Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 08:16
Behavioral task
behavioral1
Sample
20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe
-
Size
5.2MB
-
MD5
efe30ff2f84fbab3245b804f15f756d9
-
SHA1
43a65294eb5ce760d92ea74519c6c8f23ade96f3
-
SHA256
d1ca88bb6b1d8d01c8b090ef65e654b66779606e322ef60527899080aa242720
-
SHA512
9e5d909525fbfe7cc56830ecfd940e628d664fb00c81a9bb7095617331eb155daa3ea377881a580b6d6366b6ef08c985e1232124fc9066a7c35fd43e08fdd78a
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lV:RWWBibf56utgpPFotBER/mQ32lUZ
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\ftjDByO.exe cobalt_reflective_dll \Windows\system\BlFLfhS.exe cobalt_reflective_dll C:\Windows\system\nlhBxjH.exe cobalt_reflective_dll C:\Windows\system\nYuHhsA.exe cobalt_reflective_dll C:\Windows\system\YhfUtLv.exe cobalt_reflective_dll C:\Windows\system\pkDRODX.exe cobalt_reflective_dll \Windows\system\azlcdOs.exe cobalt_reflective_dll \Windows\system\JHqVaIb.exe cobalt_reflective_dll \Windows\system\UyPeaiT.exe cobalt_reflective_dll \Windows\system\zScUqNd.exe cobalt_reflective_dll \Windows\system\VKqMsEK.exe cobalt_reflective_dll C:\Windows\system\jtYkUcz.exe cobalt_reflective_dll C:\Windows\system\etDRohz.exe cobalt_reflective_dll \Windows\system\MAaISkB.exe cobalt_reflective_dll C:\Windows\system\OyWsMTC.exe cobalt_reflective_dll \Windows\system\ERhtDzq.exe cobalt_reflective_dll \Windows\system\GmbnFYV.exe cobalt_reflective_dll \Windows\system\wvoHghw.exe cobalt_reflective_dll \Windows\system\uCkbqag.exe cobalt_reflective_dll C:\Windows\system\LgcSNgq.exe cobalt_reflective_dll C:\Windows\system\maHtDnm.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 38 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-22-0x000000013F440000-0x000000013F791000-memory.dmp xmrig behavioral1/memory/2528-40-0x000000013F980000-0x000000013FCD1000-memory.dmp xmrig behavioral1/memory/2720-64-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2732-63-0x000000013F040000-0x000000013F391000-memory.dmp xmrig behavioral1/memory/2600-62-0x000000013FD20000-0x0000000140071000-memory.dmp xmrig behavioral1/memory/2888-51-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/2420-71-0x000000013F9F0000-0x000000013FD41000-memory.dmp xmrig behavioral1/memory/2316-70-0x000000013FA10000-0x000000013FD61000-memory.dmp xmrig behavioral1/memory/2724-78-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/1696-84-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/1892-86-0x000000013FA40000-0x000000013FD91000-memory.dmp xmrig behavioral1/memory/2660-95-0x000000013FC80000-0x000000013FFD1000-memory.dmp xmrig behavioral1/memory/2376-93-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/2308-110-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig behavioral1/memory/2628-99-0x000000013F1D0000-0x000000013F521000-memory.dmp xmrig behavioral1/memory/2316-140-0x000000013FA10000-0x000000013FD61000-memory.dmp xmrig behavioral1/memory/2772-160-0x000000013FF20000-0x0000000140271000-memory.dmp xmrig behavioral1/memory/1040-161-0x000000013FA50000-0x000000013FDA1000-memory.dmp xmrig behavioral1/memory/2824-159-0x000000013F0C0000-0x000000013F411000-memory.dmp xmrig behavioral1/memory/1312-157-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/796-162-0x000000013F780000-0x000000013FAD1000-memory.dmp xmrig behavioral1/memory/2672-158-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2648-156-0x000000013F260000-0x000000013F5B1000-memory.dmp xmrig behavioral1/memory/2316-163-0x000000013FA10000-0x000000013FD61000-memory.dmp xmrig behavioral1/memory/1696-208-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/2112-212-0x000000013F440000-0x000000013F791000-memory.dmp xmrig behavioral1/memory/2376-210-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/2528-222-0x000000013F980000-0x000000013FCD1000-memory.dmp xmrig behavioral1/memory/2732-230-0x000000013F040000-0x000000013F391000-memory.dmp xmrig behavioral1/memory/2720-232-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2600-228-0x000000013FD20000-0x0000000140071000-memory.dmp xmrig behavioral1/memory/2628-226-0x000000013F1D0000-0x000000013F521000-memory.dmp xmrig behavioral1/memory/2888-224-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/2420-234-0x000000013F9F0000-0x000000013FD41000-memory.dmp xmrig behavioral1/memory/2724-236-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/1892-238-0x000000013FA40000-0x000000013FD91000-memory.dmp xmrig behavioral1/memory/2660-243-0x000000013FC80000-0x000000013FFD1000-memory.dmp xmrig behavioral1/memory/2308-245-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
ftjDByO.exeBlFLfhS.exenlhBxjH.exenYuHhsA.exeYhfUtLv.exepkDRODX.exeUyPeaiT.exeazlcdOs.exeJHqVaIb.exezScUqNd.exeVKqMsEK.exejtYkUcz.exeetDRohz.exeMAaISkB.exeOyWsMTC.exemaHtDnm.exeLgcSNgq.exeGmbnFYV.exeERhtDzq.exewvoHghw.exeuCkbqag.exepid process 1696 ftjDByO.exe 2376 BlFLfhS.exe 2112 nlhBxjH.exe 2528 nYuHhsA.exe 2628 YhfUtLv.exe 2888 pkDRODX.exe 2600 UyPeaiT.exe 2732 azlcdOs.exe 2720 JHqVaIb.exe 2420 zScUqNd.exe 2724 VKqMsEK.exe 1892 jtYkUcz.exe 2660 etDRohz.exe 2308 MAaISkB.exe 2648 OyWsMTC.exe 1312 maHtDnm.exe 2672 LgcSNgq.exe 2824 GmbnFYV.exe 1040 ERhtDzq.exe 2772 wvoHghw.exe 796 uCkbqag.exe -
Loads dropped DLL 21 IoCs
Processes:
20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exepid process 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2316-0-0x000000013FA10000-0x000000013FD61000-memory.dmp upx \Windows\system\ftjDByO.exe upx \Windows\system\BlFLfhS.exe upx behavioral1/memory/1696-8-0x000000013FEF0000-0x0000000140241000-memory.dmp upx C:\Windows\system\nlhBxjH.exe upx behavioral1/memory/2112-22-0x000000013F440000-0x000000013F791000-memory.dmp upx behavioral1/memory/2376-17-0x000000013FEF0000-0x0000000140241000-memory.dmp upx C:\Windows\system\nYuHhsA.exe upx C:\Windows\system\YhfUtLv.exe upx C:\Windows\system\pkDRODX.exe upx \Windows\system\azlcdOs.exe upx \Windows\system\JHqVaIb.exe upx behavioral1/memory/2528-40-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/memory/2628-45-0x000000013F1D0000-0x000000013F521000-memory.dmp upx \Windows\system\UyPeaiT.exe upx behavioral1/memory/2720-64-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/2732-63-0x000000013F040000-0x000000013F391000-memory.dmp upx behavioral1/memory/2600-62-0x000000013FD20000-0x0000000140071000-memory.dmp upx behavioral1/memory/2888-51-0x000000013FF80000-0x00000001402D1000-memory.dmp upx \Windows\system\zScUqNd.exe upx behavioral1/memory/2420-71-0x000000013F9F0000-0x000000013FD41000-memory.dmp upx behavioral1/memory/2316-70-0x000000013FA10000-0x000000013FD61000-memory.dmp upx \Windows\system\VKqMsEK.exe upx behavioral1/memory/2724-78-0x000000013FF70000-0x00000001402C1000-memory.dmp upx C:\Windows\system\jtYkUcz.exe upx behavioral1/memory/1696-84-0x000000013FEF0000-0x0000000140241000-memory.dmp upx behavioral1/memory/1892-86-0x000000013FA40000-0x000000013FD91000-memory.dmp upx C:\Windows\system\etDRohz.exe upx behavioral1/memory/2660-95-0x000000013FC80000-0x000000013FFD1000-memory.dmp upx behavioral1/memory/2376-93-0x000000013FEF0000-0x0000000140241000-memory.dmp upx \Windows\system\MAaISkB.exe upx behavioral1/memory/2308-110-0x000000013FAD0000-0x000000013FE21000-memory.dmp upx C:\Windows\system\OyWsMTC.exe upx behavioral1/memory/2628-99-0x000000013F1D0000-0x000000013F521000-memory.dmp upx \Windows\system\ERhtDzq.exe upx \Windows\system\GmbnFYV.exe upx \Windows\system\wvoHghw.exe upx \Windows\system\uCkbqag.exe upx C:\Windows\system\LgcSNgq.exe upx C:\Windows\system\maHtDnm.exe upx behavioral1/memory/2316-140-0x000000013FA10000-0x000000013FD61000-memory.dmp upx behavioral1/memory/2772-160-0x000000013FF20000-0x0000000140271000-memory.dmp upx behavioral1/memory/1040-161-0x000000013FA50000-0x000000013FDA1000-memory.dmp upx behavioral1/memory/2824-159-0x000000013F0C0000-0x000000013F411000-memory.dmp upx behavioral1/memory/1312-157-0x000000013FF80000-0x00000001402D1000-memory.dmp upx behavioral1/memory/796-162-0x000000013F780000-0x000000013FAD1000-memory.dmp upx behavioral1/memory/2672-158-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2648-156-0x000000013F260000-0x000000013F5B1000-memory.dmp upx behavioral1/memory/2316-163-0x000000013FA10000-0x000000013FD61000-memory.dmp upx behavioral1/memory/1696-208-0x000000013FEF0000-0x0000000140241000-memory.dmp upx behavioral1/memory/2112-212-0x000000013F440000-0x000000013F791000-memory.dmp upx behavioral1/memory/2376-210-0x000000013FEF0000-0x0000000140241000-memory.dmp upx behavioral1/memory/2528-222-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/memory/2732-230-0x000000013F040000-0x000000013F391000-memory.dmp upx behavioral1/memory/2720-232-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/2600-228-0x000000013FD20000-0x0000000140071000-memory.dmp upx behavioral1/memory/2628-226-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/memory/2888-224-0x000000013FF80000-0x00000001402D1000-memory.dmp upx behavioral1/memory/2420-234-0x000000013F9F0000-0x000000013FD41000-memory.dmp upx behavioral1/memory/2724-236-0x000000013FF70000-0x00000001402C1000-memory.dmp upx behavioral1/memory/1892-238-0x000000013FA40000-0x000000013FD91000-memory.dmp upx behavioral1/memory/2660-243-0x000000013FC80000-0x000000013FFD1000-memory.dmp upx behavioral1/memory/2308-245-0x000000013FAD0000-0x000000013FE21000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exedescription ioc process File created C:\Windows\System\MAaISkB.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\OyWsMTC.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\ERhtDzq.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\BlFLfhS.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\YhfUtLv.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\azlcdOs.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\nlhBxjH.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\jtYkUcz.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\VKqMsEK.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\maHtDnm.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\wvoHghw.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\nYuHhsA.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\pkDRODX.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\zScUqNd.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\etDRohz.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\LgcSNgq.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\GmbnFYV.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\uCkbqag.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\ftjDByO.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\UyPeaiT.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe File created C:\Windows\System\JHqVaIb.exe 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process Token: SeLockMemoryPrivilege 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exedescription pid process target process PID 2316 wrote to memory of 1696 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe ftjDByO.exe PID 2316 wrote to memory of 1696 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe ftjDByO.exe PID 2316 wrote to memory of 1696 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe ftjDByO.exe PID 2316 wrote to memory of 2376 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe BlFLfhS.exe PID 2316 wrote to memory of 2376 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe BlFLfhS.exe PID 2316 wrote to memory of 2376 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe BlFLfhS.exe PID 2316 wrote to memory of 2112 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe nlhBxjH.exe PID 2316 wrote to memory of 2112 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe nlhBxjH.exe PID 2316 wrote to memory of 2112 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe nlhBxjH.exe PID 2316 wrote to memory of 2528 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe nYuHhsA.exe PID 2316 wrote to memory of 2528 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe nYuHhsA.exe PID 2316 wrote to memory of 2528 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe nYuHhsA.exe PID 2316 wrote to memory of 2628 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe YhfUtLv.exe PID 2316 wrote to memory of 2628 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe YhfUtLv.exe PID 2316 wrote to memory of 2628 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe YhfUtLv.exe PID 2316 wrote to memory of 2888 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe pkDRODX.exe PID 2316 wrote to memory of 2888 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe pkDRODX.exe PID 2316 wrote to memory of 2888 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe pkDRODX.exe PID 2316 wrote to memory of 2732 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe azlcdOs.exe PID 2316 wrote to memory of 2732 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe azlcdOs.exe PID 2316 wrote to memory of 2732 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe azlcdOs.exe PID 2316 wrote to memory of 2600 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe UyPeaiT.exe PID 2316 wrote to memory of 2600 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe UyPeaiT.exe PID 2316 wrote to memory of 2600 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe UyPeaiT.exe PID 2316 wrote to memory of 2720 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe JHqVaIb.exe PID 2316 wrote to memory of 2720 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe JHqVaIb.exe PID 2316 wrote to memory of 2720 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe JHqVaIb.exe PID 2316 wrote to memory of 2420 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe zScUqNd.exe PID 2316 wrote to memory of 2420 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe zScUqNd.exe PID 2316 wrote to memory of 2420 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe zScUqNd.exe PID 2316 wrote to memory of 2724 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe VKqMsEK.exe PID 2316 wrote to memory of 2724 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe VKqMsEK.exe PID 2316 wrote to memory of 2724 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe VKqMsEK.exe PID 2316 wrote to memory of 1892 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe jtYkUcz.exe PID 2316 wrote to memory of 1892 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe jtYkUcz.exe PID 2316 wrote to memory of 1892 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe jtYkUcz.exe PID 2316 wrote to memory of 2660 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe etDRohz.exe PID 2316 wrote to memory of 2660 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe etDRohz.exe PID 2316 wrote to memory of 2660 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe etDRohz.exe PID 2316 wrote to memory of 2308 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe MAaISkB.exe PID 2316 wrote to memory of 2308 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe MAaISkB.exe PID 2316 wrote to memory of 2308 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe MAaISkB.exe PID 2316 wrote to memory of 2648 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe OyWsMTC.exe PID 2316 wrote to memory of 2648 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe OyWsMTC.exe PID 2316 wrote to memory of 2648 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe OyWsMTC.exe PID 2316 wrote to memory of 1312 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe maHtDnm.exe PID 2316 wrote to memory of 1312 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe maHtDnm.exe PID 2316 wrote to memory of 1312 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe maHtDnm.exe PID 2316 wrote to memory of 2672 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe LgcSNgq.exe PID 2316 wrote to memory of 2672 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe LgcSNgq.exe PID 2316 wrote to memory of 2672 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe LgcSNgq.exe PID 2316 wrote to memory of 2824 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe GmbnFYV.exe PID 2316 wrote to memory of 2824 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe GmbnFYV.exe PID 2316 wrote to memory of 2824 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe GmbnFYV.exe PID 2316 wrote to memory of 2772 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe wvoHghw.exe PID 2316 wrote to memory of 2772 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe wvoHghw.exe PID 2316 wrote to memory of 2772 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe wvoHghw.exe PID 2316 wrote to memory of 1040 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe ERhtDzq.exe PID 2316 wrote to memory of 1040 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe ERhtDzq.exe PID 2316 wrote to memory of 1040 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe ERhtDzq.exe PID 2316 wrote to memory of 796 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe uCkbqag.exe PID 2316 wrote to memory of 796 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe uCkbqag.exe PID 2316 wrote to memory of 796 2316 20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe uCkbqag.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20240520efe30ff2f84fbab3245b804f15f756d9cobaltstrikecobaltstrike_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\ftjDByO.exeC:\Windows\System\ftjDByO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BlFLfhS.exeC:\Windows\System\BlFLfhS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nlhBxjH.exeC:\Windows\System\nlhBxjH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nYuHhsA.exeC:\Windows\System\nYuHhsA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YhfUtLv.exeC:\Windows\System\YhfUtLv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pkDRODX.exeC:\Windows\System\pkDRODX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\azlcdOs.exeC:\Windows\System\azlcdOs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UyPeaiT.exeC:\Windows\System\UyPeaiT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JHqVaIb.exeC:\Windows\System\JHqVaIb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zScUqNd.exeC:\Windows\System\zScUqNd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VKqMsEK.exeC:\Windows\System\VKqMsEK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jtYkUcz.exeC:\Windows\System\jtYkUcz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\etDRohz.exeC:\Windows\System\etDRohz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\MAaISkB.exeC:\Windows\System\MAaISkB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\OyWsMTC.exeC:\Windows\System\OyWsMTC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\maHtDnm.exeC:\Windows\System\maHtDnm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LgcSNgq.exeC:\Windows\System\LgcSNgq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GmbnFYV.exeC:\Windows\System\GmbnFYV.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wvoHghw.exeC:\Windows\System\wvoHghw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ERhtDzq.exeC:\Windows\System\ERhtDzq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uCkbqag.exeC:\Windows\System\uCkbqag.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\LgcSNgq.exeFilesize
5.2MB
MD50858a6a8b2f3da2eb4558679a9c4b7a5
SHA149406c333107bd86b0596369a81311345e0d01c6
SHA256b3f038a536159acfe9897d714225e4700427dd1df6f31f1b6b8fadc73755b068
SHA51298be9db76c3e6e7854aa4c375e22bd0f162b2a2aebc325fccfdc49c83950683395a52d89bb392f935c75ba4d6700b602a0d630f399c6d2550675246db62c8a33
-
C:\Windows\system\OyWsMTC.exeFilesize
5.2MB
MD50e694b49b27c63f54c19a1ce10124f8a
SHA1c8f189b06be5882cf6923572dd720500fde583e5
SHA256a4a7469c8b2d316a9e5376f5d55bdc4117b6e998c45583cb738d2c424e3b3fa8
SHA512c92afce31bdea9f067e41988f09c8fab98d0509a05cce5f7161a2e117eb08a166291b769472d837707c8258f61419825e4cf9b65a3f8c01218b0bda1d5c961fc
-
C:\Windows\system\YhfUtLv.exeFilesize
5.2MB
MD5a3b8b102c442bd4a92a701695ab368cd
SHA136cce3db294928cc8841dcf990252f5bb17a7b83
SHA256001b4a7341ebeebf91699c5d44614d86e5a68f0b3f99ce3999f095688f4ecd24
SHA51280712acc2365ab501ca69cca320a41182599f4c3a92289d910833ae627398fa75401e997a354b06490ec986b7eefb7f2bbfff037d278e33f75629168e2518739
-
C:\Windows\system\etDRohz.exeFilesize
5.2MB
MD54999be6f5f816b5a92e698ce5859c1b6
SHA1ba0fd1af362e6713276ff499772aad6013000f9a
SHA25652fd46ccbdbaab37c46e9102873307bdad4738f7466a5d5fb018c66d5b435f85
SHA512436d58c6b9f7ffa772e5e04df58ac0d99188702ec5ae5fc388a884f52fd6570ef2eafa6069ddf431ea10a4e5ad1720d7d8728f9fc67bc16bc5b8663981bf1f6a
-
C:\Windows\system\jtYkUcz.exeFilesize
5.2MB
MD5ff242cd840376da9fae0c173beac2bc0
SHA166c2d8079e76626e6498b6b98e83629b4ba9be14
SHA256f4c8324f799987684af401890a442c8195244f9ec73a8806ac7a4064b028babd
SHA512d255e7f05613d0b3f0fcae21f2e129636facce65a20282b23706485c52b2fb07d7efa0312017a9b7908c8cf65a5cc29d06c3fafb081ab50cd4a407efd1dc5a3f
-
C:\Windows\system\maHtDnm.exeFilesize
5.2MB
MD5612829fbc785c3c50ef8d157d7b748e3
SHA129a140a339ba3e03df432ade06e3bcfa2274689c
SHA256666148b99193d9e5cf0e412f2fe681149c93b7c38717514533cd7d2a9b61ec84
SHA5127386e3ab16984ac2686acd94cda1572b67c450008416e9bc38e2906aa48887aae72fc4cf62f23255d4d71303b98cc9d735ea6bd37e2b72b693b5da19649b66b3
-
C:\Windows\system\nYuHhsA.exeFilesize
5.2MB
MD529e6093f952f905ba43bbaea82eb8a75
SHA13036eca14a2b4469b7cf564fd6bc3accfab8850f
SHA256e8e7a29701eceed8950bd27927ea7e8742c33c1bf7f70f4fd45a93ec0f81e0a3
SHA512bc595499f05c81d04bbc36b04a647cbd6039ed2fb6d185530ba73740cf2c00d9bcc05c4109cd2930aa62483ad95cda058f00746f9c0681edebc57091361bbca2
-
C:\Windows\system\nlhBxjH.exeFilesize
5.2MB
MD54b855791d90fd48e3b8e17a60646a95d
SHA12497a710f4cc95559975f360217725b3051ce09c
SHA2563a90a4d18e3f923ac2643dbb104316a846f63a35b1abcceb479fd0367d43ab0d
SHA51243cd2f89a3eea1ca0f1c58e0f66461dbc4e241372239dbbf7902ed258afc82ec06aed773cafc284e76480786e620adc5945f01f10631cf6625456a0ca87e12ab
-
C:\Windows\system\pkDRODX.exeFilesize
5.2MB
MD5b463a3e8513488de52adff86cfe70f44
SHA16cf743f95eb5de892c2c5e61f5b38df1a5ac8254
SHA2562a2d4dff103792ecbbcd2468b3a75f73b8df10b6d095bc7c0e9dfb6674257722
SHA512ffa3ee2b1d45eaa0481b5e0e6d75444154a4a90332709b1a2d00de4c627b0cb4c2a0e6a7d5f13ce5a60b930b953209d19ae50bf9a1411d68368c50121497e1db
-
\Windows\system\BlFLfhS.exeFilesize
5.2MB
MD5784e86d2b504a8b76b141c804c6a06d6
SHA164bd9d1304101e9c59cdf1a218aafc1717d19314
SHA256b7100dd4b585f726788f12a25c51a729d89e35c024282659faf5471206e192c1
SHA512a253424b93b23f2b185a2e6b11c96b3d86a0e518dfe1efb54f753a935f5fa200338b1dd1386bb846229e64605d1dbf997006d9a47cf838cc3cceeb5d752fac4a
-
\Windows\system\ERhtDzq.exeFilesize
5.2MB
MD5f4784c24919a99811f632047edad26cb
SHA144e28fef9c0f1426df77b06b9ae6bb0cb3a1d2af
SHA25640ec1d97b15ea4ea7276797a6ba94149ccd59d7d4ab670045cb24c2e735a8d10
SHA5121069bfb54fdc6edcbddb20d97e4e55299d35a0a3eae74d89a7b113b783aeef21908fef3800b7ae9159948bd84dafdce1682f6f7137d97e1dd0540b6ae77fa1d9
-
\Windows\system\GmbnFYV.exeFilesize
5.2MB
MD5464b1aa705cfcabb5b7c8906ad990050
SHA1eb4169cbbc05e51fdd68e693b015b3c6a6f0d63c
SHA25696effe64ae99c37b3a309177cae61941de936c6ada58d47caa43bf66d3d00887
SHA5124a8b28e39c20d547a1fc861f79b0f87f261d1c0097510881889b64671c3eb229503e23f6e59e205dd9dcd949ff5e053bf2a3c17b72447277b3ca0460d30663d9
-
\Windows\system\JHqVaIb.exeFilesize
5.2MB
MD5a95fd86839102e2f91007afa586a6882
SHA165e9590e978b305d3323d5b0cf81848239be0bab
SHA25676f0a3d5efb50c1a2798810d1bc2d13cf88b15b0916ceb765fadb56b6cd70537
SHA5128ba7793d590ff9aa2c3d7a1dba7e020842bffc5ee7cb22baed3808e35ff5998b8f14c902bd3944c8611da8b4eb0d24424f6eb9441f91ca4adc35b2f078f05c30
-
\Windows\system\MAaISkB.exeFilesize
5.2MB
MD5730909e0d80ecc66fe45f72623299587
SHA161803db296d2c49dbbb7373c69b43afe5244698c
SHA256ee545e6e65a1d038e9ce443eb6dcdbcad669aac017dbcb9437952bd077254899
SHA5121be44ec6b8b1e866fd689b379e1058a2d3ea16168404ab820c72c6a18415f873436c9ad3ccc6025ef0686ccd6bfc0c799efdfa053b8ec0724b86429e6d9e0008
-
\Windows\system\UyPeaiT.exeFilesize
5.2MB
MD5be3e3512706d8bcb332b04038666e11c
SHA1fbaa7bf7f52c8728fb7dacff7ce88e0eb58362dc
SHA2560dc33bcd4645035ef080ca94140a2b561de2ba324d2a9560678a8ec295abbd30
SHA51236e1a08830e4e02bf9ae5e2305a062e6692b6f8c7f8732e371ab147586d4e37a36b2a8422f8852fb58364a0aab57b71aeafbc02bdc9e7c56795fdfd407bebab6
-
\Windows\system\VKqMsEK.exeFilesize
5.2MB
MD5c58aabb143d3b7bbc295c720c587587e
SHA126908cc801aff47ff99a420bbbb841ec80b5b514
SHA2568ac60ea6a6e277e89375c9889a2dd322e7529accb5de197fe16eaf7fcf794bd0
SHA5127c81d3938b0b8540564191287273908b6cce8938e9459db22e61223eca28dd8c2907e16a03a10c40e3074a71a00249207e524633b1690d27f40488692f7a8b5a
-
\Windows\system\azlcdOs.exeFilesize
5.2MB
MD530dfd8b510060a4286e79872992b8f89
SHA1517cb89239b40805b45ab6ccf71625822c0b29e9
SHA25630e6074edef2ad16abcd8328825a03abb1ff51a85c65939e0c1443fa48db5ec6
SHA5129d3480e27e5083e7bbe49aa1a45b43bb9153bd3517b9ae68094be80d337da39e6218a78b6f55a8b46f479e10cea9a8074b55fc77d5d3c79626a1361187f9bdec
-
\Windows\system\ftjDByO.exeFilesize
5.2MB
MD5443072fd1167a6fcd71aa24f4c07391c
SHA1588ac52951eea09e248703d9c35cf86a14ed3ea6
SHA2569748bd2051f19dc897c7f651266e31e72a9110202f9c832809e9e764ccfb30fb
SHA512fe68f77c58fa627b5925944b0354cad4077211c2d09b758ffe11ec5d138c78d72c64dc3f85aee3a0dd4d7bb5233c4106e8e900bcb4f80a0eb53fc61582aed05b
-
\Windows\system\uCkbqag.exeFilesize
5.2MB
MD5a9e110c96d9695bbe2355454a8c20f2d
SHA1833fe699441a69a4bd5175e296a682fd6251f225
SHA2565801da0bbfb634c83ccf3407427549e8f0d7bf4610b014731a7294edd965a4d8
SHA512f1f9f8eb624ced257ff8ec32315d7c413108e5fa3e21d7f28c5ac2b3b8f22e194332ce409ac79a901285c442aaafb4e942355e0cb32e4cebdb2ea3b9fe7047b4
-
\Windows\system\wvoHghw.exeFilesize
5.2MB
MD55e9551092a8f3bb17fee87c13c3c332d
SHA172fd46f031f39877680e558db474464df32ea315
SHA2562b9f6a6c98c382ea49c82cfae77e1929da8df5f6a2546970caeee9acee4c09d0
SHA5125abd4314b7a15b56cf05cbfdad1b6a60c5ae24c05011bc78d53c91968f7396be2bef43c336cb67d841f558af99e0e3bc5bdb9b1f22b82f461685a420750d8b60
-
\Windows\system\zScUqNd.exeFilesize
5.2MB
MD540392e776f74bc35503a9902aef77211
SHA1e5771b711e0e434828cdfde18ea8fb9968ceff74
SHA256758afed48d0edb3cea80a450d608f0a7617a8d9feac28496dbefe3fde5fddef1
SHA5129cec7e6d13fda001a8ee79435a4936c6f5df5650d07cf6d99678a26d2bf944af11f5a0e1ac7457f71eb7daf34e3c983e49e5165d7876cfe5d740be2b06a7a6d3
-
memory/796-162-0x000000013F780000-0x000000013FAD1000-memory.dmpFilesize
3.3MB
-
memory/1040-161-0x000000013FA50000-0x000000013FDA1000-memory.dmpFilesize
3.3MB
-
memory/1312-157-0x000000013FF80000-0x00000001402D1000-memory.dmpFilesize
3.3MB
-
memory/1696-208-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/1696-8-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/1696-84-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/1892-238-0x000000013FA40000-0x000000013FD91000-memory.dmpFilesize
3.3MB
-
memory/1892-86-0x000000013FA40000-0x000000013FD91000-memory.dmpFilesize
3.3MB
-
memory/2112-22-0x000000013F440000-0x000000013F791000-memory.dmpFilesize
3.3MB
-
memory/2112-212-0x000000013F440000-0x000000013F791000-memory.dmpFilesize
3.3MB
-
memory/2308-110-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2308-245-0x000000013FAD0000-0x000000013FE21000-memory.dmpFilesize
3.3MB
-
memory/2316-53-0x000000013F040000-0x000000013F391000-memory.dmpFilesize
3.3MB
-
memory/2316-77-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/2316-147-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-70-0x000000013FA10000-0x000000013FD61000-memory.dmpFilesize
3.3MB
-
memory/2316-85-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-88-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/2316-49-0x000000013FF80000-0x00000001402D1000-memory.dmpFilesize
3.3MB
-
memory/2316-140-0x000000013FA10000-0x000000013FD61000-memory.dmpFilesize
3.3MB
-
memory/2316-0-0x000000013FA10000-0x000000013FD61000-memory.dmpFilesize
3.3MB
-
memory/2316-92-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-58-0x000000013F1D0000-0x000000013F521000-memory.dmpFilesize
3.3MB
-
memory/2316-106-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-60-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-109-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-108-0x000000013F260000-0x000000013F5B1000-memory.dmpFilesize
3.3MB
-
memory/2316-163-0x000000013FA10000-0x000000013FD61000-memory.dmpFilesize
3.3MB
-
memory/2316-56-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-27-0x0000000002160000-0x00000000024B1000-memory.dmpFilesize
3.3MB
-
memory/2316-20-0x000000013F440000-0x000000013F791000-memory.dmpFilesize
3.3MB
-
memory/2316-12-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/2316-1-0x0000000000090000-0x00000000000A0000-memory.dmpFilesize
64KB
-
memory/2376-93-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/2376-210-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/2376-17-0x000000013FEF0000-0x0000000140241000-memory.dmpFilesize
3.3MB
-
memory/2420-234-0x000000013F9F0000-0x000000013FD41000-memory.dmpFilesize
3.3MB
-
memory/2420-71-0x000000013F9F0000-0x000000013FD41000-memory.dmpFilesize
3.3MB
-
memory/2528-40-0x000000013F980000-0x000000013FCD1000-memory.dmpFilesize
3.3MB
-
memory/2528-222-0x000000013F980000-0x000000013FCD1000-memory.dmpFilesize
3.3MB
-
memory/2600-228-0x000000013FD20000-0x0000000140071000-memory.dmpFilesize
3.3MB
-
memory/2600-62-0x000000013FD20000-0x0000000140071000-memory.dmpFilesize
3.3MB
-
memory/2628-226-0x000000013F1D0000-0x000000013F521000-memory.dmpFilesize
3.3MB
-
memory/2628-99-0x000000013F1D0000-0x000000013F521000-memory.dmpFilesize
3.3MB
-
memory/2628-45-0x000000013F1D0000-0x000000013F521000-memory.dmpFilesize
3.3MB
-
memory/2648-156-0x000000013F260000-0x000000013F5B1000-memory.dmpFilesize
3.3MB
-
memory/2660-95-0x000000013FC80000-0x000000013FFD1000-memory.dmpFilesize
3.3MB
-
memory/2660-243-0x000000013FC80000-0x000000013FFD1000-memory.dmpFilesize
3.3MB
-
memory/2672-158-0x000000013FA90000-0x000000013FDE1000-memory.dmpFilesize
3.3MB
-
memory/2720-64-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/2720-232-0x000000013FC10000-0x000000013FF61000-memory.dmpFilesize
3.3MB
-
memory/2724-236-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/2724-78-0x000000013FF70000-0x00000001402C1000-memory.dmpFilesize
3.3MB
-
memory/2732-230-0x000000013F040000-0x000000013F391000-memory.dmpFilesize
3.3MB
-
memory/2732-63-0x000000013F040000-0x000000013F391000-memory.dmpFilesize
3.3MB
-
memory/2772-160-0x000000013FF20000-0x0000000140271000-memory.dmpFilesize
3.3MB
-
memory/2824-159-0x000000013F0C0000-0x000000013F411000-memory.dmpFilesize
3.3MB
-
memory/2888-224-0x000000013FF80000-0x00000001402D1000-memory.dmpFilesize
3.3MB
-
memory/2888-51-0x000000013FF80000-0x00000001402D1000-memory.dmpFilesize
3.3MB