Malware Analysis Report

2024-10-24 16:29

Sample ID 201209-grdfth2a4s
Target a57c8822899013c8d0bbd87b4c36821a.exe
SHA256 ddb95e81345469771c505272274d21eb2e317ed8c46e0b679362df7cbf52ba6c
Tags
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

SHA256

ddb95e81345469771c505272274d21eb2e317ed8c46e0b679362df7cbf52ba6c

Threat Level: Likely malicious

The file a57c8822899013c8d0bbd87b4c36821a.exe was found to be: Likely malicious.

Malicious Activity Summary


Beds Protector Packer

Drops startup file

Suspicious use of SetThreadContext

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2020-12-09 10:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2020-12-09 10:28

Reported

2020-12-09 10:30

Platform

win7v20201028

Max time kernel

30s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"

Signatures

Beds Protector Packer

Description Indicator Process Target
N/A N/A N/A N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 788 set thread context of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 788 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"

C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 carperzone-connect.xyz udp
N/A 199.247.30.102:49145 carperzone-connect.xyz tcp

Files

memory/788-2-0x0000000074DA0000-0x000000007548E000-memory.dmp

memory/788-3-0x0000000000D60000-0x0000000000D61000-memory.dmp

memory/788-5-0x0000000004740000-0x000000000478B000-memory.dmp

memory/1496-6-0x0000000000400000-0x0000000000454000-memory.dmp

memory/1496-7-0x000000000044C7DE-mapping.dmp

memory/1496-8-0x0000000000400000-0x0000000000454000-memory.dmp

memory/1496-9-0x0000000000400000-0x0000000000454000-memory.dmp

memory/1496-10-0x0000000074DA0000-0x000000007548E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2020-12-09 10:28

Reported

2020-12-09 10:30

Platform

win10v20201028

Max time kernel

25s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"

Signatures

Beds Protector Packer

Description Indicator Process Target
N/A N/A N/A N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3988 set thread context of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe
PID 3988 wrote to memory of 3996 N/A C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"

C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe

"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 carperzone-connect.xyz udp
N/A 199.247.30.102:49145 carperzone-connect.xyz tcp

Files

memory/3988-2-0x00000000738E0000-0x0000000073FCE000-memory.dmp

memory/3988-3-0x0000000000900000-0x0000000000901000-memory.dmp

memory/3988-5-0x00000000055D0000-0x00000000055D1000-memory.dmp

memory/3988-6-0x0000000005190000-0x0000000005191000-memory.dmp

memory/3988-7-0x00000000052B0000-0x00000000052B1000-memory.dmp

memory/3988-8-0x0000000005330000-0x0000000005331000-memory.dmp

memory/3988-9-0x0000000005AF0000-0x0000000005B3B000-memory.dmp

memory/3988-10-0x0000000005E20000-0x0000000005E21000-memory.dmp

memory/3988-11-0x00000000060C0000-0x00000000060C1000-memory.dmp

memory/3996-12-0x0000000000400000-0x0000000000454000-memory.dmp

memory/3996-13-0x000000000044C7DE-mapping.dmp

memory/3996-14-0x0000000000400000-0x0000000000454000-memory.dmp

memory/3996-15-0x00000000738E0000-0x0000000073FCE000-memory.dmp

memory/3988-18-0x00000000067D0000-0x00000000067D1000-memory.dmp