Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-03-2021 13:55

General

  • Target

    Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKedTEST

C2

chipo.publicvm.com:1177

Mutex

4c71585ab01a8f1344352fb1f26b00fd

Attributes
  • reg_key

    4c71585ab01a8f1344352fb1f26b00fd

  • splitter

    |'|'|

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Heart

C2

185.163.127.20:61110

Mutex

HRT_MUTEX_kecTsVDPnERdvianlr

Attributes
  • encryption_key

    3vnM9JqtaSdxUVqeTXSi

  • install_name

    Subfile.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDirr

Signatures

  • Quasar Payload 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • ACProtect 1.3x - 1.4x DLL software 7 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 5 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Modifies Windows Firewall 1 TTPs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • autoit_exe 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
    "C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
      "C:\Users\Admin\AppData\Local\Temp/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Windows\system32\wscript.exe
        "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\7BF3.tmp\7BF4.tmp\7BF5.vbs //Nologo
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Heart\Load.exe
          "C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Heart\Load.exe"
          4⤵
            PID:1732
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Config.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1080
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1964
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Add-MpPreference -ExclusionPath "C:\Users" -force
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1768
            • C:\Windows\system32\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Microsoft\SubDir\Subfile0" /tr "C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe" /RL HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:1300
            • C:\Windows\system32\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "Microsoft\SubDir\Subfile1" /tr "C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exe" /RL HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:364
            • C:\Windows\system32\attrib.exe
              attrib +h +s C:\Users\Admin\AppData\Roaming\SubDirr
              5⤵
              • Views/modifies file attributes
              PID:1144
            • C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Loader.exe
              loader.exe -pP@$$W@RD@@
              5⤵
              • Loads dropped DLL
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Suspicious use of AdjustPrivilegeToken
              PID:1912
            • C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Loader1.exe
              loader1.exe -pP@$$W@RD@@
              5⤵
              • Loads dropped DLL
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Suspicious use of AdjustPrivilegeToken
              PID:1676
      • C:\Users\Admin\AppData\Local\Temp\test404.exe
        C:\Users\Admin\AppData\Local\Temp/test404.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe
          "C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:684
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe" "Google Chrome.exe" ENABLE
            4⤵
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:112
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {5C1F9CA3-44FC-41CE-A654-1A0F0BFBFA03} S-1-5-21-293278959-2699126792-324916226-1000:TUICJFPF\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exe
        C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exe
        2⤵
        • Executes dropped EXE
        PID:1056
      • C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe
        C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:612

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Modify Existing Service

    1
    T1031

    Scheduled Task

    1
    T1053

    Hidden Files and Directories

    1
    T1158

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    2
    T1112

    Hidden Files and Directories

    1
    T1158

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\System\symsrv.dll
      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_09723407-f47a-4157-bb6c-bb0d7f759f67
      MD5

      a70ee38af4bb2b5ed3eeb7cbd1a12fa3

      SHA1

      81dbaeae4b0f9e1adc0a1e3d6d76a12396498ba9

      SHA256

      dd2f41f92f19c3fe031bdf5da68ab06768e26762d0077b290cd0094df1d5d58d

      SHA512

      8c69a5300c7545c5c4b25a0594e6813b6b7a85b5f3ae7fc5464b4074fe6f50b2f49d31cacf19bc20a02bb8e237656f1b9b2a3f6a3953e3a8478ca2adc154e0e3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_159e4ecb-d8d2-4a4d-9541-c0c7893f6225
      MD5

      e5b3ba61c3cf07deda462c9b27eb4166

      SHA1

      b324dad73048be6e27467315f82b7a5c1438a1f9

      SHA256

      b84fae85b6203a0c8c9db3ba3c050c97d6700e5c9ae27dd31c103ec1bbb02925

      SHA512

      a5936a098db2e8c0d0231fd97d73cc996ad99897fd64f0e5c6761c44b8eb2db2bff477843d326503e6027c1113da0e8e35f4227195a3cf505c5a374ebe0f67fc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_22eaf65e-38a5-4334-9520-765225d73f93
      MD5

      d89968acfbd0cd60b51df04860d99896

      SHA1

      b3c29916ccb81ce98f95bbf3aa8a73de16298b29

      SHA256

      1020cc7c929cd5a4e68ccb40353ca76f427df363f0d95e456eb79db039bdb2b9

      SHA512

      b0e886cce598371b59131fed1535e220c798691bad93ef9474ba440066f5a6bd77a60966604b7a5ff6298b2e200c9dd0c8f9f04aff208b2af423480ead4e8842

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2416a213-342c-4087-a62b-b80495159a08
      MD5

      2d5cd190b5db0620cd62e3cd6ba1dcd3

      SHA1

      ff4f229f4fbacccdf11d98c04ba756bda80aac7a

      SHA256

      ab9aee31b3411bcc5a5fb51e9375777cca79cfb3a532d93ddd98a5673c60571d

      SHA512

      edb2a46f3ee33b48f8fe0b548c1e7940978d0e4ac90d5090807d8b5c8b1320217e5d66990b1d0a85546acbbaf9b601590d35de87de234da8eafd60d12fdce610

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4185f149-dc82-47a5-8ac3-a6d94c7c7f35
      MD5

      7f79b990cb5ed648f9e583fe35527aa7

      SHA1

      71b177b48c8bd745ef02c2affad79ca222da7c33

      SHA256

      080ec69d3f2abac629a0bdc314f150ad42a9a1b0a031b1d5c7b5b80051c48683

      SHA512

      20926edf7f0b990da4bd8d7ba91bd8bf7b952b75080f687afa7197a91777604688303d38b4a0a7240b558c23f2e0cd927d3590765109f8be0551f5eb050eafda

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6dac46c9-6e00-425e-aeb9-ab5981105f50
      MD5

      6f0d509e28be1af95ba237d4f43adab4

      SHA1

      c665febe79e435843553bee86a6cea731ce6c5e4

      SHA256

      f545be30e70cd6e1b70e98239219735f6b61c25712720bb1e1738f02be900e7e

      SHA512

      8dbadc140fd18eb16e2a282e3a0a895299b124850e7b9454a3f24e1cc1c090c5bebfbff5062e8807369e84ed7359e0854722cfd45b9a63681f9fea8c97fab797

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_83a3b091-194f-40b1-b4d9-cd8cead2368a
      MD5

      faa37917b36371249ac9fcf93317bf97

      SHA1

      a0f0d84d58ee518d33a69f5f1c343aa921c8ffd4

      SHA256

      b92f1a891dbe4152a1f834774cc83378d8b4cffb7e344a813219d74ec4084132

      SHA512

      614d3692e5be7554a72a38af408458254af271eaf6855f322ae07aaa647b1478c7ad13027285c8d9999db3739d65ac85ecfdf3e56acca8484083aa0e31de2198

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
      MD5

      9b763985e491367eea762f44291142d4

      SHA1

      fc3f36e4e8656178c7684ff9ddf17fea8b0b22ef

      SHA256

      2f9fe7f50faec10df204e681b4b9e1a818c613886473931b4a8ae680982f3bd3

      SHA512

      20ffd00ded3c0c84dced191f571b6ddd22dd8f851788986f5cf95f64979f3eccf32db40c3b866b23f57f5f8a10a20a31b1cac76e975015bfcb2cc03a0a579c23

    • C:\Users\Admin\AppData\Local\Temp\7BF3.tmp\7BF4.tmp\7BF5.vbs
      MD5

      eb6e66649458ab67cd6b1c1119d27cc3

      SHA1

      8099e76b7c4c5d593889d3d4bcf709e926d3eaab

      SHA256

      26dfa79be36cbdfcc3850d17dc704c16ef2772a4b561e13f349307571230f0e0

      SHA512

      daacbcd01d8d5555dda47ed08b042b29e203ee7ca6a29252a27bb14f6f742db2c1c58d5b83ce36d8c1fb40fae22ef14c0777cbc1ae0f9d28e8d2bb28c7933c08

    • C:\Users\Admin\AppData\Local\Temp\A1D26E2\7A5E44C63C.tmp
      MD5

      cb0de434b038de61b61d60e2d284c2c5

      SHA1

      f4197c2ccaf7c42679c15208945e3536d27eda97

      SHA256

      b5050491771ba6bc4305574127ef774caca08280f64f0cea0a44dd8cfb0ecae3

      SHA512

      2984641dcfa04dedcd4a5c6bfd181da3c6352a9405043f9d6a73b0d84be84d5b61f619f209c7a89dcd7cb7631edbf4a40c5fbd6de006e97e15ea00bfd7e09324

    • C:\Users\Admin\AppData\Local\Temp\A1D26E2\BC4D3D0778.tmp
      MD5

      a0f5d9448eed029fef6d9944df015832

      SHA1

      560dc39fbdccf26465005baf60648d3e0e41b32a

      SHA256

      02d46c7d93d8be4e82fd29d9452203f86d75476dbfcc952efa63360a260fb242

      SHA512

      c41251267d6c42aa916df9e15304e839b0cb9087c834c9aa2a3b912b91c67ba1804e0a1854c64b14654d9ead03e1ed0e4a4ca3a4fd87616f7ad47c8edcec12d7

    • C:\Users\Admin\AppData\Local\Temp\A1D26E2\BF2A52468C.tmp
      MD5

      cb12a9883105636361815cc05ae84a9b

      SHA1

      e200f1b9553254dac2771c11e9c7eaf39095803c

      SHA256

      fb6f81aaf1dbe4cf4a182b2f049504c2b137cf714eacddf8debc7087d52414e7

      SHA512

      36dd29e931d771802e4f39ece4cb3ab6bff777457304d3242b88189ebd8a2650a68dba2b100309f6a5962af2d92416f91f0ad0e323e98d7276b2ecec0c657fec

    • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe
      MD5

      943df0dd122ec18e4a64231c3d8cb3f9

      SHA1

      5abb3181f354cd5d48726fad840518926f8ff0d7

      SHA256

      48945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91

      SHA512

      1bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009

    • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe
      MD5

      943df0dd122ec18e4a64231c3d8cb3f9

      SHA1

      5abb3181f354cd5d48726fad840518926f8ff0d7

      SHA256

      48945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91

      SHA512

      1bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009

    • C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
      MD5

      2460a0af6c336e546ecb8d3a3bb6fab7

      SHA1

      de23c0a0c8d5b42eb804a557073e7c9cd1fe8558

      SHA256

      4ef7de2f82d7e76e2b408418c26e86680be7ca75f0406aa9e9f052a9e833ee7f

      SHA512

      b75eef7ec0de1ba74ce7ff378f3307741bb3b7b52d092180947753e620c30edae928f68978ddc2dc23c6ae8e8f884cd64a69a875b23de47ebadfd09483170966

    • C:\Users\Admin\AppData\Local\Temp\test404.exe
      MD5

      943df0dd122ec18e4a64231c3d8cb3f9

      SHA1

      5abb3181f354cd5d48726fad840518926f8ff0d7

      SHA256

      48945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91

      SHA512

      1bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009

    • C:\Users\Admin\AppData\Local\Temp\test404.exe
      MD5

      943df0dd122ec18e4a64231c3d8cb3f9

      SHA1

      5abb3181f354cd5d48726fad840518926f8ff0d7

      SHA256

      48945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91

      SHA512

      1bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      MD5

      dfdabab5e7961a5edaa0998a3d737ebf

      SHA1

      ec0bd9d6c41a98b8d9f6f7bdd39df6333370874d

      SHA256

      6c7220e6082f20887f6042fbcdef308ff4baf464a3861f305d020bb19c67e2b9

      SHA512

      51793bfcfbefa912fe055113ce45a8fc5cfa24ef2ba537bbcc09e6a99ca3f8a1d859dada71a93e9129013641fced09ef82c00b3a3ca7f7883efa49871b586fb1

    • C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe
      MD5

      3e5da207d7655d267515b8fd7fe35b8a

      SHA1

      85a81b28b919d283c7ae1df1a6c8c45dc0ff756a

      SHA256

      db4b1a7399ad2e1fc3d8e64cb9e870a4b7f36ef629614517942a4b7318c29f42

      SHA512

      f097cfdaa714fe1dfcb360467010597015ba1ff4ca686d340d1775bdeadbe02d4d9ec064d78e20add0c29bd4f06f8ef9ee572f2374031a6313af2f7602c0530d

    • C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe
      MD5

      3e5da207d7655d267515b8fd7fe35b8a

      SHA1

      85a81b28b919d283c7ae1df1a6c8c45dc0ff756a

      SHA256

      db4b1a7399ad2e1fc3d8e64cb9e870a4b7f36ef629614517942a4b7318c29f42

      SHA512

      f097cfdaa714fe1dfcb360467010597015ba1ff4ca686d340d1775bdeadbe02d4d9ec064d78e20add0c29bd4f06f8ef9ee572f2374031a6313af2f7602c0530d

    • C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exe
      MD5

      4fb7326fe1263d2f0626ee186195b891

      SHA1

      f2ceda16fe3ba9e90e2b17f77879278923fb3fe9

      SHA256

      d4641707fb9daa4f2e4e30f869a968f022f98c1067a9d8a9bd21ab22e56f82f4

      SHA512

      f4191396b94e1517af938a9ca6068686956e99b2bde98ed6dccc14c05ecf016c11a75010c5e911a52524886e9404cb001d68832230b15d455fab514ddd9fce7a

    • C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exe
      MD5

      4fb7326fe1263d2f0626ee186195b891

      SHA1

      f2ceda16fe3ba9e90e2b17f77879278923fb3fe9

      SHA256

      d4641707fb9daa4f2e4e30f869a968f022f98c1067a9d8a9bd21ab22e56f82f4

      SHA512

      f4191396b94e1517af938a9ca6068686956e99b2bde98ed6dccc14c05ecf016c11a75010c5e911a52524886e9404cb001d68832230b15d455fab514ddd9fce7a

    • \Program Files\Common Files\System\symsrv.dll
      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • \Program Files\Common Files\System\symsrv.dll
      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • \Program Files\Common Files\System\symsrv.dll
      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • \Program Files\Common Files\System\symsrv.dll
      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • \Program Files\Common Files\System\symsrv.dll
      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • \Program Files\Common Files\System\symsrv.dll
      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • \Users\Admin\AppData\Local\Temp\Google Chrome.exe
      MD5

      943df0dd122ec18e4a64231c3d8cb3f9

      SHA1

      5abb3181f354cd5d48726fad840518926f8ff0d7

      SHA256

      48945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91

      SHA512

      1bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009

    • \Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
      MD5

      2460a0af6c336e546ecb8d3a3bb6fab7

      SHA1

      de23c0a0c8d5b42eb804a557073e7c9cd1fe8558

      SHA256

      4ef7de2f82d7e76e2b408418c26e86680be7ca75f0406aa9e9f052a9e833ee7f

      SHA512

      b75eef7ec0de1ba74ce7ff378f3307741bb3b7b52d092180947753e620c30edae928f68978ddc2dc23c6ae8e8f884cd64a69a875b23de47ebadfd09483170966

    • \Users\Admin\AppData\Local\Temp\test404.exe
      MD5

      943df0dd122ec18e4a64231c3d8cb3f9

      SHA1

      5abb3181f354cd5d48726fad840518926f8ff0d7

      SHA256

      48945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91

      SHA512

      1bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009

    • memory/112-191-0x0000000000000000-mapping.dmp
    • memory/364-153-0x0000000000000000-mapping.dmp
    • memory/612-196-0x00000000753C6000-0x00000000753C7000-memory.dmp
      Filesize

      4KB

    • memory/612-181-0x0000000000000000-mapping.dmp
    • memory/612-190-0x0000000004DD0000-0x0000000004DD1000-memory.dmp
      Filesize

      4KB

    • memory/612-188-0x0000000000980000-0x0000000000981000-memory.dmp
      Filesize

      4KB

    • memory/612-185-0x0000000073FC0000-0x00000000746AE000-memory.dmp
      Filesize

      6.9MB

    • memory/612-195-0x00000000753C6000-0x00000000753C7000-memory.dmp
      Filesize

      4KB

    • memory/684-171-0x0000000000CC0000-0x0000000000CC1000-memory.dmp
      Filesize

      4KB

    • memory/684-165-0x0000000000000000-mapping.dmp
    • memory/684-176-0x0000000002CA5000-0x0000000002CB6000-memory.dmp
      Filesize

      68KB

    • memory/684-169-0x0000000073FC0000-0x00000000746AE000-memory.dmp
      Filesize

      6.9MB

    • memory/684-175-0x0000000002CA0000-0x0000000002CA1000-memory.dmp
      Filesize

      4KB

    • memory/824-87-0x0000000073FC0000-0x00000000746AE000-memory.dmp
      Filesize

      6.9MB

    • memory/824-113-0x0000000004670000-0x0000000004676000-memory.dmp
      Filesize

      24KB

    • memory/824-111-0x00000000046D0000-0x00000000046D1000-memory.dmp
      Filesize

      4KB

    • memory/824-108-0x00000000003B0000-0x00000000003C0000-memory.dmp
      Filesize

      64KB

    • memory/824-99-0x00000000003C0000-0x00000000003C1000-memory.dmp
      Filesize

      4KB

    • memory/824-127-0x00000000046D5000-0x00000000046E6000-memory.dmp
      Filesize

      68KB

    • memory/824-83-0x0000000000000000-mapping.dmp
    • memory/1056-186-0x00000000010C0000-0x00000000010C1000-memory.dmp
      Filesize

      4KB

    • memory/1056-182-0x000007FEF5650000-0x000007FEF603C000-memory.dmp
      Filesize

      9.9MB

    • memory/1056-177-0x0000000000000000-mapping.dmp
    • memory/1080-89-0x0000000000000000-mapping.dmp
    • memory/1144-154-0x0000000000000000-mapping.dmp
    • memory/1192-5-0x0000000000000000-mapping.dmp
    • memory/1244-194-0x000007FEF6100000-0x000007FEF637A000-memory.dmp
      Filesize

      2.5MB

    • memory/1300-152-0x0000000000000000-mapping.dmp
    • memory/1596-34-0x00000000008AA000-0x00000000008AB000-memory.dmp
      Filesize

      4KB

    • memory/1596-37-0x00000000008B5000-0x00000000008B6000-memory.dmp
      Filesize

      4KB

    • memory/1596-65-0x00000000008AE000-0x00000000008AF000-memory.dmp
      Filesize

      4KB

    • memory/1596-67-0x00000000008B0000-0x00000000008B1000-memory.dmp
      Filesize

      4KB

    • memory/1596-66-0x00000000008AF000-0x00000000008B0000-memory.dmp
      Filesize

      4KB

    • memory/1596-60-0x00000000008E3000-0x00000000008E4000-memory.dmp
      Filesize

      4KB

    • memory/1596-68-0x00000000008F7000-0x00000000008F8000-memory.dmp
      Filesize

      4KB

    • memory/1596-70-0x000000000091C000-0x000000000091D000-memory.dmp
      Filesize

      4KB

    • memory/1596-71-0x000000000091B000-0x000000000091C000-memory.dmp
      Filesize

      4KB

    • memory/1596-72-0x00000000008F0000-0x00000000008F1000-memory.dmp
      Filesize

      4KB

    • memory/1596-73-0x00000000008E7000-0x00000000008E8000-memory.dmp
      Filesize

      4KB

    • memory/1596-74-0x0000000000914000-0x0000000000915000-memory.dmp
      Filesize

      4KB

    • memory/1596-75-0x00000000008CC000-0x00000000008CD000-memory.dmp
      Filesize

      4KB

    • memory/1596-77-0x0000000000902000-0x0000000000903000-memory.dmp
      Filesize

      4KB

    • memory/1596-76-0x0000000000901000-0x0000000000902000-memory.dmp
      Filesize

      4KB

    • memory/1596-78-0x00000000008E9000-0x00000000008EA000-memory.dmp
      Filesize

      4KB

    • memory/1596-58-0x00000000008BD000-0x00000000008BE000-memory.dmp
      Filesize

      4KB

    • memory/1596-80-0x00000000046C0000-0x00000000046D1000-memory.dmp
      Filesize

      68KB

    • memory/1596-56-0x00000000008EC000-0x00000000008ED000-memory.dmp
      Filesize

      4KB

    • memory/1596-82-0x00000000046C0000-0x00000000046D1000-memory.dmp
      Filesize

      68KB

    • memory/1596-57-0x0000000000913000-0x0000000000914000-memory.dmp
      Filesize

      4KB

    • memory/1596-55-0x0000000000915000-0x0000000000916000-memory.dmp
      Filesize

      4KB

    • memory/1596-9-0x00000000008D3000-0x00000000008D4000-memory.dmp
      Filesize

      4KB

    • memory/1596-54-0x00000000008C3000-0x00000000008C4000-memory.dmp
      Filesize

      4KB

    • memory/1596-61-0x00000000008EA000-0x00000000008EB000-memory.dmp
      Filesize

      4KB

    • memory/1596-2-0x0000000075781000-0x0000000075783000-memory.dmp
      Filesize

      8KB

    • memory/1596-8-0x00000000008C6000-0x00000000008C7000-memory.dmp
      Filesize

      4KB

    • memory/1596-11-0x00000000008C8000-0x00000000008C9000-memory.dmp
      Filesize

      4KB

    • memory/1596-93-0x00000000008EE000-0x00000000008EF000-memory.dmp
      Filesize

      4KB

    • memory/1596-94-0x00000000008E6000-0x00000000008E7000-memory.dmp
      Filesize

      4KB

    • memory/1596-95-0x00000000008E0000-0x00000000008E1000-memory.dmp
      Filesize

      4KB

    • memory/1596-96-0x00000000008DE000-0x00000000008DF000-memory.dmp
      Filesize

      4KB

    • memory/1596-12-0x00000000008CA000-0x00000000008CB000-memory.dmp
      Filesize

      4KB

    • memory/1596-52-0x00000000008AB000-0x00000000008AC000-memory.dmp
      Filesize

      4KB

    • memory/1596-14-0x00000000008BF000-0x00000000008C0000-memory.dmp
      Filesize

      4KB

    • memory/1596-53-0x00000000008CF000-0x00000000008D0000-memory.dmp
      Filesize

      4KB

    • memory/1596-13-0x00000000008C1000-0x00000000008C2000-memory.dmp
      Filesize

      4KB

    • memory/1596-15-0x00000000008C2000-0x00000000008C3000-memory.dmp
      Filesize

      4KB

    • memory/1596-16-0x00000000008C9000-0x00000000008CA000-memory.dmp
      Filesize

      4KB

    • memory/1596-27-0x00000000008BE000-0x00000000008BF000-memory.dmp
      Filesize

      4KB

    • memory/1596-26-0x0000000000911000-0x0000000000912000-memory.dmp
      Filesize

      4KB

    • memory/1596-25-0x00000000008CD000-0x00000000008CE000-memory.dmp
      Filesize

      4KB

    • memory/1596-50-0x00000000008A3000-0x00000000008A4000-memory.dmp
      Filesize

      4KB

    • memory/1596-24-0x00000000008D0000-0x00000000008D1000-memory.dmp
      Filesize

      4KB

    • memory/1596-23-0x00000000008D4000-0x00000000008D5000-memory.dmp
      Filesize

      4KB

    • memory/1596-51-0x00000000008A4000-0x00000000008A5000-memory.dmp
      Filesize

      4KB

    • memory/1596-28-0x00000000008C0000-0x00000000008C1000-memory.dmp
      Filesize

      4KB

    • memory/1596-48-0x00000000008BC000-0x00000000008BD000-memory.dmp
      Filesize

      4KB

    • memory/1596-22-0x00000000008C5000-0x00000000008C6000-memory.dmp
      Filesize

      4KB

    • memory/1596-21-0x00000000008D9000-0x00000000008DA000-memory.dmp
      Filesize

      4KB

    • memory/1596-20-0x00000000008D7000-0x00000000008D8000-memory.dmp
      Filesize

      4KB

    • memory/1596-19-0x00000000008D6000-0x00000000008D7000-memory.dmp
      Filesize

      4KB

    • memory/1596-49-0x00000000008A5000-0x00000000008A6000-memory.dmp
      Filesize

      4KB

    • memory/1596-18-0x00000000008C4000-0x00000000008C5000-memory.dmp
      Filesize

      4KB

    • memory/1596-17-0x00000000008CB000-0x00000000008CC000-memory.dmp
      Filesize

      4KB

    • memory/1596-10-0x00000000008C7000-0x00000000008C8000-memory.dmp
      Filesize

      4KB

    • memory/1596-64-0x00000000008DB000-0x00000000008DC000-memory.dmp
      Filesize

      4KB

    • memory/1596-30-0x00000000008A7000-0x00000000008A8000-memory.dmp
      Filesize

      4KB

    • memory/1596-29-0x00000000008AD000-0x00000000008AE000-memory.dmp
      Filesize

      4KB

    • memory/1596-31-0x00000000008A8000-0x00000000008A9000-memory.dmp
      Filesize

      4KB

    • memory/1596-32-0x00000000008AC000-0x00000000008AD000-memory.dmp
      Filesize

      4KB

    • memory/1596-59-0x00000000008A2000-0x00000000008A3000-memory.dmp
      Filesize

      4KB

    • memory/1596-33-0x0000000000912000-0x0000000000913000-memory.dmp
      Filesize

      4KB

    • memory/1596-35-0x00000000008A1000-0x00000000008A2000-memory.dmp
      Filesize

      4KB

    • memory/1596-45-0x00000000008B1000-0x00000000008B2000-memory.dmp
      Filesize

      4KB

    • memory/1596-46-0x00000000008B2000-0x00000000008B3000-memory.dmp
      Filesize

      4KB

    • memory/1596-44-0x00000000008B9000-0x00000000008BB000-memory.dmp
      Filesize

      8KB

    • memory/1596-43-0x00000000008B9000-0x00000000008BA000-memory.dmp
      Filesize

      4KB

    • memory/1596-42-0x00000000008B8000-0x00000000008BA000-memory.dmp
      Filesize

      8KB

    • memory/1596-40-0x00000000008B7000-0x00000000008B8000-memory.dmp
      Filesize

      4KB

    • memory/1596-41-0x00000000008B8000-0x00000000008B9000-memory.dmp
      Filesize

      4KB

    • memory/1596-39-0x00000000008B6000-0x00000000008B7000-memory.dmp
      Filesize

      4KB

    • memory/1596-62-0x00000000008E2000-0x00000000008E3000-memory.dmp
      Filesize

      4KB

    • memory/1596-47-0x00000000008BB000-0x00000000008BC000-memory.dmp
      Filesize

      4KB

    • memory/1596-63-0x00000000008ED000-0x00000000008EE000-memory.dmp
      Filesize

      4KB

    • memory/1596-38-0x00000000008B5000-0x00000000008B7000-memory.dmp
      Filesize

      8KB

    • memory/1596-36-0x00000000008B4000-0x00000000008B5000-memory.dmp
      Filesize

      4KB

    • memory/1676-160-0x0000000000000000-mapping.dmp
    • memory/1732-124-0x0000000004A66000-0x0000000004A67000-memory.dmp
      Filesize

      4KB

    • memory/1732-88-0x0000000000000000-mapping.dmp
    • memory/1732-90-0x0000000073FC0000-0x00000000746AE000-memory.dmp
      Filesize

      6.9MB

    • memory/1732-100-0x0000000001170000-0x0000000001171000-memory.dmp
      Filesize

      4KB

    • memory/1732-103-0x0000000000CC0000-0x0000000000D74000-memory.dmp
      Filesize

      720KB

    • memory/1732-104-0x0000000004A50000-0x0000000004A51000-memory.dmp
      Filesize

      4KB

    • memory/1732-123-0x0000000004A55000-0x0000000004A66000-memory.dmp
      Filesize

      68KB

    • memory/1768-137-0x000007FEF4C60000-0x000007FEF564C000-memory.dmp
      Filesize

      9.9MB

    • memory/1768-140-0x0000000002340000-0x0000000002341000-memory.dmp
      Filesize

      4KB

    • memory/1768-143-0x0000000001D40000-0x0000000001D41000-memory.dmp
      Filesize

      4KB

    • memory/1768-134-0x0000000000000000-mapping.dmp
    • memory/1768-142-0x000000001AD44000-0x000000001AD46000-memory.dmp
      Filesize

      8KB

    • memory/1768-141-0x000000001AD40000-0x000000001AD42000-memory.dmp
      Filesize

      8KB

    • memory/1768-138-0x00000000025B0000-0x00000000025B1000-memory.dmp
      Filesize

      4KB

    • memory/1768-139-0x000000001ADC0000-0x000000001ADC1000-memory.dmp
      Filesize

      4KB

    • memory/1912-155-0x0000000000000000-mapping.dmp
    • memory/1964-114-0x0000000002740000-0x0000000002741000-memory.dmp
      Filesize

      4KB

    • memory/1964-117-0x0000000002770000-0x0000000002771000-memory.dmp
      Filesize

      4KB

    • memory/1964-106-0x000000001AE90000-0x000000001AE91000-memory.dmp
      Filesize

      4KB

    • memory/1964-105-0x00000000023A0000-0x00000000023A1000-memory.dmp
      Filesize

      4KB

    • memory/1964-98-0x000007FEF5650000-0x000007FEF603C000-memory.dmp
      Filesize

      9.9MB

    • memory/1964-110-0x000000001AE14000-0x000000001AE16000-memory.dmp
      Filesize

      8KB

    • memory/1964-109-0x000000001AE10000-0x000000001AE12000-memory.dmp
      Filesize

      8KB

    • memory/1964-107-0x0000000002020000-0x0000000002021000-memory.dmp
      Filesize

      4KB

    • memory/1964-112-0x00000000023E0000-0x00000000023E1000-memory.dmp
      Filesize

      4KB

    • memory/1964-133-0x00000000027D0000-0x00000000027D1000-memory.dmp
      Filesize

      4KB

    • memory/1964-92-0x0000000000000000-mapping.dmp
    • memory/1964-132-0x00000000027C0000-0x00000000027C1000-memory.dmp
      Filesize

      4KB

    • memory/2008-91-0x00000000026C0000-0x00000000026C4000-memory.dmp
      Filesize

      16KB

    • memory/2008-85-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp
      Filesize

      8KB

    • memory/2008-69-0x0000000000000000-mapping.dmp