Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 08:04
Behavioral task
behavioral1
Sample
2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe
Resource
win7-20240508-en
General
-
Target
2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe
-
Size
5.9MB
-
MD5
f331dd85b89422d342110e49bf45601c
-
SHA1
2591f3af784ff26093e998ebbc235a13f2de59ef
-
SHA256
06a63e434ad133556c169e9ad28a4ca9f253f2d4651bae8829c0db074c98f72b
-
SHA512
82d5499171b709a1416a7996a36a17a2a1fcca3fafd97a734c93b8f927592f7617bc305782a0479ce91f3de8a879ec37d3931b2ed7b4d1eaf814b1abd470682c
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lU6:Q+856utgpPF8u/76
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\ZwinbeJ.exe cobalt_reflective_dll \Windows\system\wZSaQDu.exe cobalt_reflective_dll C:\Windows\system\pohvIrZ.exe cobalt_reflective_dll \Windows\system\xAVYKKd.exe cobalt_reflective_dll \Windows\system\lrPzJsl.exe cobalt_reflective_dll \Windows\system\GhujyLL.exe cobalt_reflective_dll \Windows\system\WDJFeeS.exe cobalt_reflective_dll C:\Windows\system\CnEYeBC.exe cobalt_reflective_dll C:\Windows\system\RecBPsS.exe cobalt_reflective_dll C:\Windows\system\RGTZvwl.exe cobalt_reflective_dll C:\Windows\system\ZUxuJDe.exe cobalt_reflective_dll C:\Windows\system\ELEDODX.exe cobalt_reflective_dll C:\Windows\system\ITjoKvT.exe cobalt_reflective_dll C:\Windows\system\suhKJvH.exe cobalt_reflective_dll C:\Windows\system\bUoKUjf.exe cobalt_reflective_dll \Windows\system\YEzpenb.exe cobalt_reflective_dll C:\Windows\system\qftaGxy.exe cobalt_reflective_dll C:\Windows\system\JVyEuXo.exe cobalt_reflective_dll \Windows\system\kmMFCke.exe cobalt_reflective_dll C:\Windows\system\cOexwJO.exe cobalt_reflective_dll C:\Windows\system\WcMoIVR.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\ZwinbeJ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\wZSaQDu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\pohvIrZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\xAVYKKd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\lrPzJsl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\GhujyLL.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\WDJFeeS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\CnEYeBC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\RecBPsS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\RGTZvwl.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ZUxuJDe.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ELEDODX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\ITjoKvT.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\suhKJvH.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\bUoKUjf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\YEzpenb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\qftaGxy.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\JVyEuXo.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\kmMFCke.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\cOexwJO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\WcMoIVR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 53 IoCs
Processes:
resource yara_rule behavioral1/memory/848-0-0x000000013FD80000-0x00000001400D4000-memory.dmp UPX \Windows\system\ZwinbeJ.exe UPX \Windows\system\wZSaQDu.exe UPX behavioral1/memory/2088-9-0x000000013F450000-0x000000013F7A4000-memory.dmp UPX behavioral1/memory/2248-16-0x000000013FFA0000-0x00000001402F4000-memory.dmp UPX C:\Windows\system\pohvIrZ.exe UPX \Windows\system\xAVYKKd.exe UPX \Windows\system\lrPzJsl.exe UPX \Windows\system\GhujyLL.exe UPX \Windows\system\WDJFeeS.exe UPX C:\Windows\system\CnEYeBC.exe UPX C:\Windows\system\RecBPsS.exe UPX behavioral1/memory/2496-77-0x000000013F970000-0x000000013FCC4000-memory.dmp UPX behavioral1/memory/2528-76-0x000000013F6F0000-0x000000013FA44000-memory.dmp UPX behavioral1/memory/2548-74-0x000000013FC20000-0x000000013FF74000-memory.dmp UPX C:\Windows\system\RGTZvwl.exe UPX behavioral1/memory/2936-83-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX C:\Windows\system\ZUxuJDe.exe UPX behavioral1/memory/2788-93-0x000000013FA10000-0x000000013FD64000-memory.dmp UPX behavioral1/memory/876-96-0x000000013FE90000-0x00000001401E4000-memory.dmp UPX C:\Windows\system\ELEDODX.exe UPX C:\Windows\system\ITjoKvT.exe UPX C:\Windows\system\suhKJvH.exe UPX C:\Windows\system\bUoKUjf.exe UPX \Windows\system\YEzpenb.exe UPX C:\Windows\system\qftaGxy.exe UPX C:\Windows\system\JVyEuXo.exe UPX behavioral1/memory/848-88-0x000000013FD80000-0x00000001400D4000-memory.dmp UPX \Windows\system\kmMFCke.exe UPX behavioral1/memory/2768-69-0x000000013FA80000-0x000000013FDD4000-memory.dmp UPX behavioral1/memory/2536-66-0x000000013F8A0000-0x000000013FBF4000-memory.dmp UPX C:\Windows\system\cOexwJO.exe UPX behavioral1/memory/2628-48-0x000000013F330000-0x000000013F684000-memory.dmp UPX behavioral1/memory/2248-133-0x000000013FFA0000-0x00000001402F4000-memory.dmp UPX behavioral1/memory/2720-43-0x000000013F1B0000-0x000000013F504000-memory.dmp UPX behavioral1/memory/2644-39-0x000000013F730000-0x000000013FA84000-memory.dmp UPX behavioral1/memory/3064-32-0x000000013F820000-0x000000013FB74000-memory.dmp UPX C:\Windows\system\WcMoIVR.exe UPX behavioral1/memory/2936-136-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX behavioral1/memory/2088-141-0x000000013F450000-0x000000013F7A4000-memory.dmp UPX behavioral1/memory/2248-142-0x000000013FFA0000-0x00000001402F4000-memory.dmp UPX behavioral1/memory/3064-143-0x000000013F820000-0x000000013FB74000-memory.dmp UPX behavioral1/memory/2720-145-0x000000013F1B0000-0x000000013F504000-memory.dmp UPX behavioral1/memory/2644-144-0x000000013F730000-0x000000013FA84000-memory.dmp UPX behavioral1/memory/2628-146-0x000000013F330000-0x000000013F684000-memory.dmp UPX behavioral1/memory/2536-147-0x000000013F8A0000-0x000000013FBF4000-memory.dmp UPX behavioral1/memory/2768-148-0x000000013FA80000-0x000000013FDD4000-memory.dmp UPX behavioral1/memory/2548-149-0x000000013FC20000-0x000000013FF74000-memory.dmp UPX behavioral1/memory/2528-150-0x000000013F6F0000-0x000000013FA44000-memory.dmp UPX behavioral1/memory/2496-151-0x000000013F970000-0x000000013FCC4000-memory.dmp UPX behavioral1/memory/2936-152-0x000000013F490000-0x000000013F7E4000-memory.dmp UPX behavioral1/memory/2788-153-0x000000013FA10000-0x000000013FD64000-memory.dmp UPX behavioral1/memory/876-154-0x000000013FE90000-0x00000001401E4000-memory.dmp UPX -
XMRig Miner payload 56 IoCs
Processes:
resource yara_rule behavioral1/memory/848-0-0x000000013FD80000-0x00000001400D4000-memory.dmp xmrig \Windows\system\ZwinbeJ.exe xmrig \Windows\system\wZSaQDu.exe xmrig behavioral1/memory/2088-9-0x000000013F450000-0x000000013F7A4000-memory.dmp xmrig behavioral1/memory/2248-16-0x000000013FFA0000-0x00000001402F4000-memory.dmp xmrig C:\Windows\system\pohvIrZ.exe xmrig \Windows\system\xAVYKKd.exe xmrig \Windows\system\lrPzJsl.exe xmrig \Windows\system\GhujyLL.exe xmrig \Windows\system\WDJFeeS.exe xmrig C:\Windows\system\CnEYeBC.exe xmrig C:\Windows\system\RecBPsS.exe xmrig behavioral1/memory/2496-77-0x000000013F970000-0x000000013FCC4000-memory.dmp xmrig behavioral1/memory/2528-76-0x000000013F6F0000-0x000000013FA44000-memory.dmp xmrig behavioral1/memory/2548-74-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig C:\Windows\system\RGTZvwl.exe xmrig behavioral1/memory/2936-83-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig C:\Windows\system\ZUxuJDe.exe xmrig behavioral1/memory/2788-93-0x000000013FA10000-0x000000013FD64000-memory.dmp xmrig behavioral1/memory/876-96-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig C:\Windows\system\ELEDODX.exe xmrig C:\Windows\system\ITjoKvT.exe xmrig C:\Windows\system\suhKJvH.exe xmrig C:\Windows\system\bUoKUjf.exe xmrig \Windows\system\YEzpenb.exe xmrig C:\Windows\system\qftaGxy.exe xmrig C:\Windows\system\JVyEuXo.exe xmrig behavioral1/memory/848-88-0x000000013FD80000-0x00000001400D4000-memory.dmp xmrig \Windows\system\kmMFCke.exe xmrig behavioral1/memory/2768-69-0x000000013FA80000-0x000000013FDD4000-memory.dmp xmrig behavioral1/memory/2536-66-0x000000013F8A0000-0x000000013FBF4000-memory.dmp xmrig C:\Windows\system\cOexwJO.exe xmrig behavioral1/memory/2628-48-0x000000013F330000-0x000000013F684000-memory.dmp xmrig behavioral1/memory/2248-133-0x000000013FFA0000-0x00000001402F4000-memory.dmp xmrig behavioral1/memory/848-46-0x000000013F330000-0x000000013F684000-memory.dmp xmrig behavioral1/memory/2720-43-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2644-39-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/3064-32-0x000000013F820000-0x000000013FB74000-memory.dmp xmrig C:\Windows\system\WcMoIVR.exe xmrig behavioral1/memory/2936-136-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig behavioral1/memory/2788-138-0x000000013FA10000-0x000000013FD64000-memory.dmp xmrig behavioral1/memory/876-139-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2088-141-0x000000013F450000-0x000000013F7A4000-memory.dmp xmrig behavioral1/memory/2248-142-0x000000013FFA0000-0x00000001402F4000-memory.dmp xmrig behavioral1/memory/3064-143-0x000000013F820000-0x000000013FB74000-memory.dmp xmrig behavioral1/memory/2720-145-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2644-144-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/2628-146-0x000000013F330000-0x000000013F684000-memory.dmp xmrig behavioral1/memory/2536-147-0x000000013F8A0000-0x000000013FBF4000-memory.dmp xmrig behavioral1/memory/2768-148-0x000000013FA80000-0x000000013FDD4000-memory.dmp xmrig behavioral1/memory/2548-149-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig behavioral1/memory/2528-150-0x000000013F6F0000-0x000000013FA44000-memory.dmp xmrig behavioral1/memory/2496-151-0x000000013F970000-0x000000013FCC4000-memory.dmp xmrig behavioral1/memory/2936-152-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig behavioral1/memory/2788-153-0x000000013FA10000-0x000000013FD64000-memory.dmp xmrig behavioral1/memory/876-154-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
ZwinbeJ.exewZSaQDu.exepohvIrZ.exeWcMoIVR.exexAVYKKd.exelrPzJsl.exeRecBPsS.exeCnEYeBC.execOexwJO.exeGhujyLL.exeWDJFeeS.exeRGTZvwl.exeZUxuJDe.exekmMFCke.exeITjoKvT.exeELEDODX.exeJVyEuXo.exebUoKUjf.exeqftaGxy.exeYEzpenb.exesuhKJvH.exepid process 2088 ZwinbeJ.exe 2248 wZSaQDu.exe 3064 pohvIrZ.exe 2644 WcMoIVR.exe 2720 xAVYKKd.exe 2628 lrPzJsl.exe 2768 RecBPsS.exe 2536 CnEYeBC.exe 2548 cOexwJO.exe 2528 GhujyLL.exe 2496 WDJFeeS.exe 2936 RGTZvwl.exe 2788 ZUxuJDe.exe 876 kmMFCke.exe 1916 ITjoKvT.exe 1664 ELEDODX.exe 1868 JVyEuXo.exe 1628 bUoKUjf.exe 1636 qftaGxy.exe 1420 YEzpenb.exe 2244 suhKJvH.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exepid process 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/848-0-0x000000013FD80000-0x00000001400D4000-memory.dmp upx \Windows\system\ZwinbeJ.exe upx \Windows\system\wZSaQDu.exe upx behavioral1/memory/2088-9-0x000000013F450000-0x000000013F7A4000-memory.dmp upx behavioral1/memory/2248-16-0x000000013FFA0000-0x00000001402F4000-memory.dmp upx C:\Windows\system\pohvIrZ.exe upx \Windows\system\xAVYKKd.exe upx \Windows\system\lrPzJsl.exe upx \Windows\system\GhujyLL.exe upx \Windows\system\WDJFeeS.exe upx C:\Windows\system\CnEYeBC.exe upx C:\Windows\system\RecBPsS.exe upx behavioral1/memory/2496-77-0x000000013F970000-0x000000013FCC4000-memory.dmp upx behavioral1/memory/2528-76-0x000000013F6F0000-0x000000013FA44000-memory.dmp upx behavioral1/memory/2548-74-0x000000013FC20000-0x000000013FF74000-memory.dmp upx C:\Windows\system\RGTZvwl.exe upx behavioral1/memory/2936-83-0x000000013F490000-0x000000013F7E4000-memory.dmp upx C:\Windows\system\ZUxuJDe.exe upx behavioral1/memory/2788-93-0x000000013FA10000-0x000000013FD64000-memory.dmp upx behavioral1/memory/876-96-0x000000013FE90000-0x00000001401E4000-memory.dmp upx C:\Windows\system\ELEDODX.exe upx C:\Windows\system\ITjoKvT.exe upx C:\Windows\system\suhKJvH.exe upx C:\Windows\system\bUoKUjf.exe upx \Windows\system\YEzpenb.exe upx C:\Windows\system\qftaGxy.exe upx C:\Windows\system\JVyEuXo.exe upx behavioral1/memory/848-88-0x000000013FD80000-0x00000001400D4000-memory.dmp upx \Windows\system\kmMFCke.exe upx behavioral1/memory/2768-69-0x000000013FA80000-0x000000013FDD4000-memory.dmp upx behavioral1/memory/2536-66-0x000000013F8A0000-0x000000013FBF4000-memory.dmp upx C:\Windows\system\cOexwJO.exe upx behavioral1/memory/2628-48-0x000000013F330000-0x000000013F684000-memory.dmp upx behavioral1/memory/2248-133-0x000000013FFA0000-0x00000001402F4000-memory.dmp upx behavioral1/memory/2720-43-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2644-39-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/3064-32-0x000000013F820000-0x000000013FB74000-memory.dmp upx C:\Windows\system\WcMoIVR.exe upx behavioral1/memory/2936-136-0x000000013F490000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2788-138-0x000000013FA10000-0x000000013FD64000-memory.dmp upx behavioral1/memory/876-139-0x000000013FE90000-0x00000001401E4000-memory.dmp upx behavioral1/memory/2088-141-0x000000013F450000-0x000000013F7A4000-memory.dmp upx behavioral1/memory/2248-142-0x000000013FFA0000-0x00000001402F4000-memory.dmp upx behavioral1/memory/3064-143-0x000000013F820000-0x000000013FB74000-memory.dmp upx behavioral1/memory/2720-145-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2644-144-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/2628-146-0x000000013F330000-0x000000013F684000-memory.dmp upx behavioral1/memory/2536-147-0x000000013F8A0000-0x000000013FBF4000-memory.dmp upx behavioral1/memory/2768-148-0x000000013FA80000-0x000000013FDD4000-memory.dmp upx behavioral1/memory/2548-149-0x000000013FC20000-0x000000013FF74000-memory.dmp upx behavioral1/memory/2528-150-0x000000013F6F0000-0x000000013FA44000-memory.dmp upx behavioral1/memory/2496-151-0x000000013F970000-0x000000013FCC4000-memory.dmp upx behavioral1/memory/2936-152-0x000000013F490000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2788-153-0x000000013FA10000-0x000000013FD64000-memory.dmp upx behavioral1/memory/876-154-0x000000013FE90000-0x00000001401E4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\ITjoKvT.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qftaGxy.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\xAVYKKd.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\GhujyLL.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\WcMoIVR.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ELEDODX.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ZwinbeJ.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\pohvIrZ.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\kmMFCke.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\JVyEuXo.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\wZSaQDu.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RecBPsS.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\cOexwJO.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\WDJFeeS.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RGTZvwl.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ZUxuJDe.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\bUoKUjf.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\YEzpenb.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\lrPzJsl.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\CnEYeBC.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\suhKJvH.exe 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exedescription pid process target process PID 848 wrote to memory of 2088 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ZwinbeJ.exe PID 848 wrote to memory of 2088 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ZwinbeJ.exe PID 848 wrote to memory of 2088 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ZwinbeJ.exe PID 848 wrote to memory of 2248 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe wZSaQDu.exe PID 848 wrote to memory of 2248 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe wZSaQDu.exe PID 848 wrote to memory of 2248 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe wZSaQDu.exe PID 848 wrote to memory of 3064 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe pohvIrZ.exe PID 848 wrote to memory of 3064 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe pohvIrZ.exe PID 848 wrote to memory of 3064 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe pohvIrZ.exe PID 848 wrote to memory of 2644 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe WcMoIVR.exe PID 848 wrote to memory of 2644 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe WcMoIVR.exe PID 848 wrote to memory of 2644 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe WcMoIVR.exe PID 848 wrote to memory of 2720 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe xAVYKKd.exe PID 848 wrote to memory of 2720 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe xAVYKKd.exe PID 848 wrote to memory of 2720 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe xAVYKKd.exe PID 848 wrote to memory of 2628 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe lrPzJsl.exe PID 848 wrote to memory of 2628 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe lrPzJsl.exe PID 848 wrote to memory of 2628 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe lrPzJsl.exe PID 848 wrote to memory of 2768 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe RecBPsS.exe PID 848 wrote to memory of 2768 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe RecBPsS.exe PID 848 wrote to memory of 2768 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe RecBPsS.exe PID 848 wrote to memory of 2536 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe CnEYeBC.exe PID 848 wrote to memory of 2536 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe CnEYeBC.exe PID 848 wrote to memory of 2536 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe CnEYeBC.exe PID 848 wrote to memory of 2528 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe GhujyLL.exe PID 848 wrote to memory of 2528 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe GhujyLL.exe PID 848 wrote to memory of 2528 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe GhujyLL.exe PID 848 wrote to memory of 2548 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe cOexwJO.exe PID 848 wrote to memory of 2548 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe cOexwJO.exe PID 848 wrote to memory of 2548 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe cOexwJO.exe PID 848 wrote to memory of 2496 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe WDJFeeS.exe PID 848 wrote to memory of 2496 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe WDJFeeS.exe PID 848 wrote to memory of 2496 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe WDJFeeS.exe PID 848 wrote to memory of 2936 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe RGTZvwl.exe PID 848 wrote to memory of 2936 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe RGTZvwl.exe PID 848 wrote to memory of 2936 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe RGTZvwl.exe PID 848 wrote to memory of 876 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe kmMFCke.exe PID 848 wrote to memory of 876 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe kmMFCke.exe PID 848 wrote to memory of 876 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe kmMFCke.exe PID 848 wrote to memory of 2788 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ZUxuJDe.exe PID 848 wrote to memory of 2788 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ZUxuJDe.exe PID 848 wrote to memory of 2788 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ZUxuJDe.exe PID 848 wrote to memory of 1916 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ITjoKvT.exe PID 848 wrote to memory of 1916 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ITjoKvT.exe PID 848 wrote to memory of 1916 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ITjoKvT.exe PID 848 wrote to memory of 1664 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ELEDODX.exe PID 848 wrote to memory of 1664 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ELEDODX.exe PID 848 wrote to memory of 1664 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe ELEDODX.exe PID 848 wrote to memory of 1628 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe bUoKUjf.exe PID 848 wrote to memory of 1628 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe bUoKUjf.exe PID 848 wrote to memory of 1628 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe bUoKUjf.exe PID 848 wrote to memory of 1868 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe JVyEuXo.exe PID 848 wrote to memory of 1868 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe JVyEuXo.exe PID 848 wrote to memory of 1868 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe JVyEuXo.exe PID 848 wrote to memory of 1420 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe YEzpenb.exe PID 848 wrote to memory of 1420 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe YEzpenb.exe PID 848 wrote to memory of 1420 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe YEzpenb.exe PID 848 wrote to memory of 1636 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe qftaGxy.exe PID 848 wrote to memory of 1636 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe qftaGxy.exe PID 848 wrote to memory of 1636 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe qftaGxy.exe PID 848 wrote to memory of 2244 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe suhKJvH.exe PID 848 wrote to memory of 2244 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe suhKJvH.exe PID 848 wrote to memory of 2244 848 2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe suhKJvH.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-11_f331dd85b89422d342110e49bf45601c_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\ZwinbeJ.exeC:\Windows\System\ZwinbeJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wZSaQDu.exeC:\Windows\System\wZSaQDu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pohvIrZ.exeC:\Windows\System\pohvIrZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WcMoIVR.exeC:\Windows\System\WcMoIVR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xAVYKKd.exeC:\Windows\System\xAVYKKd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lrPzJsl.exeC:\Windows\System\lrPzJsl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RecBPsS.exeC:\Windows\System\RecBPsS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CnEYeBC.exeC:\Windows\System\CnEYeBC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GhujyLL.exeC:\Windows\System\GhujyLL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cOexwJO.exeC:\Windows\System\cOexwJO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WDJFeeS.exeC:\Windows\System\WDJFeeS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RGTZvwl.exeC:\Windows\System\RGTZvwl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kmMFCke.exeC:\Windows\System\kmMFCke.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZUxuJDe.exeC:\Windows\System\ZUxuJDe.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ITjoKvT.exeC:\Windows\System\ITjoKvT.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ELEDODX.exeC:\Windows\System\ELEDODX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bUoKUjf.exeC:\Windows\System\bUoKUjf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JVyEuXo.exeC:\Windows\System\JVyEuXo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YEzpenb.exeC:\Windows\System\YEzpenb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qftaGxy.exeC:\Windows\System\qftaGxy.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\suhKJvH.exeC:\Windows\System\suhKJvH.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\CnEYeBC.exeFilesize
5.9MB
MD5ab17c023ea89cc49dd897311c05d04b4
SHA1477ab59eda8b1aa98eb49e910e275d901c3a78ef
SHA2567e97316810e9abb7adfa6151d0368d1435ecd0c3f79265ab9ddd89bac4af71ed
SHA5126651d39bd6a1942a050ec3c91fcfdc6ad3bf8402d93f1e0363970d81a9925144d26ac8d083742b0d6b05bfc0aff8e9b0ad65a9f7f4d3008b3e6ee754964444b7
-
C:\Windows\system\ELEDODX.exeFilesize
5.9MB
MD5aeb4cb17e24f3533b9f66dcfcf808686
SHA12c12dadfb855515f3ddc31f2afffb014d0ffcfb0
SHA2562797fc82d7da6dbf72bc6611e38ccb66ac55724732b6996f2c76b8dbc3d96ebe
SHA5121947d1562f9c3c7fa33d79ff761fb38d6257f168d3a38ad161074713500b75142670f45d0b41c96a3a628eb3ca66c22f8e5d8e7ec86774fd63f235825b0f1d78
-
C:\Windows\system\ITjoKvT.exeFilesize
5.9MB
MD58e67432b9f25770f184e2632c866d8bb
SHA174d7fc133c88c8da6bdf7f023751729aadc4bc97
SHA25673d5e2416dcea14b4f98a278093fb470fe5703db818d53726c5d70ac8bb55ba5
SHA512ac7d1f9cdd0a42ae992ede89b540fc035cf9ddd81bfcb21ed9480d9da05048fe6febf247171efab720cf4e09ef66a9c99be294c2195dca4fc9f89041afe6ed86
-
C:\Windows\system\JVyEuXo.exeFilesize
5.9MB
MD531efd37d2fd406bea1c235301ef3cc0b
SHA19f53fcc5b48b142e4cae6b8ee93e8449537acec3
SHA256141da5b8cf68b8f762db41fbd07b30321d47e80f14d073b48cb86d61958971f5
SHA512a608df75c885c974c0be56a53f02ea015e3e5db1362d2293e38fab89180329c19f624a197d0681a66a1f60cbd790dea19ac2492e0812097e51244fa311e77f28
-
C:\Windows\system\RGTZvwl.exeFilesize
5.9MB
MD56d4efe4e53d76f35aac6896909a7a646
SHA12be96ac2336802453c21ca0133894d86eb6fe400
SHA25609c98064a84c45a46a86aef2c2ba9dffd772dd8140723676c74505bfa598ea24
SHA51287e8392e042d8f8c151191aff0e09979016357f99795a714fee3795390d075c6fc5f5b8c5ebbbde5e04ff6c8dfdbf59b892ebd555679df4ba4b2cfbd23c54cc5
-
C:\Windows\system\RecBPsS.exeFilesize
5.9MB
MD52955ce7139da4bbc68b28507edf0c185
SHA1cd28cf6691dcf6855ecd03d9102947e07b7f66d0
SHA25617435be2c18d85b698caa954124c9bb0efa6e79cc3714e450a3f1eb9e1b1f463
SHA512702da8a3f713da925907cd149b5d2fa2cab87cfb08a2f482f21909b93ce9d94dcc0b284db12a7fde0ebfcde5904d1eed8ef1cf96c2b7b72fa79318f8933b3a9c
-
C:\Windows\system\WcMoIVR.exeFilesize
5.9MB
MD5b2e155540edbceafdf625bf07c645d38
SHA19392d69a332e062b202b4fc778601f38d3791221
SHA2564baa3eaa9ce750e941ee902c7f8462a5a4ef0b3737b069cdd33731cfd1a6b021
SHA5121fafc9e8e30f873b5e0a40437759b3d19bc8561000b1f696cad0734c255165764e01b75550fdf6aaec6ee114a7792f4eadc05eadbafb9ef2aff88813606542d9
-
C:\Windows\system\ZUxuJDe.exeFilesize
5.9MB
MD5152fc81e9220247a8f53aafce973a9a8
SHA14704e10831b5508feff0f05611469f8f7da9c933
SHA2562a0407830ac1f619c51734f8a9ca1e6e6f369714e5480ba1c191a275c78c5233
SHA512b313ea440326248edaeb2fde616cde411354ce4b245002044536216ecfa9206009db825eec703e357b77d9bcd43d01388e9c60a2533bd88cc9c70f6bdcb5f38a
-
C:\Windows\system\bUoKUjf.exeFilesize
5.9MB
MD5eccb960f931f0db47739670c65de9531
SHA12adbe473e74ac6559bd8e4a4d4a116ead16761e4
SHA25611df454d50c51f9b2eceeefbe0f673ccf6567538362d95342d60512f02dd91cc
SHA51242767c5ae118051b15a69550fa950e750e5b8e742a09d944c362b19f75d9f0f3cb330a5210055f13d9d02510464c79ce8cebf02b9194fefcc83ce46f098e4b07
-
C:\Windows\system\cOexwJO.exeFilesize
5.9MB
MD51801ecf43016c3c1360cb3e845bf585e
SHA115e5746c39d56d109364dfc198a640b27bfb9eff
SHA2567853ca3c033ba3dd4bdd8e7ff4d7ceede04af7af60afe7ff2c6c549202d7c743
SHA512ae20190b3bf4bcb9351885c52c2f6c7afdfe441904813fbc641998b566d3542aec9cf55ca08ec7b4aff66603445790c751b082db18a503324f713e9e336d53ab
-
C:\Windows\system\pohvIrZ.exeFilesize
5.9MB
MD5e497f32979a3937ef2634aef86202c8f
SHA1d391d9c33f0222bcd7cca8efe73e01f528947306
SHA256422c434059ca382ad25118220eec176ac64c1ad25e2e0f7b5f0d83a517bd02d2
SHA51222cbdbfbdbd9a2390ecbd41e100473bb0f3bff71e0c789a170a7264aa4d6596366f733213542c8d51b117dcb1c2515d830374573311df6135f1f7bab5e4dc674
-
C:\Windows\system\qftaGxy.exeFilesize
5.9MB
MD5e88143bac9a663f46b5931cf3f15c4be
SHA1fc4b8ad2daac183fbe15d54176d7fbaa5f4d5aea
SHA2569a22d0ffc193f9ab82806bfa8455dd49fc6f8d9c518cb77d59559b8b97e41b15
SHA5127ba53378a811dd3745858685794f85490dc7dafd3e87586679760a15baa270a637b6f80f847a331888fc91027292762219082bc02dfc34dcb1a31add6b0f04f2
-
C:\Windows\system\suhKJvH.exeFilesize
5.9MB
MD5b168039337c6a36eeccb4f5a66c1a1ed
SHA1a6b2822c13b555f2ff81ae1d79ca1c68eecbdb50
SHA2562252706f852b41108c1c865dff855bc7c6a00791d1a5e398f28fae31305d3794
SHA512aef46070c4cda1caf7a05d6cfce388999f0b025f502c4e6a16a8d32039cd449048899c57e356a5d4a7353e5279c57fd308fc009ac51fdf60c77275f6ccc459c2
-
\Windows\system\GhujyLL.exeFilesize
5.9MB
MD5a30104f707247ddc9ea6fc229cfdd6d3
SHA1b5ad405110a48aff9ae539bca484a0840bb5bc32
SHA256b8a7413b30d35d58b2c65aa0f88a1e05268ef85c140ab50a675d810f1c47c767
SHA512c71cda39c46f937590fa5165d7a0233b3ed2cc9dc26f5d73acbf72c8812736a20b7505067c57b2899172f53c807db543ac04e5edbb7b89954088316f8af49d7c
-
\Windows\system\WDJFeeS.exeFilesize
5.9MB
MD56eb8f616e46a81253954857e0bae2d7d
SHA12a3362d2755dc944bbbf409885040fe0109649cf
SHA256024a52a12f1c0570f43f7794122a0357edde36d76c1adf90df77a7ba55e86294
SHA5120ff02abfe12826f18caeb234a98790db88b2f28420a99ac18ca737d503d38897fcb84762238137b7475afc9b4332557949a81e33e25bdc7382fd1786bb40891f
-
\Windows\system\YEzpenb.exeFilesize
5.9MB
MD5761520f2f7cc7087e16b7d91ce344bb5
SHA1fb83cb6e8083d92381bde2162014659c138c2166
SHA2564f79f07c1012dfcdf003c3a223c918a42458332664a959b1e9dc49e13b380c32
SHA51269f8bf52dfb960a580bf8f75f948fbe8ea079fd99795bd1b29b35e47b867ca92399a191c1cc01d2b887083dea78563fd99b891028233d518ca11a1eeed243703
-
\Windows\system\ZwinbeJ.exeFilesize
5.9MB
MD510eccdb676ea224d281a56ca9b81b1bd
SHA10045556bdf094df52ea6b2f6df002ae12f1c240b
SHA256362f0efa8172c4053e6aa5983571646c55ee93aabe052c89c152c691d4e9afe5
SHA51245dc5bdb72bdb9b78ea8cb37cd9e6a2f1620598b87db2f3f10cef4361b2b4977e650e2e32c05ebbcdfdf1c14c72c4a9209785ac26611ad8bead6fbe0d134332b
-
\Windows\system\kmMFCke.exeFilesize
5.9MB
MD51228bf7ab65be74deb514eb319f7d6ed
SHA178e70b0f86a27cf8cf19432865b7f7bed7e4379a
SHA25684b4c4bf1abddde0a65a8a07df066e8807aafbf42250426c4aef7b197ea86df8
SHA512c130714f40ea0e480df8aaa612a1fc14da9237c23acfbcefcbe6be0293c57411099a034eb85559eceacde55fe56bbcdab1cf3b9ef4f9e64708c075a2dd006b63
-
\Windows\system\lrPzJsl.exeFilesize
5.9MB
MD5b6bd84812175eb01a58db50640258dfa
SHA15c58006752491d2b679967f015c066d6d3bd2648
SHA256948f60533021e399a541ce0a830108f77068385964e869cc1776bb50e659099e
SHA512043d5189762152b84c2433cea22c29fed90f2b3e4b27e5b5bc560665b1d9bdaf2bad41ab312371d9d63e00a7ae0281181a3702fffd913146db2a2463b24969b9
-
\Windows\system\wZSaQDu.exeFilesize
5.9MB
MD5c8a32d70c724baa593c331baf554b69b
SHA11b491f48e1e1914cd1ee41d3a8608e5571ade5f7
SHA256678f84fd1908ee9456f93a503c7bf8bb8af4795c441b65d5f3ba25027337b8ec
SHA512853aea3c51c455275c2cc30f9cbbd752e645308e5e40a074a6f3fc36334738912cd370b73553b1725ebb87b8715a965b0fac8587f7f8ffc20fd84ce2e9ddf8a1
-
\Windows\system\xAVYKKd.exeFilesize
5.9MB
MD50528757f31ff55f7bb57d2fb89a35976
SHA1905f606d216f9788ef2a266ef55abb620b288859
SHA256f073de08ab00d760b87533d446b35b9422ba8736a3b19673ba6b56e2a575c210
SHA5123718acf4fa2d56c7f036d5ac3377ab3ea7d0f47a10bc1b67a0e444360e0f465ff9b4060b3236ecc9b6954bbd9700ee0e7e6e4bb39ec71b9de85aa56fa7c7fced
-
memory/848-135-0x0000000002410000-0x0000000002764000-memory.dmpFilesize
3.3MB
-
memory/848-0-0x000000013FD80000-0x00000001400D4000-memory.dmpFilesize
3.3MB
-
memory/848-134-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/848-26-0x000000013F820000-0x000000013FB74000-memory.dmpFilesize
3.3MB
-
memory/848-73-0x000000013F970000-0x000000013FCC4000-memory.dmpFilesize
3.3MB
-
memory/848-58-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/848-140-0x000000013F3D0000-0x000000013F724000-memory.dmpFilesize
3.3MB
-
memory/848-8-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/848-62-0x0000000002410000-0x0000000002764000-memory.dmpFilesize
3.3MB
-
memory/848-137-0x000000013FA10000-0x000000013FD64000-memory.dmpFilesize
3.3MB
-
memory/848-100-0x000000013F3D0000-0x000000013F724000-memory.dmpFilesize
3.3MB
-
memory/848-65-0x000000013F6F0000-0x000000013FA44000-memory.dmpFilesize
3.3MB
-
memory/848-88-0x000000013FD80000-0x00000001400D4000-memory.dmpFilesize
3.3MB
-
memory/848-13-0x0000000002410000-0x0000000002764000-memory.dmpFilesize
3.3MB
-
memory/848-82-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/848-71-0x0000000002410000-0x0000000002764000-memory.dmpFilesize
3.3MB
-
memory/848-46-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/848-1-0x0000000000100000-0x0000000000110000-memory.dmpFilesize
64KB
-
memory/876-139-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/876-96-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/876-154-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/2088-9-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/2088-141-0x000000013F450000-0x000000013F7A4000-memory.dmpFilesize
3.3MB
-
memory/2248-142-0x000000013FFA0000-0x00000001402F4000-memory.dmpFilesize
3.3MB
-
memory/2248-16-0x000000013FFA0000-0x00000001402F4000-memory.dmpFilesize
3.3MB
-
memory/2248-133-0x000000013FFA0000-0x00000001402F4000-memory.dmpFilesize
3.3MB
-
memory/2496-151-0x000000013F970000-0x000000013FCC4000-memory.dmpFilesize
3.3MB
-
memory/2496-77-0x000000013F970000-0x000000013FCC4000-memory.dmpFilesize
3.3MB
-
memory/2528-150-0x000000013F6F0000-0x000000013FA44000-memory.dmpFilesize
3.3MB
-
memory/2528-76-0x000000013F6F0000-0x000000013FA44000-memory.dmpFilesize
3.3MB
-
memory/2536-147-0x000000013F8A0000-0x000000013FBF4000-memory.dmpFilesize
3.3MB
-
memory/2536-66-0x000000013F8A0000-0x000000013FBF4000-memory.dmpFilesize
3.3MB
-
memory/2548-74-0x000000013FC20000-0x000000013FF74000-memory.dmpFilesize
3.3MB
-
memory/2548-149-0x000000013FC20000-0x000000013FF74000-memory.dmpFilesize
3.3MB
-
memory/2628-48-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2628-146-0x000000013F330000-0x000000013F684000-memory.dmpFilesize
3.3MB
-
memory/2644-39-0x000000013F730000-0x000000013FA84000-memory.dmpFilesize
3.3MB
-
memory/2644-144-0x000000013F730000-0x000000013FA84000-memory.dmpFilesize
3.3MB
-
memory/2720-43-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/2720-145-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/2768-69-0x000000013FA80000-0x000000013FDD4000-memory.dmpFilesize
3.3MB
-
memory/2768-148-0x000000013FA80000-0x000000013FDD4000-memory.dmpFilesize
3.3MB
-
memory/2788-138-0x000000013FA10000-0x000000013FD64000-memory.dmpFilesize
3.3MB
-
memory/2788-153-0x000000013FA10000-0x000000013FD64000-memory.dmpFilesize
3.3MB
-
memory/2788-93-0x000000013FA10000-0x000000013FD64000-memory.dmpFilesize
3.3MB
-
memory/2936-136-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/2936-83-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/2936-152-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/3064-143-0x000000013F820000-0x000000013FB74000-memory.dmpFilesize
3.3MB
-
memory/3064-32-0x000000013F820000-0x000000013FB74000-memory.dmpFilesize
3.3MB