Analysis

  • max time kernel
    154s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-06-2022 22:51

General

  • Target

    hello.exe

  • Size

    37KB

  • MD5

    f6578c4f484063121bb63109b543fb95

  • SHA1

    baae4772f958a85f2420a7c112f3b0ee02f962ce

  • SHA256

    c27c8f029c0ce21a116cdb60c78676cac7ea9dd38aab8bf5c394075b407d6f5e

  • SHA512

    882590671a309211271e40665ad0561c2f9474aac477a55dbe79e58122cb4370854641e84a9bd7d2d138eca3bef2d2453bacac501042139a7ec74cd37cacd87c

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

NEXT

C2

109.197.196.135:9991

Mutex

413491cbe232876548b9b7cd8a1b451d

Attributes
  • reg_key

    413491cbe232876548b9b7cd8a1b451d

  • splitter

    |'|'|

Signatures

  • Detect Neshta Payload 7 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Capture)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback (Remote Desktop)

  • suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

    suricata: ET MALWARE njrat ver 0.7d Malware CnC Callback Response (Remote Desktop)

  • Executes dropped EXE 13 IoCs
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 4 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hello.exe
    "C:\Users\Admin\AppData\Local\Temp\hello.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\hello.exe" "hello.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:1656
    • C:\Users\Admin\AppData\Local\Temp\tmp679A.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp679A.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Users\Admin\AppData\Roaming\dllhost.exe
        "C:\Users\Admin\AppData\Roaming\dllhost.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops autorun.inf file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\dllhost.exe" "dllhost.exe" ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:1628
        • C:\Users\Admin\AppData\Local\Temp\tmpA8DE.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmpA8DE.tmp.exe"
          4⤵
          • Modifies system executable filetype association
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1712
          • C:\Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmp.exe
            "C:\Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmp.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:328
            • C:\Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmpSrv.exe
              C:\Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmpSrv.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1496
              • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1168
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:672
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:275457 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1964
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:209934 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:2256
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\TMP1B9~1.EXE"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Users\Admin\AppData\Local\Temp\TMP1B9~1.EXE
            C:\Users\Admin\AppData\Local\Temp\TMP1B9~1.EXE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Users\Admin\AppData\Local\Temp\TMP1B9~1Srv.exe
              C:\Users\Admin\AppData\Local\Temp\TMP1B9~1Srv.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:2168
              • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
                7⤵
                • Executes dropped EXE
                PID:2196
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  8⤵
                    PID:2228
          • C:\Windows\svchost.com
            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\TMP4E9~1.EXE"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            PID:2424
            • C:\Users\Admin\AppData\Local\Temp\TMP4E9~1.EXE
              C:\Users\Admin\AppData\Local\Temp\TMP4E9~1.EXE
              5⤵
              • Executes dropped EXE
              PID:2452
      • C:\Users\Admin\AppData\Local\Temp\tmp8087.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp8087.tmp.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\tmp8087.tmp.exe" "tmp8087.tmp.exe" ENABLE
          3⤵
          • Modifies Windows Firewall
          PID:1892

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Initial Access

    Replication Through Removable Media

    1
    T1091

    Persistence

    Change Default File Association

    1
    T1042

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Lateral Movement

    Replication Through Removable Media

    1
    T1091

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmp.exe
      Filesize

      112KB

      MD5

      9a1b04a62283ab9848be4331ba124d0c

      SHA1

      f83fdad90c24e41987b44a022db3856c9ff22368

      SHA256

      3c782281df50b6286b774ce47c94da5b8283e73d285cf3412514c060fbb5405a

      SHA512

      393cc7cd603ee0f1f65085460c868339ae78e2616902da2ac25e2f45a453674f0bb94f5f1da3d62118d4cf7ec1d377f805ef3b74ce40fb368357055fe09740cc

    • C:\Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmpSrv.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmpSrv.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\Local\Temp\TMP1B9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • C:\Users\Admin\AppData\Local\Temp\TMP1B9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • C:\Users\Admin\AppData\Local\Temp\TMP1B9~1Srv.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\Local\Temp\TMP1B9~1Srv.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • C:\Users\Admin\AppData\Local\Temp\TMP4E9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • C:\Users\Admin\AppData\Local\Temp\TMP4E9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • C:\Users\Admin\AppData\Local\Temp\tmp679A.tmp.exe
      Filesize

      37KB

      MD5

      73196f394725a9623d84a512cdddf6ce

      SHA1

      4d24d92f70b2cbce52b1b173162b8f504ee7752f

      SHA256

      ee4ab4017c6e9c0883b2c1e42d0f0264f178ad2c6416e07d77169fdf94d1b1a4

      SHA512

      9c7d00237665f6a1df06217d156cbf07e499f60a7b4eb807b2df107f7392d710cb2439d524827b50492578c652ba20b81f95e4e0eee9f144330847f041971ed6

    • C:\Users\Admin\AppData\Local\Temp\tmp679A.tmp.exe
      Filesize

      37KB

      MD5

      73196f394725a9623d84a512cdddf6ce

      SHA1

      4d24d92f70b2cbce52b1b173162b8f504ee7752f

      SHA256

      ee4ab4017c6e9c0883b2c1e42d0f0264f178ad2c6416e07d77169fdf94d1b1a4

      SHA512

      9c7d00237665f6a1df06217d156cbf07e499f60a7b4eb807b2df107f7392d710cb2439d524827b50492578c652ba20b81f95e4e0eee9f144330847f041971ed6

    • C:\Users\Admin\AppData\Local\Temp\tmp8087.tmp.exe
      Filesize

      32KB

      MD5

      00b5c86717162d1d8b22334fe21b9041

      SHA1

      eada1b62b4d7e5ddcbdf57aa1fea6312d218e154

      SHA256

      60411ad95716024ff295b429667ca3363b12a9fa23f795f42ef51609d05b9036

      SHA512

      e6b5563070f56f6c76c103ef56592f52bff2657393983a05364619b374deee919424493fba70c63100c806ad4a98ab81c9db04e1285fe5f31d80ab1131b04a07

    • C:\Users\Admin\AppData\Local\Temp\tmp8087.tmp.exe
      Filesize

      32KB

      MD5

      00b5c86717162d1d8b22334fe21b9041

      SHA1

      eada1b62b4d7e5ddcbdf57aa1fea6312d218e154

      SHA256

      60411ad95716024ff295b429667ca3363b12a9fa23f795f42ef51609d05b9036

      SHA512

      e6b5563070f56f6c76c103ef56592f52bff2657393983a05364619b374deee919424493fba70c63100c806ad4a98ab81c9db04e1285fe5f31d80ab1131b04a07

    • C:\Users\Admin\AppData\Local\Temp\tmpA8DE.tmp.exe
      Filesize

      152KB

      MD5

      a83982b0882253cabec61f523f16954e

      SHA1

      fcd593b4380735520b2f77fa7243abd5bcc61c56

      SHA256

      b299476128e76cee29e3bc7b3cca388ebc60f38e7bde79d0d348c16b197b6e29

      SHA512

      e2b38461813afd7246bc836c276625ac58c568a0176f5990c14eb46dbf7ff7b30d181dacee0c29f3b37efde75f17a7105513a2a4bc35e0490899513caf3f9468

    • C:\Users\Admin\AppData\Local\Temp\tmpA8DE.tmp.exe
      Filesize

      152KB

      MD5

      a83982b0882253cabec61f523f16954e

      SHA1

      fcd593b4380735520b2f77fa7243abd5bcc61c56

      SHA256

      b299476128e76cee29e3bc7b3cca388ebc60f38e7bde79d0d348c16b197b6e29

      SHA512

      e2b38461813afd7246bc836c276625ac58c568a0176f5990c14eb46dbf7ff7b30d181dacee0c29f3b37efde75f17a7105513a2a4bc35e0490899513caf3f9468

    • C:\Users\Admin\AppData\Roaming\dllhost.exe
      Filesize

      37KB

      MD5

      73196f394725a9623d84a512cdddf6ce

      SHA1

      4d24d92f70b2cbce52b1b173162b8f504ee7752f

      SHA256

      ee4ab4017c6e9c0883b2c1e42d0f0264f178ad2c6416e07d77169fdf94d1b1a4

      SHA512

      9c7d00237665f6a1df06217d156cbf07e499f60a7b4eb807b2df107f7392d710cb2439d524827b50492578c652ba20b81f95e4e0eee9f144330847f041971ed6

    • C:\Users\Admin\AppData\Roaming\dllhost.exe
      Filesize

      37KB

      MD5

      73196f394725a9623d84a512cdddf6ce

      SHA1

      4d24d92f70b2cbce52b1b173162b8f504ee7752f

      SHA256

      ee4ab4017c6e9c0883b2c1e42d0f0264f178ad2c6416e07d77169fdf94d1b1a4

      SHA512

      9c7d00237665f6a1df06217d156cbf07e499f60a7b4eb807b2df107f7392d710cb2439d524827b50492578c652ba20b81f95e4e0eee9f144330847f041971ed6

    • C:\Windows\directx.sys
      Filesize

      48B

      MD5

      f9e40b77a07b0d27e13ae001b226881b

      SHA1

      9531152ad0b25f5371be4b65bb748dbf6f41a367

      SHA256

      c95ef1d16ca45b6222c64b3e26ec8b982a650da8ff2e028a32dc684d8de51ace

      SHA512

      107b93147333536c3a3490d6f17fa22aaade7dceef7c5c99f995c893fee71f0096860f0ad24607e61dca29f4719dbbaa38f6a8e3e8195a605826e482aa203515

    • C:\Windows\svchost.com
      Filesize

      40KB

      MD5

      36fd5e09c417c767a952b4609d73a54b

      SHA1

      299399c5a2403080a5bf67fb46faec210025b36d

      SHA256

      980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

      SHA512

      1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

    • C:\Windows\svchost.com
      Filesize

      40KB

      MD5

      36fd5e09c417c767a952b4609d73a54b

      SHA1

      299399c5a2403080a5bf67fb46faec210025b36d

      SHA256

      980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

      SHA512

      1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

    • C:\Windows\svchost.com
      Filesize

      40KB

      MD5

      36fd5e09c417c767a952b4609d73a54b

      SHA1

      299399c5a2403080a5bf67fb46faec210025b36d

      SHA256

      980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

      SHA512

      1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      Filesize

      252KB

      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • \Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • \Program Files (x86)\Microsoft\DesktopLayer.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • \Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmp.exe
      Filesize

      112KB

      MD5

      9a1b04a62283ab9848be4331ba124d0c

      SHA1

      f83fdad90c24e41987b44a022db3856c9ff22368

      SHA256

      3c782281df50b6286b774ce47c94da5b8283e73d285cf3412514c060fbb5405a

      SHA512

      393cc7cd603ee0f1f65085460c868339ae78e2616902da2ac25e2f45a453674f0bb94f5f1da3d62118d4cf7ec1d377f805ef3b74ce40fb368357055fe09740cc

    • \Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmp.exe
      Filesize

      112KB

      MD5

      9a1b04a62283ab9848be4331ba124d0c

      SHA1

      f83fdad90c24e41987b44a022db3856c9ff22368

      SHA256

      3c782281df50b6286b774ce47c94da5b8283e73d285cf3412514c060fbb5405a

      SHA512

      393cc7cd603ee0f1f65085460c868339ae78e2616902da2ac25e2f45a453674f0bb94f5f1da3d62118d4cf7ec1d377f805ef3b74ce40fb368357055fe09740cc

    • \Users\Admin\AppData\Local\Temp\3582-490\tmpA8DE.tmpSrv.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • \Users\Admin\AppData\Local\Temp\TMP1B9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • \Users\Admin\AppData\Local\Temp\TMP1B9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • \Users\Admin\AppData\Local\Temp\TMP1B9~1Srv.exe
      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • \Users\Admin\AppData\Local\Temp\TMP4E9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • \Users\Admin\AppData\Local\Temp\TMP4E9~1.EXE
      Filesize

      65KB

      MD5

      c1de9eca3223daed0bc2ae4816193d94

      SHA1

      802d287f4b04454349ca29edf759c8a17c1001fa

      SHA256

      da7ad7681972d3bad124bb4896d74cee40f5aa86d07ecfbd81050c6cc1619e8c

      SHA512

      1ffc95367e960652cd78d99b6a7a38d8056b46dca5f59ada7f4c2dc620d829a43e96610c8bfa36268e1b5037bd9ce7225a050d53fef32cfd9309af3cdc4627a0

    • \Users\Admin\AppData\Local\Temp\tmp679A.tmp.exe
      Filesize

      37KB

      MD5

      73196f394725a9623d84a512cdddf6ce

      SHA1

      4d24d92f70b2cbce52b1b173162b8f504ee7752f

      SHA256

      ee4ab4017c6e9c0883b2c1e42d0f0264f178ad2c6416e07d77169fdf94d1b1a4

      SHA512

      9c7d00237665f6a1df06217d156cbf07e499f60a7b4eb807b2df107f7392d710cb2439d524827b50492578c652ba20b81f95e4e0eee9f144330847f041971ed6

    • \Users\Admin\AppData\Local\Temp\tmp8087.tmp.exe
      Filesize

      32KB

      MD5

      00b5c86717162d1d8b22334fe21b9041

      SHA1

      eada1b62b4d7e5ddcbdf57aa1fea6312d218e154

      SHA256

      60411ad95716024ff295b429667ca3363b12a9fa23f795f42ef51609d05b9036

      SHA512

      e6b5563070f56f6c76c103ef56592f52bff2657393983a05364619b374deee919424493fba70c63100c806ad4a98ab81c9db04e1285fe5f31d80ab1131b04a07

    • \Users\Admin\AppData\Local\Temp\tmpA8DE.tmp.exe
      Filesize

      152KB

      MD5

      a83982b0882253cabec61f523f16954e

      SHA1

      fcd593b4380735520b2f77fa7243abd5bcc61c56

      SHA256

      b299476128e76cee29e3bc7b3cca388ebc60f38e7bde79d0d348c16b197b6e29

      SHA512

      e2b38461813afd7246bc836c276625ac58c568a0176f5990c14eb46dbf7ff7b30d181dacee0c29f3b37efde75f17a7105513a2a4bc35e0490899513caf3f9468

    • \Users\Admin\AppData\Local\Temp\tmpA8DE.tmp.exe
      Filesize

      152KB

      MD5

      a83982b0882253cabec61f523f16954e

      SHA1

      fcd593b4380735520b2f77fa7243abd5bcc61c56

      SHA256

      b299476128e76cee29e3bc7b3cca388ebc60f38e7bde79d0d348c16b197b6e29

      SHA512

      e2b38461813afd7246bc836c276625ac58c568a0176f5990c14eb46dbf7ff7b30d181dacee0c29f3b37efde75f17a7105513a2a4bc35e0490899513caf3f9468

    • \Users\Admin\AppData\Roaming\dllhost.exe
      Filesize

      37KB

      MD5

      73196f394725a9623d84a512cdddf6ce

      SHA1

      4d24d92f70b2cbce52b1b173162b8f504ee7752f

      SHA256

      ee4ab4017c6e9c0883b2c1e42d0f0264f178ad2c6416e07d77169fdf94d1b1a4

      SHA512

      9c7d00237665f6a1df06217d156cbf07e499f60a7b4eb807b2df107f7392d710cb2439d524827b50492578c652ba20b81f95e4e0eee9f144330847f041971ed6

    • memory/296-75-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/296-60-0x0000000000000000-mapping.dmp
    • memory/296-64-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/328-109-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/328-110-0x0000000000230000-0x000000000025E000-memory.dmp
      Filesize

      184KB

    • memory/328-92-0x0000000000000000-mapping.dmp
    • memory/328-114-0x0000000000230000-0x000000000025E000-memory.dmp
      Filesize

      184KB

    • memory/916-76-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/916-66-0x0000000000000000-mapping.dmp
    • memory/916-82-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/1080-55-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/1080-58-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/1080-54-0x00000000755C1000-0x00000000755C3000-memory.dmp
      Filesize

      8KB

    • memory/1092-77-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/1092-71-0x0000000000000000-mapping.dmp
    • memory/1092-83-0x0000000074800000-0x0000000074DAB000-memory.dmp
      Filesize

      5.7MB

    • memory/1168-100-0x0000000000000000-mapping.dmp
    • memory/1168-105-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1496-101-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1496-95-0x0000000000000000-mapping.dmp
    • memory/1628-80-0x0000000000000000-mapping.dmp
    • memory/1656-56-0x0000000000000000-mapping.dmp
    • memory/1712-107-0x0000000000310000-0x000000000032D000-memory.dmp
      Filesize

      116KB

    • memory/1712-115-0x0000000000310000-0x000000000033E000-memory.dmp
      Filesize

      184KB

    • memory/1712-112-0x0000000000310000-0x000000000032D000-memory.dmp
      Filesize

      116KB

    • memory/1712-86-0x0000000000000000-mapping.dmp
    • memory/1712-108-0x0000000000310000-0x000000000032D000-memory.dmp
      Filesize

      116KB

    • memory/1712-113-0x0000000000310000-0x000000000032D000-memory.dmp
      Filesize

      116KB

    • memory/1892-78-0x0000000000000000-mapping.dmp
    • memory/2112-136-0x00000000003B0000-0x00000000003CD000-memory.dmp
      Filesize

      116KB

    • memory/2112-137-0x00000000003B0000-0x00000000003CD000-memory.dmp
      Filesize

      116KB

    • memory/2112-117-0x0000000000000000-mapping.dmp
    • memory/2144-139-0x0000000000250000-0x000000000027E000-memory.dmp
      Filesize

      184KB

    • memory/2144-138-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/2144-123-0x0000000000000000-mapping.dmp
    • memory/2168-126-0x0000000000000000-mapping.dmp
    • memory/2168-132-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2196-131-0x0000000000000000-mapping.dmp
    • memory/2424-140-0x0000000000000000-mapping.dmp
    • memory/2452-147-0x0000000000000000-mapping.dmp