Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 08:05
Behavioral task
behavioral1
Sample
2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
General
-
Target
2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe
-
Size
5.9MB
-
MD5
6756f812c46a38ac5e8f40a4385fee4b
-
SHA1
172f9a9fb0f28d6d260f908d9162c8cb343973fa
-
SHA256
08ba7247d4902ce16b25fbcb774b566ae7af2bfce7129efa4a3a57a460430fc0
-
SHA512
24519da855cb42d5fdbef859314c7b3b4dd29f9a3ba2f82620d68508c514efa25ac8f40229dcdfaac6676a1d4dbb4ace90ea1bfb9bf65a0120d9e0a321728bce
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUS:T+856utgpPF8u/7S
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\ggtSCTN.exe cobalt_reflective_dll C:\Windows\System\ynPpQwu.exe cobalt_reflective_dll C:\Windows\System\FCGVLZM.exe cobalt_reflective_dll C:\Windows\System\cVISEXN.exe cobalt_reflective_dll C:\Windows\System\zevdOdh.exe cobalt_reflective_dll C:\Windows\System\HYtopJN.exe cobalt_reflective_dll C:\Windows\System\XzNpNTg.exe cobalt_reflective_dll C:\Windows\System\pQejRJb.exe cobalt_reflective_dll C:\Windows\System\LPvkebO.exe cobalt_reflective_dll C:\Windows\System\uNpjggG.exe cobalt_reflective_dll C:\Windows\System\nNWfsgf.exe cobalt_reflective_dll C:\Windows\System\sltNDBX.exe cobalt_reflective_dll C:\Windows\System\XQeZnwh.exe cobalt_reflective_dll C:\Windows\System\qIJbfUx.exe cobalt_reflective_dll C:\Windows\System\jhIxsjY.exe cobalt_reflective_dll C:\Windows\System\EhWBTjM.exe cobalt_reflective_dll C:\Windows\System\arBEvEu.exe cobalt_reflective_dll C:\Windows\System\mFejIsC.exe cobalt_reflective_dll C:\Windows\System\rYsoJOi.exe cobalt_reflective_dll C:\Windows\System\zVkdmau.exe cobalt_reflective_dll C:\Windows\System\IGqRvJd.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule C:\Windows\System\ggtSCTN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\ynPpQwu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\FCGVLZM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\cVISEXN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\zevdOdh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\HYtopJN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\XzNpNTg.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\pQejRJb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\LPvkebO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\uNpjggG.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\nNWfsgf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\sltNDBX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\XQeZnwh.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\qIJbfUx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\jhIxsjY.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\EhWBTjM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\arBEvEu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\mFejIsC.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\rYsoJOi.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\zVkdmau.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\IGqRvJd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1256-0-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmp UPX C:\Windows\System\ggtSCTN.exe UPX behavioral2/memory/2452-8-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmp UPX C:\Windows\System\ynPpQwu.exe UPX C:\Windows\System\FCGVLZM.exe UPX behavioral2/memory/3156-14-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmp UPX behavioral2/memory/1044-20-0x00007FF699280000-0x00007FF6995D4000-memory.dmp UPX C:\Windows\System\cVISEXN.exe UPX C:\Windows\System\zevdOdh.exe UPX C:\Windows\System\HYtopJN.exe UPX behavioral2/memory/3092-36-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp UPX behavioral2/memory/408-35-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmp UPX behavioral2/memory/1584-24-0x00007FF716590000-0x00007FF7168E4000-memory.dmp UPX C:\Windows\System\XzNpNTg.exe UPX C:\Windows\System\pQejRJb.exe UPX behavioral2/memory/3656-49-0x00007FF65B030000-0x00007FF65B384000-memory.dmp UPX behavioral2/memory/4500-43-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp UPX C:\Windows\System\LPvkebO.exe UPX behavioral2/memory/1872-55-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp UPX C:\Windows\System\uNpjggG.exe UPX behavioral2/memory/1256-66-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmp UPX C:\Windows\System\nNWfsgf.exe UPX behavioral2/memory/1356-67-0x00007FF682F00000-0x00007FF683254000-memory.dmp UPX C:\Windows\System\sltNDBX.exe UPX C:\Windows\System\XQeZnwh.exe UPX C:\Windows\System\qIJbfUx.exe UPX C:\Windows\System\jhIxsjY.exe UPX C:\Windows\System\EhWBTjM.exe UPX C:\Windows\System\arBEvEu.exe UPX C:\Windows\System\mFejIsC.exe UPX C:\Windows\System\rYsoJOi.exe UPX C:\Windows\System\zVkdmau.exe UPX C:\Windows\System\IGqRvJd.exe UPX behavioral2/memory/2896-61-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp UPX behavioral2/memory/2224-119-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmp UPX behavioral2/memory/1936-121-0x00007FF69F300000-0x00007FF69F654000-memory.dmp UPX behavioral2/memory/376-122-0x00007FF76D120000-0x00007FF76D474000-memory.dmp UPX behavioral2/memory/2692-124-0x00007FF781EA0000-0x00007FF7821F4000-memory.dmp UPX behavioral2/memory/2148-123-0x00007FF728A30000-0x00007FF728D84000-memory.dmp UPX behavioral2/memory/4172-120-0x00007FF6AC120000-0x00007FF6AC474000-memory.dmp UPX behavioral2/memory/1880-125-0x00007FF74F190000-0x00007FF74F4E4000-memory.dmp UPX behavioral2/memory/3992-126-0x00007FF62A8E0000-0x00007FF62AC34000-memory.dmp UPX behavioral2/memory/448-127-0x00007FF74A980000-0x00007FF74ACD4000-memory.dmp UPX behavioral2/memory/2116-128-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmp UPX behavioral2/memory/1584-129-0x00007FF716590000-0x00007FF7168E4000-memory.dmp UPX behavioral2/memory/3092-130-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp UPX behavioral2/memory/4500-131-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp UPX behavioral2/memory/3656-132-0x00007FF65B030000-0x00007FF65B384000-memory.dmp UPX behavioral2/memory/1872-133-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp UPX behavioral2/memory/2896-134-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp UPX behavioral2/memory/1356-135-0x00007FF682F00000-0x00007FF683254000-memory.dmp UPX behavioral2/memory/2452-136-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmp UPX behavioral2/memory/3156-137-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmp UPX behavioral2/memory/1044-138-0x00007FF699280000-0x00007FF6995D4000-memory.dmp UPX behavioral2/memory/1584-139-0x00007FF716590000-0x00007FF7168E4000-memory.dmp UPX behavioral2/memory/408-140-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmp UPX behavioral2/memory/3092-141-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp UPX behavioral2/memory/4500-142-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp UPX behavioral2/memory/3656-143-0x00007FF65B030000-0x00007FF65B384000-memory.dmp UPX behavioral2/memory/1872-144-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp UPX behavioral2/memory/2896-145-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp UPX behavioral2/memory/1356-146-0x00007FF682F00000-0x00007FF683254000-memory.dmp UPX behavioral2/memory/2116-147-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmp UPX behavioral2/memory/2224-148-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1256-0-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmp xmrig C:\Windows\System\ggtSCTN.exe xmrig behavioral2/memory/2452-8-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmp xmrig C:\Windows\System\ynPpQwu.exe xmrig C:\Windows\System\FCGVLZM.exe xmrig behavioral2/memory/3156-14-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmp xmrig behavioral2/memory/1044-20-0x00007FF699280000-0x00007FF6995D4000-memory.dmp xmrig C:\Windows\System\cVISEXN.exe xmrig C:\Windows\System\zevdOdh.exe xmrig C:\Windows\System\HYtopJN.exe xmrig behavioral2/memory/3092-36-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp xmrig behavioral2/memory/408-35-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmp xmrig behavioral2/memory/1584-24-0x00007FF716590000-0x00007FF7168E4000-memory.dmp xmrig C:\Windows\System\XzNpNTg.exe xmrig C:\Windows\System\pQejRJb.exe xmrig behavioral2/memory/3656-49-0x00007FF65B030000-0x00007FF65B384000-memory.dmp xmrig behavioral2/memory/4500-43-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp xmrig C:\Windows\System\LPvkebO.exe xmrig behavioral2/memory/1872-55-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp xmrig C:\Windows\System\uNpjggG.exe xmrig behavioral2/memory/1256-66-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmp xmrig C:\Windows\System\nNWfsgf.exe xmrig behavioral2/memory/1356-67-0x00007FF682F00000-0x00007FF683254000-memory.dmp xmrig C:\Windows\System\sltNDBX.exe xmrig C:\Windows\System\XQeZnwh.exe xmrig C:\Windows\System\qIJbfUx.exe xmrig C:\Windows\System\jhIxsjY.exe xmrig C:\Windows\System\EhWBTjM.exe xmrig C:\Windows\System\arBEvEu.exe xmrig C:\Windows\System\mFejIsC.exe xmrig C:\Windows\System\rYsoJOi.exe xmrig C:\Windows\System\zVkdmau.exe xmrig C:\Windows\System\IGqRvJd.exe xmrig behavioral2/memory/2896-61-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp xmrig behavioral2/memory/2224-119-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmp xmrig behavioral2/memory/1936-121-0x00007FF69F300000-0x00007FF69F654000-memory.dmp xmrig behavioral2/memory/376-122-0x00007FF76D120000-0x00007FF76D474000-memory.dmp xmrig behavioral2/memory/2692-124-0x00007FF781EA0000-0x00007FF7821F4000-memory.dmp xmrig behavioral2/memory/2148-123-0x00007FF728A30000-0x00007FF728D84000-memory.dmp xmrig behavioral2/memory/4172-120-0x00007FF6AC120000-0x00007FF6AC474000-memory.dmp xmrig behavioral2/memory/1880-125-0x00007FF74F190000-0x00007FF74F4E4000-memory.dmp xmrig behavioral2/memory/3992-126-0x00007FF62A8E0000-0x00007FF62AC34000-memory.dmp xmrig behavioral2/memory/448-127-0x00007FF74A980000-0x00007FF74ACD4000-memory.dmp xmrig behavioral2/memory/2116-128-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmp xmrig behavioral2/memory/1584-129-0x00007FF716590000-0x00007FF7168E4000-memory.dmp xmrig behavioral2/memory/3092-130-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp xmrig behavioral2/memory/4500-131-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp xmrig behavioral2/memory/3656-132-0x00007FF65B030000-0x00007FF65B384000-memory.dmp xmrig behavioral2/memory/1872-133-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp xmrig behavioral2/memory/2896-134-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp xmrig behavioral2/memory/1356-135-0x00007FF682F00000-0x00007FF683254000-memory.dmp xmrig behavioral2/memory/2452-136-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmp xmrig behavioral2/memory/3156-137-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmp xmrig behavioral2/memory/1044-138-0x00007FF699280000-0x00007FF6995D4000-memory.dmp xmrig behavioral2/memory/1584-139-0x00007FF716590000-0x00007FF7168E4000-memory.dmp xmrig behavioral2/memory/408-140-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmp xmrig behavioral2/memory/3092-141-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp xmrig behavioral2/memory/4500-142-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp xmrig behavioral2/memory/3656-143-0x00007FF65B030000-0x00007FF65B384000-memory.dmp xmrig behavioral2/memory/1872-144-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp xmrig behavioral2/memory/2896-145-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp xmrig behavioral2/memory/1356-146-0x00007FF682F00000-0x00007FF683254000-memory.dmp xmrig behavioral2/memory/2116-147-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmp xmrig behavioral2/memory/2224-148-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
ggtSCTN.exeFCGVLZM.exeynPpQwu.execVISEXN.exezevdOdh.exeHYtopJN.exeXzNpNTg.exepQejRJb.exeLPvkebO.exeuNpjggG.exenNWfsgf.exesltNDBX.exeXQeZnwh.exeqIJbfUx.exeIGqRvJd.exejhIxsjY.exezVkdmau.exerYsoJOi.exeEhWBTjM.exemFejIsC.exearBEvEu.exepid process 2452 ggtSCTN.exe 3156 FCGVLZM.exe 1044 ynPpQwu.exe 1584 cVISEXN.exe 408 zevdOdh.exe 3092 HYtopJN.exe 4500 XzNpNTg.exe 3656 pQejRJb.exe 1872 LPvkebO.exe 2896 uNpjggG.exe 1356 nNWfsgf.exe 2224 sltNDBX.exe 4172 XQeZnwh.exe 2116 qIJbfUx.exe 1936 IGqRvJd.exe 376 jhIxsjY.exe 2148 zVkdmau.exe 2692 rYsoJOi.exe 1880 EhWBTjM.exe 3992 mFejIsC.exe 448 arBEvEu.exe -
Processes:
resource yara_rule behavioral2/memory/1256-0-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmp upx C:\Windows\System\ggtSCTN.exe upx behavioral2/memory/2452-8-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmp upx C:\Windows\System\ynPpQwu.exe upx C:\Windows\System\FCGVLZM.exe upx behavioral2/memory/3156-14-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmp upx behavioral2/memory/1044-20-0x00007FF699280000-0x00007FF6995D4000-memory.dmp upx C:\Windows\System\cVISEXN.exe upx C:\Windows\System\zevdOdh.exe upx C:\Windows\System\HYtopJN.exe upx behavioral2/memory/3092-36-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp upx behavioral2/memory/408-35-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmp upx behavioral2/memory/1584-24-0x00007FF716590000-0x00007FF7168E4000-memory.dmp upx C:\Windows\System\XzNpNTg.exe upx C:\Windows\System\pQejRJb.exe upx behavioral2/memory/3656-49-0x00007FF65B030000-0x00007FF65B384000-memory.dmp upx behavioral2/memory/4500-43-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp upx C:\Windows\System\LPvkebO.exe upx behavioral2/memory/1872-55-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp upx C:\Windows\System\uNpjggG.exe upx behavioral2/memory/1256-66-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmp upx C:\Windows\System\nNWfsgf.exe upx behavioral2/memory/1356-67-0x00007FF682F00000-0x00007FF683254000-memory.dmp upx C:\Windows\System\sltNDBX.exe upx C:\Windows\System\XQeZnwh.exe upx C:\Windows\System\qIJbfUx.exe upx C:\Windows\System\jhIxsjY.exe upx C:\Windows\System\EhWBTjM.exe upx C:\Windows\System\arBEvEu.exe upx C:\Windows\System\mFejIsC.exe upx C:\Windows\System\rYsoJOi.exe upx C:\Windows\System\zVkdmau.exe upx C:\Windows\System\IGqRvJd.exe upx behavioral2/memory/2896-61-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp upx behavioral2/memory/2224-119-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmp upx behavioral2/memory/1936-121-0x00007FF69F300000-0x00007FF69F654000-memory.dmp upx behavioral2/memory/376-122-0x00007FF76D120000-0x00007FF76D474000-memory.dmp upx behavioral2/memory/2692-124-0x00007FF781EA0000-0x00007FF7821F4000-memory.dmp upx behavioral2/memory/2148-123-0x00007FF728A30000-0x00007FF728D84000-memory.dmp upx behavioral2/memory/4172-120-0x00007FF6AC120000-0x00007FF6AC474000-memory.dmp upx behavioral2/memory/1880-125-0x00007FF74F190000-0x00007FF74F4E4000-memory.dmp upx behavioral2/memory/3992-126-0x00007FF62A8E0000-0x00007FF62AC34000-memory.dmp upx behavioral2/memory/448-127-0x00007FF74A980000-0x00007FF74ACD4000-memory.dmp upx behavioral2/memory/2116-128-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmp upx behavioral2/memory/1584-129-0x00007FF716590000-0x00007FF7168E4000-memory.dmp upx behavioral2/memory/3092-130-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp upx behavioral2/memory/4500-131-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp upx behavioral2/memory/3656-132-0x00007FF65B030000-0x00007FF65B384000-memory.dmp upx behavioral2/memory/1872-133-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp upx behavioral2/memory/2896-134-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp upx behavioral2/memory/1356-135-0x00007FF682F00000-0x00007FF683254000-memory.dmp upx behavioral2/memory/2452-136-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmp upx behavioral2/memory/3156-137-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmp upx behavioral2/memory/1044-138-0x00007FF699280000-0x00007FF6995D4000-memory.dmp upx behavioral2/memory/1584-139-0x00007FF716590000-0x00007FF7168E4000-memory.dmp upx behavioral2/memory/408-140-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmp upx behavioral2/memory/3092-141-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmp upx behavioral2/memory/4500-142-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmp upx behavioral2/memory/3656-143-0x00007FF65B030000-0x00007FF65B384000-memory.dmp upx behavioral2/memory/1872-144-0x00007FF61A700000-0x00007FF61AA54000-memory.dmp upx behavioral2/memory/2896-145-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmp upx behavioral2/memory/1356-146-0x00007FF682F00000-0x00007FF683254000-memory.dmp upx behavioral2/memory/2116-147-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmp upx behavioral2/memory/2224-148-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\FCGVLZM.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ynPpQwu.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\cVISEXN.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\HYtopJN.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\pQejRJb.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\qIJbfUx.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\zVkdmau.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ggtSCTN.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XzNpNTg.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\uNpjggG.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\mFejIsC.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\arBEvEu.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\LPvkebO.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\nNWfsgf.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\sltNDBX.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\jhIxsjY.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\EhWBTjM.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\zevdOdh.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\XQeZnwh.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\IGqRvJd.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\rYsoJOi.exe 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exedescription pid process target process PID 1256 wrote to memory of 2452 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe ggtSCTN.exe PID 1256 wrote to memory of 2452 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe ggtSCTN.exe PID 1256 wrote to memory of 3156 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe FCGVLZM.exe PID 1256 wrote to memory of 3156 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe FCGVLZM.exe PID 1256 wrote to memory of 1044 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe ynPpQwu.exe PID 1256 wrote to memory of 1044 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe ynPpQwu.exe PID 1256 wrote to memory of 1584 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe cVISEXN.exe PID 1256 wrote to memory of 1584 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe cVISEXN.exe PID 1256 wrote to memory of 408 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe zevdOdh.exe PID 1256 wrote to memory of 408 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe zevdOdh.exe PID 1256 wrote to memory of 3092 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe HYtopJN.exe PID 1256 wrote to memory of 3092 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe HYtopJN.exe PID 1256 wrote to memory of 4500 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe XzNpNTg.exe PID 1256 wrote to memory of 4500 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe XzNpNTg.exe PID 1256 wrote to memory of 3656 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe pQejRJb.exe PID 1256 wrote to memory of 3656 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe pQejRJb.exe PID 1256 wrote to memory of 1872 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe LPvkebO.exe PID 1256 wrote to memory of 1872 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe LPvkebO.exe PID 1256 wrote to memory of 2896 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe uNpjggG.exe PID 1256 wrote to memory of 2896 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe uNpjggG.exe PID 1256 wrote to memory of 1356 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe nNWfsgf.exe PID 1256 wrote to memory of 1356 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe nNWfsgf.exe PID 1256 wrote to memory of 2224 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe sltNDBX.exe PID 1256 wrote to memory of 2224 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe sltNDBX.exe PID 1256 wrote to memory of 4172 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe XQeZnwh.exe PID 1256 wrote to memory of 4172 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe XQeZnwh.exe PID 1256 wrote to memory of 2116 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe qIJbfUx.exe PID 1256 wrote to memory of 2116 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe qIJbfUx.exe PID 1256 wrote to memory of 1936 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe IGqRvJd.exe PID 1256 wrote to memory of 1936 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe IGqRvJd.exe PID 1256 wrote to memory of 376 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe jhIxsjY.exe PID 1256 wrote to memory of 376 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe jhIxsjY.exe PID 1256 wrote to memory of 2148 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe zVkdmau.exe PID 1256 wrote to memory of 2148 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe zVkdmau.exe PID 1256 wrote to memory of 2692 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe rYsoJOi.exe PID 1256 wrote to memory of 2692 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe rYsoJOi.exe PID 1256 wrote to memory of 1880 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe EhWBTjM.exe PID 1256 wrote to memory of 1880 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe EhWBTjM.exe PID 1256 wrote to memory of 3992 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe mFejIsC.exe PID 1256 wrote to memory of 3992 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe mFejIsC.exe PID 1256 wrote to memory of 448 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe arBEvEu.exe PID 1256 wrote to memory of 448 1256 2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe arBEvEu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-11_6756f812c46a38ac5e8f40a4385fee4b_cobalt-strike_cobaltstrike.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\ggtSCTN.exeC:\Windows\System\ggtSCTN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FCGVLZM.exeC:\Windows\System\FCGVLZM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ynPpQwu.exeC:\Windows\System\ynPpQwu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cVISEXN.exeC:\Windows\System\cVISEXN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zevdOdh.exeC:\Windows\System\zevdOdh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HYtopJN.exeC:\Windows\System\HYtopJN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XzNpNTg.exeC:\Windows\System\XzNpNTg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pQejRJb.exeC:\Windows\System\pQejRJb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LPvkebO.exeC:\Windows\System\LPvkebO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uNpjggG.exeC:\Windows\System\uNpjggG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nNWfsgf.exeC:\Windows\System\nNWfsgf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sltNDBX.exeC:\Windows\System\sltNDBX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\XQeZnwh.exeC:\Windows\System\XQeZnwh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qIJbfUx.exeC:\Windows\System\qIJbfUx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\IGqRvJd.exeC:\Windows\System\IGqRvJd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\jhIxsjY.exeC:\Windows\System\jhIxsjY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zVkdmau.exeC:\Windows\System\zVkdmau.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rYsoJOi.exeC:\Windows\System\rYsoJOi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EhWBTjM.exeC:\Windows\System\EhWBTjM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mFejIsC.exeC:\Windows\System\mFejIsC.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\arBEvEu.exeC:\Windows\System\arBEvEu.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\EhWBTjM.exeFilesize
5.9MB
MD5f6353a888b7be0ec8741be485a011a04
SHA18430e4da749d03839bd922d2bae8373ba8c5b705
SHA256fbc94c1bfeb9e90a4006e0fe4135437bab02c55a78519cfb27139b596c85fd66
SHA512cc90f8aa4c971b5328090e4931ab1425d79389114c1d5327ecddfb4d8e0190e71b7522a4fe9ba621878df92d0dbc29601dc79f134871c04c0f22d38bc1da46c8
-
C:\Windows\System\FCGVLZM.exeFilesize
5.9MB
MD57e20ed8bbebde295b31746f4e4ad6280
SHA1ab52a986d5ba13f690ba7c000a5f3abbc6a06a26
SHA2560c75297d70735222964134fda850575e9d36854ec3b0694b82d439ef7f32ce3c
SHA51264b2d6a5d59232a5362a7b2604b0bc9cd4915b123e9e475fd8b87cd14526440b20e5e01e85613195bfeef7e71b408ada09e1aa467e87189ad5f68025ef00485d
-
C:\Windows\System\HYtopJN.exeFilesize
5.9MB
MD5926e84fa2c0094041b229843dd27baa4
SHA105d00700457d4f654fe1118b9b114c0e04ef2a98
SHA256f6ed9a7b647d43886b9025a16cbb3d5a7de29a3db27f7bfbff825a7289e253f5
SHA512d67d8dd0028b25318f9697ce35357c614776606937277be0714bb9c18cda9566709339fff577c907db74a5aae04194640cbeeded81561c675ce0102d787b0237
-
C:\Windows\System\IGqRvJd.exeFilesize
5.9MB
MD54448a99985cbd19b6f260ff0b624ef43
SHA1bc27809460754786e21dcc5b9aabbc9d7b027e9f
SHA25673d21f07548cfe6d91be177739489389681850e38cad6a03f2de5a8414ec8171
SHA512c09f4b3c9eca6190a8b32ee03e9e28609e86d6208efe356bbde16300195012ac793881d9b40a17fd2bf7cd026769a168519c26f827f18fa900e3027a1d846ceb
-
C:\Windows\System\LPvkebO.exeFilesize
5.9MB
MD59d217d8390a09d0f33f0478f132ffc3c
SHA15faf81b697f4530fd407002a88fec541bf18c24e
SHA2567c1ec8097c200f5ffe5872400f036a07d705c70dd9d4b78ae7d4034987e8252a
SHA5120dd2bde6c651ce462979a8111bb78fc2b80b62de0c621e6f2ddbdcef7b0bf7a79a1dd684f9cfc31859d19548a5cad8b7669404981813905fd8c54b289963e940
-
C:\Windows\System\XQeZnwh.exeFilesize
5.9MB
MD577b6bf3d4a4f8a4042da7cffe15f1e94
SHA1071c8630ebca7c8f34669d4afbb6e73d709346ab
SHA2567a9df16b3541cbd2d9d8504f49dd4372bc9867e5fa16745766ed388ee7adc6c0
SHA5121925fd8cfd49b25b8959c43bb7869cfc2d0bc74bc4a3bb033ebcbf14c179a108947313d0d0bd484d7e110a63d1343ae9cb00f9f77524eb28591b6c44f3bbdaf5
-
C:\Windows\System\XzNpNTg.exeFilesize
5.9MB
MD56a85d286d84dab4d193c59211b0d12a4
SHA158ece7c45fb8e087e7f9eef3d5c841b72ea481ab
SHA256532338adbb8be9a4999334da29651da8a2d6ade8e93e86145c3753644418a64c
SHA51238f8c0146ee08c6b04d36e31e1fb80d2f6410f4e2ef989efb4e5e1a5ff1e4fbde3eb6bd15ee0b1e353186518d10cd6b3fd38029ac63240a8e4a34f36d3d54f65
-
C:\Windows\System\arBEvEu.exeFilesize
5.9MB
MD5362ccf606940cac5b496286e968ad0bd
SHA1be905a7d648c1ba9e4dda8321a46ea4abc371ed1
SHA2568712a3eb4b2a791706767dd24ad2e09f8f4be04122fa4135e04884bcffea77fa
SHA5126adb17cb0d3d1d453b582320c88ca83056d383832aa528f4155988529060b865bbffd17d9778241b344a1b0c1fddea4ddd45f896996c2d5e5233f004b9b9c65d
-
C:\Windows\System\cVISEXN.exeFilesize
5.9MB
MD597a036a571071399ebbd5a223b0c096e
SHA110413d56331407101fa8b9c4403387af322a25d9
SHA25682a6354e466e7dac776efab5134354118b13c098f254d067652408a233104bb8
SHA51247a2d5d4d4d84efb124c92a8994d3824a8139247e6a47fe64eb603091cd698aac5eff5d1f0f71402a3ae00f29b5684fe062d5947bc5fae008e01f46879cc7ad6
-
C:\Windows\System\ggtSCTN.exeFilesize
5.9MB
MD59ca442d0d7929257e171c2a9c19ff610
SHA132b0a7c38ec04d2968b03307a3f0e1179055bb67
SHA2560813ba54a7fff818893464b4f3e901403392e5c3c52891082010d13bf547080d
SHA51230039a0be7ddc98d70cb29a52ca7b2333b79952efc172d5fbebad7ce1f86388a3c06b772eab33e5c3b5957bb5263dc00e2455bbd69ead0d1f0f850c3f3a41fad
-
C:\Windows\System\jhIxsjY.exeFilesize
5.9MB
MD5167d9108b158b734b22357e6bb4b1d3d
SHA19f9ff11a51d99ba7e151b765a36b5f743968a5b0
SHA256a9e751c707922c67f3f9dfb12c3cf388e5a713c95d849ef634df18a247684fdd
SHA5127a555bd53ad641f9d261b9ad177ad5e916a5ff04fdc6e2348b384152cd2b26a48eb2baf8a28ed8d3aa5bd03724772f4c1bf335ae5e090475b4db18b4380ea596
-
C:\Windows\System\mFejIsC.exeFilesize
5.9MB
MD50b9b0e6776c5dcbbdc1b4e83583bbb55
SHA10746fe836d51e3157dd5714fbb8ee6b0eb53443a
SHA2569fb157143c77ad31c0ac6f43778bd4e945402674f5d06fe91e1827e642fa3bc8
SHA51204d0ddfe6843ec3294e244ad9bea1cfe7d24eed78d1623c9b2d26f9475d327ddd92e23c841c5aaad2c124539a56eb98e8fc96bb4e9d969dbab90e2ef3ded1396
-
C:\Windows\System\nNWfsgf.exeFilesize
5.9MB
MD5e15d304daddf0e6123538b7ad653c2c5
SHA17a26d092d80e9c3fd320873c9468b076a5bc80dc
SHA256f0760aa3b8881cb537ab892b5149ee21473b0c3e16516e1a3f75a2a1627d46b5
SHA5125ac063c10da806b204d08bf46306e36f6f6d42ec8f1dca1aef115a66b102837be1f5bc50a42a83b452ea29a7637f7eb71ae47eb2fc7c57e668ec89d871aee463
-
C:\Windows\System\pQejRJb.exeFilesize
5.9MB
MD5faf9e34e8ba9d5df656f893fe8636a67
SHA1ac6237094f49c821e07eca98e0ff1eda9e611d79
SHA256f3740764c6c0063fa7544d3648c0cfb8b3ed31bd483eccef8f48da333cfb9238
SHA5120d3e3b04bc72daa69ebc974656c306c02966230925820a60f2f939609820ff00eace217b712cfb89830530ca1dbc93887966a101fc43c03dbead5245663c4660
-
C:\Windows\System\qIJbfUx.exeFilesize
5.9MB
MD5b9846647f754474587c9e9a426dc3fb7
SHA1238635fe5b917affd397c004e4890b3118f4c5af
SHA256ad4561d43ac983818097592f763b5d923ebcf21766a19259521bdd442c298041
SHA5127544791c2d5fcdac5903fc420dfc4aefd920611c919f35a1e74a210f00f2bceee3780485a5827f68e24506c5c9245706880d8045eb7c13421af40a6055108a9b
-
C:\Windows\System\rYsoJOi.exeFilesize
5.9MB
MD582161797b1efff9f36f6b789b4a52f04
SHA16593e9c715d02ecd095f345b793789db6f81e4be
SHA25630b77c295ef143a9e8ec4c526c879c3aca5a78ab5d4eb0db21055f709c82fe1a
SHA5126a24f8dbd65b6183c4c0513297cce74635ba779d38c96fcb04ac5baaa0eafbf1eb66941c6b8ecf522a6fddef400f4b5e12081d1f6cd5e45d7d263465426d6321
-
C:\Windows\System\sltNDBX.exeFilesize
5.9MB
MD5cb9d04e10ab487ff3b6d6080957708aa
SHA1b35d70d5ba357a25ac5578817000ff6e7dbbbdb2
SHA256b1833669d8f7789a6491063b702709438338cf26f99344eb4ef9ab0505e93a03
SHA512bb46ec3290b0d4ea7e07f72cabf69004853e0cb0cb45c2763e717761ad6b615bcb84f7d1c638a6aa8395959e9a4999fb86146b7260601509677c6502b86da300
-
C:\Windows\System\uNpjggG.exeFilesize
5.9MB
MD5cd3d6014ff14f2fea9e4483d92a0c4b2
SHA1c8e6b5c380be3e61136f9effe7e33e4a23b388f4
SHA256ddba55265d1bab1a6d7acb0c49ca455c263472b8453dbbde455eb024d158e4dd
SHA5128eee32ada9ddacd6a7ed637275d0aefa2560ecfaadec2b2e94de39557fdd715e3c36553e9cc5211588aa20cea46c866b1f1f0341ec9c343f4b66c4b681c08a64
-
C:\Windows\System\ynPpQwu.exeFilesize
5.9MB
MD511c62d0841dd85e69e560f52dcdd9eaf
SHA133519b58197d307b4de22517d960d8fc4deabf5a
SHA25664efb63774f69a421465fc52ea49b15043dd9e09544a35cc808bd0374917d47a
SHA512de17dc9d9d3a45efb2fe6c517857969772bf2fe2d4129ebc78566a6b5e474b34bfcd2a4ab2fbf5c3d03f5911e1a925c2960736356bdafb41ac86256ab6b340ef
-
C:\Windows\System\zVkdmau.exeFilesize
5.9MB
MD54c4bd70dbdd907f31fe3fd2f8aa82d45
SHA16a9b97bfe17ab0ab660451cec12bd68453208da9
SHA256cb232e47b05636fc3ac33f90a24e3e120f3d826d5c0f1612296406df4c43a21f
SHA512fddb3befbf32ec94f7723347408142017444e127ad825f17fae673e00b68e346d985a350f63c646dae2c803ffe6e93df7708c4785757d0c5ed14a6afad22f253
-
C:\Windows\System\zevdOdh.exeFilesize
5.9MB
MD563e922a373883a16848cc8dcc0a9f216
SHA11c7c4690269e887a65c4d65293e98502b1b5b1c5
SHA256bdfd365ad88eca958d50d265914556ac402164a7cfc8ccd66d7142e7f1b76c7f
SHA5122e8029a16907053f0a4b472162051524c5f5353408233e8dcb1b2519a5eebe99a1b8df703260419fbed1abf9eb848484059f5fdc701cc035250c2338f69c2878
-
memory/376-122-0x00007FF76D120000-0x00007FF76D474000-memory.dmpFilesize
3.3MB
-
memory/376-151-0x00007FF76D120000-0x00007FF76D474000-memory.dmpFilesize
3.3MB
-
memory/408-140-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmpFilesize
3.3MB
-
memory/408-35-0x00007FF65A180000-0x00007FF65A4D4000-memory.dmpFilesize
3.3MB
-
memory/448-127-0x00007FF74A980000-0x00007FF74ACD4000-memory.dmpFilesize
3.3MB
-
memory/448-153-0x00007FF74A980000-0x00007FF74ACD4000-memory.dmpFilesize
3.3MB
-
memory/1044-20-0x00007FF699280000-0x00007FF6995D4000-memory.dmpFilesize
3.3MB
-
memory/1044-138-0x00007FF699280000-0x00007FF6995D4000-memory.dmpFilesize
3.3MB
-
memory/1256-1-0x000001E5F1540000-0x000001E5F1550000-memory.dmpFilesize
64KB
-
memory/1256-66-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmpFilesize
3.3MB
-
memory/1256-0-0x00007FF7B9140000-0x00007FF7B9494000-memory.dmpFilesize
3.3MB
-
memory/1356-67-0x00007FF682F00000-0x00007FF683254000-memory.dmpFilesize
3.3MB
-
memory/1356-146-0x00007FF682F00000-0x00007FF683254000-memory.dmpFilesize
3.3MB
-
memory/1356-135-0x00007FF682F00000-0x00007FF683254000-memory.dmpFilesize
3.3MB
-
memory/1584-139-0x00007FF716590000-0x00007FF7168E4000-memory.dmpFilesize
3.3MB
-
memory/1584-129-0x00007FF716590000-0x00007FF7168E4000-memory.dmpFilesize
3.3MB
-
memory/1584-24-0x00007FF716590000-0x00007FF7168E4000-memory.dmpFilesize
3.3MB
-
memory/1872-55-0x00007FF61A700000-0x00007FF61AA54000-memory.dmpFilesize
3.3MB
-
memory/1872-133-0x00007FF61A700000-0x00007FF61AA54000-memory.dmpFilesize
3.3MB
-
memory/1872-144-0x00007FF61A700000-0x00007FF61AA54000-memory.dmpFilesize
3.3MB
-
memory/1880-125-0x00007FF74F190000-0x00007FF74F4E4000-memory.dmpFilesize
3.3MB
-
memory/1880-155-0x00007FF74F190000-0x00007FF74F4E4000-memory.dmpFilesize
3.3MB
-
memory/1936-150-0x00007FF69F300000-0x00007FF69F654000-memory.dmpFilesize
3.3MB
-
memory/1936-121-0x00007FF69F300000-0x00007FF69F654000-memory.dmpFilesize
3.3MB
-
memory/2116-147-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmpFilesize
3.3MB
-
memory/2116-128-0x00007FF6D7ED0000-0x00007FF6D8224000-memory.dmpFilesize
3.3MB
-
memory/2148-152-0x00007FF728A30000-0x00007FF728D84000-memory.dmpFilesize
3.3MB
-
memory/2148-123-0x00007FF728A30000-0x00007FF728D84000-memory.dmpFilesize
3.3MB
-
memory/2224-119-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmpFilesize
3.3MB
-
memory/2224-148-0x00007FF65FD70000-0x00007FF6600C4000-memory.dmpFilesize
3.3MB
-
memory/2452-136-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmpFilesize
3.3MB
-
memory/2452-8-0x00007FF6B3BE0000-0x00007FF6B3F34000-memory.dmpFilesize
3.3MB
-
memory/2692-124-0x00007FF781EA0000-0x00007FF7821F4000-memory.dmpFilesize
3.3MB
-
memory/2692-156-0x00007FF781EA0000-0x00007FF7821F4000-memory.dmpFilesize
3.3MB
-
memory/2896-61-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmpFilesize
3.3MB
-
memory/2896-134-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmpFilesize
3.3MB
-
memory/2896-145-0x00007FF6AC4F0000-0x00007FF6AC844000-memory.dmpFilesize
3.3MB
-
memory/3092-130-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmpFilesize
3.3MB
-
memory/3092-141-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmpFilesize
3.3MB
-
memory/3092-36-0x00007FF7F5EF0000-0x00007FF7F6244000-memory.dmpFilesize
3.3MB
-
memory/3156-14-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmpFilesize
3.3MB
-
memory/3156-137-0x00007FF7B0E70000-0x00007FF7B11C4000-memory.dmpFilesize
3.3MB
-
memory/3656-143-0x00007FF65B030000-0x00007FF65B384000-memory.dmpFilesize
3.3MB
-
memory/3656-49-0x00007FF65B030000-0x00007FF65B384000-memory.dmpFilesize
3.3MB
-
memory/3656-132-0x00007FF65B030000-0x00007FF65B384000-memory.dmpFilesize
3.3MB
-
memory/3992-126-0x00007FF62A8E0000-0x00007FF62AC34000-memory.dmpFilesize
3.3MB
-
memory/3992-154-0x00007FF62A8E0000-0x00007FF62AC34000-memory.dmpFilesize
3.3MB
-
memory/4172-149-0x00007FF6AC120000-0x00007FF6AC474000-memory.dmpFilesize
3.3MB
-
memory/4172-120-0x00007FF6AC120000-0x00007FF6AC474000-memory.dmpFilesize
3.3MB
-
memory/4500-131-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmpFilesize
3.3MB
-
memory/4500-142-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmpFilesize
3.3MB
-
memory/4500-43-0x00007FF6B6BD0000-0x00007FF6B6F24000-memory.dmpFilesize
3.3MB