Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 08:46
Behavioral task
behavioral1
Sample
2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe
Resource
win7-20240419-en
General
-
Target
2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe
-
Size
5.9MB
-
MD5
b25f195db01aa104933feb63feb44aaf
-
SHA1
b95ba04bfb48c309e14e4c5553d511bca2319136
-
SHA256
6bbb5ce2be1222dcf61b61979862b7abf2f0fe8464225962305329e89e3ea7fd
-
SHA512
33bbddf14800e3306281c7865b041dcd54505aa76fa6e9c353b002e340c9841855c8fd77e18cffe850627e83b44793ed090a8f0b69b1f7e412a3ee86c8578580
-
SSDEEP
98304:kPrrcBpddfE0pZVg56utgpPFotBER/mQ32lUf:i0BM56utgpPF8u/7f
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\huztZOn.exe cobalt_reflective_dll \Windows\system\cXXqwhv.exe cobalt_reflective_dll C:\Windows\system\CBXJXtx.exe cobalt_reflective_dll \Windows\system\CZMVcYr.exe cobalt_reflective_dll C:\Windows\system\pQwEsHs.exe cobalt_reflective_dll C:\Windows\system\lspXrHl.exe cobalt_reflective_dll \Windows\system\xCOSjSY.exe cobalt_reflective_dll C:\Windows\system\JyrpdpH.exe cobalt_reflective_dll \Windows\system\UwYxtYm.exe cobalt_reflective_dll C:\Windows\system\DNHEYnU.exe cobalt_reflective_dll \Windows\system\YcgfhoC.exe cobalt_reflective_dll C:\Windows\system\RUiMcoy.exe cobalt_reflective_dll \Windows\system\ftikcuf.exe cobalt_reflective_dll \Windows\system\aENRjbs.exe cobalt_reflective_dll \Windows\system\DSPeOWB.exe cobalt_reflective_dll C:\Windows\system\ZJBmvpe.exe cobalt_reflective_dll \Windows\system\fVnxseP.exe cobalt_reflective_dll C:\Windows\system\qyKJrXR.exe cobalt_reflective_dll C:\Windows\system\vqKmBiT.exe cobalt_reflective_dll \Windows\system\uYssbKy.exe cobalt_reflective_dll C:\Windows\system\KzgFoTv.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\huztZOn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\cXXqwhv.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CBXJXtx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\CZMVcYr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\pQwEsHs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\lspXrHl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\xCOSjSY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\JyrpdpH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\UwYxtYm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\DNHEYnU.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\YcgfhoC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\RUiMcoy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ftikcuf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\aENRjbs.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\DSPeOWB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ZJBmvpe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\fVnxseP.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qyKJrXR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\vqKmBiT.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\uYssbKy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\KzgFoTv.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 58 IoCs
Processes:
resource yara_rule behavioral1/memory/1876-0-0x000000013FF50000-0x00000001402A4000-memory.dmp UPX \Windows\system\huztZOn.exe UPX behavioral1/memory/1224-9-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX \Windows\system\cXXqwhv.exe UPX C:\Windows\system\CBXJXtx.exe UPX behavioral1/memory/2356-21-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX behavioral1/memory/2480-17-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX behavioral1/memory/2748-27-0x000000013F720000-0x000000013FA74000-memory.dmp UPX \Windows\system\CZMVcYr.exe UPX C:\Windows\system\pQwEsHs.exe UPX C:\Windows\system\lspXrHl.exe UPX \Windows\system\xCOSjSY.exe UPX C:\Windows\system\JyrpdpH.exe UPX behavioral1/memory/2572-48-0x000000013FC20000-0x000000013FF74000-memory.dmp UPX behavioral1/memory/2500-57-0x000000013FAF0000-0x000000013FE44000-memory.dmp UPX behavioral1/memory/1876-53-0x000000013FF50000-0x00000001402A4000-memory.dmp UPX behavioral1/memory/2824-41-0x000000013FEC0000-0x0000000140214000-memory.dmp UPX behavioral1/memory/2696-35-0x000000013F1C0000-0x000000013F514000-memory.dmp UPX \Windows\system\UwYxtYm.exe UPX behavioral1/memory/2536-63-0x000000013F570000-0x000000013F8C4000-memory.dmp UPX behavioral1/memory/2480-62-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX C:\Windows\system\DNHEYnU.exe UPX behavioral1/memory/2552-73-0x000000013FEF0000-0x0000000140244000-memory.dmp UPX behavioral1/memory/2356-70-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX \Windows\system\YcgfhoC.exe UPX behavioral1/memory/2880-81-0x000000013F360000-0x000000013F6B4000-memory.dmp UPX behavioral1/memory/2748-78-0x000000013F720000-0x000000013FA74000-memory.dmp UPX C:\Windows\system\RUiMcoy.exe UPX \Windows\system\ftikcuf.exe UPX behavioral1/memory/1152-96-0x000000013FDE0000-0x0000000140134000-memory.dmp UPX behavioral1/memory/2824-94-0x000000013FEC0000-0x0000000140214000-memory.dmp UPX behavioral1/memory/2912-93-0x000000013FCD0000-0x0000000140024000-memory.dmp UPX \Windows\system\aENRjbs.exe UPX behavioral1/memory/1752-104-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX behavioral1/memory/2572-102-0x000000013FC20000-0x000000013FF74000-memory.dmp UPX \Windows\system\DSPeOWB.exe UPX C:\Windows\system\ZJBmvpe.exe UPX \Windows\system\fVnxseP.exe UPX C:\Windows\system\qyKJrXR.exe UPX C:\Windows\system\vqKmBiT.exe UPX \Windows\system\uYssbKy.exe UPX C:\Windows\system\KzgFoTv.exe UPX behavioral1/memory/2536-141-0x000000013F570000-0x000000013F8C4000-memory.dmp UPX behavioral1/memory/2880-144-0x000000013F360000-0x000000013F6B4000-memory.dmp UPX behavioral1/memory/1224-146-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX behavioral1/memory/2480-147-0x000000013F4F0000-0x000000013F844000-memory.dmp UPX behavioral1/memory/2748-148-0x000000013F720000-0x000000013FA74000-memory.dmp UPX behavioral1/memory/2696-149-0x000000013F1C0000-0x000000013F514000-memory.dmp UPX behavioral1/memory/2824-150-0x000000013FEC0000-0x0000000140214000-memory.dmp UPX behavioral1/memory/2500-151-0x000000013FAF0000-0x000000013FE44000-memory.dmp UPX behavioral1/memory/2572-152-0x000000013FC20000-0x000000013FF74000-memory.dmp UPX behavioral1/memory/2356-153-0x000000013F090000-0x000000013F3E4000-memory.dmp UPX behavioral1/memory/2536-154-0x000000013F570000-0x000000013F8C4000-memory.dmp UPX behavioral1/memory/2552-155-0x000000013FEF0000-0x0000000140244000-memory.dmp UPX behavioral1/memory/2880-156-0x000000013F360000-0x000000013F6B4000-memory.dmp UPX behavioral1/memory/2912-157-0x000000013FCD0000-0x0000000140024000-memory.dmp UPX behavioral1/memory/1152-158-0x000000013FDE0000-0x0000000140134000-memory.dmp UPX behavioral1/memory/1752-159-0x000000013FCE0000-0x0000000140034000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral1/memory/1876-0-0x000000013FF50000-0x00000001402A4000-memory.dmp xmrig \Windows\system\huztZOn.exe xmrig behavioral1/memory/1224-9-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig \Windows\system\cXXqwhv.exe xmrig C:\Windows\system\CBXJXtx.exe xmrig behavioral1/memory/2356-21-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2480-17-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2748-27-0x000000013F720000-0x000000013FA74000-memory.dmp xmrig \Windows\system\CZMVcYr.exe xmrig C:\Windows\system\pQwEsHs.exe xmrig C:\Windows\system\lspXrHl.exe xmrig \Windows\system\xCOSjSY.exe xmrig C:\Windows\system\JyrpdpH.exe xmrig behavioral1/memory/2572-48-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig behavioral1/memory/2500-57-0x000000013FAF0000-0x000000013FE44000-memory.dmp xmrig behavioral1/memory/1876-53-0x000000013FF50000-0x00000001402A4000-memory.dmp xmrig behavioral1/memory/2824-41-0x000000013FEC0000-0x0000000140214000-memory.dmp xmrig behavioral1/memory/2696-35-0x000000013F1C0000-0x000000013F514000-memory.dmp xmrig \Windows\system\UwYxtYm.exe xmrig behavioral1/memory/2536-63-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/2480-62-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig C:\Windows\system\DNHEYnU.exe xmrig behavioral1/memory/2552-73-0x000000013FEF0000-0x0000000140244000-memory.dmp xmrig behavioral1/memory/2356-70-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig \Windows\system\YcgfhoC.exe xmrig behavioral1/memory/2880-81-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/1876-79-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/2748-78-0x000000013F720000-0x000000013FA74000-memory.dmp xmrig C:\Windows\system\RUiMcoy.exe xmrig \Windows\system\ftikcuf.exe xmrig behavioral1/memory/1152-96-0x000000013FDE0000-0x0000000140134000-memory.dmp xmrig behavioral1/memory/1876-95-0x0000000002490000-0x00000000027E4000-memory.dmp xmrig behavioral1/memory/2824-94-0x000000013FEC0000-0x0000000140214000-memory.dmp xmrig behavioral1/memory/2912-93-0x000000013FCD0000-0x0000000140024000-memory.dmp xmrig \Windows\system\aENRjbs.exe xmrig behavioral1/memory/1752-104-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig behavioral1/memory/2572-102-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig \Windows\system\DSPeOWB.exe xmrig behavioral1/memory/1876-108-0x000000013F320000-0x000000013F674000-memory.dmp xmrig C:\Windows\system\ZJBmvpe.exe xmrig \Windows\system\fVnxseP.exe xmrig C:\Windows\system\qyKJrXR.exe xmrig C:\Windows\system\vqKmBiT.exe xmrig \Windows\system\uYssbKy.exe xmrig C:\Windows\system\KzgFoTv.exe xmrig behavioral1/memory/2536-141-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/1876-140-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/1876-143-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/2880-144-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/1876-145-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/1224-146-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig behavioral1/memory/2480-147-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2748-148-0x000000013F720000-0x000000013FA74000-memory.dmp xmrig behavioral1/memory/2696-149-0x000000013F1C0000-0x000000013F514000-memory.dmp xmrig behavioral1/memory/2824-150-0x000000013FEC0000-0x0000000140214000-memory.dmp xmrig behavioral1/memory/2500-151-0x000000013FAF0000-0x000000013FE44000-memory.dmp xmrig behavioral1/memory/2572-152-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig behavioral1/memory/2356-153-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2536-154-0x000000013F570000-0x000000013F8C4000-memory.dmp xmrig behavioral1/memory/2552-155-0x000000013FEF0000-0x0000000140244000-memory.dmp xmrig behavioral1/memory/2880-156-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/2912-157-0x000000013FCD0000-0x0000000140024000-memory.dmp xmrig behavioral1/memory/1152-158-0x000000013FDE0000-0x0000000140134000-memory.dmp xmrig behavioral1/memory/1752-159-0x000000013FCE0000-0x0000000140034000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
huztZOn.execXXqwhv.exeCBXJXtx.exepQwEsHs.exeCZMVcYr.exelspXrHl.exexCOSjSY.exeJyrpdpH.exeUwYxtYm.exeDNHEYnU.exeYcgfhoC.exeRUiMcoy.exeftikcuf.exeaENRjbs.exeDSPeOWB.exeZJBmvpe.exeqyKJrXR.exefVnxseP.exeKzgFoTv.exevqKmBiT.exeuYssbKy.exepid process 1224 huztZOn.exe 2480 cXXqwhv.exe 2356 CBXJXtx.exe 2748 pQwEsHs.exe 2696 CZMVcYr.exe 2824 lspXrHl.exe 2572 xCOSjSY.exe 2500 JyrpdpH.exe 2536 UwYxtYm.exe 2552 DNHEYnU.exe 2880 YcgfhoC.exe 2912 RUiMcoy.exe 1152 ftikcuf.exe 1752 aENRjbs.exe 1220 DSPeOWB.exe 1212 ZJBmvpe.exe 2240 qyKJrXR.exe 1676 fVnxseP.exe 2808 KzgFoTv.exe 1412 vqKmBiT.exe 624 uYssbKy.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exepid process 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/1876-0-0x000000013FF50000-0x00000001402A4000-memory.dmp upx \Windows\system\huztZOn.exe upx behavioral1/memory/1224-9-0x000000013F490000-0x000000013F7E4000-memory.dmp upx \Windows\system\cXXqwhv.exe upx C:\Windows\system\CBXJXtx.exe upx behavioral1/memory/2356-21-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2480-17-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2748-27-0x000000013F720000-0x000000013FA74000-memory.dmp upx \Windows\system\CZMVcYr.exe upx C:\Windows\system\pQwEsHs.exe upx C:\Windows\system\lspXrHl.exe upx \Windows\system\xCOSjSY.exe upx C:\Windows\system\JyrpdpH.exe upx behavioral1/memory/2572-48-0x000000013FC20000-0x000000013FF74000-memory.dmp upx behavioral1/memory/2500-57-0x000000013FAF0000-0x000000013FE44000-memory.dmp upx behavioral1/memory/1876-53-0x000000013FF50000-0x00000001402A4000-memory.dmp upx behavioral1/memory/2824-41-0x000000013FEC0000-0x0000000140214000-memory.dmp upx behavioral1/memory/2696-35-0x000000013F1C0000-0x000000013F514000-memory.dmp upx \Windows\system\UwYxtYm.exe upx behavioral1/memory/2536-63-0x000000013F570000-0x000000013F8C4000-memory.dmp upx behavioral1/memory/2480-62-0x000000013F4F0000-0x000000013F844000-memory.dmp upx C:\Windows\system\DNHEYnU.exe upx behavioral1/memory/2552-73-0x000000013FEF0000-0x0000000140244000-memory.dmp upx behavioral1/memory/2356-70-0x000000013F090000-0x000000013F3E4000-memory.dmp upx \Windows\system\YcgfhoC.exe upx behavioral1/memory/2880-81-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/2748-78-0x000000013F720000-0x000000013FA74000-memory.dmp upx C:\Windows\system\RUiMcoy.exe upx \Windows\system\ftikcuf.exe upx behavioral1/memory/1152-96-0x000000013FDE0000-0x0000000140134000-memory.dmp upx behavioral1/memory/2824-94-0x000000013FEC0000-0x0000000140214000-memory.dmp upx behavioral1/memory/2912-93-0x000000013FCD0000-0x0000000140024000-memory.dmp upx \Windows\system\aENRjbs.exe upx behavioral1/memory/1752-104-0x000000013FCE0000-0x0000000140034000-memory.dmp upx behavioral1/memory/2572-102-0x000000013FC20000-0x000000013FF74000-memory.dmp upx \Windows\system\DSPeOWB.exe upx C:\Windows\system\ZJBmvpe.exe upx \Windows\system\fVnxseP.exe upx C:\Windows\system\qyKJrXR.exe upx C:\Windows\system\vqKmBiT.exe upx \Windows\system\uYssbKy.exe upx C:\Windows\system\KzgFoTv.exe upx behavioral1/memory/2536-141-0x000000013F570000-0x000000013F8C4000-memory.dmp upx behavioral1/memory/2880-144-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/1224-146-0x000000013F490000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2480-147-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2748-148-0x000000013F720000-0x000000013FA74000-memory.dmp upx behavioral1/memory/2696-149-0x000000013F1C0000-0x000000013F514000-memory.dmp upx behavioral1/memory/2824-150-0x000000013FEC0000-0x0000000140214000-memory.dmp upx behavioral1/memory/2500-151-0x000000013FAF0000-0x000000013FE44000-memory.dmp upx behavioral1/memory/2572-152-0x000000013FC20000-0x000000013FF74000-memory.dmp upx behavioral1/memory/2356-153-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2536-154-0x000000013F570000-0x000000013F8C4000-memory.dmp upx behavioral1/memory/2552-155-0x000000013FEF0000-0x0000000140244000-memory.dmp upx behavioral1/memory/2880-156-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/2912-157-0x000000013FCD0000-0x0000000140024000-memory.dmp upx behavioral1/memory/1152-158-0x000000013FDE0000-0x0000000140134000-memory.dmp upx behavioral1/memory/1752-159-0x000000013FCE0000-0x0000000140034000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\JyrpdpH.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RUiMcoy.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\cXXqwhv.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\CZMVcYr.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\UwYxtYm.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\DSPeOWB.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\lspXrHl.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\xCOSjSY.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ftikcuf.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\KzgFoTv.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\vqKmBiT.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\huztZOn.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\CBXJXtx.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\pQwEsHs.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\DNHEYnU.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\YcgfhoC.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\aENRjbs.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ZJBmvpe.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qyKJrXR.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\fVnxseP.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\uYssbKy.exe 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exedescription pid process target process PID 1876 wrote to memory of 1224 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe huztZOn.exe PID 1876 wrote to memory of 1224 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe huztZOn.exe PID 1876 wrote to memory of 1224 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe huztZOn.exe PID 1876 wrote to memory of 2480 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe cXXqwhv.exe PID 1876 wrote to memory of 2480 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe cXXqwhv.exe PID 1876 wrote to memory of 2480 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe cXXqwhv.exe PID 1876 wrote to memory of 2356 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe CBXJXtx.exe PID 1876 wrote to memory of 2356 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe CBXJXtx.exe PID 1876 wrote to memory of 2356 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe CBXJXtx.exe PID 1876 wrote to memory of 2748 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe pQwEsHs.exe PID 1876 wrote to memory of 2748 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe pQwEsHs.exe PID 1876 wrote to memory of 2748 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe pQwEsHs.exe PID 1876 wrote to memory of 2696 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe CZMVcYr.exe PID 1876 wrote to memory of 2696 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe CZMVcYr.exe PID 1876 wrote to memory of 2696 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe CZMVcYr.exe PID 1876 wrote to memory of 2824 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe lspXrHl.exe PID 1876 wrote to memory of 2824 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe lspXrHl.exe PID 1876 wrote to memory of 2824 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe lspXrHl.exe PID 1876 wrote to memory of 2572 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe xCOSjSY.exe PID 1876 wrote to memory of 2572 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe xCOSjSY.exe PID 1876 wrote to memory of 2572 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe xCOSjSY.exe PID 1876 wrote to memory of 2500 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe JyrpdpH.exe PID 1876 wrote to memory of 2500 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe JyrpdpH.exe PID 1876 wrote to memory of 2500 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe JyrpdpH.exe PID 1876 wrote to memory of 2536 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe UwYxtYm.exe PID 1876 wrote to memory of 2536 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe UwYxtYm.exe PID 1876 wrote to memory of 2536 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe UwYxtYm.exe PID 1876 wrote to memory of 2552 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe DNHEYnU.exe PID 1876 wrote to memory of 2552 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe DNHEYnU.exe PID 1876 wrote to memory of 2552 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe DNHEYnU.exe PID 1876 wrote to memory of 2880 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe YcgfhoC.exe PID 1876 wrote to memory of 2880 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe YcgfhoC.exe PID 1876 wrote to memory of 2880 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe YcgfhoC.exe PID 1876 wrote to memory of 2912 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe RUiMcoy.exe PID 1876 wrote to memory of 2912 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe RUiMcoy.exe PID 1876 wrote to memory of 2912 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe RUiMcoy.exe PID 1876 wrote to memory of 1152 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe ftikcuf.exe PID 1876 wrote to memory of 1152 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe ftikcuf.exe PID 1876 wrote to memory of 1152 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe ftikcuf.exe PID 1876 wrote to memory of 1752 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe aENRjbs.exe PID 1876 wrote to memory of 1752 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe aENRjbs.exe PID 1876 wrote to memory of 1752 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe aENRjbs.exe PID 1876 wrote to memory of 1220 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe DSPeOWB.exe PID 1876 wrote to memory of 1220 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe DSPeOWB.exe PID 1876 wrote to memory of 1220 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe DSPeOWB.exe PID 1876 wrote to memory of 1212 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe ZJBmvpe.exe PID 1876 wrote to memory of 1212 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe ZJBmvpe.exe PID 1876 wrote to memory of 1212 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe ZJBmvpe.exe PID 1876 wrote to memory of 2240 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe qyKJrXR.exe PID 1876 wrote to memory of 2240 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe qyKJrXR.exe PID 1876 wrote to memory of 2240 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe qyKJrXR.exe PID 1876 wrote to memory of 1676 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe fVnxseP.exe PID 1876 wrote to memory of 1676 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe fVnxseP.exe PID 1876 wrote to memory of 1676 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe fVnxseP.exe PID 1876 wrote to memory of 2808 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe KzgFoTv.exe PID 1876 wrote to memory of 2808 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe KzgFoTv.exe PID 1876 wrote to memory of 2808 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe KzgFoTv.exe PID 1876 wrote to memory of 1412 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe vqKmBiT.exe PID 1876 wrote to memory of 1412 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe vqKmBiT.exe PID 1876 wrote to memory of 1412 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe vqKmBiT.exe PID 1876 wrote to memory of 624 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe uYssbKy.exe PID 1876 wrote to memory of 624 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe uYssbKy.exe PID 1876 wrote to memory of 624 1876 2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe uYssbKy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_b25f195db01aa104933feb63feb44aaf_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\huztZOn.exeC:\Windows\System\huztZOn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cXXqwhv.exeC:\Windows\System\cXXqwhv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CBXJXtx.exeC:\Windows\System\CBXJXtx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pQwEsHs.exeC:\Windows\System\pQwEsHs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CZMVcYr.exeC:\Windows\System\CZMVcYr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lspXrHl.exeC:\Windows\System\lspXrHl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xCOSjSY.exeC:\Windows\System\xCOSjSY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JyrpdpH.exeC:\Windows\System\JyrpdpH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UwYxtYm.exeC:\Windows\System\UwYxtYm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DNHEYnU.exeC:\Windows\System\DNHEYnU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YcgfhoC.exeC:\Windows\System\YcgfhoC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RUiMcoy.exeC:\Windows\System\RUiMcoy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ftikcuf.exeC:\Windows\System\ftikcuf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aENRjbs.exeC:\Windows\System\aENRjbs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DSPeOWB.exeC:\Windows\System\DSPeOWB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZJBmvpe.exeC:\Windows\System\ZJBmvpe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qyKJrXR.exeC:\Windows\System\qyKJrXR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fVnxseP.exeC:\Windows\System\fVnxseP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KzgFoTv.exeC:\Windows\System\KzgFoTv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vqKmBiT.exeC:\Windows\System\vqKmBiT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uYssbKy.exeC:\Windows\System\uYssbKy.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CBXJXtx.exeFilesize
5.9MB
MD5115fd1fa2c761c56ff55f2e88f6f5207
SHA1b9f15e6843c046abf42dbb265118338f07310235
SHA2569aaf67e56a3a4eac63c16ef29432d2dbf40579f58623572bdbb46a96a1716128
SHA512f1447793eae27a6f2cefca5aabcd71758a0d43dbe326a2d64476d5b867a1534ca421d44d1df3ef4d2a86bbd4b951d7525bb066a8fc91bcc64654d771ce6f5f2b
-
C:\Windows\system\DNHEYnU.exeFilesize
5.9MB
MD5509cd7756db881a4414285a662792188
SHA10c52c2f2e13eb2fa63756880004e7a26d0885d55
SHA25652d3e99d8aa1e8f7b6e75e2a0ea4f5e77e7830249e8e69c7f441e47e6cef813a
SHA512eda84cb30a789a088756fb87de761e02b2dbb242392d5c330f533dbd2cf81f4330d6b37ad03fb58327a4c9d0228529e58ade5c4b0bf36a52b0f261d73e77e0b9
-
C:\Windows\system\JyrpdpH.exeFilesize
5.9MB
MD5bf7286e969840904409bfa51b599e6b5
SHA198d5afb1d7e5f540ca932f7dff6cd9a4beca9f56
SHA2560c67616174de993e40dfcd95030f91f17dda921156aea63da05b5c7c3ecdd566
SHA512f525b4dc6ec251aa086a62e2933b8964054c7f24e0ee0be3bae0ba6219ab2d5353bb37e74eceaf2327332389181996e41613382a3f84d074d59e9c2b1a614465
-
C:\Windows\system\KzgFoTv.exeFilesize
5.9MB
MD5940b833e2b74c7418c4890652f28bb41
SHA1b937014f49a0564f5477d8a8a0adc67a5a53563f
SHA2562e5d9809dce11f90266c6b109e8b4bfc656881cda0ee643a4cee4ad0712c4bc9
SHA5127699112cca66c4d3c0dee62cbfa67ac43a8dca66fbe2e5e62e8d9a9256966236df42f298015d6718051a654cb4ec5efc3ab880a64db901d941bf2a699424b32e
-
C:\Windows\system\RUiMcoy.exeFilesize
5.9MB
MD522017a71c3e258c0207b5ad61206ad88
SHA183dc0c0f5a77caeeb2faac2f7ea52c0994e097c8
SHA2562604be868291269a25ecbe03a3b724fef42cd510efe6415e013379e2e82fec1d
SHA5120f41a2166383f1437b5c09f470f8ab17bdf55e225c981fdcabed89f264e1544122e0c464c016a11a3333c1af1b18aab6e24a9ad114385b72b0c0d8f0e164f13f
-
C:\Windows\system\ZJBmvpe.exeFilesize
5.9MB
MD5796dab52ed74c0c2fa252fd94715b86c
SHA1f416641643ac0f6ea862d339fd959cb302a42c3c
SHA256e7fabae5c0b60b4b8493d672df33bf440747a3d0f128bc93eb992ae231d8a9b1
SHA51261f63b9738d1c5a92814aa49102c9bc5b557f5babc004f150e5c3707c921c19dcd5610588c3cf6000379631f45cadbc92605827712706636a9714f3338e73377
-
C:\Windows\system\lspXrHl.exeFilesize
5.9MB
MD5204cd0a738f80cb5445fd106cf089d26
SHA1d3f621702da9cf05040c588884b5518339cd2a78
SHA2564ac50eea742821ed99f225efb260b72fb632e214236c25137c65127d2d9341e6
SHA51297a9834fccd89d9dc335867cf14f41f98fb061a9166440ac507bb50d9f57948952e2ffe7fa8ea04fbad5ad2b4cf429d8edc70297795a07b47bd2ae5a4a7035cc
-
C:\Windows\system\pQwEsHs.exeFilesize
5.9MB
MD5e9e49b825b42b38cabfe54993e48b7b8
SHA1f9cc0c1127e4a261435a841fafa67e7857daa813
SHA2561cb42a3178fcd68fd4dba8e2c6e306bba59288dead3d46335015778a3859380c
SHA5126aad745a6535be17140b63db9c65179945ae5e04b01db09a98e65222e2952635bc3b384b1830a736e563a530dde178a09ccc8dca2d5b8b30a5fa2a0289961b6d
-
C:\Windows\system\qyKJrXR.exeFilesize
5.9MB
MD53dcbc151c75c8a96e8763606099fa83c
SHA1699747a2c610e2890763df6683e15a1e7528368d
SHA256297472795085dbc2ba605f61ebb3fe81ed97e4e532528f4c0bc4f4277312de4a
SHA512a527655e50844d1c998f28701ed92da81f1fe32ec43320bfde6584d58087f39b7c14e0876056e874d288bcb321eb7981cd81b625fa2fd7338b7d0b41f363eaca
-
C:\Windows\system\vqKmBiT.exeFilesize
5.9MB
MD570cb37977a9bfa45fecef9c244180aaa
SHA1fd4ec25b48bba629e3eef4757b32c92d285f5ac1
SHA25600c13d2224e0a740b8872e171b3589e582da3a68134395b951fbcbbc02c0f62d
SHA5125cfc7a0e981d4702e1bfcc9c7f83a5bcb9fbc05e71a8c911036e420faadd88f65c24099b719b7883201ed89a1bc5075079fd497d6aaeed999f4de6b8e05eac19
-
\Windows\system\CZMVcYr.exeFilesize
5.9MB
MD5bac717a0ae7a5424d235e0dd182adc93
SHA18acb05f503e50ec8a363f4aa3f5f5a1ee72f7ae1
SHA256a44b541085753b17af691556120137ed48aa7288b8fa38c0babb8b2ea494e131
SHA512c0508d723e6db96ea042aa79a7e10cd7f4cd50a5d5ac1430c1ab56f63e0f0da584fbcc852e85046a5af9c2f23fefc5c9312b64ffcc8eb056f726f29815a9bc5b
-
\Windows\system\DSPeOWB.exeFilesize
5.9MB
MD50a1b24c7d8fef1fe83bad6899b9b67e2
SHA166850aabfd363a382d816eb792501fca863f9a71
SHA256b01908d26c10e46d676f4a205e85ba5617c078ae0d57b5702a948cf9dfc0ace2
SHA5126e43b351926ae5db975355ec9baf551050535bb28c909fac5040768f2cca2d0b97c8016feee5d65dfe6268de673166029c32efe94dcac417c6462be38e2cf9a2
-
\Windows\system\UwYxtYm.exeFilesize
5.9MB
MD5216d3b8dd4204b433cabe7c517a673f4
SHA1cad16d2cc01832f8d432d07b11e02b9a8ae69444
SHA2566f0d5f38d3694ebaa740d8eee851491d0ed22de64aeaaf2e44c8c11b095dc712
SHA5124db10808b06ef646c35cbdfefe27c53135326cacbe57585acea3807e0adbb872225dbd69ca2076e715a2fca044d388e09fa9cd2be8fc60e082faa614df8e3a9c
-
\Windows\system\YcgfhoC.exeFilesize
5.9MB
MD5388d5b6f8edb54896a0d29d4c13c6c69
SHA1ae468091cb047439b57e4604b26bcbf766526ef4
SHA2567038ff1e54d7d94fb3bfa8fd06975af1dc51c0d1acee4f5be116b8a9585408bf
SHA5120e118fa45092e6bb6afd81b428462597d3bebd229ad0cecace4d9ea7884cbd3efb1cafc225605aaf4d13fc97a6a2615f4ff2bd7404630efb47e4ec5206b313c1
-
\Windows\system\aENRjbs.exeFilesize
5.9MB
MD558e9a671e83868711792daab9c9e48e2
SHA12e345bebb02e19d14a03c61c8a60d889b1bab6b2
SHA256e772a8214517da9c1fb1f9a454451e138387e122d38a61190a860f5cd25fc373
SHA5124553c996c39c5f4b13405a2436cd5933e5ca3dc50e92077b43f0d6c1fd00d8e1bc5dca63c935b1fa8fa8a553c3e09021693a82e56e08098998a956c888808965
-
\Windows\system\cXXqwhv.exeFilesize
5.9MB
MD51bfe4ebc1acdd427aa14ff5897e29041
SHA131599400512dedce8cc9e33511e942b868e4ec91
SHA2560195c93ba444dd406e7d5305087ce98b0cd90d7e9a89a19ede4c64df308afd2b
SHA512963a729c264678b50ab121535e3907b2fb1664b24318c912212b8f57a68737d639f0f6dab388838e1bda6abe6b72bbfb4b07925c67715fdea577908b5ad27618
-
\Windows\system\fVnxseP.exeFilesize
5.9MB
MD511808d46dc32038350698b716d947b20
SHA1abbe083141c9726e653e4a75702cd21d0ec20cfe
SHA256665ca90c0c38cdde247a0db885896cb8ef18cc2c2780aa4b14a9e2f76b76d6d2
SHA5128988a883aa09670fd8b18c13a60e73d38cc1f45b0cece6c5203beffac9ff83e1f1e1a757bd5697423e35f70bc2e6ff31e593d1aa3a57878c5d6a131ba7d7410b
-
\Windows\system\ftikcuf.exeFilesize
5.9MB
MD56ae8893acdc8f6d706e9e5196587cf20
SHA150c27697002f07f899d45fc782a0ff67ce19286e
SHA256f97cd6f9ee6cacb8c637b2cad9b7f342934702f06035e6e013e22ab658a78875
SHA5124313ce28215b57af73d34198a1ca2984547a350120628b70f174562203b82df5979c5f9f5262f181cbe36916edc037af734db779cd1fe9cf445db37905e78a7e
-
\Windows\system\huztZOn.exeFilesize
5.9MB
MD541cd0f02b24613a19300f0a1bbd2b383
SHA13e7b320658f5040cf2cd9cbfb0825ecafdf7b3b0
SHA256d2c36135c7506e3883bbf2a4eded3df0b66cfadd5768f2085b0b03b6eaa2e504
SHA5125b781502046b1ca2058f267adac7dee79aae1ddfa8f4281583a0cbb6c5be4efc93240f2faee4dc0e54e06df344fc7842dbb9e29ad31b234bee3e1b9b1e2b255f
-
\Windows\system\uYssbKy.exeFilesize
5.9MB
MD5d1b427e005dfae5ea30251f7523c9abb
SHA154d208857f6f6ff4bf0ab30f923fa4b4541333af
SHA25639fd2b50eeb9f7fc0c24e123d9518edb4445d7a41bec65b90a2bf7c6148efdb9
SHA5122b49387c044d7cf79f60738b5511ca8d7170cc0717f30dbc32658ab935a1de7e30147a591674d445d6a85a10a51cee27fe6c2d87280a5e34ebed3e4f81674da1
-
\Windows\system\xCOSjSY.exeFilesize
5.9MB
MD54c75fad12546830f67a3b5538e92d01a
SHA1bfd2921e5c311dd74efaa5446783be8eaaf5670e
SHA25642d3a8d566c1657a2128cd6698f5f0581663088dd353dde05cfc88214e3149c1
SHA51229c57f85970aefccd3e01a1d09a34977227f25d32a239636b2ee7f44b51a874366bd5ee1e2dcc51cb1e11c082b99c8c39a6b1c7db703508fd43ac9c117d24317
-
memory/1152-158-0x000000013FDE0000-0x0000000140134000-memory.dmpFilesize
3.3MB
-
memory/1152-96-0x000000013FDE0000-0x0000000140134000-memory.dmpFilesize
3.3MB
-
memory/1224-9-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/1224-146-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/1752-104-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/1752-159-0x000000013FCE0000-0x0000000140034000-memory.dmpFilesize
3.3MB
-
memory/1876-142-0x0000000002490000-0x00000000027E4000-memory.dmpFilesize
3.3MB
-
memory/1876-145-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/1876-40-0x0000000002490000-0x00000000027E4000-memory.dmpFilesize
3.3MB
-
memory/1876-65-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/1876-72-0x0000000002490000-0x00000000027E4000-memory.dmpFilesize
3.3MB
-
memory/1876-30-0x000000013F1C0000-0x000000013F514000-memory.dmpFilesize
3.3MB
-
memory/1876-26-0x000000013F720000-0x000000013FA74000-memory.dmpFilesize
3.3MB
-
memory/1876-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/1876-79-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/1876-8-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/1876-108-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/1876-19-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/1876-92-0x0000000002490000-0x00000000027E4000-memory.dmpFilesize
3.3MB
-
memory/1876-47-0x0000000002490000-0x00000000027E4000-memory.dmpFilesize
3.3MB
-
memory/1876-95-0x0000000002490000-0x00000000027E4000-memory.dmpFilesize
3.3MB
-
memory/1876-143-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/1876-140-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/1876-53-0x000000013FF50000-0x00000001402A4000-memory.dmpFilesize
3.3MB
-
memory/1876-103-0x0000000002490000-0x00000000027E4000-memory.dmpFilesize
3.3MB
-
memory/1876-0-0x000000013FF50000-0x00000001402A4000-memory.dmpFilesize
3.3MB
-
memory/2356-153-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2356-21-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2356-70-0x000000013F090000-0x000000013F3E4000-memory.dmpFilesize
3.3MB
-
memory/2480-17-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2480-147-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2480-62-0x000000013F4F0000-0x000000013F844000-memory.dmpFilesize
3.3MB
-
memory/2500-57-0x000000013FAF0000-0x000000013FE44000-memory.dmpFilesize
3.3MB
-
memory/2500-151-0x000000013FAF0000-0x000000013FE44000-memory.dmpFilesize
3.3MB
-
memory/2536-141-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2536-154-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2536-63-0x000000013F570000-0x000000013F8C4000-memory.dmpFilesize
3.3MB
-
memory/2552-155-0x000000013FEF0000-0x0000000140244000-memory.dmpFilesize
3.3MB
-
memory/2552-73-0x000000013FEF0000-0x0000000140244000-memory.dmpFilesize
3.3MB
-
memory/2572-152-0x000000013FC20000-0x000000013FF74000-memory.dmpFilesize
3.3MB
-
memory/2572-48-0x000000013FC20000-0x000000013FF74000-memory.dmpFilesize
3.3MB
-
memory/2572-102-0x000000013FC20000-0x000000013FF74000-memory.dmpFilesize
3.3MB
-
memory/2696-149-0x000000013F1C0000-0x000000013F514000-memory.dmpFilesize
3.3MB
-
memory/2696-35-0x000000013F1C0000-0x000000013F514000-memory.dmpFilesize
3.3MB
-
memory/2748-148-0x000000013F720000-0x000000013FA74000-memory.dmpFilesize
3.3MB
-
memory/2748-27-0x000000013F720000-0x000000013FA74000-memory.dmpFilesize
3.3MB
-
memory/2748-78-0x000000013F720000-0x000000013FA74000-memory.dmpFilesize
3.3MB
-
memory/2824-150-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/2824-94-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/2824-41-0x000000013FEC0000-0x0000000140214000-memory.dmpFilesize
3.3MB
-
memory/2880-144-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/2880-156-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/2880-81-0x000000013F360000-0x000000013F6B4000-memory.dmpFilesize
3.3MB
-
memory/2912-93-0x000000013FCD0000-0x0000000140024000-memory.dmpFilesize
3.3MB
-
memory/2912-157-0x000000013FCD0000-0x0000000140024000-memory.dmpFilesize
3.3MB