Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
312KB
-
MD5
048c5750cce12e02e62aa2f2b961629d
-
SHA1
f3ada2cb30bb9425ceab9ebc7e862f632c2e1629
-
SHA256
bca75ab0bb5422913cebbbf496921a29c2686604e2ca29b8335887ce98266038
-
SHA512
bc54df0bac11752baf68c6b1587ac23debf84ef0067c9f5270fc33eb4793c84a13d436c6759c52903f2fe4aa857849f00f1820751554ec9f518cd3e1b2005664
-
SSDEEP
3072:llckLrdy2gjCJ8rPMsilLtob+1k4/ZK7rMFxMSgkH4rOPHFRuUrIb6u8qn1n6dpu:rckLs/VgFS2pMXkH4rWlRjO1n
Malware Config
Extracted
amadey
3.63
62.204.41.79/tT7774433/index.php
Extracted
redline
mario23_10
167.235.252.160:10642
-
auth_value
eca57cfb5172f71dc45986763bb98942
Extracted
djvu
http://abibiall.com/lancer/get.php
-
extension
.bttu
-
offline_id
8p2Go5ZmkbFk0DF2oJ6E8vGEogpBqqaGCWjto1t1
-
payload_url
http://uaery.top/dl/build2.exe
http://abibiall.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-Q5EougBEbU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0619JOsie
Signatures
-
Detect Amadey credential stealer module 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module -
Detected Djvu ransomware 11 IoCs
Processes:
resource yara_rule behavioral1/memory/1112-171-0x0000000002190000-0x00000000022AB000-memory.dmp family_djvu behavioral1/memory/1488-174-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1488-176-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1488-178-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1488-180-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1488-185-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1592-189-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1592-191-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1592-196-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1592-226-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1592-265-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1484-133-0x0000000000510000-0x0000000000519000-memory.dmp family_smokeloader behavioral1/memory/1760-144-0x00000000004D0000-0x00000000004D9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2844-163-0x0000000000400000-0x0000000000460000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 115 2032 rundll32.exe 116 2032 rundll32.exe 196 4176 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
Processes:
185A.exe1A6E.exe6F17.exe7060.exe71AA.exenbveek.exe71AA.exe71AA.exe71AA.exe8F06.exebuild2.exebuild3.exebuild2.exenbveek.exemstsca.exepid process 2296 185A.exe 1760 1A6E.exe 4048 6F17.exe 2456 7060.exe 1112 71AA.exe 1080 nbveek.exe 1488 71AA.exe 4196 71AA.exe 1592 71AA.exe 1788 8F06.exe 4440 build2.exe 4376 build3.exe 1708 build2.exe 3896 nbveek.exe 2028 mstsca.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6F17.exenbveek.exe71AA.exe71AA.exebuild2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 6F17.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 71AA.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 71AA.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation build2.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exebuild2.exerundll32.exepid process 2032 rundll32.exe 1708 build2.exe 1708 build2.exe 4176 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
71AA.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\6eb20edb-096f-4b2c-a2e2-e3a1c94bced6\\71AA.exe\" --AutoStart" 71AA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 82 api.2ip.ua 83 api.2ip.ua 98 api.2ip.ua -
Suspicious use of SetThreadContext 5 IoCs
Processes:
7060.exe71AA.exe71AA.exebuild2.exerundll32.exedescription pid process target process PID 2456 set thread context of 2844 2456 7060.exe AppLaunch.exe PID 1112 set thread context of 1488 1112 71AA.exe 71AA.exe PID 4196 set thread context of 1592 4196 71AA.exe 71AA.exe PID 4440 set thread context of 1708 4440 build2.exe build2.exe PID 2032 set thread context of 2384 2032 rundll32.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 808 2296 WerFault.exe 185A.exe 2672 2456 WerFault.exe 7060.exe 2644 1788 WerFault.exe 8F06.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exe1A6E.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1A6E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1A6E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1A6E.exe -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exebuild2.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 3740 schtasks.exe 2444 schtasks.exe 3520 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1444 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Processes:
description ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar -
Modifies registry class 7 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings -
Processes:
build2.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 build2.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 532 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exetaskmgr.exepid process 1484 file.exe 1484 file.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 532 532 532 532 532 532 532 532 532 532 532 532 532 532 1844 taskmgr.exe 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 1844 taskmgr.exe 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 532 1844 taskmgr.exe 532 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
taskmgr.exepid process 532 1844 taskmgr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
file.exe1A6E.exepid process 1484 file.exe 1760 1A6E.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskmgr.exetasklist.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 1844 taskmgr.exe Token: SeSystemProfilePrivilege 1844 taskmgr.exe Token: SeCreateGlobalPrivilege 1844 taskmgr.exe Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeDebugPrivilege 2444 tasklist.exe Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeDebugPrivilege 2844 AppLaunch.exe Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeSecurityPrivilege 1844 taskmgr.exe Token: SeTakeOwnershipPrivilege 1844 taskmgr.exe Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 Token: SeCreatePagefilePrivilege 532 Token: SeShutdownPrivilege 532 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 532 1844 taskmgr.exe 532 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
pid process 532 532 532 532 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exe6F17.exe7060.exenbveek.exe71AA.exe71AA.exe71AA.exe8F06.exe71AA.exedescription pid process target process PID 532 wrote to memory of 2296 532 185A.exe PID 532 wrote to memory of 2296 532 185A.exe PID 532 wrote to memory of 2296 532 185A.exe PID 532 wrote to memory of 1760 532 1A6E.exe PID 532 wrote to memory of 1760 532 1A6E.exe PID 532 wrote to memory of 1760 532 1A6E.exe PID 532 wrote to memory of 1688 532 cmd.exe PID 532 wrote to memory of 1688 532 cmd.exe PID 1688 wrote to memory of 2444 1688 cmd.exe tasklist.exe PID 1688 wrote to memory of 2444 1688 cmd.exe tasklist.exe PID 532 wrote to memory of 4048 532 6F17.exe PID 532 wrote to memory of 4048 532 6F17.exe PID 532 wrote to memory of 4048 532 6F17.exe PID 532 wrote to memory of 2456 532 7060.exe PID 532 wrote to memory of 2456 532 7060.exe PID 532 wrote to memory of 2456 532 7060.exe PID 532 wrote to memory of 1112 532 71AA.exe PID 532 wrote to memory of 1112 532 71AA.exe PID 532 wrote to memory of 1112 532 71AA.exe PID 4048 wrote to memory of 1080 4048 6F17.exe nbveek.exe PID 4048 wrote to memory of 1080 4048 6F17.exe nbveek.exe PID 4048 wrote to memory of 1080 4048 6F17.exe nbveek.exe PID 2456 wrote to memory of 2844 2456 7060.exe AppLaunch.exe PID 2456 wrote to memory of 2844 2456 7060.exe AppLaunch.exe PID 2456 wrote to memory of 2844 2456 7060.exe AppLaunch.exe PID 2456 wrote to memory of 2844 2456 7060.exe AppLaunch.exe PID 2456 wrote to memory of 2844 2456 7060.exe AppLaunch.exe PID 1080 wrote to memory of 3740 1080 nbveek.exe schtasks.exe PID 1080 wrote to memory of 3740 1080 nbveek.exe schtasks.exe PID 1080 wrote to memory of 3740 1080 nbveek.exe schtasks.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1112 wrote to memory of 1488 1112 71AA.exe 71AA.exe PID 1488 wrote to memory of 4388 1488 71AA.exe icacls.exe PID 1488 wrote to memory of 4388 1488 71AA.exe icacls.exe PID 1488 wrote to memory of 4388 1488 71AA.exe icacls.exe PID 1488 wrote to memory of 4196 1488 71AA.exe 71AA.exe PID 1488 wrote to memory of 4196 1488 71AA.exe 71AA.exe PID 1488 wrote to memory of 4196 1488 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 4196 wrote to memory of 1592 4196 71AA.exe 71AA.exe PID 532 wrote to memory of 1788 532 8F06.exe PID 532 wrote to memory of 1788 532 8F06.exe PID 532 wrote to memory of 1788 532 8F06.exe PID 1788 wrote to memory of 2032 1788 8F06.exe rundll32.exe PID 1788 wrote to memory of 2032 1788 8F06.exe rundll32.exe PID 1788 wrote to memory of 2032 1788 8F06.exe rundll32.exe PID 1592 wrote to memory of 4440 1592 71AA.exe build2.exe PID 1592 wrote to memory of 4440 1592 71AA.exe build2.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1484
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1844
-
C:\Users\Admin\AppData\Local\Temp\185A.exeC:\Users\Admin\AppData\Local\Temp\185A.exe1⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 3402⤵
- Program crash
PID:808
-
C:\Users\Admin\AppData\Local\Temp\1A6E.exeC:\Users\Admin\AppData\Local\Temp\1A6E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1760
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2296 -ip 22961⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\6F17.exeC:\Users\Admin\AppData\Local\Temp\6F17.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\e76728db77\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\e76728db77\nbveek.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\e76728db77\nbveek.exe" /F3⤵
- Creates scheduled task(s)
PID:3740 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_win_path
PID:4176
-
C:\Users\Admin\AppData\Local\Temp\7060.exeC:\Users\Admin\AppData\Local\Temp\7060.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 2962⤵
- Program crash
PID:2672
-
C:\Users\Admin\AppData\Local\Temp\71AA.exeC:\Users\Admin\AppData\Local\Temp\71AA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\71AA.exeC:\Users\Admin\AppData\Local\Temp\71AA.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\6eb20edb-096f-4b2c-a2e2-e3a1c94bced6" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\71AA.exe"C:\Users\Admin\AppData\Local\Temp\71AA.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\71AA.exe"C:\Users\Admin\AppData\Local\Temp\71AA.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exe"C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4440 -
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exe"C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exe" & exit7⤵PID:4040
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:1444 -
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build3.exe"C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build3.exe"5⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2456 -ip 24561⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\8F06.exeC:\Users\Admin\AppData\Local\Temp\8F06.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
PID:2032 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 141443⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 5402⤵
- Program crash
PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1788 -ip 17881⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\e76728db77\nbveek.exeC:\Users\Admin\AppData\Local\Temp\e76728db77\nbveek.exe1⤵
- Executes dropped EXE
PID:3896
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mozglue.dllFilesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
C:\ProgramData\nss3.dllFilesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD50f419c66dbc4946c001394e2910c173d
SHA1e988a2291023e4c29b6442bfdeaacd9a83f0c640
SHA256763aeee4de549d18d1e3a30be29961f5ffe2ce794179d13a06f44dd57a0b6b48
SHA512c9d6c5459b055cecec7d7ed00f7774144b06fb2a4511bfc110a83577ed4517595a325f51e0579238d28550cf76de0a276f9d8bc322898c763b987a649e643918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD5c6964c598d970f6c97ea4092e97d517d
SHA1690351843ee9c5dae635519f869192bb786207c6
SHA2568901c2d40e486f904090f6ee8e107197cdb876c5bfe5fd7ce2d212e3330eba4a
SHA5127fbaf67a4c6f9603c11ccfb42e65a42841c5f68baaf6817b84e0b48ad036636772adf06bc00b9b31ca33342b4c43854f6e5e750247bc718dd6ad1d5342e38aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD52ab819b8381773ed73b51bf3c445540c
SHA183d902c19c82ff992420874c031c1746b1a10519
SHA2564b7bb45829586baf4b7617ff9b9456f301ad012d9c4a5f01853727bb9b3e3577
SHA51262ac6178fa98381b6873c0b9d00540f026966456308e909bcef2e8a2fb51552bdd5e766903e3b27d298c921649b38a2a243371557326c3fccd1f3e0bc86df1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD5ac0ffcedbd628fd9bef6ccd133c874fe
SHA10fd148ef10a11657a37c1e18e701aaec857322c7
SHA256f65692ddf3e9a46a09ee713c08f691d495369c0ae8b3cfd77c5a81782e538e5f
SHA5126eec9a1d67e99b0676662f4bb076eacbf860b4a56a9e0423c00ad6e4ed9ad1ffcf68b7e2c048cdaff73e44b10d87c3f6caa7a5193a8f60bd592bc855f6769b06
-
C:\Users\Admin\AppData\Local\6eb20edb-096f-4b2c-a2e2-e3a1c94bced6\71AA.exeFilesize
811KB
MD5239c55dbc0208bdc294be7ed3d3901c0
SHA1215d19d191ce08bccce5e6a063f58322a029f6e7
SHA256fecfabb935d8d19cdbe87b0ec418570ed11ba8e37ad78b76b2419804e951ed14
SHA5120cb9102a4a3f4d258bdedd4f0f1714431203c37902fb984c76effde2bc2a97f5d848f6a66db2635fd6d8dbfa0ad3a0535d8ace39124a475a3bf9f9f58c494e5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
28KB
MD556b6bf314c57950722d46f0789f03037
SHA18cf6b3b5a760e508dbdd7fd30a41b925069db1d9
SHA2564d2d533b936d96a8fe025779dce96bcc7eaa0c0506f6761fdf660823d000c9f3
SHA512cb45538930325c4d8d36c066f9832c599864ea5a0cf595f355a7b16d0beb6e614cf7f807a83b07c2997ac34468c0d50c3e4362aae6c0b1a4f6032f43963e8c18
-
C:\Users\Admin\AppData\Local\Temp\185A.exeFilesize
303KB
MD53c7fc0068fa6fa0b2d9e28e48554d434
SHA18820f19e49b69bcbefe44c852d284deb4ccab192
SHA256f543faf12d40822998caa60a4a1561501bed284e8d6502ecb106afa7448b0d6b
SHA512c0f29c0602dea46c105007300d355a4529c0385748c5f091700b5418fd1eb086988a69830d0e0845223ff108a6d655bf19a7b2071a11f2f0bcc60bfe863ac626
-
C:\Users\Admin\AppData\Local\Temp\185A.exeFilesize
303KB
MD53c7fc0068fa6fa0b2d9e28e48554d434
SHA18820f19e49b69bcbefe44c852d284deb4ccab192
SHA256f543faf12d40822998caa60a4a1561501bed284e8d6502ecb106afa7448b0d6b
SHA512c0f29c0602dea46c105007300d355a4529c0385748c5f091700b5418fd1eb086988a69830d0e0845223ff108a6d655bf19a7b2071a11f2f0bcc60bfe863ac626
-
C:\Users\Admin\AppData\Local\Temp\1A6E.exeFilesize
311KB
MD5367a5816fc549b3e9cfa01e6b3655c8e
SHA1d0575587e3e5f527ec584673d64c0c4ba7723e86
SHA25615a1e183ccac3134e1a70006bd007874523a0c152a39a0384675461683029c65
SHA5124d8be307b655a0ba75a1f6557ec77b889ceec0d8fc2668e7516cf2df855193a1a3c6caa2d6bf0ba62a05bf6042684de596c4597f48dc95a229b38f35656870c9
-
C:\Users\Admin\AppData\Local\Temp\1A6E.exeFilesize
311KB
MD5367a5816fc549b3e9cfa01e6b3655c8e
SHA1d0575587e3e5f527ec584673d64c0c4ba7723e86
SHA25615a1e183ccac3134e1a70006bd007874523a0c152a39a0384675461683029c65
SHA5124d8be307b655a0ba75a1f6557ec77b889ceec0d8fc2668e7516cf2df855193a1a3c6caa2d6bf0ba62a05bf6042684de596c4597f48dc95a229b38f35656870c9
-
C:\Users\Admin\AppData\Local\Temp\6F17.exeFilesize
235KB
MD5cb41a6b7a7f4a5bfc31a327e0f09e85e
SHA1e6651675fe2c060c92fb2ad03de90d78d30116d4
SHA25697406ce4e2f14cee1e32d3bcd082878a106d34e179e7ab9bc04aa92e424e72bc
SHA512e3b1a6088e0c96ce01972cb507d231927f398aebfa2e1229c9b9bfa0a87814903035cb2981b3003cd805212c5e24a37216e60f2d6cabc7ad4d42823e838d07c1
-
C:\Users\Admin\AppData\Local\Temp\6F17.exeFilesize
235KB
MD5cb41a6b7a7f4a5bfc31a327e0f09e85e
SHA1e6651675fe2c060c92fb2ad03de90d78d30116d4
SHA25697406ce4e2f14cee1e32d3bcd082878a106d34e179e7ab9bc04aa92e424e72bc
SHA512e3b1a6088e0c96ce01972cb507d231927f398aebfa2e1229c9b9bfa0a87814903035cb2981b3003cd805212c5e24a37216e60f2d6cabc7ad4d42823e838d07c1
-
C:\Users\Admin\AppData\Local\Temp\7060.exeFilesize
384KB
MD559cac60a64b25a098740406fe32c510e
SHA1bd0e0ff74db2ec2823e87ca144bd74af63262491
SHA2569f466007436c7ffe0d27b45811af30cafa290de451a5f70135ba8429288084ea
SHA5129bcb4f085747f6ea4220c09c44c9d19f33d9b1f67ab79c2434c602be46b539b99c62ea4359d36ca094407dd3b2cc3850aaeb14dbc93fd90f939b5291a0f1bf27
-
C:\Users\Admin\AppData\Local\Temp\7060.exeFilesize
384KB
MD559cac60a64b25a098740406fe32c510e
SHA1bd0e0ff74db2ec2823e87ca144bd74af63262491
SHA2569f466007436c7ffe0d27b45811af30cafa290de451a5f70135ba8429288084ea
SHA5129bcb4f085747f6ea4220c09c44c9d19f33d9b1f67ab79c2434c602be46b539b99c62ea4359d36ca094407dd3b2cc3850aaeb14dbc93fd90f939b5291a0f1bf27
-
C:\Users\Admin\AppData\Local\Temp\71AA.exeFilesize
811KB
MD5239c55dbc0208bdc294be7ed3d3901c0
SHA1215d19d191ce08bccce5e6a063f58322a029f6e7
SHA256fecfabb935d8d19cdbe87b0ec418570ed11ba8e37ad78b76b2419804e951ed14
SHA5120cb9102a4a3f4d258bdedd4f0f1714431203c37902fb984c76effde2bc2a97f5d848f6a66db2635fd6d8dbfa0ad3a0535d8ace39124a475a3bf9f9f58c494e5f
-
C:\Users\Admin\AppData\Local\Temp\71AA.exeFilesize
811KB
MD5239c55dbc0208bdc294be7ed3d3901c0
SHA1215d19d191ce08bccce5e6a063f58322a029f6e7
SHA256fecfabb935d8d19cdbe87b0ec418570ed11ba8e37ad78b76b2419804e951ed14
SHA5120cb9102a4a3f4d258bdedd4f0f1714431203c37902fb984c76effde2bc2a97f5d848f6a66db2635fd6d8dbfa0ad3a0535d8ace39124a475a3bf9f9f58c494e5f
-
C:\Users\Admin\AppData\Local\Temp\71AA.exeFilesize
811KB
MD5239c55dbc0208bdc294be7ed3d3901c0
SHA1215d19d191ce08bccce5e6a063f58322a029f6e7
SHA256fecfabb935d8d19cdbe87b0ec418570ed11ba8e37ad78b76b2419804e951ed14
SHA5120cb9102a4a3f4d258bdedd4f0f1714431203c37902fb984c76effde2bc2a97f5d848f6a66db2635fd6d8dbfa0ad3a0535d8ace39124a475a3bf9f9f58c494e5f
-
C:\Users\Admin\AppData\Local\Temp\71AA.exeFilesize
811KB
MD5239c55dbc0208bdc294be7ed3d3901c0
SHA1215d19d191ce08bccce5e6a063f58322a029f6e7
SHA256fecfabb935d8d19cdbe87b0ec418570ed11ba8e37ad78b76b2419804e951ed14
SHA5120cb9102a4a3f4d258bdedd4f0f1714431203c37902fb984c76effde2bc2a97f5d848f6a66db2635fd6d8dbfa0ad3a0535d8ace39124a475a3bf9f9f58c494e5f
-
C:\Users\Admin\AppData\Local\Temp\71AA.exeFilesize
811KB
MD5239c55dbc0208bdc294be7ed3d3901c0
SHA1215d19d191ce08bccce5e6a063f58322a029f6e7
SHA256fecfabb935d8d19cdbe87b0ec418570ed11ba8e37ad78b76b2419804e951ed14
SHA5120cb9102a4a3f4d258bdedd4f0f1714431203c37902fb984c76effde2bc2a97f5d848f6a66db2635fd6d8dbfa0ad3a0535d8ace39124a475a3bf9f9f58c494e5f
-
C:\Users\Admin\AppData\Local\Temp\8F06.exeFilesize
1.1MB
MD5f54e72ec43ba9b6d7dcb039cc2ad48f6
SHA14dd3e8194b67d5e594eee18101bee38a69d1343a
SHA256106a8c05bd4fe5807019f19c99c66dd65166442148ab41a482944a06740dca2f
SHA51250e425e51b2fe3a11e35499470c0cb9e571f82a1beff6acf21a061da53f278de362a7dd93b121408cf7a27421ff2a557e59c94943f9b3681dab7e023b64c7c3e
-
C:\Users\Admin\AppData\Local\Temp\8F06.exeFilesize
1.1MB
MD5f54e72ec43ba9b6d7dcb039cc2ad48f6
SHA14dd3e8194b67d5e594eee18101bee38a69d1343a
SHA256106a8c05bd4fe5807019f19c99c66dd65166442148ab41a482944a06740dca2f
SHA51250e425e51b2fe3a11e35499470c0cb9e571f82a1beff6acf21a061da53f278de362a7dd93b121408cf7a27421ff2a557e59c94943f9b3681dab7e023b64c7c3e
-
C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
C:\Users\Admin\AppData\Local\Temp\e76728db77\nbveek.exeFilesize
235KB
MD5cb41a6b7a7f4a5bfc31a327e0f09e85e
SHA1e6651675fe2c060c92fb2ad03de90d78d30116d4
SHA25697406ce4e2f14cee1e32d3bcd082878a106d34e179e7ab9bc04aa92e424e72bc
SHA512e3b1a6088e0c96ce01972cb507d231927f398aebfa2e1229c9b9bfa0a87814903035cb2981b3003cd805212c5e24a37216e60f2d6cabc7ad4d42823e838d07c1
-
C:\Users\Admin\AppData\Local\Temp\e76728db77\nbveek.exeFilesize
235KB
MD5cb41a6b7a7f4a5bfc31a327e0f09e85e
SHA1e6651675fe2c060c92fb2ad03de90d78d30116d4
SHA25697406ce4e2f14cee1e32d3bcd082878a106d34e179e7ab9bc04aa92e424e72bc
SHA512e3b1a6088e0c96ce01972cb507d231927f398aebfa2e1229c9b9bfa0a87814903035cb2981b3003cd805212c5e24a37216e60f2d6cabc7ad4d42823e838d07c1
-
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exeFilesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exeFilesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build2.exeFilesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\d7309c14-f91b-4d00-9d12-c75e5e5e8a2f\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dllFilesize
126KB
MD5628a26398301374c915780252650990b
SHA15d31e095d924e3982422aa1be3959c2e3353e602
SHA2567c25d5c136fff48f875478d8f9f3a80f4f72a6fb5aa80f7954a3ab3ef6ddbd78
SHA512ec4deacbb87a2ac52e42eeff86506d391c273741bab16a18973adf4d127e29d6d231ef405c7428e1ec5fe9d3b7a4f4451efb9c9c8eee886e8b5621b785f81705
-
C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dllFilesize
126KB
MD5628a26398301374c915780252650990b
SHA15d31e095d924e3982422aa1be3959c2e3353e602
SHA2567c25d5c136fff48f875478d8f9f3a80f4f72a6fb5aa80f7954a3ab3ef6ddbd78
SHA512ec4deacbb87a2ac52e42eeff86506d391c273741bab16a18973adf4d127e29d6d231ef405c7428e1ec5fe9d3b7a4f4451efb9c9c8eee886e8b5621b785f81705
-
\??\c:\users\admin\appdata\local\temp\e76728db77\nbveek.exeFilesize
235KB
MD5cb41a6b7a7f4a5bfc31a327e0f09e85e
SHA1e6651675fe2c060c92fb2ad03de90d78d30116d4
SHA25697406ce4e2f14cee1e32d3bcd082878a106d34e179e7ab9bc04aa92e424e72bc
SHA512e3b1a6088e0c96ce01972cb507d231927f398aebfa2e1229c9b9bfa0a87814903035cb2981b3003cd805212c5e24a37216e60f2d6cabc7ad4d42823e838d07c1
-
memory/1080-158-0x0000000000000000-mapping.dmp
-
memory/1112-170-0x0000000001FEC000-0x000000000207E000-memory.dmpFilesize
584KB
-
memory/1112-171-0x0000000002190000-0x00000000022AB000-memory.dmpFilesize
1.1MB
-
memory/1112-156-0x0000000000000000-mapping.dmp
-
memory/1444-250-0x0000000000000000-mapping.dmp
-
memory/1484-134-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1484-133-0x0000000000510000-0x0000000000519000-memory.dmpFilesize
36KB
-
memory/1484-132-0x0000000000589000-0x000000000059F000-memory.dmpFilesize
88KB
-
memory/1484-135-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1488-185-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1488-178-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1488-180-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1488-173-0x0000000000000000-mapping.dmp
-
memory/1488-174-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1488-176-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1592-196-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1592-226-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1592-265-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1592-189-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1592-191-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1592-186-0x0000000000000000-mapping.dmp
-
memory/1688-142-0x0000000000000000-mapping.dmp
-
memory/1708-221-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1708-224-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1708-249-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1708-227-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/1708-222-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1708-219-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1708-218-0x0000000000000000-mapping.dmp
-
memory/1760-145-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1760-144-0x00000000004D0000-0x00000000004D9000-memory.dmpFilesize
36KB
-
memory/1760-143-0x0000000000589000-0x000000000059F000-memory.dmpFilesize
88KB
-
memory/1760-139-0x0000000000000000-mapping.dmp
-
memory/1760-148-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1788-209-0x00000000022F0000-0x0000000002420000-memory.dmpFilesize
1.2MB
-
memory/1788-208-0x00000000020F5000-0x00000000021E3000-memory.dmpFilesize
952KB
-
memory/1788-210-0x0000000000400000-0x0000000000531000-memory.dmpFilesize
1.2MB
-
memory/1788-197-0x0000000000000000-mapping.dmp
-
memory/2032-254-0x00000000051E0000-0x0000000005320000-memory.dmpFilesize
1.2MB
-
memory/2032-205-0x0000000000000000-mapping.dmp
-
memory/2032-264-0x00000000048D0000-0x0000000004FF5000-memory.dmpFilesize
7.1MB
-
memory/2032-251-0x00000000048D0000-0x0000000004FF5000-memory.dmpFilesize
7.1MB
-
memory/2032-253-0x00000000051E0000-0x0000000005320000-memory.dmpFilesize
1.2MB
-
memory/2032-255-0x00000000051E0000-0x0000000005320000-memory.dmpFilesize
1.2MB
-
memory/2032-256-0x00000000051E0000-0x0000000005320000-memory.dmpFilesize
1.2MB
-
memory/2032-258-0x00000000051E0000-0x0000000005320000-memory.dmpFilesize
1.2MB
-
memory/2032-257-0x00000000051E0000-0x0000000005320000-memory.dmpFilesize
1.2MB
-
memory/2032-252-0x00000000048D0000-0x0000000004FF5000-memory.dmpFilesize
7.1MB
-
memory/2296-147-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/2296-136-0x0000000000000000-mapping.dmp
-
memory/2296-146-0x0000000000549000-0x000000000055E000-memory.dmpFilesize
84KB
-
memory/2384-263-0x00000146751A0000-0x00000146753CA000-memory.dmpFilesize
2.2MB
-
memory/2384-259-0x00007FF6E81A6890-mapping.dmp
-
memory/2384-260-0x0000014676B70000-0x0000014676CB0000-memory.dmpFilesize
1.2MB
-
memory/2384-261-0x0000014676B70000-0x0000014676CB0000-memory.dmpFilesize
1.2MB
-
memory/2384-262-0x0000000000EB0000-0x00000000010C9000-memory.dmpFilesize
2.1MB
-
memory/2444-149-0x0000000000000000-mapping.dmp
-
memory/2444-217-0x0000000000000000-mapping.dmp
-
memory/2456-153-0x0000000000000000-mapping.dmp
-
memory/2844-200-0x0000000005B60000-0x0000000005BC6000-memory.dmpFilesize
408KB
-
memory/2844-177-0x00000000057F0000-0x0000000005802000-memory.dmpFilesize
72KB
-
memory/2844-162-0x0000000000000000-mapping.dmp
-
memory/2844-163-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2844-169-0x0000000005D50000-0x0000000006368000-memory.dmpFilesize
6.1MB
-
memory/2844-179-0x0000000005850000-0x000000000588C000-memory.dmpFilesize
240KB
-
memory/2844-172-0x00000000058C0000-0x00000000059CA000-memory.dmpFilesize
1.0MB
-
memory/2844-204-0x0000000007FE0000-0x000000000850C000-memory.dmpFilesize
5.2MB
-
memory/2844-203-0x00000000073C0000-0x0000000007582000-memory.dmpFilesize
1.8MB
-
memory/2844-201-0x0000000006E10000-0x00000000073B4000-memory.dmpFilesize
5.6MB
-
memory/2844-202-0x0000000006900000-0x0000000006992000-memory.dmpFilesize
584KB
-
memory/3520-272-0x0000000000000000-mapping.dmp
-
memory/3740-168-0x0000000000000000-mapping.dmp
-
memory/4040-248-0x0000000000000000-mapping.dmp
-
memory/4048-150-0x0000000000000000-mapping.dmp
-
memory/4176-266-0x0000000000000000-mapping.dmp
-
memory/4196-190-0x00000000006B4000-0x0000000000746000-memory.dmpFilesize
584KB
-
memory/4196-183-0x0000000000000000-mapping.dmp
-
memory/4376-214-0x0000000000000000-mapping.dmp
-
memory/4388-181-0x0000000000000000-mapping.dmp
-
memory/4440-223-0x00000000005D8000-0x0000000000606000-memory.dmpFilesize
184KB
-
memory/4440-225-0x0000000000510000-0x0000000000563000-memory.dmpFilesize
332KB
-
memory/4440-211-0x0000000000000000-mapping.dmp