Malware Analysis Report

2024-08-06 06:32

Sample ID 210728-raqax3y1p6
Target Bitdefender.V10.f.r.Vista.keygen.zip
SHA256 26111363366c2407a77c92724b16a8b0403b0f4f0ce5a0fc6f2f318a08e64cda
Tags
azorult pony discovery infostealer persistence rat spyware stealer suricata trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

26111363366c2407a77c92724b16a8b0403b0f4f0ce5a0fc6f2f318a08e64cda

Threat Level: Known bad

The file Bitdefender.V10.f.r.Vista.keygen.zip was found to be: Known bad.

Malicious Activity Summary

azorult pony discovery infostealer persistence rat spyware stealer suricata trojan

Azorult

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M3

Pony,Fareit

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Reads data files stored by FTP clients

Checks installed software on the system

Adds Run key to start application

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Modifies system certificate store

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V6

Analysis: static1

Detonation Overview

Reported

2021-07-28 23:12

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-07-28 23:12

Reported

2021-07-28 23:42

Platform

win7v20210408

Max time kernel

24s

Max time network

32s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe"

Signatures

Azorult

trojan infostealer azorult

Pony,Fareit

rat spyware stealer pony

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M3

suricata

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Muavi Music Player Dc47 IISouxm7qlNavy6c2aL4qtxjjhHgWe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft GDa6dKdwv90j82T 242xc_jUpdater.exe" C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe N/A

Checks installed software on the system

discovery

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1572 set thread context of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

Enumerates physical storage devices

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 940 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe C:\Windows\SysWOW64\cmd.exe
PID 940 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe C:\Windows\SysWOW64\cmd.exe
PID 940 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe C:\Windows\SysWOW64\cmd.exe
PID 940 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe C:\Windows\SysWOW64\cmd.exe
PID 1344 wrote to memory of 1364 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 1344 wrote to memory of 1364 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 1344 wrote to memory of 1364 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 1344 wrote to memory of 1364 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 1344 wrote to memory of 1364 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 1344 wrote to memory of 1364 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 1344 wrote to memory of 1364 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 1344 wrote to memory of 1352 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
PID 1344 wrote to memory of 1352 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
PID 1344 wrote to memory of 1352 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
PID 1344 wrote to memory of 1352 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
PID 1344 wrote to memory of 1580 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
PID 1344 wrote to memory of 1580 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
PID 1344 wrote to memory of 1580 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
PID 1344 wrote to memory of 1580 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
PID 1344 wrote to memory of 556 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
PID 1344 wrote to memory of 556 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
PID 1344 wrote to memory of 556 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
PID 1344 wrote to memory of 556 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
PID 1364 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1364 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1364 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1364 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1364 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1364 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1364 wrote to memory of 1572 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 556 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
PID 556 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
PID 556 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
PID 556 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1572 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 556 wrote to memory of 932 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe
PID 556 wrote to memory of 932 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe
PID 556 wrote to memory of 932 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe
PID 556 wrote to memory of 932 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe
PID 556 wrote to memory of 932 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe
PID 556 wrote to memory of 932 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe
PID 556 wrote to memory of 932 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe

"C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe

keygen-pr.exe -p83fsase3Ge

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

keygen-step-1.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe

keygen-step-3.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe

keygen-step-4.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat

C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 www.wws23dfwe.com udp
N/A 8.8.8.8:53 digitalassets.ams3.digitaloceanspaces.com udp
N/A 5.101.110.225:443 digitalassets.ams3.digitaloceanspaces.com tcp
N/A 8.8.8.8:53 kvaka.li udp
N/A 185.173.37.179:80 kvaka.li tcp
N/A 45.133.1.139:80 tcp
N/A 8.8.8.8:53 oldhorse.info udp
N/A 185.177.93.149:80 oldhorse.info tcp

Files

memory/940-60-0x0000000075051000-0x0000000075053000-memory.dmp

memory/1344-61-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat

MD5 f2632c204f883c59805093720dfe5a78
SHA1 c96e3aa03805a84fec3ea4208104a25a2a9d037e
SHA256 f9458a661ecd6c7e8fae669be72497288472a11ac3e823d3074e58f7fe98cd68
SHA512 5a19c4a777899889381be64f190e50a23cceee0abb78776b6d041e2384ba88e692972e40cefa34c03ca1b7d029475a0afbc5ce006ce833a1665e52008671bae2

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe

MD5 65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1 a1f4784377c53151167965e0ff225f5085ebd43b
SHA256 862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512 e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da

\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe

MD5 65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1 a1f4784377c53151167965e0ff225f5085ebd43b
SHA256 862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512 e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da

memory/1364-65-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe

MD5 65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1 a1f4784377c53151167965e0ff225f5085ebd43b
SHA256 862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512 e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da

\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

MD5 c615d0bfa727f494fee9ecb3f0acf563
SHA1 6c3509ae64abc299a7afa13552c4fe430071f087
SHA256 95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512 d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

MD5 c615d0bfa727f494fee9ecb3f0acf563
SHA1 6c3509ae64abc299a7afa13552c4fe430071f087
SHA256 95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512 d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

MD5 c615d0bfa727f494fee9ecb3f0acf563
SHA1 6c3509ae64abc299a7afa13552c4fe430071f087
SHA256 95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512 d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

memory/1352-70-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

MD5 c615d0bfa727f494fee9ecb3f0acf563
SHA1 6c3509ae64abc299a7afa13552c4fe430071f087
SHA256 95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512 d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe

MD5 9aaafaed80038c9dcb3bb6a532e9d071
SHA1 4657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256 e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA512 9d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996

\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe

MD5 9aaafaed80038c9dcb3bb6a532e9d071
SHA1 4657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256 e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA512 9d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996

memory/1580-75-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe

MD5 7a14c7bd45bdcd63d51c448292d9fefe
SHA1 f3dfc78ccdfe3cc4bbff429e1c3bc67ce60e1778
SHA256 8050446e3f3cb9cc241b34d71effe20efce7c21ae842bbc66c9e32eae41382a3
SHA512 de914a5d00faeaf6555740ee9feb9674436b360426aaa7b766e7f6e802aaa6b5d021545ec379c54b034455765f928f91bac3928000f304a4f3d9df3229b3ef1e

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe

MD5 9aaafaed80038c9dcb3bb6a532e9d071
SHA1 4657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256 e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA512 9d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996

\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe

MD5 7a14c7bd45bdcd63d51c448292d9fefe
SHA1 f3dfc78ccdfe3cc4bbff429e1c3bc67ce60e1778
SHA256 8050446e3f3cb9cc241b34d71effe20efce7c21ae842bbc66c9e32eae41382a3
SHA512 de914a5d00faeaf6555740ee9feb9674436b360426aaa7b766e7f6e802aaa6b5d021545ec379c54b034455765f928f91bac3928000f304a4f3d9df3229b3ef1e

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe

MD5 7a14c7bd45bdcd63d51c448292d9fefe
SHA1 f3dfc78ccdfe3cc4bbff429e1c3bc67ce60e1778
SHA256 8050446e3f3cb9cc241b34d71effe20efce7c21ae842bbc66c9e32eae41382a3
SHA512 de914a5d00faeaf6555740ee9feb9674436b360426aaa7b766e7f6e802aaa6b5d021545ec379c54b034455765f928f91bac3928000f304a4f3d9df3229b3ef1e

memory/556-80-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

memory/1572-87-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

C:\Users\Admin\AppData\Local\Temp\RarSFX1\JOzWR.dat

MD5 12476321a502e943933e60cfb4429970
SHA1 c71d293b84d03153a1bd13c560fca0f8857a95a7
SHA256 14a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29
SHA512 f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc

\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

memory/1572-95-0x0000000002500000-0x000000000269C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

memory/1240-96-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

memory/1240-102-0x00000000013A0000-0x00000000013A1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

memory/1076-101-0x0000000000400000-0x0000000000983000-memory.dmp

\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

memory/1076-104-0x000000000066C0BC-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

memory/1240-107-0x0000000000960000-0x0000000000962000-memory.dmp

memory/1076-108-0x0000000000400000-0x0000000000983000-memory.dmp

\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

memory/932-113-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

memory/932-116-0x0000000000060000-0x0000000000061000-memory.dmp

memory/932-118-0x0000000004690000-0x0000000004691000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX1\potato.dat

MD5 124857a6a883987ba85b034138f79be2
SHA1 6428f74323f4bf49ac98e62bad96785a4cbedfd0
SHA256 71bce4f46a28aa31ffc2d563c555a3df2ed46d52c62f46fefd7c81ffb90beeea
SHA512 f29ba8f758d21cd018602a23193a983f3a2275e782ca3ff169315ac1fb16758099789309b865e2084ce9d657a4d34c66cfa726bd502ff00e8fff240a0677658f

memory/1572-120-0x0000000000A10000-0x0000000000AFF000-memory.dmp

memory/932-121-0x0000000004695000-0x00000000046A6000-memory.dmp

memory/932-122-0x00000000046A6000-0x00000000046A7000-memory.dmp

memory/1572-123-0x0000000000140000-0x0000000000152000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2021-07-28 23:12

Reported

2021-07-28 23:42

Platform

win10v20210410

Max time kernel

329s

Max time network

1442s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe"

Signatures

Azorult

trojan infostealer azorult

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16

suricata

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Muavi Music Player X2dHt_r3vfrIed4PyHBIVPc8F8RBHs45Sw7q = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftnNgShdNdEhr0yNlJPP_nhu7wUpdater.exe" C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3100 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe C:\Windows\SysWOW64\cmd.exe
PID 3100 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe C:\Windows\SysWOW64\cmd.exe
PID 3100 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe C:\Windows\SysWOW64\cmd.exe
PID 2884 wrote to memory of 2576 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 2884 wrote to memory of 2576 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 2884 wrote to memory of 2576 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
PID 2884 wrote to memory of 204 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
PID 2884 wrote to memory of 204 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
PID 2884 wrote to memory of 204 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
PID 2884 wrote to memory of 188 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
PID 2884 wrote to memory of 188 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
PID 2884 wrote to memory of 188 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
PID 2884 wrote to memory of 3840 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
PID 2884 wrote to memory of 3840 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
PID 2884 wrote to memory of 3840 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
PID 2576 wrote to memory of 1312 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 2576 wrote to memory of 1312 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 2576 wrote to memory of 1312 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 3840 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe
PID 3840 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe
PID 1312 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1312 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 1312 wrote to memory of 1264 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
PID 3840 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe
PID 3840 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe
PID 3840 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe

"C:\Users\Admin\AppData\Local\Temp\Bitdefender.V10.f.r.Vista.keygen.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe

keygen-pr.exe -p83fsase3Ge

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

keygen-step-1.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe

keygen-step-3.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe

keygen-step-4.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat

C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 www.wws23dfwe.com udp
N/A 8.8.8.8:53 kvaka.li udp
N/A 185.173.37.179:80 kvaka.li tcp
N/A 8.8.8.8:53 digitalassets.ams3.digitaloceanspaces.com udp
N/A 5.101.110.225:443 digitalassets.ams3.digitaloceanspaces.com tcp
N/A 45.133.1.139:80 tcp

Files

memory/2884-114-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat

MD5 f2632c204f883c59805093720dfe5a78
SHA1 c96e3aa03805a84fec3ea4208104a25a2a9d037e
SHA256 f9458a661ecd6c7e8fae669be72497288472a11ac3e823d3074e58f7fe98cd68
SHA512 5a19c4a777899889381be64f190e50a23cceee0abb78776b6d041e2384ba88e692972e40cefa34c03ca1b7d029475a0afbc5ce006ce833a1665e52008671bae2

memory/2576-116-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe

MD5 65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1 a1f4784377c53151167965e0ff225f5085ebd43b
SHA256 862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512 e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe

MD5 65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1 a1f4784377c53151167965e0ff225f5085ebd43b
SHA256 862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512 e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

MD5 c615d0bfa727f494fee9ecb3f0acf563
SHA1 6c3509ae64abc299a7afa13552c4fe430071f087
SHA256 95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512 d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

memory/188-121-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe

MD5 9aaafaed80038c9dcb3bb6a532e9d071
SHA1 4657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256 e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA512 9d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe

MD5 9aaafaed80038c9dcb3bb6a532e9d071
SHA1 4657521b9a50137db7b1e2e84193363a2ddbd74f
SHA256 e019f9e9da75b4b108fd9a62853e5966d13a33fc13718b8248041204316edff5
SHA512 9d69afc8c16ddc2261b46cc48e7ca2176e35a19534d82c6245baa6318b478fd63d1235a8418c07bf11cb5386aa0ee9879db90866b88251b16b959880d6ab0996

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe

MD5 c615d0bfa727f494fee9ecb3f0acf563
SHA1 6c3509ae64abc299a7afa13552c4fe430071f087
SHA256 95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512 d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

memory/204-119-0x0000000000000000-mapping.dmp

memory/3840-125-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe

MD5 7a14c7bd45bdcd63d51c448292d9fefe
SHA1 f3dfc78ccdfe3cc4bbff429e1c3bc67ce60e1778
SHA256 8050446e3f3cb9cc241b34d71effe20efce7c21ae842bbc66c9e32eae41382a3
SHA512 de914a5d00faeaf6555740ee9feb9674436b360426aaa7b766e7f6e802aaa6b5d021545ec379c54b034455765f928f91bac3928000f304a4f3d9df3229b3ef1e

C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe

MD5 7a14c7bd45bdcd63d51c448292d9fefe
SHA1 f3dfc78ccdfe3cc4bbff429e1c3bc67ce60e1778
SHA256 8050446e3f3cb9cc241b34d71effe20efce7c21ae842bbc66c9e32eae41382a3
SHA512 de914a5d00faeaf6555740ee9feb9674436b360426aaa7b766e7f6e802aaa6b5d021545ec379c54b034455765f928f91bac3928000f304a4f3d9df3229b3ef1e

memory/1312-130-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe

MD5 51ef03c9257f2dd9b93bfdd74e96c017
SHA1 3baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA256 82a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA512 2c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1

memory/1176-134-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX1\JOzWR.dat

MD5 12476321a502e943933e60cfb4429970
SHA1 c71d293b84d03153a1bd13c560fca0f8857a95a7
SHA256 14a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29
SHA512 f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc

C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe

MD5 190e4e695d5408772221905f21d8cc4b
SHA1 553ac45a383b813bc453301a35f3489768469d4c
SHA256 168010080aeaf73cd296baed534d239f193072e0a52c700ba15f6aff34f712cb
SHA512 611159a78f8852f7ea48a756d775b30dc6e2282030fba1bd1988c546283d0e2448a68732975c9a501a49212e56649188e447a6a503c2fe72196f3eede4e24cdd

memory/1176-137-0x0000000000370000-0x0000000000371000-memory.dmp

memory/1176-139-0x000000001B0F0000-0x000000001B0F2000-memory.dmp

memory/1312-140-0x0000000002640000-0x00000000027DC000-memory.dmp

memory/2548-141-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

C:\Users\Admin\AppData\Local\Temp\RarSFX1\Install.exe

MD5 1c9bb6efaebb7a43cab38e3d58b5134c
SHA1 0b688305eb02ab06c8937de018f698fa3ddbad57
SHA256 596ab1ddff660a3cd00e14f5e43d5af6a0ad03a41d07a51344b8eb61a594d27f
SHA512 53efe778773d51702866f3cbf00b40734bf3c0097957f4684ff424fe972d9659c8adc676b8201b645c22fc1d53e1bb673957d3fe88f99acec93b55caf99c7c4d

memory/2548-144-0x00000000003D0000-0x00000000003D1000-memory.dmp

memory/2548-146-0x0000000005190000-0x0000000005191000-memory.dmp

memory/2548-147-0x0000000004C90000-0x0000000004C91000-memory.dmp

memory/2548-148-0x0000000004D80000-0x0000000004D81000-memory.dmp

memory/2548-149-0x0000000004C90000-0x000000000518E000-memory.dmp

memory/2548-150-0x0000000004C90000-0x000000000518E000-memory.dmp