Analysis Overview
SHA256
dfe486574656d4f9290dc5b89c4c82f8dddd1090e812cae1e7d6a962888ee42b
Threat Level: Known bad
The file jiigtih was found to be: Known bad.
Malicious Activity Summary
Amadey
DcRat
Detects Smokeloader packer
Djvu Ransomware
Detected Djvu ransomware
Vidar
SmokeLoader
Drops file in Drivers directory
Executes dropped EXE
Downloads MZ/PE file
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Modifies file permissions
Looks up external IP address via web service
Drops Chrome extension
Adds Run key to start application
Accesses Microsoft Outlook profiles
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
outlook_win_path
Checks SCSI registry key(s)
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SendNotifyMessage
outlook_office_path
Enumerates system info in registry
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Modifies registry class
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-12-01 06:34
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-12-01 06:34
Reported
2022-12-01 06:38
Platform
win7-20220812-en
Max time kernel
188s
Max time network
45s
Command Line
Signatures
Detects Smokeloader packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
SmokeLoader
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\jiigtih.exe
"C:\Users\Admin\AppData\Local\Temp\jiigtih.exe"
Network
Files
memory/1352-54-0x0000000075071000-0x0000000075073000-memory.dmp
memory/1352-55-0x00000000008CA000-0x00000000008DF000-memory.dmp
memory/1352-56-0x0000000000020000-0x0000000000029000-memory.dmp
memory/1352-57-0x0000000000400000-0x000000000083C000-memory.dmp
memory/1352-58-0x0000000000400000-0x000000000083C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-12-01 06:34
Reported
2022-12-01 06:38
Platform
win10v2004-20220812-en
Max time kernel
185s
Max time network
215s
Command Line
Signatures
Amadey
DcRat
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\f297bd02-af8e-4c57-af83-8c01fb3ca0ae\\BB42.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\BB42.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detects Smokeloader packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
SmokeLoader
Vidar
Downloads MZ/PE file
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\System32\drivers\etc\hosts | C:\Users\Admin\AppData\Local\Temp\240D.exe | N/A |
| File created | C:\Windows\System32\drivers\etc\hosts | C:\Users\Admin\AppData\Local\Temp\240D.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\240D.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\26FC.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2920.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\240D.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7E94.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BB42.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BB42.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\BB42.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1FD9.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\688B.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\240D.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\BB42.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\BB42.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\f297bd02-af8e-4c57-af83-8c01fb3ca0ae\\BB42.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\BB42.exe | N/A |
Drops Chrome extension
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json | C:\Users\Admin\AppData\Local\Temp\240D.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4000 set thread context of 1328 | N/A | C:\Users\Admin\AppData\Local\Temp\240D.exe | C:\Users\Admin\AppData\Local\Temp\240D.exe |
| PID 3544 set thread context of 3288 | N/A | C:\Users\Admin\AppData\Local\Temp\BB42.exe | C:\Users\Admin\AppData\Local\Temp\BB42.exe |
| PID 704 set thread context of 1068 | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | C:\Users\Admin\AppData\Local\Temp\BB42.exe |
| PID 5400 set thread context of 5460 | N/A | C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe | C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\2920.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\688B.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\26FC.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\26FC.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\7E94.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\7E94.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\7E94.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\26FC.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ | N/A | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ | N/A | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ | N/A | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\jiigtih.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\26FC.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7E94.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Windows\SysWOW64\explorer.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\jiigtih.exe
"C:\Users\Admin\AppData\Local\Temp\jiigtih.exe"
C:\Users\Admin\AppData\Local\Temp\240D.exe
C:\Users\Admin\AppData\Local\Temp\240D.exe
C:\Users\Admin\AppData\Local\Temp\26FC.exe
C:\Users\Admin\AppData\Local\Temp\26FC.exe
C:\Users\Admin\AppData\Local\Temp\2920.exe
C:\Users\Admin\AppData\Local\Temp\2920.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4136 -ip 4136
C:\Users\Admin\AppData\Local\Temp\240D.exe
C:\Users\Admin\AppData\Local\Temp\240D.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 356
C:\Users\Admin\AppData\Local\Temp\7E94.exe
C:\Users\Admin\AppData\Local\Temp\7E94.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9C8D.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\9C8D.dll
C:\Users\Admin\AppData\Local\Temp\BB42.exe
C:\Users\Admin\AppData\Local\Temp\BB42.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://search-syt.com/reginst/prg/8573ee94/102/0/"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://search-syt.com/reginst/prg/8573ee94/102/0/"
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff905f04f50,0x7ff905f04f60,0x7ff905f04f70
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9151246f8,0x7ff915124708,0x7ff915124718
C:\Users\Admin\AppData\Local\Temp\BB42.exe
C:\Users\Admin\AppData\Local\Temp\BB42.exe
C:\Windows\explorer.exe
C:\Windows\explorer.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,10511226990801053440,281693743211689788,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1628 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,10511226990801053440,281693743211689788,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1988 /prefetch:8
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\f297bd02-af8e-4c57-af83-8c01fb3ca0ae" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1620,10511226990801053440,281693743211689788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:8
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,10511226990801053440,281693743211689788,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,10511226990801053440,281693743211689788,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Users\Admin\AppData\Local\Temp\BB42.exe
"C:\Users\Admin\AppData\Local\Temp\BB42.exe" --Admin IsNotAutoStart IsNotTask
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,10511226990801053440,281693743211689788,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,10511226990801053440,281693743211689788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\BB42.exe
"C:\Users\Admin\AppData\Local\Temp\BB42.exe" --Admin IsNotAutoStart IsNotTask
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4724 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4920 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17057504412908985762,5725013478305071106,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe
"C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe"
C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe
"C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build2.exe"
C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build3.exe
"C:\Users\Admin\AppData\Local\edc615f8-3914-48cc-803a-51fe4c5eb763\build3.exe"
C:\Users\Admin\AppData\Local\Temp\1FD9.exe
C:\Users\Admin\AppData\Local\Temp\1FD9.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe
"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --reenable-autoupdates --system-level
C:\Users\Admin\AppData\Local\Temp\688B.exe
C:\Users\Admin\AppData\Local\Temp\688B.exe
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe
"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff61d25a890,0x7ff61d25a8a0,0x7ff61d25a8b0
C:\Users\Admin\AppData\Local\Temp\97CA.exe
C:\Users\Admin\AppData\Local\Temp\97CA.exe
C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe
"C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5820 -ip 5820
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5820 -s 1140
C:\Windows\explorer.exe
C:\Windows\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\gntuud.exe" /F
C:\Windows\explorer.exe
C:\Windows\explorer.exe
Network
| Country | Destination | Domain | Proto |
| N/A | 72.21.91.29:80 | tcp | |
| N/A | 52.182.143.210:443 | tcp | |
| N/A | 67.24.171.254:80 | tcp | |
| N/A | 67.24.171.254:80 | tcp | |
| N/A | 67.24.171.254:80 | tcp | |
| N/A | 67.24.171.254:80 | tcp | |
| N/A | 67.24.171.254:80 | tcp | |
| N/A | 8.8.8.8:53 | furubujjul.net | udp |
| N/A | 91.195.240.101:80 | furubujjul.net | tcp |
| N/A | 67.26.209.254:80 | tcp | |
| N/A | 67.26.209.254:80 | tcp | |
| N/A | 8.8.8.8:53 | starvestitibo.org | udp |
| N/A | 193.106.191.15:80 | starvestitibo.org | tcp |
| N/A | 8.253.225.254:80 | tcp | |
| N/A | 8.8.8.8:53 | careers-info.com | udp |
| N/A | 167.235.4.117:443 | careers-info.com | tcp |
| N/A | 77.73.131.124:80 | tcp | |
| N/A | 8.253.146.249:80 | tcp | |
| N/A | 8.8.8.8:53 | 151.122.125.40.in-addr.arpa | udp |
| N/A | 8.8.8.8:53 | dowe.at | udp |
| N/A | 58.235.189.192:80 | dowe.at | tcp |
| N/A | 8.8.8.8:53 | dowe.at | udp |
| N/A | 58.235.189.192:80 | dowe.at | tcp |
| N/A | 8.8.8.8:53 | api.2ip.ua | udp |
| N/A | 162.0.217.254:443 | api.2ip.ua | tcp |
| N/A | 8.8.8.8:53 | starvestitibo.org | udp |
| N/A | 193.106.191.15:80 | starvestitibo.org | tcp |
| N/A | 58.235.189.192:80 | dowe.at | tcp |
| N/A | 58.235.189.192:80 | dowe.at | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| N/A | 8.8.8.8:53 | search-syt.com | udp |
| N/A | 8.8.8.8:53 | accounts.google.com | udp |
| N/A | 172.217.168.237:443 | accounts.google.com | tcp |
| N/A | 31.220.1.81:443 | search-syt.com | tcp |
| N/A | 31.220.1.81:443 | search-syt.com | tcp |
| N/A | 58.235.189.192:80 | dowe.at | tcp |
| N/A | 8.8.8.8:53 | google.com | udp |
| N/A | 8.8.8.8:53 | st.search-st1.com | udp |
| N/A | 8.8.8.8:53 | js1.search-st1.com | udp |
| N/A | 142.251.36.46:443 | google.com | tcp |
| N/A | 142.251.36.46:443 | google.com | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 123.253.32.170:80 | 123.253.32.170 | tcp |
| N/A | 8.8.8.8:53 | translate.googleapis.com | udp |
| N/A | 142.250.179.170:443 | translate.googleapis.com | tcp |
| N/A | 8.8.8.8:53 | content-autofill.googleapis.com | udp |
| N/A | 8.8.8.8:53 | dns.google | udp |
| N/A | 142.250.179.170:443 | content-autofill.googleapis.com | tcp |
| N/A | 8.8.8.8:443 | dns.google | tcp |
| N/A | 8.8.8.8:443 | dns.google | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 204.79.197.200:443 | www.bing.com | tcp |
| N/A | 204.79.197.200:443 | www.bing.com | tcp |
| N/A | 8.8.8.8:443 | dns.google | tcp |
| N/A | 8.8.8.8:443 | dns.google | tcp |
| N/A | 8.8.8.8:443 | dns.google | udp |
| N/A | 142.251.36.46:443 | google.com | tcp |
| N/A | 142.251.36.46:443 | google.com | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 8.8.8.8:443 | dns.google | udp |
| N/A | 142.250.179.142:443 | apis.google.com | tcp |
| N/A | 8.8.8.8:53 | nav.smartscreen.microsoft.com | udp |
| N/A | 20.73.130.64:443 | nav.smartscreen.microsoft.com | tcp |
| N/A | 20.73.130.64:443 | nav.smartscreen.microsoft.com | tcp |
| N/A | 162.0.217.254:443 | api.2ip.ua | tcp |
| N/A | 204.79.197.239:443 | tcp | |
| N/A | 8.8.8.8:53 | smartscreen-prod.microsoft.com | udp |
| N/A | 20.82.250.189:443 | smartscreen-prod.microsoft.com | tcp |
| N/A | 31.220.1.81:443 | js1.search-st1.com | tcp |
| N/A | 20.82.250.189:443 | smartscreen-prod.microsoft.com | tcp |
| N/A | 20.82.250.189:443 | smartscreen-prod.microsoft.com | tcp |
| N/A | 142.250.179.142:443 | apis.google.com | tcp |
| N/A | 8.8.8.8:53 | uaery.top | udp |
| N/A | 8.8.8.8:53 | fresherlights.com | udp |
| N/A | 8.8.8.8:53 | smartscreen-prod.microsoft.com | udp |
| N/A | 20.67.219.150:443 | smartscreen-prod.microsoft.com | tcp |
| N/A | 20.67.219.150:443 | smartscreen-prod.microsoft.com | tcp |
| N/A | 211.53.230.67:80 | fresherlights.com | tcp |
| N/A | 20.67.219.150:443 | smartscreen-prod.microsoft.com | tcp |
| N/A | 175.126.109.15:80 | fresherlights.com | tcp |
| N/A | 142.250.179.131:443 | ssl.gstatic.com | tcp |
| N/A | 204.79.197.200:443 | www.bing.com | tcp |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 8.8.8.8:53 | 14.110.152.52.in-addr.arpa | udp |
| N/A | 8.8.8.8:53 | ntp.msn.com | udp |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 175.126.109.15:80 | fresherlights.com | tcp |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 127.0.0.1:443 | tcp | |
| N/A | 8.8.8.8:53 | edge.microsoft.com | udp |
| N/A | 204.79.197.239:443 | edge.microsoft.com | tcp |
| N/A | 8.8.8.8:53 | assets.msn.com | udp |
| N/A | 23.73.0.135:443 | assets.msn.com | tcp |
| N/A | 23.73.0.135:443 | assets.msn.com | tcp |
| N/A | 23.73.0.135:443 | assets.msn.com | tcp |
| N/A | 8.8.8.8:53 | c.bing.com | udp |
| N/A | 8.8.8.8:53 | c.msn.com | udp |
| N/A | 204.79.197.200:443 | c.bing.com | tcp |
| N/A | 8.8.8.8:53 | img-s-msn-com.akamaized.net | udp |
| N/A | 20.234.93.27:443 | c.msn.com | tcp |
| N/A | 8.8.8.8:53 | sb.scorecardresearch.com | udp |
| N/A | 104.109.143.97:443 | img-s-msn-com.akamaized.net | tcp |
| N/A | 65.9.86.81:443 | sb.scorecardresearch.com | tcp |
| N/A | 8.8.8.8:53 | r3oidsofsios.com | udp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 8.8.8.8:53 | t.me | udp |
| N/A | 149.154.167.99:443 | t.me | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 31.41.244.188:80 | 31.41.244.188 | tcp |
| N/A | 8.8.8.8:53 | dowe.at | udp |
| N/A | 211.59.14.90:80 | dowe.at | tcp |
| N/A | 8.8.8.8:53 | deff.nelreports.net | udp |
| N/A | 104.109.143.22:443 | deff.nelreports.net | tcp |
| N/A | 211.59.14.90:80 | dowe.at | tcp |
| N/A | 116.203.0.170:80 | 116.203.0.170 | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 8.8.8.8:53 | agence-regionale-energetique.fr | udp |
| N/A | 185.98.131.146:443 | agence-regionale-energetique.fr | tcp |
| N/A | 211.59.14.90:80 | dowe.at | tcp |
| N/A | 211.59.14.90:80 | dowe.at | tcp |
| N/A | 185.246.221.151:80 | r3oidsofsios.com | tcp |
| N/A | 211.59.14.90:80 | dowe.at | tcp |
| N/A | 211.59.14.90:80 | dowe.at | tcp |
| N/A | 62.204.41.252:80 | 62.204.41.252 | tcp |
| N/A | 62.204.41.252:80 | 62.204.41.252 | tcp |
| N/A | 211.59.14.90:80 | dowe.at | tcp |
| N/A | 77.73.133.113:80 | 77.73.133.113 | tcp |
Files
memory/4484-132-0x0000000000B87000-0x0000000000B9D000-memory.dmp
memory/4484-133-0x0000000000030000-0x0000000000039000-memory.dmp
memory/4484-134-0x0000000000400000-0x000000000083C000-memory.dmp
memory/4484-135-0x0000000000400000-0x000000000083C000-memory.dmp
memory/4000-136-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\240D.exe
| MD5 | 47ad5d71dcd38f85253d882d93c04906 |
| SHA1 | 941ef208fb34ff9a3b25f7a325fcd0a44eacaaaf |
| SHA256 | 6ba14148ff3ce0ee93f4d2641677ac454aa0187821cba41c8eb03212a8c04fe2 |
| SHA512 | 75291bdf369e90b76d7c15a45c3532f751e82a7acde205af1c019775e1138833cea32652fe940cc98e3a491f2c3677c45d58933c7e2ea55f089e99f2133dd0d0 |
memory/704-138-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\26FC.exe
| MD5 | bb3c5c5c5f475a111ca24773ef3e3f45 |
| SHA1 | 6faf112bbde6f98a07055135d904ab1a783a4d51 |
| SHA256 | 71d8e2ee1b9ad989093f49204375b23123a903a302ee985c14b4e3adec025b7d |
| SHA512 | ffe9ed6ce4ef0150f73143bcca1d383497fffe030ec3ef9ecac4117ea36314025eb221d4bfc260e191aa45d00d76892c4622a4680a79374228d4c3589de27147 |
C:\Users\Admin\AppData\Local\Temp\26FC.exe
| MD5 | bb3c5c5c5f475a111ca24773ef3e3f45 |
| SHA1 | 6faf112bbde6f98a07055135d904ab1a783a4d51 |
| SHA256 | 71d8e2ee1b9ad989093f49204375b23123a903a302ee985c14b4e3adec025b7d |
| SHA512 | ffe9ed6ce4ef0150f73143bcca1d383497fffe030ec3ef9ecac4117ea36314025eb221d4bfc260e191aa45d00d76892c4622a4680a79374228d4c3589de27147 |
memory/4136-141-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\2920.exe
| MD5 | 627c6b5db128a8979a15c2c44c61c638 |
| SHA1 | c647dba63fa8072c4463d03eea0d9f806b7baa1d |
| SHA256 | 2313f2c77c1d900ea6b55f12c161602999026b6d51ff2d747638cc3b29e95b13 |
| SHA512 | 82ccb403c51fecc366f49065957b5a4a065d83026a325170030eab699b234f3484a912e8f1476ea94843683805f32d4918c30a130d2403910df547caaec1a003 |
C:\Users\Admin\AppData\Local\Temp\2920.exe
| MD5 | 627c6b5db128a8979a15c2c44c61c638 |
| SHA1 | c647dba63fa8072c4463d03eea0d9f806b7baa1d |
| SHA256 | 2313f2c77c1d900ea6b55f12c161602999026b6d51ff2d747638cc3b29e95b13 |
| SHA512 | 82ccb403c51fecc366f49065957b5a4a065d83026a325170030eab699b234f3484a912e8f1476ea94843683805f32d4918c30a130d2403910df547caaec1a003 |
memory/704-144-0x00000000006E9000-0x00000000006F9000-memory.dmp
memory/704-145-0x00000000004E0000-0x00000000004E9000-memory.dmp
memory/704-146-0x0000000000400000-0x0000000000464000-memory.dmp
memory/4136-147-0x0000000000400000-0x0000000000458000-memory.dmp
memory/4136-148-0x00000000007CD000-0x00000000007DD000-memory.dmp
memory/4000-149-0x0000000004A7C000-0x0000000004C37000-memory.dmp
memory/4000-150-0x0000000004C40000-0x000000000500F000-memory.dmp
memory/1328-151-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\240D.exe
| MD5 | 47ad5d71dcd38f85253d882d93c04906 |
| SHA1 | 941ef208fb34ff9a3b25f7a325fcd0a44eacaaaf |
| SHA256 | 6ba14148ff3ce0ee93f4d2641677ac454aa0187821cba41c8eb03212a8c04fe2 |
| SHA512 | 75291bdf369e90b76d7c15a45c3532f751e82a7acde205af1c019775e1138833cea32652fe940cc98e3a491f2c3677c45d58933c7e2ea55f089e99f2133dd0d0 |
memory/1328-152-0x0000000000400000-0x00000000007DC000-memory.dmp
memory/1328-154-0x0000000000400000-0x00000000007DC000-memory.dmp
memory/1328-155-0x0000000000400000-0x00000000007DC000-memory.dmp
memory/1328-156-0x0000000000400000-0x00000000007DC000-memory.dmp
memory/704-157-0x0000000000400000-0x0000000000464000-memory.dmp
memory/1328-158-0x0000000000400000-0x00000000007DC000-memory.dmp
memory/544-159-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\7E94.exe
| MD5 | bd89233fff8b6db6404c5d1f1b6692bd |
| SHA1 | 9c93c729ba035c190a57fcfc297b7a9e5c06318a |
| SHA256 | 38f2295d9116b2ea9a4ca2c25ac762b62b1e86784961cabe2afc12a42581b7af |
| SHA512 | f8ffe86a646af461ac54ad9e463ae022fc562755685cc09fd1e689eeb8592de0460f090cb1638cc3233f08f334049398c393c4619159eda5609acdbb75291d6d |
C:\Users\Admin\AppData\Local\Temp\7E94.exe
| MD5 | bd89233fff8b6db6404c5d1f1b6692bd |
| SHA1 | 9c93c729ba035c190a57fcfc297b7a9e5c06318a |
| SHA256 | 38f2295d9116b2ea9a4ca2c25ac762b62b1e86784961cabe2afc12a42581b7af |
| SHA512 | f8ffe86a646af461ac54ad9e463ae022fc562755685cc09fd1e689eeb8592de0460f090cb1638cc3233f08f334049398c393c4619159eda5609acdbb75291d6d |
memory/544-162-0x000000000077D000-0x000000000078E000-memory.dmp
memory/544-163-0x0000000000400000-0x0000000000459000-memory.dmp
memory/544-164-0x00000000005A0000-0x00000000005A9000-memory.dmp
memory/544-165-0x0000000000400000-0x0000000000459000-memory.dmp
memory/544-166-0x000000000077D000-0x000000000078E000-memory.dmp
memory/5084-167-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\9C8D.dll
| MD5 | 5a00b18b04ccdec303133f1e5dafa31b |
| SHA1 | a9d0b7bed7e45cadf9099117edd0c4df3ef653e5 |
| SHA256 | f65a1440cebcd5f07b53f0c878e806cbc25cb02b29605db7506e55e493c6886a |
| SHA512 | 0f0d71ec916c5bfa14c7c88f348fdc24300edb75e60c9fd52566e371b149a954022bfada09a7dc0d440db4e7f6523f38131ba95f3b593b75e931d35f1bf00ac6 |
memory/3084-169-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\9C8D.dll
| MD5 | 5a00b18b04ccdec303133f1e5dafa31b |
| SHA1 | a9d0b7bed7e45cadf9099117edd0c4df3ef653e5 |
| SHA256 | f65a1440cebcd5f07b53f0c878e806cbc25cb02b29605db7506e55e493c6886a |
| SHA512 | 0f0d71ec916c5bfa14c7c88f348fdc24300edb75e60c9fd52566e371b149a954022bfada09a7dc0d440db4e7f6523f38131ba95f3b593b75e931d35f1bf00ac6 |
memory/3544-171-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\BB42.exe
| MD5 | 83c1e4e675d6c19eb31b92bbe0471341 |
| SHA1 | f027cf43958250cbb33012270e72b421bbc4db37 |
| SHA256 | 61fdfa8cd554673184f7b115259529ba929d8a3f28c25c7cf6f18043ab9875e3 |
| SHA512 | 0b6e10af2019e60355341e5b00a27f679b37935d27d343edc9f7c5910261feb7be79b4adb15745e9e4ee5a9c99e28f77b421fa3886d1afcf095717368f6e5900 |
C:\Users\Admin\AppData\Local\Temp\BB42.exe
| MD5 | 83c1e4e675d6c19eb31b92bbe0471341 |
| SHA1 | f027cf43958250cbb33012270e72b421bbc4db37 |
| SHA256 | 61fdfa8cd554673184f7b115259529ba929d8a3f28c25c7cf6f18043ab9875e3 |
| SHA512 | 0b6e10af2019e60355341e5b00a27f679b37935d27d343edc9f7c5910261feb7be79b4adb15745e9e4ee5a9c99e28f77b421fa3886d1afcf095717368f6e5900 |
memory/452-174-0x0000000000000000-mapping.dmp
memory/3124-175-0x0000000000000000-mapping.dmp
memory/4736-176-0x0000000000000000-mapping.dmp
memory/3288-177-0x0000000000000000-mapping.dmp
memory/3288-178-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3288-180-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3124-181-0x0000000001270000-0x00000000012E5000-memory.dmp
memory/3124-183-0x0000000001200000-0x000000000126B000-memory.dmp
memory/3544-185-0x00000000021C0000-0x00000000022DB000-memory.dmp
memory/3288-184-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3544-182-0x0000000002109000-0x000000000219A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\BB42.exe
| MD5 | 83c1e4e675d6c19eb31b92bbe0471341 |
| SHA1 | f027cf43958250cbb33012270e72b421bbc4db37 |
| SHA256 | 61fdfa8cd554673184f7b115259529ba929d8a3f28c25c7cf6f18043ab9875e3 |
| SHA512 | 0b6e10af2019e60355341e5b00a27f679b37935d27d343edc9f7c5910261feb7be79b4adb15745e9e4ee5a9c99e28f77b421fa3886d1afcf095717368f6e5900 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data
| MD5 | 5f1b6473ccebfb6c4850be30e0e6303c |
| SHA1 | 2bce2854045916338423aebe4c6fa01edd82626e |
| SHA256 | fa63a7892095280c06708f009e66a99879c4bfff37338bde5dbd4fabaa8f862d |
| SHA512 | 40f74dc86a42f1b3fa906e38c28245baeb5b4816dd95b23e271d862a7fb755efc25c4762eeed93fce9296e04be7b89542d9ac94b972aa5459c3110da883aa7dd |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data
| MD5 | e9b8e16e16dfd282479234fdec0544f6 |
| SHA1 | fcb9a79ba3d06c39a0bb9e6dc99c61385642377d |
| SHA256 | ac70e899705ee1e25d10c35b3ff8988a442a642e2ffbcb104abdab965347984a |
| SHA512 | a80d6c4e66683e7af56f721f0c2e0514086cdddca90a0363af62051751b610396b30c1d20b9c2c2b4306d8b700ad74888d2bdcde340332fb95b296fe00d370a3 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | ee621404b574f32a8e3a1d386894fbfe |
| SHA1 | 24c5db80947c41178e87b5f5af98cd1c1a30e01c |
| SHA256 | a68e303ca584d44c52c0840e6f4118aa3560d1e1e41c753c6cbe1cfaeecf0a7b |
| SHA512 | 92cea56e688dfe81230f7890f4c70b076f0addc89dcc1827d64adcbf1cbee995191c96a72ec716e7782b03899da6d06744abd40a32d4f117a6b4df43269993c4 |
memory/3860-189-0x0000000000000000-mapping.dmp
memory/3124-190-0x0000000001200000-0x000000000126B000-memory.dmp
memory/3860-191-0x0000000000B00000-0x0000000000B0C000-memory.dmp
memory/3288-192-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Windows\system32\drivers\etc\hosts
| MD5 | 6b800a7ce8e526d4ef554af1d3c5df84 |
| SHA1 | a55b3ee214f87bd52fa8bbd9366c4b5b9f25b11f |
| SHA256 | d3834400ae484a92575e325d9e64802d07a0f2a28ff76fb1aef48dbce32b931f |
| SHA512 | cce2d77ad7e26b9b2fae11761d8d7836b160db176777f2904471f4f73e5e39036979ba9ff66aea6fd21338a3bba4a6b0ad63f025870d55e1486bb569d813d49a |
\??\pipe\crashpad_548_IRQLXAEGHRPLJENF
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | a1d5a3a2478000a8617477f0d5cd1f53 |
| SHA1 | 3404d0af805856a098c348d9bc20fe60be1d7721 |
| SHA256 | 7c966ac44a808da6b39022e3cd97f8c1ef4060b85c83f11ab291d83c3bb9974d |
| SHA512 | f2623ac1033e3045ef7239228dab01568edfc0ec4ddd9eeb53424da26b9a1ca8c744b8b557f0d2b09435839359798c5c977f12778a9ccfe5e7537c1aececd25e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 3be2af707ad05df617dd349f0aa72089 |
| SHA1 | 0bb785fdcc7f4690647c7283e79fc92fe4ffe1b8 |
| SHA256 | e5c4b75054e0643e7d64553faada1e4596d7cbe2985e01ead1fd452ba374ae07 |
| SHA512 | 4d33b3a7192104ae2b69f3627b57e84639d132d39e91104e0f218faae5e53aacdff119735af4d712aea5efd6ddc3398420a345ecad49c965f47f2e3a675ae5f5 |
memory/2756-197-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json
| MD5 | 23bb601e1a3c4a5a19830739f33b6f7b |
| SHA1 | 3558f1194cf2562f66245d7d5f562e7331da8afd |
| SHA256 | 04bbd2c615f81fd4f57663259f6373224033b23c623bc1265afcd8ceb548f1bb |
| SHA512 | 71cb66058b9cd2feb98b01d78554422fbbad148fc2e9450a6fcdf25af6a8bed4a3c0d71df6293e1da22af4f24e31bc95fa1f54836e2f7798c56bd03d144b1dba |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\16.png
| MD5 | c2e121bfc2b42d77c4632f0e43968ac2 |
| SHA1 | 0f1d5bc95df1b6b333055871f25172ee66ceb21d |
| SHA256 | 7d0d655cccfc117307faf463404da2931c2f5deae5ce80e638e042beccfa7b1e |
| SHA512 | baa00af5fe6de9a3de61f85f4e27dec9c5c9a12052fb1d110f2dc5c1a4e39d275547a6d0368a93f6c0c88945dca3777b550408942f7c498ba556170b1e7a243c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\js\ads.js
| MD5 | 4a825d485551c014dd45ff480fedef48 |
| SHA1 | 2a0867acaf0e2d251f73fbfbacab7839ab67cf95 |
| SHA256 | 8b79dbf4c747a266c9688ebe24ceb3605afa38e305c92632aa63086f64473aa5 |
| SHA512 | ac98c12b68691018dc87fd2bc3f3c528f2acdddd1b31268819da65cc52d4f07dbbdd6866dbb410c41b6d2d5459453d11c20c1b6da3d5324063674037248c77fc |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\128.png
| MD5 | 1f2092ca6379fb8aaf583d4bc260955e |
| SHA1 | 1f5c95c87fc0e794fffa81f9db5e6663eefa2cd1 |
| SHA256 | bf8b8d46317c1fda356507735093f90dff5a578f564ed482b1166088ffcb8015 |
| SHA512 | 5ee4e914801fd60a3f3840cb7836f4773c6a49cfc878b431a60d0eb7e7dc391d1efdb079fab134ed08148a94e83d1eeb483a698f6cb8d3136dadd645058b9cd7 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\64.png
| MD5 | d93ff667b54492bba9b9490cf588bf49 |
| SHA1 | 9a9f6fc23ecbaacebbc3260c76bb57bab5949a63 |
| SHA256 | 55a82197ac30ec87ecbaa140ed6f007c4d4a379834370a518b77971e0107c9a0 |
| SHA512 | 923051a25d4c4567cee0af02feb4cf02bdecca3c6f344bc48994941632637c0ec47303734f5e3dc76160b2c9f2f4eae704ac48e2806ac998a4dc8707c7db59b6 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\48.png
| MD5 | 059ee71acc8439f352e350aecd374ab9 |
| SHA1 | d5143bf7aad6847d46f0230f0edf6393db4c9a8c |
| SHA256 | 0047690e602eb4a017c27402ad27cfe3b2e897b6e7b298e4f022e69fa2024b50 |
| SHA512 | 91928af347a547678d15b95836b7daeb6b2fbbd4855f067be9f6b8feadafff7803aa31159c8a1bf8f7cb95733bde883315a189dae54d898d517f521ea37d5ded |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\36.png
| MD5 | 4e93455eb724d13f8cddbe4c5fd236c3 |
| SHA1 | 3e8c930686c4024e0a3e6cd813d709ce67a7208d |
| SHA256 | a3e4f86e7e85040a8e234652d834c089bdb2849937194b612ca1963c81fcc69f |
| SHA512 | 78a3c51f4db8aa273f6d0363c93c0b88d401752b18007b1a09303236b1d91e9758d8ea32a88b8ce76c6e820fe0ebca5ae1fc28c86dc98479f1ff8200c2dfeb83 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\32.png
| MD5 | a11da999ffc6d60d18430e21be60a921 |
| SHA1 | f98adfc8f6c526f2d3d9bd7b8726a7ea851ec1e5 |
| SHA256 | 1e8162fa7f3109b450c66d3c7a4a8ba205f1516d23a5b610ab396ec0931b6dc6 |
| SHA512 | 8aa2078ff8e68edd30ba46a4cae1a87df2a92e9623c848f0bcd816791f6243faa98164ec849c544130f22b8cb1fa1bd9e5bece8367fde1fd22fe8b1da09ce401 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\24.png
| MD5 | 52b03cd5ab1715c9478925d24e470989 |
| SHA1 | 675804f5552867b9015b6cdb2328a88b3596a00c |
| SHA256 | afb7462a5952697a10eda8f653fb57287def531ba851678323dfa838a0291ccb |
| SHA512 | 00dc3c4ae1939f16e506bf414d369c755e5043edbaf9181e9c05f48d1cc55c5f05f67c9cab2ab82a2845fdeba977d47c263bdd23762ba3cfcea43d8bb1b3fdd3 |
C:\Users\Admin\AppData\Local\f297bd02-af8e-4c57-af83-8c01fb3ca0ae\BB42.exe
| MD5 | 83c1e4e675d6c19eb31b92bbe0471341 |
| SHA1 | f027cf43958250cbb33012270e72b421bbc4db37 |
| SHA256 | 61fdfa8cd554673184f7b115259529ba929d8a3f28c25c7cf6f18043ab9875e3 |
| SHA512 | 0b6e10af2019e60355341e5b00a27f679b37935d27d343edc9f7c5910261feb7be79b4adb15745e9e4ee5a9c99e28f77b421fa3886d1afcf095717368f6e5900 |
memory/4976-210-0x0000000000000000-mapping.dmp
memory/4492-209-0x0000000000000000-mapping.dmp
\??\pipe\LOCAL\crashpad_452_NTNYZGYMCFLBLJSN
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences
| MD5 | e241615011a64274f9adc068d7225c9f |
| SHA1 | 6acb5249e0b7a3439994a54144dd3fbedac0f9e4 |
| SHA256 | f2dab69911fc11341edda3add360dd533af514678db5bc7e60af67364da60764 |
| SHA512 | a51a432a873e3ec1bbe7efb69be16eec90eddcd97110fa7b172ea8b6fce82ba85b0408bd1b96c34cb8dfc88ff19627e037d03d6839d80aa208edb5be240f311e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | dda3a2e59247fd4ee7bcbabf833055df |
| SHA1 | 8ba9753883373268376e206a2abccd36c793cd53 |
| SHA256 | af6e197b2bedd65c99f754f9b8cee388f81bd33999c6bd9a2862cd46a897a6a2 |
| SHA512 | 43f97d0c413e2a645fe27df2268d73d5ee46564dac9f6e453f6517f3a7a51945fea059b5b8216a03ff024a709cdfa60ce95a6223df2555e82de8df6f8f1836de |
memory/1292-215-0x0000000000000000-mapping.dmp
memory/1328-216-0x0000000000400000-0x00000000007DC000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json
| MD5 | 23bb601e1a3c4a5a19830739f33b6f7b |
| SHA1 | 3558f1194cf2562f66245d7d5f562e7331da8afd |
| SHA256 | 04bbd2c615f81fd4f57663259f6373224033b23c623bc1265afcd8ceb548f1bb |
| SHA512 | 71cb66058b9cd2feb98b01d78554422fbbad148fc2e9450a6fcdf25af6a8bed4a3c0d71df6293e1da22af4f24e31bc95fa1f54836e2f7798c56bd03d144b1dba |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\16.png
| MD5 | c2e121bfc2b42d77c4632f0e43968ac2 |
| SHA1 | 0f1d5bc95df1b6b333055871f25172ee66ceb21d |
| SHA256 | 7d0d655cccfc117307faf463404da2931c2f5deae5ce80e638e042beccfa7b1e |
| SHA512 | baa00af5fe6de9a3de61f85f4e27dec9c5c9a12052fb1d110f2dc5c1a4e39d275547a6d0368a93f6c0c88945dca3777b550408942f7c498ba556170b1e7a243c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\24.png
| MD5 | 52b03cd5ab1715c9478925d24e470989 |
| SHA1 | 675804f5552867b9015b6cdb2328a88b3596a00c |
| SHA256 | afb7462a5952697a10eda8f653fb57287def531ba851678323dfa838a0291ccb |
| SHA512 | 00dc3c4ae1939f16e506bf414d369c755e5043edbaf9181e9c05f48d1cc55c5f05f67c9cab2ab82a2845fdeba977d47c263bdd23762ba3cfcea43d8bb1b3fdd3 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\64.png
| MD5 | d93ff667b54492bba9b9490cf588bf49 |
| SHA1 | 9a9f6fc23ecbaacebbc3260c76bb57bab5949a63 |
| SHA256 | 55a82197ac30ec87ecbaa140ed6f007c4d4a379834370a518b77971e0107c9a0 |
| SHA512 | 923051a25d4c4567cee0af02feb4cf02bdecca3c6f344bc48994941632637c0ec47303734f5e3dc76160b2c9f2f4eae704ac48e2806ac998a4dc8707c7db59b6 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\js\ads.js
| MD5 | 4a825d485551c014dd45ff480fedef48 |
| SHA1 | 2a0867acaf0e2d251f73fbfbacab7839ab67cf95 |
| SHA256 | 8b79dbf4c747a266c9688ebe24ceb3605afa38e305c92632aa63086f64473aa5 |
| SHA512 | ac98c12b68691018dc87fd2bc3f3c528f2acdddd1b31268819da65cc52d4f07dbbdd6866dbb410c41b6d2d5459453d11c20c1b6da3d5324063674037248c77fc |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\128.png
| MD5 | 1f2092ca6379fb8aaf583d4bc260955e |
| SHA1 | 1f5c95c87fc0e794fffa81f9db5e6663eefa2cd1 |
| SHA256 | bf8b8d46317c1fda356507735093f90dff5a578f564ed482b1166088ffcb8015 |
| SHA512 | 5ee4e914801fd60a3f3840cb7836f4773c6a49cfc878b431a60d0eb7e7dc391d1efdb079fab134ed08148a94e83d1eeb483a698f6cb8d3136dadd645058b9cd7 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\48.png
| MD5 | 059ee71acc8439f352e350aecd374ab9 |
| SHA1 | d5143bf7aad6847d46f0230f0edf6393db4c9a8c |
| SHA256 | 0047690e602eb4a017c27402ad27cfe3b2e897b6e7b298e4f022e69fa2024b50 |
| SHA512 | 91928af347a547678d15b95836b7daeb6b2fbbd4855f067be9f6b8feadafff7803aa31159c8a1bf8f7cb95733bde883315a189dae54d898d517f521ea37d5ded |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\32.png
| MD5 | a11da999ffc6d60d18430e21be60a921 |
| SHA1 | f98adfc8f6c526f2d3d9bd7b8726a7ea851ec1e5 |
| SHA256 | 1e8162fa7f3109b450c66d3c7a4a8ba205f1516d23a5b610ab396ec0931b6dc6 |
| SHA512 | 8aa2078ff8e68edd30ba46a4cae1a87df2a92e9623c848f0bcd816791f6243faa98164ec849c544130f22b8cb1fa1bd9e5bece8367fde1fd22fe8b1da09ce401 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\36.png
| MD5 | 4e93455eb724d13f8cddbe4c5fd236c3 |
| SHA1 | 3e8c930686c4024e0a3e6cd813d709ce67a7208d |
| SHA256 | a3e4f86e7e85040a8e234652d834c089bdb2849937194b612ca1963c81fcc69f |
| SHA512 | 78a3c51f4db8aa273f6d0363c93c0b88d401752b18007b1a09303236b1d91e9758d8ea32a88b8ce76c6e820fe0ebca5ae1fc28c86dc98479f1ff8200c2dfeb83 |
memory/704-226-0x0000000000000000-mapping.dmp
memory/3288-227-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\BB42.exe
| MD5 | 83c1e4e675d6c19eb31b92bbe0471341 |
| SHA1 | f027cf43958250cbb33012270e72b421bbc4db37 |
| SHA256 | 61fdfa8cd554673184f7b115259529ba929d8a3f28c25c7cf6f18043ab9875e3 |
| SHA512 | 0b6e10af2019e60355341e5b00a27f679b37935d27d343edc9f7c5910261feb7be79b4adb15745e9e4ee5a9c99e28f77b421fa3886d1afcf095717368f6e5900 |
memory/5036-230-0x0000000000000000-mapping.dmp
memory/4860-232-0x0000000000000000-mapping.dmp
memory/1068-233-0x0000000000000000-mapping.dmp
memory/1068-236-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1068-238-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4036-241-0x0000000000000000-mapping.dmp
memory/1068-242-0x0000000000400000-0x0000000000537000-memory.dmp
memory/704-237-0x0000000001FE7000-0x0000000002078000-memory.dmp
memory/3044-244-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\BB42.exe
| MD5 | 83c1e4e675d6c19eb31b92bbe0471341 |
| SHA1 | f027cf43958250cbb33012270e72b421bbc4db37 |
| SHA256 | 61fdfa8cd554673184f7b115259529ba929d8a3f28c25c7cf6f18043ab9875e3 |
| SHA512 | 0b6e10af2019e60355341e5b00a27f679b37935d27d343edc9f7c5910261feb7be79b4adb15745e9e4ee5a9c99e28f77b421fa3886d1afcf095717368f6e5900 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico
| MD5 | e5e3377341056643b0494b6842c0b544 |
| SHA1 | d53fd8e256ec9d5cef8ef5387872e544a2df9108 |
| SHA256 | e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25 |
| SHA512 | 83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef |
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
| MD5 | 7d2ffe948f13b3dd438231c574016ee5 |
| SHA1 | a04ab04eb9e169da15b3d79d6a7339dc51196382 |
| SHA256 | 268f6313c924bdcb0319a020726c94921ad13a6a4b2f3022e0f0ca657ab98852 |
| SHA512 | 7c84a794696752d062b47ef4047732f8561d35147f9ca5bad76031eb34f1985a0a5acf2be039032c932e32ae55216f5ada73cf643955d6e34091461311b0485e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | f2c403ab2fc88d4495bc721dd65013b8 |
| SHA1 | 57bc10306fa02338f535e010747c22da54b58e52 |
| SHA256 | 73f7d8095ae5053484774aa0ee59de94a990e86898682dad2e208d9bae2b5ffc |
| SHA512 | a5d71e6d445451abd69e64a54a7bca03c9026048cd301cf8aee4759064f5b2358202d82a0fc9b44d44c225821345637b7c4c5b57eb51e213f8ac8863a83af7fb |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 61ffe15234088bd43d27e9eb101ad1f6 |
| SHA1 | 80e8cf2dbbf66018e148cbab446cfc5e52eed1b2 |
| SHA256 | 1dc492a98f81cf0473e5ebc17c9284892b88c592b5194c31761a1ef1985c59b5 |
| SHA512 | f925dbd2d421bc596f344241ce915b69e8f9a5112f4b9d6e62c82a717493ce2422366395dea33dfce896704b940afd6366923a7a2eb476d10563bc76de15b61d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 916c512d221c683beeea9d5cb311b0b0 |
| SHA1 | bf0db4b1c4566275b629efb095b6ff8857b5748e |
| SHA256 | 64a36c1637d0a111152002a2c0385b0df9dd81b616b3f2073fbbe3f2975aa4d8 |
| SHA512 | af32cffea722438e9b17b08062dc2e209edc5417418964ead0b392bd502e1a647a8456b2ee2ea59faf69f93d0c6ea6f15949b6c30924db7da65b91cb18e8dc6c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 3afe82884ccff956868396e05f1c64d7 |
| SHA1 | 39bc87ff5eff4e43f797ce181cd985264dc9a57b |
| SHA256 | 63355ca637720af059adef796c52058f96eb1cac806ef481296039e40206d939 |
| SHA512 | 3e2e8cbac5fbf2aa4f357a56aa0948bcb9f86088d23cd27d744ffb6c44a3857710bb6d4b6590522e02b5b72333b24058abd8381e3e498a514db897368fda6298 |
memory/3084-251-0x0000000002F90000-0x000000000305A000-memory.dmp
memory/3084-252-0x0000000002C10000-0x0000000002D4F000-memory.dmp
memory/3084-253-0x0000000002E70000-0x0000000002F84000-memory.dmp
memory/3084-254-0x0000000003060000-0x0000000003116000-memory.dmp
memory/704-258-0x0000000000000000-mapping.dmp
memory/5232-260-0x0000000000000000-mapping.dmp
memory/5252-262-0x0000000000000000-mapping.dmp
memory/1068-263-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5400-264-0x0000000000000000-mapping.dmp
memory/5460-265-0x0000000000000000-mapping.dmp
memory/5460-266-0x0000000000400000-0x000000000045F000-memory.dmp
memory/5460-267-0x0000000000400000-0x000000000045F000-memory.dmp
memory/5460-268-0x0000000000400000-0x000000000045F000-memory.dmp
memory/5400-269-0x000000000062E000-0x000000000065A000-memory.dmp
memory/5400-270-0x00000000020B0000-0x00000000020FB000-memory.dmp
memory/5460-271-0x0000000000400000-0x000000000045F000-memory.dmp
memory/5520-272-0x0000000000000000-mapping.dmp
memory/5460-273-0x0000000000400000-0x000000000045F000-memory.dmp
memory/5736-274-0x0000000000000000-mapping.dmp
memory/5668-275-0x0000000000000000-mapping.dmp
memory/5820-277-0x0000000000000000-mapping.dmp
memory/5792-276-0x0000000000000000-mapping.dmp
memory/6128-278-0x0000000000000000-mapping.dmp
memory/5460-279-0x0000000061E00000-0x0000000061EF3000-memory.dmp
memory/5408-294-0x0000000000000000-mapping.dmp
memory/5528-298-0x0000000000000000-mapping.dmp
memory/5820-300-0x00000000005C9000-0x00000000005E8000-memory.dmp
memory/1956-299-0x0000000000000000-mapping.dmp
memory/5820-301-0x0000000002090000-0x00000000020CE000-memory.dmp
memory/5820-302-0x0000000000400000-0x0000000000472000-memory.dmp
memory/5668-303-0x00000000027E3000-0x0000000002B68000-memory.dmp
memory/5668-304-0x0000000002B70000-0x0000000003055000-memory.dmp
memory/5668-305-0x0000000000400000-0x00000000008F2000-memory.dmp
memory/1956-306-0x00000000008B0000-0x00000000008BB000-memory.dmp
memory/4384-307-0x0000000000000000-mapping.dmp
memory/1956-308-0x00000000008C0000-0x00000000008C7000-memory.dmp
memory/4384-309-0x0000000000830000-0x0000000000839000-memory.dmp
memory/4136-311-0x0000000000000000-mapping.dmp
memory/4384-310-0x0000000000820000-0x000000000082F000-memory.dmp
memory/452-312-0x000001756D240000-0x000001756D24F000-memory.dmp
memory/5528-313-0x0000000000400000-0x0000000000472000-memory.dmp
memory/4136-314-0x0000000000550000-0x0000000000559000-memory.dmp
memory/4044-316-0x0000000000000000-mapping.dmp
memory/5088-315-0x0000000000000000-mapping.dmp
memory/5528-317-0x0000000000738000-0x0000000000757000-memory.dmp
memory/4136-318-0x0000000000560000-0x0000000000565000-memory.dmp
memory/4044-320-0x00000000007F0000-0x00000000007F6000-memory.dmp
memory/4736-319-0x0000014B77BE0000-0x0000014B77BEF000-memory.dmp
memory/4044-321-0x00000000007E0000-0x00000000007EC000-memory.dmp