Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 12:44
Behavioral task
behavioral1
Sample
2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe
Resource
win7-20240508-en
General
-
Target
2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe
-
Size
5.9MB
-
MD5
08f328f05ea5f5a32bd970972814cb86
-
SHA1
f509e04b5235ff363fb3dbb2ed5f838c80503ac8
-
SHA256
0580ceaa067653d75937f6c77bc24679ecb3818a6362883615739eb5f5cd8b3a
-
SHA512
787bc5a1ca62d103d2ff5d91bc524f6f1f713063f2137a435deaa921133c6a56cd2471e9e2094fcdb5c7ccd4709732fa75d46e71a808ef54adf4d1b7800cc88a
-
SSDEEP
98304:BemTLkNdfE0pZrT56utgpPFotBER/mQ32lU7:Q+u56utgpPF8u/77
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\RUDYbdX.exe cobalt_reflective_dll C:\Windows\system\UTftjcX.exe cobalt_reflective_dll C:\Windows\system\AJvJekb.exe cobalt_reflective_dll C:\Windows\system\zOLvLVM.exe cobalt_reflective_dll \Windows\system\wzdvfWx.exe cobalt_reflective_dll C:\Windows\system\mqoRaLO.exe cobalt_reflective_dll \Windows\system\WmfNMpa.exe cobalt_reflective_dll C:\Windows\system\dlWtEUd.exe cobalt_reflective_dll C:\Windows\system\tGJlmzA.exe cobalt_reflective_dll C:\Windows\system\iwByyRE.exe cobalt_reflective_dll C:\Windows\system\iImCbvm.exe cobalt_reflective_dll \Windows\system\gIzWCUF.exe cobalt_reflective_dll C:\Windows\system\NkGDSqw.exe cobalt_reflective_dll \Windows\system\cEqKFHF.exe cobalt_reflective_dll \Windows\system\UQlQmBf.exe cobalt_reflective_dll \Windows\system\ErWWhhS.exe cobalt_reflective_dll \Windows\system\BKApAke.exe cobalt_reflective_dll C:\Windows\system\YVHFXOF.exe cobalt_reflective_dll C:\Windows\system\mqHcAWZ.exe cobalt_reflective_dll C:\Windows\system\yLxBYAc.exe cobalt_reflective_dll C:\Windows\system\nCZqIKN.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule \Windows\system\RUDYbdX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\UTftjcX.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\AJvJekb.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\zOLvLVM.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\wzdvfWx.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\mqoRaLO.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\WmfNMpa.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\dlWtEUd.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\tGJlmzA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\iwByyRE.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\iImCbvm.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\gIzWCUF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\NkGDSqw.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\cEqKFHF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\UQlQmBf.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\ErWWhhS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader \Windows\system\BKApAke.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\YVHFXOF.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\mqHcAWZ.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\yLxBYAc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\system\nCZqIKN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 51 IoCs
Processes:
resource yara_rule behavioral1/memory/1520-1-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX \Windows\system\RUDYbdX.exe UPX C:\Windows\system\UTftjcX.exe UPX behavioral1/memory/1532-16-0x000000013F140000-0x000000013F494000-memory.dmp UPX behavioral1/memory/2360-14-0x000000013F1E0000-0x000000013F534000-memory.dmp UPX C:\Windows\system\AJvJekb.exe UPX C:\Windows\system\zOLvLVM.exe UPX behavioral1/memory/2828-27-0x000000013F5D0000-0x000000013F924000-memory.dmp UPX behavioral1/memory/2248-26-0x000000013F9B0000-0x000000013FD04000-memory.dmp UPX \Windows\system\wzdvfWx.exe UPX C:\Windows\system\mqoRaLO.exe UPX behavioral1/memory/2896-42-0x000000013F320000-0x000000013F674000-memory.dmp UPX behavioral1/memory/2656-35-0x000000013FC30000-0x000000013FF84000-memory.dmp UPX \Windows\system\WmfNMpa.exe UPX C:\Windows\system\dlWtEUd.exe UPX behavioral1/memory/2832-57-0x000000013F7D0000-0x000000013FB24000-memory.dmp UPX behavioral1/memory/2524-51-0x000000013F040000-0x000000013F394000-memory.dmp UPX behavioral1/memory/1520-49-0x000000013F9E0000-0x000000013FD34000-memory.dmp UPX behavioral1/memory/2248-72-0x000000013F9B0000-0x000000013FD04000-memory.dmp UPX C:\Windows\system\tGJlmzA.exe UPX C:\Windows\system\iwByyRE.exe UPX C:\Windows\system\iImCbvm.exe UPX \Windows\system\gIzWCUF.exe UPX C:\Windows\system\NkGDSqw.exe UPX \Windows\system\cEqKFHF.exe UPX \Windows\system\UQlQmBf.exe UPX \Windows\system\ErWWhhS.exe UPX behavioral1/memory/2960-86-0x000000013FD20000-0x0000000140074000-memory.dmp UPX \Windows\system\BKApAke.exe UPX behavioral1/memory/1532-69-0x000000013F140000-0x000000013F494000-memory.dmp UPX behavioral1/memory/2828-118-0x000000013F5D0000-0x000000013F924000-memory.dmp UPX C:\Windows\system\YVHFXOF.exe UPX behavioral1/memory/2568-110-0x000000013FC90000-0x000000013FFE4000-memory.dmp UPX behavioral1/memory/2240-107-0x000000013F0A0000-0x000000013F3F4000-memory.dmp UPX C:\Windows\system\mqHcAWZ.exe UPX behavioral1/memory/2564-90-0x000000013F550000-0x000000013F8A4000-memory.dmp UPX C:\Windows\system\yLxBYAc.exe UPX C:\Windows\system\nCZqIKN.exe UPX behavioral1/memory/2960-137-0x000000013FD20000-0x0000000140074000-memory.dmp UPX behavioral1/memory/2360-139-0x000000013F1E0000-0x000000013F534000-memory.dmp UPX behavioral1/memory/1532-140-0x000000013F140000-0x000000013F494000-memory.dmp UPX behavioral1/memory/2248-141-0x000000013F9B0000-0x000000013FD04000-memory.dmp UPX behavioral1/memory/2828-142-0x000000013F5D0000-0x000000013F924000-memory.dmp UPX behavioral1/memory/2656-143-0x000000013FC30000-0x000000013FF84000-memory.dmp UPX behavioral1/memory/2896-144-0x000000013F320000-0x000000013F674000-memory.dmp UPX behavioral1/memory/2524-145-0x000000013F040000-0x000000013F394000-memory.dmp UPX behavioral1/memory/2832-146-0x000000013F7D0000-0x000000013FB24000-memory.dmp UPX behavioral1/memory/2564-147-0x000000013F550000-0x000000013F8A4000-memory.dmp UPX behavioral1/memory/2568-148-0x000000013FC90000-0x000000013FFE4000-memory.dmp UPX behavioral1/memory/2240-149-0x000000013F0A0000-0x000000013F3F4000-memory.dmp UPX behavioral1/memory/2960-150-0x000000013FD20000-0x0000000140074000-memory.dmp UPX -
XMRig Miner payload 53 IoCs
Processes:
resource yara_rule behavioral1/memory/1520-1-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig \Windows\system\RUDYbdX.exe xmrig C:\Windows\system\UTftjcX.exe xmrig behavioral1/memory/1532-16-0x000000013F140000-0x000000013F494000-memory.dmp xmrig behavioral1/memory/2360-14-0x000000013F1E0000-0x000000013F534000-memory.dmp xmrig C:\Windows\system\AJvJekb.exe xmrig C:\Windows\system\zOLvLVM.exe xmrig behavioral1/memory/1520-28-0x000000013F5D0000-0x000000013F924000-memory.dmp xmrig behavioral1/memory/2828-27-0x000000013F5D0000-0x000000013F924000-memory.dmp xmrig behavioral1/memory/2248-26-0x000000013F9B0000-0x000000013FD04000-memory.dmp xmrig \Windows\system\wzdvfWx.exe xmrig C:\Windows\system\mqoRaLO.exe xmrig behavioral1/memory/2896-42-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2656-35-0x000000013FC30000-0x000000013FF84000-memory.dmp xmrig \Windows\system\WmfNMpa.exe xmrig C:\Windows\system\dlWtEUd.exe xmrig behavioral1/memory/2832-57-0x000000013F7D0000-0x000000013FB24000-memory.dmp xmrig behavioral1/memory/2524-51-0x000000013F040000-0x000000013F394000-memory.dmp xmrig behavioral1/memory/1520-49-0x000000013F9E0000-0x000000013FD34000-memory.dmp xmrig behavioral1/memory/2248-72-0x000000013F9B0000-0x000000013FD04000-memory.dmp xmrig C:\Windows\system\tGJlmzA.exe xmrig C:\Windows\system\iwByyRE.exe xmrig C:\Windows\system\iImCbvm.exe xmrig \Windows\system\gIzWCUF.exe xmrig C:\Windows\system\NkGDSqw.exe xmrig \Windows\system\cEqKFHF.exe xmrig \Windows\system\UQlQmBf.exe xmrig \Windows\system\ErWWhhS.exe xmrig behavioral1/memory/2960-86-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig \Windows\system\BKApAke.exe xmrig behavioral1/memory/1532-69-0x000000013F140000-0x000000013F494000-memory.dmp xmrig behavioral1/memory/2828-118-0x000000013F5D0000-0x000000013F924000-memory.dmp xmrig C:\Windows\system\YVHFXOF.exe xmrig behavioral1/memory/2568-110-0x000000013FC90000-0x000000013FFE4000-memory.dmp xmrig behavioral1/memory/2240-107-0x000000013F0A0000-0x000000013F3F4000-memory.dmp xmrig C:\Windows\system\mqHcAWZ.exe xmrig behavioral1/memory/2564-90-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig C:\Windows\system\yLxBYAc.exe xmrig C:\Windows\system\nCZqIKN.exe xmrig behavioral1/memory/1520-136-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig behavioral1/memory/2960-137-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig behavioral1/memory/2360-139-0x000000013F1E0000-0x000000013F534000-memory.dmp xmrig behavioral1/memory/1532-140-0x000000013F140000-0x000000013F494000-memory.dmp xmrig behavioral1/memory/2248-141-0x000000013F9B0000-0x000000013FD04000-memory.dmp xmrig behavioral1/memory/2828-142-0x000000013F5D0000-0x000000013F924000-memory.dmp xmrig behavioral1/memory/2656-143-0x000000013FC30000-0x000000013FF84000-memory.dmp xmrig behavioral1/memory/2896-144-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2524-145-0x000000013F040000-0x000000013F394000-memory.dmp xmrig behavioral1/memory/2832-146-0x000000013F7D0000-0x000000013FB24000-memory.dmp xmrig behavioral1/memory/2564-147-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig behavioral1/memory/2568-148-0x000000013FC90000-0x000000013FFE4000-memory.dmp xmrig behavioral1/memory/2240-149-0x000000013F0A0000-0x000000013F3F4000-memory.dmp xmrig behavioral1/memory/2960-150-0x000000013FD20000-0x0000000140074000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
RUDYbdX.exeUTftjcX.exeAJvJekb.exezOLvLVM.exewzdvfWx.exemqoRaLO.exeWmfNMpa.exedlWtEUd.exeiImCbvm.exenCZqIKN.exeyLxBYAc.exetGJlmzA.exemqHcAWZ.exeiwByyRE.exeYVHFXOF.exegIzWCUF.exeBKApAke.exeNkGDSqw.exeErWWhhS.exeUQlQmBf.execEqKFHF.exepid process 2360 RUDYbdX.exe 1532 UTftjcX.exe 2248 AJvJekb.exe 2828 zOLvLVM.exe 2656 wzdvfWx.exe 2896 mqoRaLO.exe 2524 WmfNMpa.exe 2832 dlWtEUd.exe 2960 iImCbvm.exe 2564 nCZqIKN.exe 2240 yLxBYAc.exe 2568 tGJlmzA.exe 1824 mqHcAWZ.exe 1940 iwByyRE.exe 1008 YVHFXOF.exe 2688 gIzWCUF.exe 2180 BKApAke.exe 2352 NkGDSqw.exe 1620 ErWWhhS.exe 1656 UQlQmBf.exe 1876 cEqKFHF.exe -
Loads dropped DLL 21 IoCs
Processes:
2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exepid process 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe -
Processes:
resource yara_rule behavioral1/memory/1520-1-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx \Windows\system\RUDYbdX.exe upx C:\Windows\system\UTftjcX.exe upx behavioral1/memory/1532-16-0x000000013F140000-0x000000013F494000-memory.dmp upx behavioral1/memory/2360-14-0x000000013F1E0000-0x000000013F534000-memory.dmp upx C:\Windows\system\AJvJekb.exe upx C:\Windows\system\zOLvLVM.exe upx behavioral1/memory/2828-27-0x000000013F5D0000-0x000000013F924000-memory.dmp upx behavioral1/memory/2248-26-0x000000013F9B0000-0x000000013FD04000-memory.dmp upx \Windows\system\wzdvfWx.exe upx C:\Windows\system\mqoRaLO.exe upx behavioral1/memory/2896-42-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2656-35-0x000000013FC30000-0x000000013FF84000-memory.dmp upx \Windows\system\WmfNMpa.exe upx C:\Windows\system\dlWtEUd.exe upx behavioral1/memory/2832-57-0x000000013F7D0000-0x000000013FB24000-memory.dmp upx behavioral1/memory/2524-51-0x000000013F040000-0x000000013F394000-memory.dmp upx behavioral1/memory/1520-49-0x000000013F9E0000-0x000000013FD34000-memory.dmp upx behavioral1/memory/2248-72-0x000000013F9B0000-0x000000013FD04000-memory.dmp upx C:\Windows\system\tGJlmzA.exe upx C:\Windows\system\iwByyRE.exe upx C:\Windows\system\iImCbvm.exe upx \Windows\system\gIzWCUF.exe upx C:\Windows\system\NkGDSqw.exe upx \Windows\system\cEqKFHF.exe upx \Windows\system\UQlQmBf.exe upx \Windows\system\ErWWhhS.exe upx behavioral1/memory/2960-86-0x000000013FD20000-0x0000000140074000-memory.dmp upx \Windows\system\BKApAke.exe upx behavioral1/memory/1532-69-0x000000013F140000-0x000000013F494000-memory.dmp upx behavioral1/memory/2828-118-0x000000013F5D0000-0x000000013F924000-memory.dmp upx C:\Windows\system\YVHFXOF.exe upx behavioral1/memory/2568-110-0x000000013FC90000-0x000000013FFE4000-memory.dmp upx behavioral1/memory/2240-107-0x000000013F0A0000-0x000000013F3F4000-memory.dmp upx C:\Windows\system\mqHcAWZ.exe upx behavioral1/memory/2564-90-0x000000013F550000-0x000000013F8A4000-memory.dmp upx C:\Windows\system\yLxBYAc.exe upx C:\Windows\system\nCZqIKN.exe upx behavioral1/memory/2960-137-0x000000013FD20000-0x0000000140074000-memory.dmp upx behavioral1/memory/2360-139-0x000000013F1E0000-0x000000013F534000-memory.dmp upx behavioral1/memory/1532-140-0x000000013F140000-0x000000013F494000-memory.dmp upx behavioral1/memory/2248-141-0x000000013F9B0000-0x000000013FD04000-memory.dmp upx behavioral1/memory/2828-142-0x000000013F5D0000-0x000000013F924000-memory.dmp upx behavioral1/memory/2656-143-0x000000013FC30000-0x000000013FF84000-memory.dmp upx behavioral1/memory/2896-144-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2524-145-0x000000013F040000-0x000000013F394000-memory.dmp upx behavioral1/memory/2832-146-0x000000013F7D0000-0x000000013FB24000-memory.dmp upx behavioral1/memory/2564-147-0x000000013F550000-0x000000013F8A4000-memory.dmp upx behavioral1/memory/2568-148-0x000000013FC90000-0x000000013FFE4000-memory.dmp upx behavioral1/memory/2240-149-0x000000013F0A0000-0x000000013F3F4000-memory.dmp upx behavioral1/memory/2960-150-0x000000013FD20000-0x0000000140074000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exedescription ioc process File created C:\Windows\System\UTftjcX.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\AJvJekb.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\wzdvfWx.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\mqoRaLO.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\dlWtEUd.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\nCZqIKN.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\gIzWCUF.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\tGJlmzA.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\ErWWhhS.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\UQlQmBf.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\cEqKFHF.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\iImCbvm.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\mqHcAWZ.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\iwByyRE.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\YVHFXOF.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\zOLvLVM.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\RUDYbdX.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\WmfNMpa.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\yLxBYAc.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\BKApAke.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe File created C:\Windows\System\NkGDSqw.exe 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exedescription pid process Token: SeLockMemoryPrivilege 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe Token: SeLockMemoryPrivilege 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exedescription pid process target process PID 1520 wrote to memory of 2360 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe RUDYbdX.exe PID 1520 wrote to memory of 2360 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe RUDYbdX.exe PID 1520 wrote to memory of 2360 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe RUDYbdX.exe PID 1520 wrote to memory of 1532 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe UTftjcX.exe PID 1520 wrote to memory of 1532 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe UTftjcX.exe PID 1520 wrote to memory of 1532 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe UTftjcX.exe PID 1520 wrote to memory of 2248 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe AJvJekb.exe PID 1520 wrote to memory of 2248 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe AJvJekb.exe PID 1520 wrote to memory of 2248 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe AJvJekb.exe PID 1520 wrote to memory of 2828 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe zOLvLVM.exe PID 1520 wrote to memory of 2828 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe zOLvLVM.exe PID 1520 wrote to memory of 2828 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe zOLvLVM.exe PID 1520 wrote to memory of 2656 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe wzdvfWx.exe PID 1520 wrote to memory of 2656 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe wzdvfWx.exe PID 1520 wrote to memory of 2656 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe wzdvfWx.exe PID 1520 wrote to memory of 2896 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe mqoRaLO.exe PID 1520 wrote to memory of 2896 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe mqoRaLO.exe PID 1520 wrote to memory of 2896 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe mqoRaLO.exe PID 1520 wrote to memory of 2524 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe WmfNMpa.exe PID 1520 wrote to memory of 2524 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe WmfNMpa.exe PID 1520 wrote to memory of 2524 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe WmfNMpa.exe PID 1520 wrote to memory of 2832 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe dlWtEUd.exe PID 1520 wrote to memory of 2832 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe dlWtEUd.exe PID 1520 wrote to memory of 2832 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe dlWtEUd.exe PID 1520 wrote to memory of 2960 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe iImCbvm.exe PID 1520 wrote to memory of 2960 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe iImCbvm.exe PID 1520 wrote to memory of 2960 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe iImCbvm.exe PID 1520 wrote to memory of 2564 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe nCZqIKN.exe PID 1520 wrote to memory of 2564 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe nCZqIKN.exe PID 1520 wrote to memory of 2564 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe nCZqIKN.exe PID 1520 wrote to memory of 2688 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe gIzWCUF.exe PID 1520 wrote to memory of 2688 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe gIzWCUF.exe PID 1520 wrote to memory of 2688 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe gIzWCUF.exe PID 1520 wrote to memory of 2240 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe yLxBYAc.exe PID 1520 wrote to memory of 2240 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe yLxBYAc.exe PID 1520 wrote to memory of 2240 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe yLxBYAc.exe PID 1520 wrote to memory of 2180 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe BKApAke.exe PID 1520 wrote to memory of 2180 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe BKApAke.exe PID 1520 wrote to memory of 2180 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe BKApAke.exe PID 1520 wrote to memory of 2568 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe tGJlmzA.exe PID 1520 wrote to memory of 2568 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe tGJlmzA.exe PID 1520 wrote to memory of 2568 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe tGJlmzA.exe PID 1520 wrote to memory of 2352 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe NkGDSqw.exe PID 1520 wrote to memory of 2352 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe NkGDSqw.exe PID 1520 wrote to memory of 2352 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe NkGDSqw.exe PID 1520 wrote to memory of 1824 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe mqHcAWZ.exe PID 1520 wrote to memory of 1824 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe mqHcAWZ.exe PID 1520 wrote to memory of 1824 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe mqHcAWZ.exe PID 1520 wrote to memory of 1620 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe ErWWhhS.exe PID 1520 wrote to memory of 1620 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe ErWWhhS.exe PID 1520 wrote to memory of 1620 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe ErWWhhS.exe PID 1520 wrote to memory of 1940 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe iwByyRE.exe PID 1520 wrote to memory of 1940 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe iwByyRE.exe PID 1520 wrote to memory of 1940 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe iwByyRE.exe PID 1520 wrote to memory of 1656 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe UQlQmBf.exe PID 1520 wrote to memory of 1656 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe UQlQmBf.exe PID 1520 wrote to memory of 1656 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe UQlQmBf.exe PID 1520 wrote to memory of 1008 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe YVHFXOF.exe PID 1520 wrote to memory of 1008 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe YVHFXOF.exe PID 1520 wrote to memory of 1008 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe YVHFXOF.exe PID 1520 wrote to memory of 1876 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe cEqKFHF.exe PID 1520 wrote to memory of 1876 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe cEqKFHF.exe PID 1520 wrote to memory of 1876 1520 2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe cEqKFHF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-11_08f328f05ea5f5a32bd970972814cb86_cobalt-strike_cobaltstrike.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\RUDYbdX.exeC:\Windows\System\RUDYbdX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UTftjcX.exeC:\Windows\System\UTftjcX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\AJvJekb.exeC:\Windows\System\AJvJekb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zOLvLVM.exeC:\Windows\System\zOLvLVM.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wzdvfWx.exeC:\Windows\System\wzdvfWx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mqoRaLO.exeC:\Windows\System\mqoRaLO.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WmfNMpa.exeC:\Windows\System\WmfNMpa.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dlWtEUd.exeC:\Windows\System\dlWtEUd.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iImCbvm.exeC:\Windows\System\iImCbvm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nCZqIKN.exeC:\Windows\System\nCZqIKN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gIzWCUF.exeC:\Windows\System\gIzWCUF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\yLxBYAc.exeC:\Windows\System\yLxBYAc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\BKApAke.exeC:\Windows\System\BKApAke.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tGJlmzA.exeC:\Windows\System\tGJlmzA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NkGDSqw.exeC:\Windows\System\NkGDSqw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mqHcAWZ.exeC:\Windows\System\mqHcAWZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ErWWhhS.exeC:\Windows\System\ErWWhhS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\iwByyRE.exeC:\Windows\System\iwByyRE.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UQlQmBf.exeC:\Windows\System\UQlQmBf.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YVHFXOF.exeC:\Windows\System\YVHFXOF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\cEqKFHF.exeC:\Windows\System\cEqKFHF.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\AJvJekb.exeFilesize
5.9MB
MD5e65774df286db516baa7efa426e8baa9
SHA19e7d0bc7cb12937a6fcb15dd0f36f47c8224e7e7
SHA256231fa48c00cae94e0b431f4442dee3242492d6947f40b1960ea6e5cfecfb1d11
SHA51212369e1f2a884723d578681cb794455fd9a62bb0c658b5b32aac8d30c126c1e90b1860a6429a08441186cd1ee8775bb27ede054a2b7b1b95158dc946c21632c4
-
C:\Windows\system\NkGDSqw.exeFilesize
5.9MB
MD5905f4ac8268a616e6df684358d84a7ad
SHA1688d6f8a9ea338b8cca48a17c5f0ddbc757b53f1
SHA256cdf9a874e0da1e9b65e633bf64d3324dbcd851778c8ccdc7afe645a1e55a0a57
SHA51209e56759cc9c61474fca73b73fe1badae6eff0412f3a416715cbbc3e5851fcb92311316ec089e8c991f0449c68f05302983a9fe8e5ce06ca5f0d9100d0bf752c
-
C:\Windows\system\UTftjcX.exeFilesize
5.9MB
MD523fec13af1b81636f7f5b0e014d46adb
SHA16e273ef3ac36e572853bf450021b7c8426cc853f
SHA256a3e3d6ec5deb0cd5b15ee827f58e721618d03597511efbeb6d80fdb8a50597bc
SHA51223351450dfa0034bc21cdeb391e01db5339480b788ac2e98d2aaa00e9eaa797b9f06ee7bab0affa12145aae4cc4b745923dcaa643c84f540261940877f8bb282
-
C:\Windows\system\YVHFXOF.exeFilesize
5.9MB
MD5d0f015347d06223c642f9a73d2211a5c
SHA1510555403f458873c1326acd0960bec21acc27d7
SHA2560369b21ea4332d4d4193d9d366ce4103a187943eff4f31975428a5f74b8ddd2f
SHA51288d5c763d397ac51498c9020875375f97ace3b4c5299c63fee9069359dfbe32b4f43256656636766ed51f6f13a7c42f843e093e82006ca739c63f77b554f68c4
-
C:\Windows\system\dlWtEUd.exeFilesize
5.9MB
MD5c32a3146eb66abeee92051ee6541f99b
SHA1c081d4052d639806c63134eee14df5c211b14d78
SHA256b1ed598df9f6359e85173b8fe1e91ffc64e2591950ae17c8900130994b806eda
SHA51221351401a5ce0e843d4151d7270f610a718e3c2fb940946e1efef4669aa3a1c334e28a19a07a35c770f6531d8741e57a040cc8588d4fda56dae9542fb29f46cf
-
C:\Windows\system\iImCbvm.exeFilesize
5.9MB
MD5d1a8bd3bcb40dc3ffae1473dc209ee54
SHA1cf6b092179d7a80e86ab71a5b75c5a5507dcc940
SHA256795e77873a90a6f74fe433467c1767564c0bfaa8a9c46f7d363b9950b60ff6c6
SHA5125562a1bbea583e84297ff2c267dd0936641597b7f718964cc3d7d1f9d7fe1d046df679ae401fb55fbed1f35752c6cc85718d85329e7579ee5c8bfb13e051caca
-
C:\Windows\system\iwByyRE.exeFilesize
5.9MB
MD552cad4a4df933a83f0fee457a028d0d4
SHA15e71e99bdfeee835f8b06818985bf70a13f1f512
SHA2567cb70aa80c35b9ee4951dcda808bf500eecf7cc26297268a1f4ce452d8457c8f
SHA51232c831b758e8a08a32392fb4f6890d0cd64c586178547db1c647b7d7125f966af8ac24ce3db994ff3c4ef0681c203b9a9f22b661deb20b731fdee8a92b1aae10
-
C:\Windows\system\mqHcAWZ.exeFilesize
5.9MB
MD5453f016633a4bd3d6d1fdcdd9315b66f
SHA1df9b6677bd3d411e8b8a2f5685c61604afb96b73
SHA256370301e6cf8ad3c3973a1ba336603712e205a1645d7005395a7a5d2a9be4fa8e
SHA512a9efa9f559f0e0b990cb53976487498af2a784d368f05f76bb4ed369c494ef27d721d2732b93668f12b8fdb69f290749b466d17107ae652474abeaea225794f2
-
C:\Windows\system\mqoRaLO.exeFilesize
5.9MB
MD51a2cb4f3c64d08565ce99f3b2a782044
SHA1d29e73dca57bf428b6f1a1f54a9786234ac3af52
SHA2567d66569b265bcc7859dbef47e4f090d0b512ff32601127bf294b317978d51233
SHA51205f28077a16770646d0080379a95be4525d62a3879078c251d3640c65a13c5f01ee78c3b5ad8399cce40c1bd4caed0fc56aa5415266d24a6bd44a50f63537614
-
C:\Windows\system\nCZqIKN.exeFilesize
5.9MB
MD5729432aaa5b114ff03ad680fa4950adf
SHA140714493e02f1ffd585bff7b9533c2cfc36224ba
SHA256453d5fe7c6eeb11f6e4528642fe8c8372813abe7192f9ddc15484fcdb34a9e95
SHA5125f7283593868484658eee73a9efa99402877f452763ea8dbf25e398fb51f88bb8d1d53364cb377559cf0e1cc1b791f625805440588c38d16e77317fcd2ade5da
-
C:\Windows\system\tGJlmzA.exeFilesize
5.9MB
MD52ca1041dbc658610faf630960d958cc7
SHA16fc9e47dfb3b0eeba160a23b5febdc94b7b77df6
SHA2564e03767fe5234b734b6e28fbe4926ca0b181a935a1e352443cdc1b8936efc006
SHA5126a660097289f3b5e184066c30b3210853009e6a1c507fb19b97e0b5c17f6d886c0d10efd7d526fc44f77e95f69b4902ad4f64fdd19501d66d1108343a5c1db30
-
C:\Windows\system\yLxBYAc.exeFilesize
5.9MB
MD501e1d40b01ac6596ffe2d4b91c2e7a18
SHA14db6c050b696c4507841804a730f86892021b87f
SHA256d6b23b981947e903ffc07f71505e5f2132e81b57a2d06493879a67ee3a7480ed
SHA512b2b3f4369267579c8930cf31bc7dcc39b11b39e5a280b994bd4dd0f5f4f593992a486641035c50f1c40ee54a8f6e7ace78efd0565e39d76031a7e39419044ded
-
C:\Windows\system\zOLvLVM.exeFilesize
5.9MB
MD50169c44c64beaf6e303b5b6b7da37a7c
SHA18ff599847e9e50576b46f8ce40505f70f3b4c1ca
SHA2565895c15b8e8780b468e88c93db97771d44e2bfdc051019789fb3737d3b897326
SHA5125f8513723601ae63f61a05383c3d4c8c52261462466aae20bcc168e7060ae961aab234c69889a713ab4ecf8ca8927a719cbec2dd572a2b4459db18215b569bdc
-
\Windows\system\BKApAke.exeFilesize
5.9MB
MD549a5604ce4ed5020ab15ecec3ca7114a
SHA1ed85a8aa348a58c0cdec114b5e5a3b93be4841ce
SHA25681f3cac444d30b5038f71cd924933993eae2dafe842717fd38735799f7c7f608
SHA512b6dbadd27ebca58bd62645205f3330ea102bfafcacd3510b415a4007c6e23704806d8562342eec6c9162d19e77a0eb121e241712b09fc719ca988bc53f9bb080
-
\Windows\system\ErWWhhS.exeFilesize
5.9MB
MD569de93702911b037b2a405aebffb1699
SHA1f808c6e39a16efc57a007e9d824515f5754f48c1
SHA256117632220e728b3c0ed0b3e245ea07ca4e40dc248de16fa77e8f118abea43af3
SHA5120a8448f590faeeba4b2a15d10f2cadc1df567d29a62a591160be587660bb03ffd5780181c36b3b1153b91406336ab0fd4da3ee714e221de2f9f8c9db4c348426
-
\Windows\system\RUDYbdX.exeFilesize
5.9MB
MD5331d95777bf52a8f06052834c6c241dd
SHA1e263cda4aeaaed59aabf42ff91ebd3457fb4e45b
SHA256c2cbebad4c4ac1aae80adee73ac81a4ac1d5b6f09bb07129c91a67af0e7a56c9
SHA512f9ac074ef5f0a6acfefab22b5cc761f92be32da518c82da082ffbbc90b607f336ec8c02bb5ac310e2de0b3e120a83e9059ba2f563dbe330333d3194954835ee7
-
\Windows\system\UQlQmBf.exeFilesize
5.9MB
MD5f9151ac357509927a3a65a753db44be4
SHA14f90339b969703857165675a27473cade1e7b910
SHA2569a010c54b64fbbb76d29af96843a8f435add0d2097a329462989bb2276006faa
SHA5126d447fd4064e3d8609db38f0071a07f0d4a010ae3fd2da60cf2de40aaf6476b12113bcaa4f527e5b98465bb915c9e1d318556f477e4331d8fd2f6a3e239f0456
-
\Windows\system\WmfNMpa.exeFilesize
5.9MB
MD5026d980d7b4bb11dea3f8a49f4784166
SHA1492dc94e631e9797893e511644de3ea70336a89f
SHA256d083bbc6df8dcad8254203017deeaf07df93073e13c813c9e5c45b8d8e63d81f
SHA512c94a65ed15a8b0fd65d859e60ff0acc8ea04cabdc262c0e15d1fb3b1f87f476baf8b14d5c6c621b5715e89353bd3efc04443f4cf60fe2a4dcd912fa32c671817
-
\Windows\system\cEqKFHF.exeFilesize
5.9MB
MD5ad0f20db10900c6f2866788fdc3b958a
SHA1ca6857c07b888f92c8318b4e860f4fa5fb7e553b
SHA256ea5335648aef9b3bbca171a2b97e8d87de5ec3c0a6a7d49507cb23cafba254f9
SHA512bfadcdf6b7b60e1540115c0c49b7dc2bc785c1e2ae07f0f894efc8b05e6d1df998ad8813d3e0cf2eb301469e24cc8538ae060b8f6b937bd3df96ee504b442a6c
-
\Windows\system\gIzWCUF.exeFilesize
5.9MB
MD5b7d6a09103695c8357f328cddc75c5dd
SHA143352d8b8621a61a73bb067ba27b47a42aa4658a
SHA2562f1559b9ccffe5ac6e4c5bcc9a51e79a56cc4511ef5ff60b5c3758b105971ff8
SHA5129b5d8b83881acff29899c5ee54c4d617c7430c6202ed2c9af7e3e4400815573dbdd7ae976df7ffa468336e96ff2d4064daeec523b78de7255fab1a194c8afa14
-
\Windows\system\wzdvfWx.exeFilesize
5.9MB
MD5d38fd6b3b6c239944b3bf8f12abadcce
SHA1fdcc974a7ac765768383ce4f06cc963e4e428540
SHA256239efb5d9880eaf459298bd353f053f9146b42a2e9ba578492e4ec3e6fd77e29
SHA512516cd2353aac91cdee2af8a4cb6304b8ca0cb6a3a15a951adf9bafedc2ebf415fa87692a3ea02d4d2a2cbf7df60d83b5c2153d175a0169354d28364da088bf36
-
memory/1520-120-0x000000013F0A0000-0x000000013F3F4000-memory.dmpFilesize
3.3MB
-
memory/1520-0-0x0000000000300000-0x0000000000310000-memory.dmpFilesize
64KB
-
memory/1520-50-0x000000013F1E0000-0x000000013F534000-memory.dmpFilesize
3.3MB
-
memory/1520-49-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/1520-135-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/1520-63-0x0000000002320000-0x0000000002674000-memory.dmpFilesize
3.3MB
-
memory/1520-41-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/1520-117-0x000000013F2B0000-0x000000013F604000-memory.dmpFilesize
3.3MB
-
memory/1520-44-0x000000013F040000-0x000000013F394000-memory.dmpFilesize
3.3MB
-
memory/1520-138-0x000000013F0A0000-0x000000013F3F4000-memory.dmpFilesize
3.3MB
-
memory/1520-12-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/1520-136-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/1520-1-0x000000013F9E0000-0x000000013FD34000-memory.dmpFilesize
3.3MB
-
memory/1520-81-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/1520-28-0x000000013F5D0000-0x000000013F924000-memory.dmpFilesize
3.3MB
-
memory/1520-100-0x0000000002320000-0x0000000002674000-memory.dmpFilesize
3.3MB
-
memory/1520-11-0x000000013F1E0000-0x000000013F534000-memory.dmpFilesize
3.3MB
-
memory/1520-121-0x0000000002320000-0x0000000002674000-memory.dmpFilesize
3.3MB
-
memory/1532-69-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/1532-16-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/1532-140-0x000000013F140000-0x000000013F494000-memory.dmpFilesize
3.3MB
-
memory/2240-107-0x000000013F0A0000-0x000000013F3F4000-memory.dmpFilesize
3.3MB
-
memory/2240-149-0x000000013F0A0000-0x000000013F3F4000-memory.dmpFilesize
3.3MB
-
memory/2248-26-0x000000013F9B0000-0x000000013FD04000-memory.dmpFilesize
3.3MB
-
memory/2248-141-0x000000013F9B0000-0x000000013FD04000-memory.dmpFilesize
3.3MB
-
memory/2248-72-0x000000013F9B0000-0x000000013FD04000-memory.dmpFilesize
3.3MB
-
memory/2360-139-0x000000013F1E0000-0x000000013F534000-memory.dmpFilesize
3.3MB
-
memory/2360-14-0x000000013F1E0000-0x000000013F534000-memory.dmpFilesize
3.3MB
-
memory/2524-51-0x000000013F040000-0x000000013F394000-memory.dmpFilesize
3.3MB
-
memory/2524-145-0x000000013F040000-0x000000013F394000-memory.dmpFilesize
3.3MB
-
memory/2564-90-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/2564-147-0x000000013F550000-0x000000013F8A4000-memory.dmpFilesize
3.3MB
-
memory/2568-110-0x000000013FC90000-0x000000013FFE4000-memory.dmpFilesize
3.3MB
-
memory/2568-148-0x000000013FC90000-0x000000013FFE4000-memory.dmpFilesize
3.3MB
-
memory/2656-35-0x000000013FC30000-0x000000013FF84000-memory.dmpFilesize
3.3MB
-
memory/2656-143-0x000000013FC30000-0x000000013FF84000-memory.dmpFilesize
3.3MB
-
memory/2828-27-0x000000013F5D0000-0x000000013F924000-memory.dmpFilesize
3.3MB
-
memory/2828-118-0x000000013F5D0000-0x000000013F924000-memory.dmpFilesize
3.3MB
-
memory/2828-142-0x000000013F5D0000-0x000000013F924000-memory.dmpFilesize
3.3MB
-
memory/2832-57-0x000000013F7D0000-0x000000013FB24000-memory.dmpFilesize
3.3MB
-
memory/2832-146-0x000000013F7D0000-0x000000013FB24000-memory.dmpFilesize
3.3MB
-
memory/2896-144-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/2896-42-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/2960-137-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB
-
memory/2960-86-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB
-
memory/2960-150-0x000000013FD20000-0x0000000140074000-memory.dmpFilesize
3.3MB