEWqnPV.exe PID 1508 wrote to memory of 1728 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe fEWqnPV.exe PID 1508 wrote to memory of 2608 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe NMzMHaJ.exe PID 1508 wrote to memory of 2608 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe NMzMHaJ.exe PID 1508 wrote to memory of 2608 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe NMzMHaJ.exe PID 1508 wrote to memory of 2464 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe bjGnaBG.exe PID 1508 wrote to memory of 2464 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe bjGnaBG.exe PID 1508 wrote to memory of 2464 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe bjGnaBG.exe PID 1508 wrote to memory of 2420 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe jCvqNHD.exe PID 1508 wrote to memory of 2420 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe jCvqNHD.exe PID 1508 wrote to memory of 2420 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe jCvqNHD.exe PID 1508 wrote to memory of 2592 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe iTYPfGN.exe PID 1508 wrote to memory of 2592 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe iTYPfGN.exe PID 1508 wrote to memory of 2592 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe iTYPfGN.exe PID 1508 wrote to memory of 1748 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe iGOjQLI.exe PID 1508 wrote to memory of 1748 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe iGOjQLI.exe PID 1508 wrote to memory of 1748 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe iGOjQLI.exe PID 1508 wrote to memory of 1708 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe ftOUaxM.exe PID 1508 wrote to memory of 1708 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe ftOUaxM.exe PID 1508 wrote to memory of 1708 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe ftOUaxM.exe PID 1508 wrote to memory of 2652 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe thWYgwm.exe PID 1508 wrote to memory of 2652 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe thWYgwm.exe PID 1508 wrote to memory of 2652 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe thWYgwm.exe PID 1508 wrote to memory of 2304 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe FbciQHE.exe PID 1508 wrote to memory of 2304 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe FbciQHE.exe PID 1508 wrote to memory of 2304 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe FbciQHE.exe PID 1508 wrote to memory of 2340 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe aUBExrV.exe PID 1508 wrote to memory of 2340 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe aUBExrV.exe PID 1508 wrote to memory of 2340 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe aUBExrV.exe PID 1508 wrote to memory of 1852 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe gcoHeAc.exe PID 1508 wrote to memory of 1852 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe gcoHeAc.exe PID 1508 wrote to memory of 1852 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe gcoHeAc.exe PID 1508 wrote to memory of 1192 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe IxGlbON.exe PID 1508 wrote to memory of 1192 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe IxGlbON.exe PID 1508 wrote to memory of 1192 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe IxGlbON.exe PID 1508 wrote to memory of 1432 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe QchQYKJ.exe PID 1508 wrote to memory of 1432 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe QchQYKJ.exe PID 1508 wrote to memory of 1432 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe QchQYKJ.exe PID 1508 wrote to memory of 352 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe qbtJDES.exe PID 1508 wrote to memory of 352 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe qbtJDES.exe PID 1508 wrote to memory of 352 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe qbtJDES.exe PID 1508 wrote to memory of 2120 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe cKfOQmM.exe PID 1508 wrote to memory of 2120 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe cKfOQmM.exe PID 1508 wrote to memory of 2120 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe cKfOQmM.exe PID 1508 wrote to memory of 2332 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe ncHMiDf.exe PID 1508 wrote to memory of 2332 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe ncHMiDf.exe PID 1508 wrote to memory of 2332 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe ncHMiDf.exe PID 1508 wrote to memory of 2328 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe TrWJSEm.exe PID 1508 wrote to memory of 2328 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe TrWJSEm.exe PID 1508 wrote to memory of 2328 1508 2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe TrWJSEm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_06f4de71f83e67abee02b8cd5e0467aa_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\RbeHyZU.exeC:\Windows\System\RbeHyZU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DpPElcF.exeC:\Windows\System\DpPElcF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XjQGNBS.exeC:\Windows\System\XjQGNBS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SbZAhzE.exeC:\Windows\System\SbZAhzE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fEWqnPV.exeC:\Windows\System\fEWqnPV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NMzMHaJ.exeC:\Windows\System\NMzMHaJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bjGnaBG.exeC:\Windows\System\bjGnaBG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jCvqNHD.exeC:\Windows\System\jCvqNHD.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iTYPfGN.exeC:\Windows\System\iTYPfGN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iGOjQLI.exeC:\Windows\System\iGOjQLI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ftOUaxM.exeC:\Windows\System\ftOUaxM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\thWYgwm.exeC:\Windows\System\thWYgwm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FbciQHE.exeC:\Windows\System\FbciQHE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aUBExrV.exeC:\Windows\System\aUBExrV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gcoHeAc.exeC:\Windows\System\gcoHeAc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IxGlbON.exeC:\Windows\System\IxGlbON.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\QchQYKJ.exeC:\Windows\System\QchQYKJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qbtJDES.exeC:\Windows\System\qbtJDES.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cKfOQmM.exeC:\Windows\System\cKfOQmM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ncHMiDf.exeC:\Windows\System\ncHMiDf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TrWJSEm.exeC:\Windows\System\TrWJSEm.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\DpPElcF.exeFilesize
6.0MB
MD5720b807b53da73d13b89987fa699a6a8
SHA15140011a52aab2ae25a3777c29ddd48c4a5feeaa
SHA256ac60b1b365d204bc15347e18ef06064f9624a8f2faa27d2d6247a28dd6c469c2
SHA512cadfbf3869ed2823fd686a8f8cf0716bcc902d852018803ab5c394b94d2e2773897f2fabf2e3338e40e142a6dbcb7efd10cc1c79cb19c55d1297eb074f622d3a
-
C:\Windows\system\FbciQHE.exeFilesize
6.0MB
MD56ca30fa167100cf5b9176dabc2c07265
SHA1f40391196706629b330fcf2a924ca53ef3dd39e0
SHA2560025ebf5635db1a06c614056feabe8237c16bc11db3b424721077f03f8781433
SHA5125728b250b5fcf71d5d6dee400e91552edc67ec37505fb77162b1bcec88a3af0d4dc9798c78ec65582c50ad0fe158d1237241616ae21544b26fd740c3485e1c3d
-
C:\Windows\system\IxGlbON.exeFilesize
6.0MB
MD55ef666bc1d0961207a343252a976ccce
SHA1b4331176b3595263478c0f0bb4dd2d0f9c2c33b0
SHA2566b66a88a0237d3c2ed12c434bd24deb2b33af437279e6e721b586603c3e5cc21
SHA512f7da9c05a0f89790c9d0d605df32bd568b3ddf8447b14f2954b21bd2974c0d988f9c239e31fa5dc56de479fa474613e503861377fba7a25bc4abf45d3e0bab17
-
C:\Windows\system\NMzMHaJ.exeFilesize
6.0MB
MD55a1ccda3b95bae53d6d39f39f9df9ba8
SHA19bc9896871757d77abac43f19d6e534db7c8eb0a
SHA256b016f1b231dbcfeaa2f904b213e081bbfa8622556b8ffc54df2d60390f1cbdda
SHA512eddc4286cc46b64b02d1c85b5549be2365c9180d50229d381da2c765b6ac56be385af473fc5b58d8e5c65c61d03869e4dc7b2936fd49a4cf3c42ca8d504b2333
-
C:\Windows\system\QchQYKJ.exeFilesize
6.0MB
MD5fe238a7a60c664977df543bc86056311
SHA1a4cc95e1de3ea07df398830e14c6568abe76b5a1
SHA256a76e4c19cedd3acef2f63b9b3c71a0425097c7d9ab32d40b83419556940dd778
SHA512cb70f4b3b415b90e0b2eadca3515bfdae0edaf0b961cc850246372186752223ce278efb79ce686fa2be0af9abce9b65c21c9ed74b2da3065bb887b79ef19b59d
-
C:\Windows\system\cKfOQmM.exeFilesize
6.0MB
MD55232f4ed5c3efcb74f86a1d396cc8eab
SHA1051c83daa7d5ac57245725145c4c1b99bc16f57a
SHA256fed1aa43fea1b5bb4777cf9fa28b87b3fbc17dfd11441b6297f1211e0edc4b48
SHA5128a0f669fbeaf16e7610af6fa8a1b8e9c8d274626c0be4ff6ac9da460581db33e57917e7bca520f3a6cb0c662cff3c86e1f43ee492e825c67daa63b2e6f95035b
-
C:\Windows\system\ftOUaxM.exeFilesize
6.0MB
MD53294818fedd4c73a07702d56ad777899
SHA1c54b07463b07daea8262fbb5c54ff6ec48e023f0
SHA256abff3ea77fb89e8e7f9e8b959fbe545a5ff39a80d4bb97e51f78f6910a60e60d
SHA512e1361b4bb37fa39a98031e3fa7f9df0dfbf67b92dc7b468d15bc65ced20b7d2a5e5041ccac8ca6bea57a4c2dc9f8d4209b7aeda52aac4cedf67e0fe9ca40ce34
-
C:\Windows\system\gcoHeAc.exeFilesize
6.0MB
MD51e3b45de8fbed2bddc32cb7c77725e1a
SHA1b30469bd1b8068102821e218573ebb184fdf8776
SHA256d7f974a5fdee1ef20316b6fc111341af76681b56359d1cbf534e9ee4ad11d6dc
SHA512776b223ed56f113e6cfdf9b860c968b5f03544cf5458dcb2a1ba5cc8c8c26674ad550e0576936f79c9c561082e85bf33f7a0af4b196d87aa79288cf5f919c665
-
C:\Windows\system\iGOjQLI.exeFilesize
6.0MB
MD5824b3198965bdc7eb6eec828ca47a2b2
SHA1a5abfef7f36003513786723d4c611310e42593d6
SHA256002020ca683556389e9345bea5fd5d7690c07d7ca5f9778726947f71f54c299c
SHA5126fb0bc40686d9228675da65f64f21cc9f66d3ca77c2a5e3cb7b84d5be6fec0294be6137bb6c8e91316fa7ed7934d001aa120cc8239246f2f3f1bad5e6d248c4c
-
C:\Windows\system\iTYPfGN.exeFilesize
6.0MB
MD5a4ebaf5bea5e7a9dae119cf297b2861b
SHA1fc4b731b70b1649af6e2ca6b95cef7d7354da1f1
SHA2562afe5cdd88fe26a6bb37c5ab8fd006caffa309548ed7a1314fe7c12afc57a0b6
SHA5128f099ab6450b84b2d49e7559f06dfa7f069cd843dfbb31e360f206c5dc1011358d6761c45d23448e5c079d5903ce87093df18d97f3eaf5a781b017429ae0304c
-
C:\Windows\system\jCvqNHD.exeFilesize
6.0MB
MD54c11c0d38c59175c3fbba7d1c455ea20
SHA18a214b3ed5d34a29aaba4934137f18606f73fa99
SHA2560a9190d30aadc74b7f812774e0ffc980da6d761c60ca61e283b7fe7e31636e77
SHA512ea65b27e34e0d4e497c01f3d71be7c24771c8b7c516f3e6f8e7d5ea097ee5d108dfb3e76f449ce1e9e0778df1c83e29a1c7300f741e7e0820699b62f54143ea1
-
C:\Windows\system\ncHMiDf.exeFilesize
6.0MB
MD52ca8f315eae6d4d7aa98f7680187a84a
SHA13af0200f5de69497a61d5a77808ea5b4c50be567
SHA256752977e9993df24a1791ef53b8fa055bc3f93ffadd8a6a0cefc53c57dda76e2a
SHA5125097291c06239dcece65e8e99f1a7d64f3b41366e73f877e8a148bb38db8df124e6a405b63308b4987bb1be27327a73da7ad34856de87ea52301fe266c659b90
-
C:\Windows\system\qbtJDES.exeFilesize
6.0MB
MD5ed173154828481b648790982c5bfb11d
SHA1114739d4b958637b54e79d4f7b88d6324fd3c820
SHA256b6f7bb143a06ebab391822ace2e4fdd44156e68900e3ff72367db7c3c2f17ef8
SHA51266c6424f2f623aecea025d88600ab8a57e427334326f6789552b5a768f29f7b1fc7897b8f830e9e1c32be841598170ea0cf5ee21899b9f31e290cec88f9beac8
-
C:\Windows\system\thWYgwm.exeFilesize
6.0MB
MD51b33df97df93834c2858cf79789066fa
SHA156ee32ace56c745661b065b4e93bd05f00b342ba
SHA256304173282e3dd0387fd1af0327db2188dfafeaeaa6cc7aa71eaf6f45084f9c90
SHA512ef936b36771b8940be8eb92113e355798795c9aeb63b966f70a35b61d32bdba3015fbd3b029715994e24673508ec4acadb24702db0cc665f7fdb96e219d576e4
-
\Windows\system\RbeHyZU.exeFilesize
6.0MB
MD589aa21872dc23d69e423525a3c948a3c
SHA12cd7ca5c2e9d0ce37472a44ea5ec53a03919da5f
SHA256d59cbab3752282b77d80441660c7103db7d8440d6d6f11e25866db96a7d70f1b
SHA512644220b17a208600a84a2c7759feb1fad379545f4b2322cb15c39e098df80fe84bc1520abcff102b98437e2df765b788f6882223ea3e6c1530412c1b5e06e67b
-
\Windows\system\SbZAhzE.exeFilesize
6.0MB
MD5dfdfac4ffc09f6c7044e2b136b77a9d5
SHA1dfce82d3eb7130514786df25ce2e144ce91ef6c9
SHA2568075d51820247312ed372d18931eff4eaa2fb0755459cb49dab49dc9d89b2343
SHA512ebf379ae2e3bd87c3bd968e1c5620091fc4bf3c6e3cc99ebdf918091934a9efea8618895cc873f4ce68fba6bc8fa26f2ba4d47d45df85b4504f4a5ea9eacfff8
-
\Windows\system\TrWJSEm.exeFilesize
6.0MB
MD59c2cbe8f41d6eb2ca72444ae1b3d9044
SHA15897e19366ffa2cd971ae45b4117dab1931d26ff
SHA256ed6ee3d61864655be870ebd2ab5317c09a0d16d7b34b3faeb022d8788f950443
SHA512d088e3a2fafec7eb0431d80e53020295bc44ad2434ad76b93974fed248c5ae140e097d29092ed69569a8c9abeab42b5a0e831284d00100e4547dcc116c64e6a8
-
\Windows\system\XjQGNBS.exeFilesize
6.0MB
MD57ad9f7ab4e2d05563ed11e593244cfaf
SHA141ca85f35afc7a3539d0033035d273ef0e3ac93c
SHA256eb2f11dd4919cd85a56a874b79637d774b173dc45efbd285d71ac48e17af59b1
SHA51272cc6b3bb2d99137decd6d51b41d1ce3ea88d96a49252ba812806af69e306614c7353293a8279eb5152f077ee9c256e0ce7e8ea7d2feedc3fa04f970b5f29da1
-
\Windows\system\aUBExrV.exeFilesize
6.0MB
MD5cf65543e71e14be8fe96bbeecb0e7782
SHA1fbe38e316ebb86d4aee45f8f6cc9be6d6aec94cb
SHA256047c6f371b321e07ec3e0b6938c0db6d086ee96231b7105c479aec04d12ecca2
SHA512e3456cc5f034c3e1443d273c5694e5f0ca757d85b58f59504db6889c2444126dbe20a2a2b95fed8580a35c8ac81b6f37775037d11c3ec733d6c452f1b1e1face
-
\Windows\system\bjGnaBG.exeFilesize
6.0MB
MD56ab4a5eb26f09f8c8501b00da2e1cd85
SHA135287ced8614c317a249cb771ce38edfe1230392
SHA256e3217909cbb762df07ba4edc70823c167d9f3894dbf72e7b3f313e525f5cfe55
SHA5121f0c6179aa497a4905b486f51d26b8ecce3a0a4130a93ee002b00140f0666916cfd25bd462bfa4c5bacc3d25f2ca9e24759568a8b0bea836b260dac9250538df
-
\Windows\system\fEWqnPV.exeFilesize
6.0MB
MD5eed8ba06aa6584e7958655e3f249b406
SHA1ad6159bc634b3366edd472f9e15b769a72fa3108
SHA2569d61ed55c52ce4d68c782a254cc800a3523d5668a2a0f1e3a196528b01801efb
SHA5129a7faf5943313aa76f0edc6c0cabed3c692753f4cf5dabed6bec171f78eb3b8c7bf2962d2bc810e5bc7943d3e7cab6b43fc4310c87e77c6829fb4e911a87ebf8
-
memory/1508-84-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/1508-142-0x000000013F9B0000-0x000000013FD04000-memory.dmpFilesize
3.3MB
-
memory/1508-39-0x0000000002310000-0x0000000002664000-memory.dmpFilesize
3.3MB
-
memory/1508-55-0x0000000002310000-0x0000000002664000-memory.dmpFilesize
3.3MB
-
memory/1508-64-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/1508-63-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/1508-141-0x000000013F920000-0x000000013FC74000-memory.dmpFilesize
3.3MB
-
memory/1508-140-0x000000013F310000-0x000000013F664000-memory.dmpFilesize
3.3MB
-
memory/1508-139-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/1508-138-0x000000013F160000-0x000000013F4B4000-memory.dmpFilesize
3.3MB
-
memory/1508-77-0x000000013F160000-0x000000013F4B4000-memory.dmpFilesize
3.3MB
-
memory/1508-49-0x0000000002310000-0x0000000002664000-memory.dmpFilesize
3.3MB
-
memory/1508-136-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/1508-0-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/1508-1-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/1508-23-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/1508-29-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/1508-91-0x000000013F310000-0x000000013F664000-memory.dmpFilesize
3.3MB
-
memory/1508-8-0x000000013F7E0000-0x000000013FB34000-memory.dmpFilesize
3.3MB
-
memory/1508-98-0x000000013F920000-0x000000013FC74000-memory.dmpFilesize
3.3MB
-
memory/1508-105-0x000000013F9B0000-0x000000013FD04000-memory.dmpFilesize
3.3MB
-
memory/1508-14-0x000000013F6F0000-0x000000013FA44000-memory.dmpFilesize
3.3MB
-
memory/1708-78-0x000000013F160000-0x000000013F4B4000-memory.dmpFilesize
3.3MB
-
memory/1708-153-0x000000013F160000-0x000000013F4B4000-memory.dmpFilesize
3.3MB
-
memory/1728-147-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/1728-45-0x000000013F2C0000-0x000000013F614000-memory.dmpFilesize
3.3MB
-
memory/1748-152-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/1748-137-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/1748-69-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/2204-145-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2204-21-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2304-155-0x000000013F310000-0x000000013F664000-memory.dmpFilesize
3.3MB
-
memory/2304-92-0x000000013F310000-0x000000013F664000-memory.dmpFilesize
3.3MB
-
memory/2340-99-0x000000013F920000-0x000000013FC74000-memory.dmpFilesize
3.3MB
-
memory/2340-156-0x000000013F920000-0x000000013FC74000-memory.dmpFilesize
3.3MB
-
memory/2420-150-0x000000013FC60000-0x000000013FFB4000-memory.dmpFilesize
3.3MB
-
memory/2420-56-0x000000013FC60000-0x000000013FFB4000-memory.dmpFilesize
3.3MB
-
memory/2420-135-0x000000013FC60000-0x000000013FFB4000-memory.dmpFilesize
3.3MB
-
memory/2464-50-0x000000013FFA0000-0x00000001402F4000-memory.dmpFilesize
3.3MB
-
memory/2464-149-0x000000013FFA0000-0x00000001402F4000-memory.dmpFilesize
3.3MB
-
memory/2516-144-0x000000013F7E0000-0x000000013FB34000-memory.dmpFilesize
3.3MB
-
memory/2516-20-0x000000013F7E0000-0x000000013FB34000-memory.dmpFilesize
3.3MB
-
memory/2532-22-0x000000013F6F0000-0x000000013FA44000-memory.dmpFilesize
3.3MB
-
memory/2532-143-0x000000013F6F0000-0x000000013FA44000-memory.dmpFilesize
3.3MB
-
memory/2548-146-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/2548-30-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/2592-65-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2592-151-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2608-48-0x000000013FBA0000-0x000000013FEF4000-memory.dmpFilesize
3.3MB
-
memory/2608-148-0x000000013FBA0000-0x000000013FEF4000-memory.dmpFilesize
3.3MB
-
memory/2652-154-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB
-
memory/2652-85-0x000000013F130000-0x000000013F484000-memory.dmpFilesize
3.3MB