Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 00:02
Behavioral task
behavioral1
Sample
2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240419-en
General
-
Target
2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.9MB
-
MD5
2d406d9f1318c70a630caebc5f9cd253
-
SHA1
c3af47f0cc5b6a85956ce9fea7691bb3320a8a5c
-
SHA256
b501f3100bfac73023d7772e7fec733787acf11561c6c0bd6c0f34ba0682ae58
-
SHA512
4c240306750f36661f1ed4fb20edc53f2074f4f6c288ed7baa7a779f137d7dfb3799bd8c3e1c0d9fefb05c63d5070b85d9cdbfcdde253d81ed96ecf21b8284ff
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUj:Q+856utgpPF8u/7j
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\Windows\System\bOjnijp.exe cobalt_reflective_dll C:\Windows\System\LNPwPcB.exe cobalt_reflective_dll C:\Windows\System\DFHEDmv.exe cobalt_reflective_dll C:\Windows\System\SEXMdTw.exe cobalt_reflective_dll C:\Windows\System\ZcFAASW.exe cobalt_reflective_dll C:\Windows\System\aqAnxVr.exe cobalt_reflective_dll C:\Windows\System\StulbEu.exe cobalt_reflective_dll C:\Windows\System\lMfFUdk.exe cobalt_reflective_dll C:\Windows\System\Wloeezj.exe cobalt_reflective_dll C:\Windows\System\GKlAixp.exe cobalt_reflective_dll C:\Windows\System\bCgKacg.exe cobalt_reflective_dll C:\Windows\System\lEjoXtk.exe cobalt_reflective_dll C:\Windows\System\RUmRLbR.exe cobalt_reflective_dll C:\Windows\System\SaVDShz.exe cobalt_reflective_dll C:\Windows\System\zagAOab.exe cobalt_reflective_dll C:\Windows\System\PXDakyW.exe cobalt_reflective_dll C:\Windows\System\heawLuc.exe cobalt_reflective_dll C:\Windows\System\ZuJDENN.exe cobalt_reflective_dll C:\Windows\System\KjatxbA.exe cobalt_reflective_dll C:\Windows\System\tAAXhKS.exe cobalt_reflective_dll C:\Windows\System\wcTqzAn.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detects Reflective DLL injection artifacts 21 IoCs
Processes:
resource yara_rule C:\Windows\System\bOjnijp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\LNPwPcB.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\DFHEDmv.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\SEXMdTw.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\ZcFAASW.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\aqAnxVr.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\StulbEu.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\lMfFUdk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\Wloeezj.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\GKlAixp.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\bCgKacg.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\lEjoXtk.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\RUmRLbR.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\SaVDShz.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\zagAOab.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\PXDakyW.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\heawLuc.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\ZuJDENN.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\KjatxbA.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\tAAXhKS.exe INDICATOR_SUSPICIOUS_ReflectiveLoader C:\Windows\System\wcTqzAn.exe INDICATOR_SUSPICIOUS_ReflectiveLoader -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral2/memory/380-0-0x00007FF799DB0000-0x00007FF79A104000-memory.dmp UPX C:\Windows\System\bOjnijp.exe UPX behavioral2/memory/3820-7-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp UPX C:\Windows\System\LNPwPcB.exe UPX behavioral2/memory/3988-12-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp UPX C:\Windows\System\DFHEDmv.exe UPX behavioral2/memory/4392-20-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp UPX C:\Windows\System\SEXMdTw.exe UPX behavioral2/memory/5020-24-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp UPX C:\Windows\System\ZcFAASW.exe UPX behavioral2/memory/3164-31-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp UPX C:\Windows\System\aqAnxVr.exe UPX behavioral2/memory/4000-36-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp UPX C:\Windows\System\StulbEu.exe UPX C:\Windows\System\lMfFUdk.exe UPX behavioral2/memory/3196-48-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmp UPX behavioral2/memory/4200-43-0x00007FF604550000-0x00007FF6048A4000-memory.dmp UPX C:\Windows\System\Wloeezj.exe UPX behavioral2/memory/1564-56-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmp UPX C:\Windows\System\GKlAixp.exe UPX C:\Windows\System\bCgKacg.exe UPX behavioral2/memory/1264-73-0x00007FF682460000-0x00007FF6827B4000-memory.dmp UPX C:\Windows\System\lEjoXtk.exe UPX behavioral2/memory/2324-74-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmp UPX behavioral2/memory/3820-71-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp UPX behavioral2/memory/2172-65-0x00007FF72CB30000-0x00007FF72CE84000-memory.dmp UPX behavioral2/memory/380-62-0x00007FF799DB0000-0x00007FF79A104000-memory.dmp UPX C:\Windows\System\RUmRLbR.exe UPX behavioral2/memory/3988-82-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp UPX behavioral2/memory/3472-85-0x00007FF6C0450000-0x00007FF6C07A4000-memory.dmp UPX C:\Windows\System\SaVDShz.exe UPX C:\Windows\System\zagAOab.exe UPX behavioral2/memory/5020-95-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp UPX behavioral2/memory/2056-96-0x00007FF662100000-0x00007FF662454000-memory.dmp UPX behavioral2/memory/1624-90-0x00007FF7EEB70000-0x00007FF7EEEC4000-memory.dmp UPX behavioral2/memory/4392-89-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp UPX C:\Windows\System\PXDakyW.exe UPX behavioral2/memory/4316-102-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmp UPX behavioral2/memory/3164-101-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp UPX C:\Windows\System\heawLuc.exe UPX behavioral2/memory/528-111-0x00007FF618750000-0x00007FF618AA4000-memory.dmp UPX C:\Windows\System\ZuJDENN.exe UPX behavioral2/memory/4000-110-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp UPX behavioral2/memory/4200-116-0x00007FF604550000-0x00007FF6048A4000-memory.dmp UPX behavioral2/memory/828-118-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmp UPX C:\Windows\System\KjatxbA.exe UPX behavioral2/memory/3196-124-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmp UPX behavioral2/memory/928-125-0x00007FF621FD0000-0x00007FF622324000-memory.dmp UPX C:\Windows\System\tAAXhKS.exe UPX C:\Windows\System\wcTqzAn.exe UPX behavioral2/memory/1564-135-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmp UPX behavioral2/memory/1312-136-0x00007FF61CCE0000-0x00007FF61D034000-memory.dmp UPX behavioral2/memory/1672-137-0x00007FF6083D0000-0x00007FF608724000-memory.dmp UPX behavioral2/memory/2324-138-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmp UPX behavioral2/memory/2056-139-0x00007FF662100000-0x00007FF662454000-memory.dmp UPX behavioral2/memory/4316-140-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmp UPX behavioral2/memory/828-141-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmp UPX behavioral2/memory/928-142-0x00007FF621FD0000-0x00007FF622324000-memory.dmp UPX behavioral2/memory/3820-143-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp UPX behavioral2/memory/3988-144-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp UPX behavioral2/memory/4392-145-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp UPX behavioral2/memory/5020-146-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp UPX behavioral2/memory/3164-147-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp UPX behavioral2/memory/4000-148-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/380-0-0x00007FF799DB0000-0x00007FF79A104000-memory.dmp xmrig C:\Windows\System\bOjnijp.exe xmrig behavioral2/memory/3820-7-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp xmrig C:\Windows\System\LNPwPcB.exe xmrig behavioral2/memory/3988-12-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp xmrig C:\Windows\System\DFHEDmv.exe xmrig behavioral2/memory/4392-20-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp xmrig C:\Windows\System\SEXMdTw.exe xmrig behavioral2/memory/5020-24-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp xmrig C:\Windows\System\ZcFAASW.exe xmrig behavioral2/memory/3164-31-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp xmrig C:\Windows\System\aqAnxVr.exe xmrig behavioral2/memory/4000-36-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp xmrig C:\Windows\System\StulbEu.exe xmrig C:\Windows\System\lMfFUdk.exe xmrig behavioral2/memory/3196-48-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmp xmrig behavioral2/memory/4200-43-0x00007FF604550000-0x00007FF6048A4000-memory.dmp xmrig C:\Windows\System\Wloeezj.exe xmrig behavioral2/memory/1564-56-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmp xmrig C:\Windows\System\GKlAixp.exe xmrig C:\Windows\System\bCgKacg.exe xmrig behavioral2/memory/1264-73-0x00007FF682460000-0x00007FF6827B4000-memory.dmp xmrig C:\Windows\System\lEjoXtk.exe xmrig behavioral2/memory/2324-74-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmp xmrig behavioral2/memory/3820-71-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp xmrig behavioral2/memory/2172-65-0x00007FF72CB30000-0x00007FF72CE84000-memory.dmp xmrig behavioral2/memory/380-62-0x00007FF799DB0000-0x00007FF79A104000-memory.dmp xmrig C:\Windows\System\RUmRLbR.exe xmrig behavioral2/memory/3988-82-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp xmrig behavioral2/memory/3472-85-0x00007FF6C0450000-0x00007FF6C07A4000-memory.dmp xmrig C:\Windows\System\SaVDShz.exe xmrig C:\Windows\System\zagAOab.exe xmrig behavioral2/memory/5020-95-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp xmrig behavioral2/memory/2056-96-0x00007FF662100000-0x00007FF662454000-memory.dmp xmrig behavioral2/memory/1624-90-0x00007FF7EEB70000-0x00007FF7EEEC4000-memory.dmp xmrig behavioral2/memory/4392-89-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp xmrig C:\Windows\System\PXDakyW.exe xmrig behavioral2/memory/4316-102-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmp xmrig behavioral2/memory/3164-101-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp xmrig C:\Windows\System\heawLuc.exe xmrig behavioral2/memory/528-111-0x00007FF618750000-0x00007FF618AA4000-memory.dmp xmrig C:\Windows\System\ZuJDENN.exe xmrig behavioral2/memory/4000-110-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp xmrig behavioral2/memory/4200-116-0x00007FF604550000-0x00007FF6048A4000-memory.dmp xmrig behavioral2/memory/828-118-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmp xmrig C:\Windows\System\KjatxbA.exe xmrig behavioral2/memory/3196-124-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmp xmrig behavioral2/memory/928-125-0x00007FF621FD0000-0x00007FF622324000-memory.dmp xmrig C:\Windows\System\tAAXhKS.exe xmrig C:\Windows\System\wcTqzAn.exe xmrig behavioral2/memory/1564-135-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmp xmrig behavioral2/memory/1312-136-0x00007FF61CCE0000-0x00007FF61D034000-memory.dmp xmrig behavioral2/memory/1672-137-0x00007FF6083D0000-0x00007FF608724000-memory.dmp xmrig behavioral2/memory/2324-138-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmp xmrig behavioral2/memory/2056-139-0x00007FF662100000-0x00007FF662454000-memory.dmp xmrig behavioral2/memory/4316-140-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmp xmrig behavioral2/memory/828-141-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmp xmrig behavioral2/memory/928-142-0x00007FF621FD0000-0x00007FF622324000-memory.dmp xmrig behavioral2/memory/3820-143-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp xmrig behavioral2/memory/3988-144-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp xmrig behavioral2/memory/4392-145-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp xmrig behavioral2/memory/5020-146-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp xmrig behavioral2/memory/3164-147-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp xmrig behavioral2/memory/4000-148-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
bOjnijp.exeLNPwPcB.exeDFHEDmv.exeSEXMdTw.exeZcFAASW.exeaqAnxVr.exeStulbEu.exelMfFUdk.exeWloeezj.exeGKlAixp.exebCgKacg.exelEjoXtk.exeRUmRLbR.exeSaVDShz.exezagAOab.exePXDakyW.exeheawLuc.exeZuJDENN.exeKjatxbA.exetAAXhKS.exewcTqzAn.exepid process 3820 bOjnijp.exe 3988 LNPwPcB.exe 4392 DFHEDmv.exe 5020 SEXMdTw.exe 3164 ZcFAASW.exe 4000 aqAnxVr.exe 4200 StulbEu.exe 3196 lMfFUdk.exe 1564 Wloeezj.exe 2172 GKlAixp.exe 1264 bCgKacg.exe 2324 lEjoXtk.exe 3472 RUmRLbR.exe 1624 SaVDShz.exe 2056 zagAOab.exe 4316 PXDakyW.exe 528 heawLuc.exe 828 ZuJDENN.exe 928 KjatxbA.exe 1312 tAAXhKS.exe 1672 wcTqzAn.exe -
Processes:
resource yara_rule behavioral2/memory/380-0-0x00007FF799DB0000-0x00007FF79A104000-memory.dmp upx C:\Windows\System\bOjnijp.exe upx behavioral2/memory/3820-7-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp upx C:\Windows\System\LNPwPcB.exe upx behavioral2/memory/3988-12-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp upx C:\Windows\System\DFHEDmv.exe upx behavioral2/memory/4392-20-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp upx C:\Windows\System\SEXMdTw.exe upx behavioral2/memory/5020-24-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp upx C:\Windows\System\ZcFAASW.exe upx behavioral2/memory/3164-31-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp upx C:\Windows\System\aqAnxVr.exe upx behavioral2/memory/4000-36-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp upx C:\Windows\System\StulbEu.exe upx C:\Windows\System\lMfFUdk.exe upx behavioral2/memory/3196-48-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmp upx behavioral2/memory/4200-43-0x00007FF604550000-0x00007FF6048A4000-memory.dmp upx C:\Windows\System\Wloeezj.exe upx behavioral2/memory/1564-56-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmp upx C:\Windows\System\GKlAixp.exe upx C:\Windows\System\bCgKacg.exe upx behavioral2/memory/1264-73-0x00007FF682460000-0x00007FF6827B4000-memory.dmp upx C:\Windows\System\lEjoXtk.exe upx behavioral2/memory/2324-74-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmp upx behavioral2/memory/3820-71-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp upx behavioral2/memory/2172-65-0x00007FF72CB30000-0x00007FF72CE84000-memory.dmp upx behavioral2/memory/380-62-0x00007FF799DB0000-0x00007FF79A104000-memory.dmp upx C:\Windows\System\RUmRLbR.exe upx behavioral2/memory/3988-82-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp upx behavioral2/memory/3472-85-0x00007FF6C0450000-0x00007FF6C07A4000-memory.dmp upx C:\Windows\System\SaVDShz.exe upx C:\Windows\System\zagAOab.exe upx behavioral2/memory/5020-95-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp upx behavioral2/memory/2056-96-0x00007FF662100000-0x00007FF662454000-memory.dmp upx behavioral2/memory/1624-90-0x00007FF7EEB70000-0x00007FF7EEEC4000-memory.dmp upx behavioral2/memory/4392-89-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp upx C:\Windows\System\PXDakyW.exe upx behavioral2/memory/4316-102-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmp upx behavioral2/memory/3164-101-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp upx C:\Windows\System\heawLuc.exe upx behavioral2/memory/528-111-0x00007FF618750000-0x00007FF618AA4000-memory.dmp upx C:\Windows\System\ZuJDENN.exe upx behavioral2/memory/4000-110-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp upx behavioral2/memory/4200-116-0x00007FF604550000-0x00007FF6048A4000-memory.dmp upx behavioral2/memory/828-118-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmp upx C:\Windows\System\KjatxbA.exe upx behavioral2/memory/3196-124-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmp upx behavioral2/memory/928-125-0x00007FF621FD0000-0x00007FF622324000-memory.dmp upx C:\Windows\System\tAAXhKS.exe upx C:\Windows\System\wcTqzAn.exe upx behavioral2/memory/1564-135-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmp upx behavioral2/memory/1312-136-0x00007FF61CCE0000-0x00007FF61D034000-memory.dmp upx behavioral2/memory/1672-137-0x00007FF6083D0000-0x00007FF608724000-memory.dmp upx behavioral2/memory/2324-138-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmp upx behavioral2/memory/2056-139-0x00007FF662100000-0x00007FF662454000-memory.dmp upx behavioral2/memory/4316-140-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmp upx behavioral2/memory/828-141-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmp upx behavioral2/memory/928-142-0x00007FF621FD0000-0x00007FF622324000-memory.dmp upx behavioral2/memory/3820-143-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmp upx behavioral2/memory/3988-144-0x00007FF647C60000-0x00007FF647FB4000-memory.dmp upx behavioral2/memory/4392-145-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmp upx behavioral2/memory/5020-146-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmp upx behavioral2/memory/3164-147-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmp upx behavioral2/memory/4000-148-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exedescription ioc process File created C:\Windows\System\DFHEDmv.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\Wloeezj.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\GKlAixp.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bCgKacg.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZuJDENN.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\KjatxbA.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\tAAXhKS.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SEXMdTw.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\ZcFAASW.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\aqAnxVr.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\RUmRLbR.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\SaVDShz.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\heawLuc.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\wcTqzAn.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\bOjnijp.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\zagAOab.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\LNPwPcB.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\StulbEu.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lMfFUdk.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\lEjoXtk.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe File created C:\Windows\System\PXDakyW.exe 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process Token: SeLockMemoryPrivilege 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exedescription pid process target process PID 380 wrote to memory of 3820 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe bOjnijp.exe PID 380 wrote to memory of 3820 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe bOjnijp.exe PID 380 wrote to memory of 3988 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe LNPwPcB.exe PID 380 wrote to memory of 3988 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe LNPwPcB.exe PID 380 wrote to memory of 4392 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe DFHEDmv.exe PID 380 wrote to memory of 4392 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe DFHEDmv.exe PID 380 wrote to memory of 5020 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe SEXMdTw.exe PID 380 wrote to memory of 5020 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe SEXMdTw.exe PID 380 wrote to memory of 3164 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe ZcFAASW.exe PID 380 wrote to memory of 3164 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe ZcFAASW.exe PID 380 wrote to memory of 4000 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe aqAnxVr.exe PID 380 wrote to memory of 4000 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe aqAnxVr.exe PID 380 wrote to memory of 4200 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe StulbEu.exe PID 380 wrote to memory of 4200 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe StulbEu.exe PID 380 wrote to memory of 3196 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe lMfFUdk.exe PID 380 wrote to memory of 3196 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe lMfFUdk.exe PID 380 wrote to memory of 1564 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe Wloeezj.exe PID 380 wrote to memory of 1564 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe Wloeezj.exe PID 380 wrote to memory of 2172 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe GKlAixp.exe PID 380 wrote to memory of 2172 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe GKlAixp.exe PID 380 wrote to memory of 1264 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe bCgKacg.exe PID 380 wrote to memory of 1264 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe bCgKacg.exe PID 380 wrote to memory of 2324 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe lEjoXtk.exe PID 380 wrote to memory of 2324 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe lEjoXtk.exe PID 380 wrote to memory of 3472 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe RUmRLbR.exe PID 380 wrote to memory of 3472 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe RUmRLbR.exe PID 380 wrote to memory of 1624 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe SaVDShz.exe PID 380 wrote to memory of 1624 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe SaVDShz.exe PID 380 wrote to memory of 2056 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe zagAOab.exe PID 380 wrote to memory of 2056 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe zagAOab.exe PID 380 wrote to memory of 4316 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe PXDakyW.exe PID 380 wrote to memory of 4316 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe PXDakyW.exe PID 380 wrote to memory of 528 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe heawLuc.exe PID 380 wrote to memory of 528 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe heawLuc.exe PID 380 wrote to memory of 828 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe ZuJDENN.exe PID 380 wrote to memory of 828 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe ZuJDENN.exe PID 380 wrote to memory of 928 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe KjatxbA.exe PID 380 wrote to memory of 928 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe KjatxbA.exe PID 380 wrote to memory of 1312 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe tAAXhKS.exe PID 380 wrote to memory of 1312 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe tAAXhKS.exe PID 380 wrote to memory of 1672 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe wcTqzAn.exe PID 380 wrote to memory of 1672 380 2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe wcTqzAn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-27_2d406d9f1318c70a630caebc5f9cd253_cobalt-strike_cobaltstrike_poet-rat.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\bOjnijp.exeC:\Windows\System\bOjnijp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LNPwPcB.exeC:\Windows\System\LNPwPcB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DFHEDmv.exeC:\Windows\System\DFHEDmv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SEXMdTw.exeC:\Windows\System\SEXMdTw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZcFAASW.exeC:\Windows\System\ZcFAASW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aqAnxVr.exeC:\Windows\System\aqAnxVr.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\StulbEu.exeC:\Windows\System\StulbEu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lMfFUdk.exeC:\Windows\System\lMfFUdk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\Wloeezj.exeC:\Windows\System\Wloeezj.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\GKlAixp.exeC:\Windows\System\GKlAixp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bCgKacg.exeC:\Windows\System\bCgKacg.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lEjoXtk.exeC:\Windows\System\lEjoXtk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RUmRLbR.exeC:\Windows\System\RUmRLbR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\SaVDShz.exeC:\Windows\System\SaVDShz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zagAOab.exeC:\Windows\System\zagAOab.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\PXDakyW.exeC:\Windows\System\PXDakyW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\heawLuc.exeC:\Windows\System\heawLuc.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZuJDENN.exeC:\Windows\System\ZuJDENN.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KjatxbA.exeC:\Windows\System\KjatxbA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\tAAXhKS.exeC:\Windows\System\tAAXhKS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wcTqzAn.exeC:\Windows\System\wcTqzAn.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System\DFHEDmv.exeFilesize
5.9MB
MD53ae9f7afeca901af6f3eecb50547ee35
SHA1718e45016eb114e2f16cafe538ec715e61c56e38
SHA256f992bf32a14d8f4908fe24b0a7f26141d8ff9862ad6d85adc82ed645988ad591
SHA5121addcebacf1927eea4e5920673ea5af9760aab151f39942cea38abce5bb7b9a7718aacb7e769093cd9a7239e432996c3bba5986cce6dd798a609068f37d1f8c0
-
C:\Windows\System\GKlAixp.exeFilesize
5.9MB
MD50c4204ec30834d561264ba54049aa26d
SHA186b90460229a08eace2511c3f10c7e8d0fffce05
SHA25627ec6be70a1ad19bb396b2e2b1d8a8305f8a9a1c2c611a85f06f461e82eec265
SHA512a2669e4acb2b9138fd14d67211e110577db407be7b0b6311398bf52ec68152f941dffe9707d05916dc5948065da3bfc626d7d7cb68fe8a7710af37d410534d7a
-
C:\Windows\System\KjatxbA.exeFilesize
5.9MB
MD527a5ddfcf7ac976e3affd020bacb13db
SHA17b329de25b78543ee62276a439cc5cce124253da
SHA2561c6d68748c56f569820fe8b94db6ad7fd9a6f2f6c43b16291a6e11af75abafcf
SHA51260ef7db1d30092868536410a8f44e4b6d3ed4b9781106e330643e1ebea42ed9f2ac5da2b4af91536730535c8cc900d72283a61205d3e3376de0db24f12094130
-
C:\Windows\System\LNPwPcB.exeFilesize
5.9MB
MD53b86323c4e790e08e4dc0b16481934ca
SHA1f37ecf2714ae888e22f4828392d59ab816fc999d
SHA2565c3e95af2a205bd529d5f106266fc274690039094dedd20d31e26f048e74a199
SHA512ea7f04e801b7d9daa20b1a0fb5b7067a4aad143bc0ab29cb2126a4a5069e567e05d70b99d59c44ca052e9249b598f81e6cfcccf7c100f998cb939053a1fa0c99
-
C:\Windows\System\PXDakyW.exeFilesize
5.9MB
MD58045228cdc6e928c3e92e287d207a163
SHA12e9feeac06a4cf77999f30a0191683be133f02d1
SHA25678a60e9c93691c2d3bb1500e013f1f788ab9164185b456e7e4e2080c3fa6b125
SHA512521844d5ce0effafc4966edc487b16ec07c581b3e11c79cf00b33a1235ad055655233b62686e06fc177e1d132e5c14d1c5ddb5fbb36b8e89b01c05530a3f134a
-
C:\Windows\System\RUmRLbR.exeFilesize
5.9MB
MD58059c8d877a91c8a0ed35d201d107ac5
SHA1caa9126e8d8d911f42fa4620197bbeed9f71abcf
SHA256bc6a9fe53b371528b3cf013c622f7080411e94129b774d17cdcd2be04a7d70be
SHA512e37f63db1a5cc9609a2aa4c360faed55578e5926cf56f1dd5dc25abab87b7539c317193eb24810e2bf003484e92de740f7c6dce2d6d6e454527e5cbd9065306b
-
C:\Windows\System\SEXMdTw.exeFilesize
5.9MB
MD5e9eeb70be3f2276819cc347c0eba6b98
SHA1c7630c92f2ae380e4d772ffc45424d4d32354c2b
SHA25681acd64e0666d4c80b783116911cee4e63e563ca66a031e36b03db4211c12fd3
SHA5129d4fc8598333aff6b33dba3c7fc2c18b0d747d9fdd91d9673a1acd89e878eb8a609cde1cabfea8a1433e8880ee434ae6271f54fd2099ddf1f91f3afe125cdc51
-
C:\Windows\System\SaVDShz.exeFilesize
5.9MB
MD57b7de6a298491cc6be09a825c8fe8688
SHA153ce3caa8220bace6aafad13896ef2adce5e4949
SHA2560c91cd3e2be69e2f0e88d947705a22161ec9a8587019b6934bd74ecfe90d36c0
SHA51239e94a3013a8fc0a55329791b1e5f9d1fcc51639b28f167df58772e5d01ea10d0a469e37d0d6049c7a76aca65811305acf3b8cf28c6cfe6b2ec94ab2ed10b3cc
-
C:\Windows\System\StulbEu.exeFilesize
5.9MB
MD5cc551ad7ac3e3951d62398640d2f161f
SHA1f4e4f7ae629baf1074277faffe493522bf56dec9
SHA256424a7c5e777b64fca324e19cb17643c631fda6d7b28864456120e5ea8f6e4e94
SHA512387d295d59bf134b333e2d0cb40e3200203d8d0efc0d90f62651620f4a2e332af79b88041137d87f4483234b43c101f4c5c47a8f227069e4c8afa86af42a04e3
-
C:\Windows\System\Wloeezj.exeFilesize
5.9MB
MD581abf6d8880400abdee73eaeea8a194f
SHA1a2d13da37dbd8ce54dbfa882cee3ed1b3f8bc253
SHA256ba11904a9c7335fe9b328d3a7b108b2f828742462eb1acbf04fb8636ddd99236
SHA51217c0da93790ad62f9d3976b59fa4ce44177868201614d990aad18b2e326de130108f3f5755f46b3584b0846b4a8cd3ba6c068dcf42c2b42a100643381c35e610
-
C:\Windows\System\ZcFAASW.exeFilesize
5.9MB
MD5878e6934e17d7ad9f5562708bab9dda2
SHA1702876682dadf5aed440a52c24a9c473ad0d46c4
SHA256fa4a7be3abf5abf440b0daae8a6a68e0b71f2bda8901f6dee9d97ebf0d391711
SHA512911089f78f7bd7fc5a176c2778ca1f6d640ad61f795b6a2e8f39fcbda16172e1870ab2df900976d381294884f7bcbd23e42872aa54cbf9468edb1b4be7752eda
-
C:\Windows\System\ZuJDENN.exeFilesize
5.9MB
MD524c12d470a0770703461d47feda16b6b
SHA1453a1d74ad68b327fd3607a57a03a53be19534aa
SHA2561fdd6a88e7a5def776af3fd33a51fb6dd751f72c22670a8b6c68831d2ec4f398
SHA512096deed53d2d64bf782fc764e7dd8a14aaba524580c3e4e3c4e1f81c19f8493ffd1fc0318b2c0f1a547f5703c7d24ee2a0df0ae04b4009a63d38fb0ed4061aa3
-
C:\Windows\System\aqAnxVr.exeFilesize
5.9MB
MD5d6cc3b0635997fc24d34cfde15225248
SHA13fed23a5bd353cb3d6aaf4a940817ab208dad16d
SHA256df71e2d158496c2ba327f26674d17992d59420481a8f249746d621c6a4d7c072
SHA512e522f45bc6ae1dab991491d36bb96867bcdd21b2a73f3b8fd59b49b3069b0bb1b45ab63f907140172f2a8bc4b07cf974bd1897bd2dd0bbac051c444632d6b079
-
C:\Windows\System\bCgKacg.exeFilesize
5.9MB
MD5dc7a3b19e847ce5c72716ecd2ec85083
SHA1e2aad7dccd82a4a6ccc2a120df6fb7734e13eb1d
SHA25641f69669c4fbb92f29d3a57a9a47a5acfafdea5e24ad497ba699d28d9d08a17e
SHA512cdf491b8779fb04778d98a0c4c843699a66818429033a6b4719a7f640a2c9ee1c6491a7ffa9835cdbbdb8273f75245626a40b21529d9bed526762b173f622cc8
-
C:\Windows\System\bOjnijp.exeFilesize
5.9MB
MD586725d7c403593bf38fb1173cbc52824
SHA19c272993fb86fe906fa1c210d8a36702f956ee7a
SHA2563556bff6bca69f179b9a1d842ecf26cd86ff86834a516b89bb519ccf3d28b876
SHA512004d19350b0607890c14faf1608b9c68005cbff80dfc9abce30a9c666d4f08868026fc20a4772e85e0abe13d86cc1f281914904b22aa39170fec409d681fc887
-
C:\Windows\System\heawLuc.exeFilesize
5.9MB
MD519bee620104d5c6f7365bd157d0bc828
SHA1fcf2c1b330cd47eec726fe5be2dc318a05e67dad
SHA2566623fd8ea026fc55e905bd7de26763ea67d9144565851b52c49aaa4410a424a0
SHA5125e88814edaf89b989aeff400dcfeedf2c3c73ced50c602dccea860dfb6ee87fed95f4095a2a48f9a2cbc73293917d590ed3b33c5436007b12c445728e313334c
-
C:\Windows\System\lEjoXtk.exeFilesize
5.9MB
MD538fc4870401f53485d11dd3d8c346a07
SHA18f71019c4382d905d2b2cd76bd48d9bcf72bc0e1
SHA256c410e1da37eb340b2ee7c8d2ad18df2964786c6b057150f0a2d45221b943e1be
SHA51216e8b724c56fb90ec1d8e8e89adf2e61cec47a43c8867a79440c1c17f48b2ed8348ea5786346af040c260ab1a85ff0fa304c7351eabe905d481f9c7f79d3b29f
-
C:\Windows\System\lMfFUdk.exeFilesize
5.9MB
MD50e461985b9a1c46ca8e42d4a7c03afac
SHA1ae72de69e92f10b96bb6b63d12fa77049c5db1b8
SHA25637350a892a335b6dde24ba3db4e936a8c0f6070d107d0195b6b2af71dacc7a25
SHA5128b192efaa77d775556a8e1bd89edd135238da592521b40473071504d813ff6f60896c6d8321359764e774cf23a2a34912ad6d68c62a340d9d126fe317c325dec
-
C:\Windows\System\tAAXhKS.exeFilesize
5.9MB
MD5dc13784d02fcb98df4af6bc10712bd82
SHA13cf1c34f983444ec32a41ddf01a6426b52454554
SHA2568ac197e6a0cd3323c0ee0da9575cf83d50ca5fe1dd30246a80e00d33d54f96f2
SHA512bc56fd544b44084949bbe389a47300dea2ce82af593ba7ded8d1ed7b644e713f82bd474915ea30485feb91cf80914c896141aae04ff4c50c46054a37d7c71b32
-
C:\Windows\System\wcTqzAn.exeFilesize
5.9MB
MD5167c49133913898bc81bd834ffeab5f5
SHA104a4cc5ba715f0752ce85469c65c6924a54421f9
SHA2561a49548285d55c854c410c5a38d704abdd239d4016abcef747a409bce5652f72
SHA5129537c862e5c4dca0390920cdb6afb662f5a70bf24b03e9978540bb17a4bfc67e83bc12899d9f81c7a897c4e83ed602b3714cbf28e2fb0b8bffd6428fa13b6aa5
-
C:\Windows\System\zagAOab.exeFilesize
5.9MB
MD5bb8d02853f85b7bf5f7cab33748912bc
SHA10df6fbcc98ab3a874d9f51dff72068af54b3a29e
SHA256ee88ad88aff3348e7c44543c58438f6311cb1ab5c88230e7f64e1d8708a89711
SHA512a7b749da164bb04fd11018d7a9845d9c19ff566dac9f7bf22cd4036a17224f044d47d3b6235db877c9fe3e3260c99bc6c84394750bcfd0426562f206bd5e6290
-
memory/380-62-0x00007FF799DB0000-0x00007FF79A104000-memory.dmpFilesize
3.3MB
-
memory/380-1-0x000002803DF50000-0x000002803DF60000-memory.dmpFilesize
64KB
-
memory/380-0-0x00007FF799DB0000-0x00007FF79A104000-memory.dmpFilesize
3.3MB
-
memory/528-111-0x00007FF618750000-0x00007FF618AA4000-memory.dmpFilesize
3.3MB
-
memory/528-159-0x00007FF618750000-0x00007FF618AA4000-memory.dmpFilesize
3.3MB
-
memory/828-141-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmpFilesize
3.3MB
-
memory/828-118-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmpFilesize
3.3MB
-
memory/828-160-0x00007FF64ACB0000-0x00007FF64B004000-memory.dmpFilesize
3.3MB
-
memory/928-142-0x00007FF621FD0000-0x00007FF622324000-memory.dmpFilesize
3.3MB
-
memory/928-125-0x00007FF621FD0000-0x00007FF622324000-memory.dmpFilesize
3.3MB
-
memory/928-161-0x00007FF621FD0000-0x00007FF622324000-memory.dmpFilesize
3.3MB
-
memory/1264-73-0x00007FF682460000-0x00007FF6827B4000-memory.dmpFilesize
3.3MB
-
memory/1264-153-0x00007FF682460000-0x00007FF6827B4000-memory.dmpFilesize
3.3MB
-
memory/1312-163-0x00007FF61CCE0000-0x00007FF61D034000-memory.dmpFilesize
3.3MB
-
memory/1312-136-0x00007FF61CCE0000-0x00007FF61D034000-memory.dmpFilesize
3.3MB
-
memory/1564-56-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmpFilesize
3.3MB
-
memory/1564-135-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmpFilesize
3.3MB
-
memory/1564-151-0x00007FF7DBA40000-0x00007FF7DBD94000-memory.dmpFilesize
3.3MB
-
memory/1624-90-0x00007FF7EEB70000-0x00007FF7EEEC4000-memory.dmpFilesize
3.3MB
-
memory/1624-156-0x00007FF7EEB70000-0x00007FF7EEEC4000-memory.dmpFilesize
3.3MB
-
memory/1672-162-0x00007FF6083D0000-0x00007FF608724000-memory.dmpFilesize
3.3MB
-
memory/1672-137-0x00007FF6083D0000-0x00007FF608724000-memory.dmpFilesize
3.3MB
-
memory/2056-157-0x00007FF662100000-0x00007FF662454000-memory.dmpFilesize
3.3MB
-
memory/2056-96-0x00007FF662100000-0x00007FF662454000-memory.dmpFilesize
3.3MB
-
memory/2056-139-0x00007FF662100000-0x00007FF662454000-memory.dmpFilesize
3.3MB
-
memory/2172-152-0x00007FF72CB30000-0x00007FF72CE84000-memory.dmpFilesize
3.3MB
-
memory/2172-65-0x00007FF72CB30000-0x00007FF72CE84000-memory.dmpFilesize
3.3MB
-
memory/2324-154-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmpFilesize
3.3MB
-
memory/2324-138-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmpFilesize
3.3MB
-
memory/2324-74-0x00007FF6FBBF0000-0x00007FF6FBF44000-memory.dmpFilesize
3.3MB
-
memory/3164-101-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmpFilesize
3.3MB
-
memory/3164-147-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmpFilesize
3.3MB
-
memory/3164-31-0x00007FF6E4C70000-0x00007FF6E4FC4000-memory.dmpFilesize
3.3MB
-
memory/3196-48-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmpFilesize
3.3MB
-
memory/3196-124-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmpFilesize
3.3MB
-
memory/3196-150-0x00007FF68C7F0000-0x00007FF68CB44000-memory.dmpFilesize
3.3MB
-
memory/3472-85-0x00007FF6C0450000-0x00007FF6C07A4000-memory.dmpFilesize
3.3MB
-
memory/3472-155-0x00007FF6C0450000-0x00007FF6C07A4000-memory.dmpFilesize
3.3MB
-
memory/3820-143-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmpFilesize
3.3MB
-
memory/3820-71-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmpFilesize
3.3MB
-
memory/3820-7-0x00007FF7B77E0000-0x00007FF7B7B34000-memory.dmpFilesize
3.3MB
-
memory/3988-12-0x00007FF647C60000-0x00007FF647FB4000-memory.dmpFilesize
3.3MB
-
memory/3988-144-0x00007FF647C60000-0x00007FF647FB4000-memory.dmpFilesize
3.3MB
-
memory/3988-82-0x00007FF647C60000-0x00007FF647FB4000-memory.dmpFilesize
3.3MB
-
memory/4000-110-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmpFilesize
3.3MB
-
memory/4000-148-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmpFilesize
3.3MB
-
memory/4000-36-0x00007FF6B5770000-0x00007FF6B5AC4000-memory.dmpFilesize
3.3MB
-
memory/4200-116-0x00007FF604550000-0x00007FF6048A4000-memory.dmpFilesize
3.3MB
-
memory/4200-149-0x00007FF604550000-0x00007FF6048A4000-memory.dmpFilesize
3.3MB
-
memory/4200-43-0x00007FF604550000-0x00007FF6048A4000-memory.dmpFilesize
3.3MB
-
memory/4316-102-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmpFilesize
3.3MB
-
memory/4316-158-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmpFilesize
3.3MB
-
memory/4316-140-0x00007FF60EB60000-0x00007FF60EEB4000-memory.dmpFilesize
3.3MB
-
memory/4392-20-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmpFilesize
3.3MB
-
memory/4392-89-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmpFilesize
3.3MB
-
memory/4392-145-0x00007FF73FF50000-0x00007FF7402A4000-memory.dmpFilesize
3.3MB
-
memory/5020-24-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmpFilesize
3.3MB
-
memory/5020-146-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmpFilesize
3.3MB
-
memory/5020-95-0x00007FF6CBE20000-0x00007FF6CC174000-memory.dmpFilesize
3.3MB