Analysis Overview
SHA256
11a66a01ad5bf1a78af73a05f167e8f1c202545f6d980524666f0bf91e6a654d
Threat Level: Known bad
The file file was found to be: Known bad.
Malicious Activity Summary
Detects Smokeloader packer
Danabot
Vidar
Detected Djvu ransomware
SmokeLoader
Djvu Ransomware
Executes dropped EXE
Blocklisted process makes network request
Downloads MZ/PE file
Checks computer location settings
Modifies file permissions
Loads dropped DLL
Reads user/profile data of web browsers
Adds Run key to start application
Accesses 2FA software files, possible credential harvesting
Checks installed software on the system
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
outlook_office_path
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks processor information in registry
outlook_win_path
Creates scheduled task(s)
Checks SCSI registry key(s)
Suspicious use of AdjustPrivilegeToken
Kills process with taskkill
Delays execution with timeout.exe
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-10-19 12:32
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-10-19 12:32
Reported
2022-10-19 12:35
Platform
win7-20220812-en
Max time kernel
170s
Max time network
47s
Command Line
Signatures
Detects Smokeloader packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
SmokeLoader
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\file.exe
"C:\Users\Admin\AppData\Local\Temp\file.exe"
Network
Files
memory/2036-54-0x0000000000678000-0x0000000000689000-memory.dmp
memory/2036-55-0x0000000075501000-0x0000000075503000-memory.dmp
memory/2036-57-0x0000000000220000-0x0000000000229000-memory.dmp
memory/2036-56-0x0000000000678000-0x0000000000689000-memory.dmp
memory/2036-58-0x0000000000400000-0x0000000000597000-memory.dmp
memory/2036-59-0x0000000000400000-0x0000000000597000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-10-19 12:32
Reported
2022-10-19 12:35
Platform
win10v2004-20220812-en
Max time kernel
180s
Max time network
187s
Command Line
Signatures
Danabot
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detects Smokeloader packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
SmokeLoader
Vidar
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Downloads MZ/PE file
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9F8C.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\A26B.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\A5E7.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Accesses 2FA software files, possible credential harvesting
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\917af88a-9c06-41af-b8d3-fd2ff1f4cd35\\AA6D.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | N/A |
Checks installed software on the system
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 5064 set thread context of 4020 | N/A | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | C:\Users\Admin\AppData\Local\Temp\AA6D.exe |
| PID 4236 set thread context of 4156 | N/A | C:\Users\Admin\AppData\Local\Temp\AA6D.exe | C:\Users\Admin\AppData\Local\Temp\AA6D.exe |
| PID 1736 set thread context of 3472 | N/A | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe |
Enumerates physical storage devices
Program crash
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\system32\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\svchost.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 | C:\Windows\system32\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\svchost.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\9F8C.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\svchost.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\9F8C.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\9F8C.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A | C:\Windows\system32\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A | C:\Windows\system32\svchost.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Users\Admin\AppData\Local\Temp\E39.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\file.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9F8C.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\file.exe
"C:\Users\Admin\AppData\Local\Temp\file.exe"
C:\Users\Admin\AppData\Local\Temp\9F8C.exe
C:\Users\Admin\AppData\Local\Temp\9F8C.exe
C:\Users\Admin\AppData\Local\Temp\A26B.exe
C:\Users\Admin\AppData\Local\Temp\A26B.exe
C:\Users\Admin\AppData\Local\Temp\A5E7.exe
C:\Users\Admin\AppData\Local\Temp\A5E7.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 220 -ip 220
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\A8A7.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\A8A7.dll
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 340
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 260 -ip 260
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 260 -s 340
C:\Windows\explorer.exe
C:\Windows\explorer.exe
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\917af88a-9c06-41af-b8d3-fd2ff1f4cd35" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
"C:\Users\Admin\AppData\Local\Temp\AA6D.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
"C:\Users\Admin\AppData\Local\Temp\AA6D.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe
"C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe"
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build3.exe
"C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build3.exe"
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe
"C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\Temp\E39.exe
C:\Users\Admin\AppData\Local\Temp\E39.exe
C:\Windows\SysWOW64\agentactivationruntimestarter.exe
C:\Windows\system32\agentactivationruntimestarter.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x404 0x470
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" ø y/c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe" & del C:\PrograData\*.dll & exit
C:\Windows\SysWOW64\taskkill.exe
taskkill /im build2.exe /f
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1276 -ip 1276
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 628
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1276 -ip 1276
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 948
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1276 -ip 1276
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 1044
Network
| Country | Destination | Domain | Proto |
| US | 93.184.221.240:80 | tcp | |
| NL | 95.101.78.106:80 | tcp | |
| NL | 95.101.78.106:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| DE | 51.116.253.168:443 | tcp | |
| US | 8.8.8.8:53 | furubujjul.net | udp |
| US | 172.67.203.213:80 | furubujjul.net | tcp |
| US | 8.8.8.8:53 | pelegisr.com | udp |
| NL | 185.220.204.62:443 | pelegisr.com | tcp |
| US | 93.184.220.29:80 | tcp | |
| RU | 185.174.137.174:80 | 185.174.137.174 | tcp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| US | 172.67.203.213:80 | furubujjul.net | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| KR | 211.171.233.129:80 | winnlinne.com | tcp |
| US | 8.8.8.8:53 | udp | |
| N/A | 40.127.240.158:443 | tcp | |
| NL | 162.0.217.254:443 | tcp | |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | udp | |
| KR | 211.171.233.129:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| N/A | 190.147.188.50:80 | tcp | |
| US | 8.8.8.8:53 | gayworld.at | udp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| NL | 213.227.155.193:80 | 213.227.155.193 | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| DE | 116.202.186.42:80 | 116.202.186.42 | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| US | 8.8.8.8:53 | disk.yandex.ru | udp |
| RU | 87.250.250.50:443 | disk.yandex.ru | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| EG | 41.41.255.235:80 | gayworld.at | tcp |
| NL | 192.236.233.188:443 | 192.236.233.188 | tcp |
Files
memory/3064-132-0x0000000000903000-0x0000000000914000-memory.dmp
memory/3064-133-0x00000000001F0000-0x00000000001F9000-memory.dmp
memory/3064-134-0x0000000000400000-0x0000000000597000-memory.dmp
memory/3064-135-0x0000000000903000-0x0000000000914000-memory.dmp
memory/3064-136-0x0000000000400000-0x0000000000597000-memory.dmp
memory/3196-137-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\9F8C.exe
| MD5 | b2e3468de0cca1d708122ace4cbb1efe |
| SHA1 | fb015f1fe50bd8ad8458a267ee3322a01ea8a721 |
| SHA256 | 6a883411f16df17993db73ab92b50ce5a454d3b5f4b510baa308f226aaf3a338 |
| SHA512 | 3fdf979c231345b9da989388019ef46a7aa52241a86624ebd8b9ccbdbe26a036e971f820a891b2dcae466763c70cefb2150c0b506d5befa58bb96103c19b5137 |
C:\Users\Admin\AppData\Local\Temp\9F8C.exe
| MD5 | b2e3468de0cca1d708122ace4cbb1efe |
| SHA1 | fb015f1fe50bd8ad8458a267ee3322a01ea8a721 |
| SHA256 | 6a883411f16df17993db73ab92b50ce5a454d3b5f4b510baa308f226aaf3a338 |
| SHA512 | 3fdf979c231345b9da989388019ef46a7aa52241a86624ebd8b9ccbdbe26a036e971f820a891b2dcae466763c70cefb2150c0b506d5befa58bb96103c19b5137 |
memory/220-140-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\A26B.exe
| MD5 | 22f91cf54daf8dde7270d770df505c10 |
| SHA1 | d7aac098c189cb176205670562d50e876aff2318 |
| SHA256 | febd3bc85cb8088a78be9f9cecaf03e4417452a79118129efd1073a24f0ac65e |
| SHA512 | 3bca71adc06d4eb11dc348854bbb74a38c6c94a46a00fa85ea47d847fe813a9681723b538e35de3434bedfe789d9c70a64f826426b82cdf7a81becca67a0783e |
C:\Users\Admin\AppData\Local\Temp\A26B.exe
| MD5 | 22f91cf54daf8dde7270d770df505c10 |
| SHA1 | d7aac098c189cb176205670562d50e876aff2318 |
| SHA256 | febd3bc85cb8088a78be9f9cecaf03e4417452a79118129efd1073a24f0ac65e |
| SHA512 | 3bca71adc06d4eb11dc348854bbb74a38c6c94a46a00fa85ea47d847fe813a9681723b538e35de3434bedfe789d9c70a64f826426b82cdf7a81becca67a0783e |
memory/260-143-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\A5E7.exe
| MD5 | 9420bba7b85499d94c75478a9674d3f3 |
| SHA1 | 2264554b7ff245bfb53cfe15f089f3be2c15b422 |
| SHA256 | eef607cb257bd11f3bcf6013b8838b3255a3f08d71ee160591395d92df639c10 |
| SHA512 | aa0854b1b11c9a7b7c16e1ecd082d0629eb9bf237772e375948bf36ce3f47fb54fe9499292cec8de7669bf2a90a702685ee0537dd082a7c2a1a8d281d632911b |
C:\Users\Admin\AppData\Local\Temp\A5E7.exe
| MD5 | 9420bba7b85499d94c75478a9674d3f3 |
| SHA1 | 2264554b7ff245bfb53cfe15f089f3be2c15b422 |
| SHA256 | eef607cb257bd11f3bcf6013b8838b3255a3f08d71ee160591395d92df639c10 |
| SHA512 | aa0854b1b11c9a7b7c16e1ecd082d0629eb9bf237772e375948bf36ce3f47fb54fe9499292cec8de7669bf2a90a702685ee0537dd082a7c2a1a8d281d632911b |
memory/3196-146-0x00000000007D3000-0x00000000007E4000-memory.dmp
memory/3196-147-0x00000000001F0000-0x00000000001F9000-memory.dmp
memory/3196-148-0x0000000000400000-0x0000000000597000-memory.dmp
memory/220-150-0x0000000000400000-0x0000000000597000-memory.dmp
memory/220-149-0x0000000000693000-0x00000000006A4000-memory.dmp
memory/1368-151-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\A8A7.dll
| MD5 | 34988e2e5d74e24b4cd7746546cd8534 |
| SHA1 | 15bcfb5529aeae156a6f4c3b4d38e87fe806caba |
| SHA256 | ddb8f83a3c85c3c1fd6f670247b0707cef55102474c0e3f45ee02288e519f0a4 |
| SHA512 | 20e3db206aa1b44f2f8ed4cb9bb204f0beb59aee02ce755f46931fd089f8e1d49a0c4e1980f6fdfe373361a25ebdb7c5aa626807094d90fae77237c299763f25 |
memory/4888-153-0x0000000000000000-mapping.dmp
memory/5064-154-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
| MD5 | dc38da1da1e88bac04121824d2abb81a |
| SHA1 | 101f00bcbba421c4f14a20a7da382acbfe900e52 |
| SHA256 | fd5c524cd0cb96875cb791dafbbd11d4ef5970fc988df77aabfdce9cb63f4e1a |
| SHA512 | cb0a18fabc9d065a328a85957efb4f52ce640d8f8c74cfb64d2e01c245f669b0440c0c2fca1d51ad3618ae72a578ce17726f1446b9aa79f1e2fe2e86d439381b |
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
| MD5 | dc38da1da1e88bac04121824d2abb81a |
| SHA1 | 101f00bcbba421c4f14a20a7da382acbfe900e52 |
| SHA256 | fd5c524cd0cb96875cb791dafbbd11d4ef5970fc988df77aabfdce9cb63f4e1a |
| SHA512 | cb0a18fabc9d065a328a85957efb4f52ce640d8f8c74cfb64d2e01c245f669b0440c0c2fca1d51ad3618ae72a578ce17726f1446b9aa79f1e2fe2e86d439381b |
memory/2100-157-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\A8A7.dll
| MD5 | 34988e2e5d74e24b4cd7746546cd8534 |
| SHA1 | 15bcfb5529aeae156a6f4c3b4d38e87fe806caba |
| SHA256 | ddb8f83a3c85c3c1fd6f670247b0707cef55102474c0e3f45ee02288e519f0a4 |
| SHA512 | 20e3db206aa1b44f2f8ed4cb9bb204f0beb59aee02ce755f46931fd089f8e1d49a0c4e1980f6fdfe373361a25ebdb7c5aa626807094d90fae77237c299763f25 |
memory/4592-159-0x0000000000000000-mapping.dmp
memory/260-161-0x00000000005F0000-0x00000000005F9000-memory.dmp
memory/260-160-0x0000000000633000-0x0000000000644000-memory.dmp
memory/260-162-0x0000000000400000-0x0000000000597000-memory.dmp
memory/2100-165-0x00000000008F0000-0x000000000095B000-memory.dmp
memory/4592-164-0x00000000007E0000-0x00000000007EC000-memory.dmp
memory/2100-163-0x0000000000960000-0x00000000009D5000-memory.dmp
memory/4020-166-0x0000000000000000-mapping.dmp
memory/5064-170-0x000000000077C000-0x000000000080E000-memory.dmp
memory/4020-172-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5064-171-0x0000000002290000-0x00000000023AB000-memory.dmp
memory/4020-169-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
| MD5 | dc38da1da1e88bac04121824d2abb81a |
| SHA1 | 101f00bcbba421c4f14a20a7da382acbfe900e52 |
| SHA256 | fd5c524cd0cb96875cb791dafbbd11d4ef5970fc988df77aabfdce9cb63f4e1a |
| SHA512 | cb0a18fabc9d065a328a85957efb4f52ce640d8f8c74cfb64d2e01c245f669b0440c0c2fca1d51ad3618ae72a578ce17726f1446b9aa79f1e2fe2e86d439381b |
memory/4020-167-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2100-173-0x00000000008F0000-0x000000000095B000-memory.dmp
memory/4020-174-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4888-176-0x0000000002EC0000-0x0000000002FBE000-memory.dmp
memory/4888-175-0x0000000002CC0000-0x0000000002DBE000-memory.dmp
memory/2212-177-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\917af88a-9c06-41af-b8d3-fd2ff1f4cd35\AA6D.exe
| MD5 | dc38da1da1e88bac04121824d2abb81a |
| SHA1 | 101f00bcbba421c4f14a20a7da382acbfe900e52 |
| SHA256 | fd5c524cd0cb96875cb791dafbbd11d4ef5970fc988df77aabfdce9cb63f4e1a |
| SHA512 | cb0a18fabc9d065a328a85957efb4f52ce640d8f8c74cfb64d2e01c245f669b0440c0c2fca1d51ad3618ae72a578ce17726f1446b9aa79f1e2fe2e86d439381b |
memory/3196-179-0x0000000000400000-0x0000000000597000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
| MD5 | dc38da1da1e88bac04121824d2abb81a |
| SHA1 | 101f00bcbba421c4f14a20a7da382acbfe900e52 |
| SHA256 | fd5c524cd0cb96875cb791dafbbd11d4ef5970fc988df77aabfdce9cb63f4e1a |
| SHA512 | cb0a18fabc9d065a328a85957efb4f52ce640d8f8c74cfb64d2e01c245f669b0440c0c2fca1d51ad3618ae72a578ce17726f1446b9aa79f1e2fe2e86d439381b |
memory/4020-182-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4888-183-0x0000000002FC0000-0x0000000003082000-memory.dmp
memory/4236-180-0x0000000000000000-mapping.dmp
memory/4888-184-0x0000000003090000-0x000000000313D000-memory.dmp
memory/4156-187-0x0000000000000000-mapping.dmp
memory/4156-190-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4236-191-0x00000000006F5000-0x0000000000787000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\AA6D.exe
| MD5 | dc38da1da1e88bac04121824d2abb81a |
| SHA1 | 101f00bcbba421c4f14a20a7da382acbfe900e52 |
| SHA256 | fd5c524cd0cb96875cb791dafbbd11d4ef5970fc988df77aabfdce9cb63f4e1a |
| SHA512 | cb0a18fabc9d065a328a85957efb4f52ce640d8f8c74cfb64d2e01c245f669b0440c0c2fca1d51ad3618ae72a578ce17726f1446b9aa79f1e2fe2e86d439381b |
memory/4156-192-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4888-194-0x0000000002EC0000-0x0000000002FBE000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 006c98bc42ac1d15f0ec70e3488783c5 |
| SHA1 | a8c8302826468c903b511e206d6d058e2c3acdaa |
| SHA256 | e24883740fbed2781e4df4e5387cd95c3345ec9944edeeb36babd2c10135fa00 |
| SHA512 | e0caea17f99a18483e0195c5311942c195ef42532f1868bfb5c64b3f6cb72cc0fc58414176a9bfc66452e11d17c2058eafb483a41890f502ec76dc3a6807f2f4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 6dcff31f0d286b0ca3a10b223211c9a0 |
| SHA1 | b4402333130690114499b6311cbe9d360be5122b |
| SHA256 | e9c920420d3cdf604615dfd84b6be30c640026039e4cbc9ed4682e441d8ebb72 |
| SHA512 | 0d6ab41e0b387f3dcaf9e5d336ce5f096751c2c10b715df5831d71fb08d78722a4354fc85be60d1328d4dcb4538edde447afe85ef95082e03956875223f95f4c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 97ab7ffd65186e85f453dc7c02637528 |
| SHA1 | f22312a6a44613be85c0370878456a965f869a40 |
| SHA256 | 630df8e970cc3b1ad508db713dd8be52e0ac7a5826f3f264a266232f9a1c23ee |
| SHA512 | 37d90c98e72ad55b2cbb938541c81bac1aa9d2b8a7e19f0fbfaa365b49e7bef2d3199f03e46aa9fbf3055f3701d21860820c451065f7e425d39bf86ca606bfb0 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 5752d073d795ae1b90e3d2f1ad61b3c6 |
| SHA1 | 81beabe29a71e701546082263cbee871c9cb7667 |
| SHA256 | 7e9a4c7fa66b4e54e4df873d62bf8647070e39c2e2afd8c50db66338aa7aff7c |
| SHA512 | 9b65ac3b0053dab55c509d8bed7457d7bf1cbc584786a64a00434d63ce59df06497b9fd6cae6cf6ceba3274962c15d7e1c98df8080f0e2915a8eb94eff519218 |
memory/4156-199-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe
| MD5 | 5fd8c38657bb9393bb4736c880675223 |
| SHA1 | f3a03b2e75cef22262f6677e3832b6ad9327905c |
| SHA256 | 2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6 |
| SHA512 | 43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe |
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe
| MD5 | 5fd8c38657bb9393bb4736c880675223 |
| SHA1 | f3a03b2e75cef22262f6677e3832b6ad9327905c |
| SHA256 | 2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6 |
| SHA512 | 43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe |
memory/1736-200-0x0000000000000000-mapping.dmp
memory/4156-203-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/1680-204-0x0000000000000000-mapping.dmp
memory/3472-207-0x0000000000000000-mapping.dmp
memory/3472-208-0x0000000000400000-0x0000000000463000-memory.dmp
C:\Users\Admin\AppData\Local\fd1fc184-08c8-4d72-888e-d2e1853eeb06\build2.exe
| MD5 | 5fd8c38657bb9393bb4736c880675223 |
| SHA1 | f3a03b2e75cef22262f6677e3832b6ad9327905c |
| SHA256 | 2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6 |
| SHA512 | 43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe |
memory/3472-212-0x0000000000400000-0x0000000000463000-memory.dmp
memory/1736-213-0x0000000002220000-0x000000000226F000-memory.dmp
memory/1736-211-0x000000000067D000-0x00000000006A9000-memory.dmp
memory/3472-214-0x0000000000400000-0x0000000000463000-memory.dmp
memory/1572-215-0x0000000000000000-mapping.dmp
memory/1276-216-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\E39.exe
| MD5 | 76382b7d0f6adf19177349a6bba70871 |
| SHA1 | aebd1817e812aba0256e6601dc0d6b50422f6978 |
| SHA256 | abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af |
| SHA512 | 905f20366cceb2e6768ce2c918b08f2876a23065517351fc5d6bd67af62297ae3acd77c7083a78b9d83415517dab5fa95a5734536a743ba31c8834848f9e3537 |
C:\Users\Admin\AppData\Local\Temp\E39.exe
| MD5 | 76382b7d0f6adf19177349a6bba70871 |
| SHA1 | aebd1817e812aba0256e6601dc0d6b50422f6978 |
| SHA256 | abe0c546fa9e5be61b51f294b2ac934285d755e0cedff611e382005109dd94af |
| SHA512 | 905f20366cceb2e6768ce2c918b08f2876a23065517351fc5d6bd67af62297ae3acd77c7083a78b9d83415517dab5fa95a5734536a743ba31c8834848f9e3537 |
memory/3940-219-0x0000000000000000-mapping.dmp
memory/1276-220-0x0000000000999000-0x0000000000AB7000-memory.dmp
memory/1276-221-0x0000000002510000-0x00000000027D2000-memory.dmp
memory/1276-222-0x0000000000400000-0x00000000006CE000-memory.dmp
memory/3472-223-0x0000000061E00000-0x0000000061EF3000-memory.dmp
C:\ProgramData\nss3.dll
| MD5 | 1cc453cdf74f31e4d913ff9c10acdde2 |
| SHA1 | 6e85eae544d6e965f15fa5c39700fa7202f3aafe |
| SHA256 | ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5 |
| SHA512 | dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571 |
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
memory/3472-243-0x0000000000400000-0x0000000000463000-memory.dmp
memory/4936-244-0x0000000000000000-mapping.dmp
memory/3124-246-0x0000000000000000-mapping.dmp
memory/3472-245-0x0000000000400000-0x0000000000463000-memory.dmp
memory/2224-247-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/4524-250-0x0000000000000000-mapping.dmp
memory/1276-251-0x0000000000400000-0x00000000006CE000-memory.dmp
memory/1276-252-0x0000000000400000-0x00000000006CE000-memory.dmp
memory/1856-253-0x0000000000000000-mapping.dmp
memory/1856-254-0x0000000000450000-0x0000000000453000-memory.dmp
memory/1856-255-0x0000000000460000-0x0000000000463000-memory.dmp
memory/1856-256-0x0000000000470000-0x0000000000473000-memory.dmp
memory/1856-257-0x0000000000480000-0x0000000000483000-memory.dmp
memory/1856-258-0x0000000000480000-0x0000000000483000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Sepawuaopqtypsq.tmp
| MD5 | 8b9c0f72deaf2ee06e7441209cbe4ffb |
| SHA1 | 34912f3c7f4285d85497c96e95c33e5d6a597c97 |
| SHA256 | 1e7242ac7c025b87636e59c07e3601f1bbf5894ce0b23709405b6fefbca4dabe |
| SHA512 | db8fb980b6331f494fea8dd4adf6d8724c9ad1a7a2048c6d91e49d9e81fc83700c1195854efc5dcbe2b3aef8d94b5f0ddd7ae8910f40b9cdab017e381f855cd7 |
memory/1276-260-0x0000000003210000-0x0000000003CD3000-memory.dmp
memory/1276-261-0x0000000003210000-0x0000000003CD3000-memory.dmp
memory/1276-262-0x0000000003210000-0x0000000003CD3000-memory.dmp
memory/1276-263-0x0000000003DA0000-0x0000000003EE0000-memory.dmp
memory/1276-264-0x0000000003DA0000-0x0000000003EE0000-memory.dmp
memory/1276-265-0x0000000003DA0000-0x0000000003EE0000-memory.dmp
memory/1276-266-0x0000000003DA0000-0x0000000003EE0000-memory.dmp
memory/1276-267-0x0000000003DA0000-0x0000000003EE0000-memory.dmp
memory/1276-268-0x0000000003DA0000-0x0000000003EE0000-memory.dmp
memory/1276-269-0x0000000000400000-0x00000000006CE000-memory.dmp