Analysis Overview
SHA256
0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48
Threat Level: Known bad
The file 0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48 was found to be: Known bad.
Malicious Activity Summary
RedLine
Djvu Ransomware
Detected Djvu ransomware
SmokeLoader
Vidar
RedLine payload
Detects Smokeloader packer
Blocklisted process makes network request
Executes dropped EXE
Downloads MZ/PE file
Reads user/profile data of web browsers
Modifies file permissions
Deletes itself
Loads dropped DLL
Checks installed software on the system
Adds Run key to start application
Looks up external IP address via web service
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious use of SetThreadContext
Program crash
Enumerates physical storage devices
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Checks processor information in registry
Modifies registry class
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Delays execution with timeout.exe
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-01-08 00:33
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-01-08 00:32
Reported
2023-01-08 00:35
Platform
win10-20220901-en
Max time kernel
132s
Max time network
138s
Command Line
Signatures
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detects Smokeloader packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SmokeLoader
Vidar
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Downloads MZ/PE file
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2635.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2A1E.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\34DD.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\39DF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3E26.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2A1E.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2A1E.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2A1E.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\440E.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\ed6de1d9-1b39-4e0d-bdf4-4450f4ed5cf0\\2A1E.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\2A1E.exe | N/A |
Checks installed software on the system
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2964 set thread context of 4204 | N/A | C:\Users\Admin\AppData\Local\Temp\2A1E.exe | C:\Users\Admin\AppData\Local\Temp\2A1E.exe |
| PID 4184 set thread context of 3668 | N/A | C:\Users\Admin\AppData\Local\Temp\2A1E.exe | C:\Users\Admin\AppData\Local\Temp\2A1E.exe |
| PID 5104 set thread context of 3044 | N/A | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe |
| PID 4316 set thread context of 2528 | N/A | C:\Windows\SysWOW64\rundll32.exe | C:\Windows\system32\rundll32.exe |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\39DF.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\34DD.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\34DD.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\34DD.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data | C:\Windows\SysWOW64\rundll32.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Windows\SysWOW64\rundll32.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000028566104100054656d7000003a0009000400efbe2155a884285661042e0000000000000000000000000000000000000000000000000002f4d700540065006d007000000014000000 | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff | C:\Windows\system32\rundll32.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff | C:\Windows\system32\rundll32.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 | C:\Windows\system32\rundll32.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 | C:\Windows\system32\rundll32.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU | C:\Windows\system32\rundll32.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\34DD.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2635.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\3E26.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe
"C:\Users\Admin\AppData\Local\Temp\0ee693963c48fb1608568161447e324d5452eb1f11b5ac66777fe4562c06bc48.exe"
C:\Users\Admin\AppData\Local\Temp\2635.exe
C:\Users\Admin\AppData\Local\Temp\2635.exe
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
C:\Users\Admin\AppData\Local\Temp\34DD.exe
C:\Users\Admin\AppData\Local\Temp\34DD.exe
C:\Users\Admin\AppData\Local\Temp\39DF.exe
C:\Users\Admin\AppData\Local\Temp\39DF.exe
C:\Users\Admin\AppData\Local\Temp\3E26.exe
C:\Users\Admin\AppData\Local\Temp\3E26.exe
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 792 -s 476
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\ed6de1d9-1b39-4e0d-bdf4-4450f4ed5cf0" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
"C:\Users\Admin\AppData\Local\Temp\2A1E.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
"C:\Users\Admin\AppData\Local\Temp\2A1E.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe
"C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe"
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build3.exe
"C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe
"C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe"
C:\Users\Admin\AppData\Local\Temp\440E.exe
C:\Users\Admin\AppData\Local\Temp\440E.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\system32\rundll32.exe
"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 15599
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\SysWOW64\schtasks.exe
schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
C:\Windows\SysWOW64\schtasks.exe
schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | potunulit.org | udp |
| N/A | 188.114.96.1:80 | potunulit.org | tcp |
| N/A | 13.89.179.8:443 | tcp | |
| N/A | 194.110.203.101:80 | 194.110.203.101 | tcp |
| N/A | 8.8.8.8:53 | polyzi.com | udp |
| N/A | 95.217.49.230:443 | polyzi.com | tcp |
| N/A | 8.8.8.8:53 | api.2ip.ua | udp |
| N/A | 162.0.217.254:443 | api.2ip.ua | tcp |
| N/A | 91.215.85.155:32796 | tcp | |
| N/A | 91.215.85.155:32796 | tcp | |
| N/A | 162.0.217.254:443 | api.2ip.ua | tcp |
| N/A | 8.8.8.8:53 | uaery.top | udp |
| N/A | 8.8.8.8:53 | spaceris.com | udp |
| N/A | 187.212.192.17:80 | uaery.top | tcp |
| N/A | 37.34.248.24:80 | spaceris.com | tcp |
| N/A | 37.34.248.24:80 | spaceris.com | tcp |
| N/A | 8.8.8.8:53 | vatra.at | udp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 8.8.8.8:53 | t.me | udp |
| N/A | 149.154.167.99:443 | t.me | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 94.130.190.48:80 | 94.130.190.48 | tcp |
| N/A | 194.135.33.42:80 | 194.135.33.42 | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 23.236.181.126:443 | 23.236.181.126 | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 211.40.39.251:80 | vatra.at | tcp |
| N/A | 127.0.0.1:15599 | tcp | |
| N/A | 127.0.0.1:1312 | tcp |
Files
memory/3064-120-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-121-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-122-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-123-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-124-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-125-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-126-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-127-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-128-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-129-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-130-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-131-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-132-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-133-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-134-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-135-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-136-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-137-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-138-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-139-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-140-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-141-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-143-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-144-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-145-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-146-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-147-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-149-0x00000000030F0000-0x000000000323A000-memory.dmp
memory/3064-148-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-151-0x0000000003020000-0x00000000030CE000-memory.dmp
memory/3064-150-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-152-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-153-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-154-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-155-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/3064-156-0x0000000000400000-0x000000000301B000-memory.dmp
memory/3064-157-0x0000000000400000-0x000000000301B000-memory.dmp
memory/4624-158-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\2635.exe
| MD5 | 54dcf4b418fed028218468056ac16997 |
| SHA1 | 0cce53d34f7fbb83152400062e1a4f894a7c4588 |
| SHA256 | 5f6c6b28458e83e83fadf6c26dbd64af2178c0a27928124a64fcc96761256d58 |
| SHA512 | afd70852de09f881b9b2d370d171f599987349fbdd299abd34dbdc62d2c3d04d9da109f75126e8ea5e72e532558eff47bd8c0b8cc625f878da867dc63a397b84 |
memory/4624-160-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-161-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-162-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-163-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-164-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-165-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-166-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-168-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-169-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2635.exe
| MD5 | 54dcf4b418fed028218468056ac16997 |
| SHA1 | 0cce53d34f7fbb83152400062e1a4f894a7c4588 |
| SHA256 | 5f6c6b28458e83e83fadf6c26dbd64af2178c0a27928124a64fcc96761256d58 |
| SHA512 | afd70852de09f881b9b2d370d171f599987349fbdd299abd34dbdc62d2c3d04d9da109f75126e8ea5e72e532558eff47bd8c0b8cc625f878da867dc63a397b84 |
memory/4624-170-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-171-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-172-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-173-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-174-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-176-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-177-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/4624-180-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-182-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-183-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-184-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-185-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-188-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-189-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-192-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-193-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-194-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-191-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-190-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
| MD5 | 6e327dfaf7c938622faf253bf3811b1f |
| SHA1 | f465857772cb95a80dade25c65accd1a125b5b0b |
| SHA256 | 8a519dd3c4b60bba2789f6f9ca26bcdb6adfc32f6acc327e55b0274c395328c6 |
| SHA512 | 1a9670d4bf91f81bf9d45009bf6c89aa78dda0ae1432f028376e01c16ac766e869998237dd35928325a2a82800b23655c014f53f00ef49b051720d3272ee4321 |
memory/2964-186-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-181-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
memory/2964-179-0x0000000077DB0000-0x0000000077F3E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
| MD5 | 6e327dfaf7c938622faf253bf3811b1f |
| SHA1 | f465857772cb95a80dade25c65accd1a125b5b0b |
| SHA256 | 8a519dd3c4b60bba2789f6f9ca26bcdb6adfc32f6acc327e55b0274c395328c6 |
| SHA512 | 1a9670d4bf91f81bf9d45009bf6c89aa78dda0ae1432f028376e01c16ac766e869998237dd35928325a2a82800b23655c014f53f00ef49b051720d3272ee4321 |
memory/2964-175-0x0000000000000000-mapping.dmp
memory/1188-203-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\34DD.exe
| MD5 | 39dade0b3087b1e0bc18503e26af8eb0 |
| SHA1 | 23bdd7a7891360015d5c5aa24672bff40c154bb5 |
| SHA256 | 22794d3f45fe31bc2d521ba99a804327a1d86936ec786441b2d926a1ffa36c6b |
| SHA512 | 6b0bbeb4c0bf11c9e4700758538c32218146200000011ee688407943e6a9c29a0c45fc2f9c1b5ccf6d1150593767f5c6b7bb9c1f2c7bd19aff88c9a2f0683fb5 |
C:\Users\Admin\AppData\Local\Temp\34DD.exe
| MD5 | 39dade0b3087b1e0bc18503e26af8eb0 |
| SHA1 | 23bdd7a7891360015d5c5aa24672bff40c154bb5 |
| SHA256 | 22794d3f45fe31bc2d521ba99a804327a1d86936ec786441b2d926a1ffa36c6b |
| SHA512 | 6b0bbeb4c0bf11c9e4700758538c32218146200000011ee688407943e6a9c29a0c45fc2f9c1b5ccf6d1150593767f5c6b7bb9c1f2c7bd19aff88c9a2f0683fb5 |
memory/792-222-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\39DF.exe
| MD5 | b9bfdc5e2185f3660a476defa9f3be0e |
| SHA1 | db874bc97764445da6f370c426e2a43c41dd57bd |
| SHA256 | 67ca5adb5a5afa3b99bf9b0c3cf0e584627b5fe004a14c56f6cca9d05b97cbea |
| SHA512 | 19428c13be7fc3e67cdaf7c974d509841d8cebea6ada454eb2030156209bc9c4ec265b0bb2f1639b966da69d9a17eb8b558ea40aae98796efd601203f6ced74e |
C:\Users\Admin\AppData\Local\Temp\39DF.exe
| MD5 | b9bfdc5e2185f3660a476defa9f3be0e |
| SHA1 | db874bc97764445da6f370c426e2a43c41dd57bd |
| SHA256 | 67ca5adb5a5afa3b99bf9b0c3cf0e584627b5fe004a14c56f6cca9d05b97cbea |
| SHA512 | 19428c13be7fc3e67cdaf7c974d509841d8cebea6ada454eb2030156209bc9c4ec265b0bb2f1639b966da69d9a17eb8b558ea40aae98796efd601203f6ced74e |
memory/3464-244-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\3E26.exe
| MD5 | 4ed8fc021a8c8e43a565f5077fc0e7a9 |
| SHA1 | 7e4f5e2d95567c1a96b8e02f9af1ba7432d9fb2f |
| SHA256 | ac4bf5981d50148ef38fe7ecd09cd0cf3ac92f59acaf189e689ca461a4c60394 |
| SHA512 | 320bc1c3e0ebe5bee625b2dd6ff5572216c970170b27ec0287f0a531341b98be1ab9c90b2a8dda35b6a00df878e0ab0c74b5dfeee8057a4c7f4f104632b5b21c |
C:\Users\Admin\AppData\Local\Temp\3E26.exe
| MD5 | 4ed8fc021a8c8e43a565f5077fc0e7a9 |
| SHA1 | 7e4f5e2d95567c1a96b8e02f9af1ba7432d9fb2f |
| SHA256 | ac4bf5981d50148ef38fe7ecd09cd0cf3ac92f59acaf189e689ca461a4c60394 |
| SHA512 | 320bc1c3e0ebe5bee625b2dd6ff5572216c970170b27ec0287f0a531341b98be1ab9c90b2a8dda35b6a00df878e0ab0c74b5dfeee8057a4c7f4f104632b5b21c |
memory/2964-289-0x0000000004C60000-0x0000000004CFA000-memory.dmp
memory/2964-292-0x0000000004E40000-0x0000000004F5B000-memory.dmp
memory/4624-295-0x0000000003170000-0x00000000032BA000-memory.dmp
memory/4204-300-0x0000000000424141-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
| MD5 | 6e327dfaf7c938622faf253bf3811b1f |
| SHA1 | f465857772cb95a80dade25c65accd1a125b5b0b |
| SHA256 | 8a519dd3c4b60bba2789f6f9ca26bcdb6adfc32f6acc327e55b0274c395328c6 |
| SHA512 | 1a9670d4bf91f81bf9d45009bf6c89aa78dda0ae1432f028376e01c16ac766e869998237dd35928325a2a82800b23655c014f53f00ef49b051720d3272ee4321 |
memory/4624-315-0x00000000032EA000-0x0000000003318000-memory.dmp
memory/4624-333-0x0000000005010000-0x0000000005056000-memory.dmp
memory/4624-331-0x0000000000400000-0x0000000003034000-memory.dmp
memory/4624-349-0x0000000007960000-0x0000000007E5E000-memory.dmp
memory/4624-355-0x00000000052B0000-0x00000000052F4000-memory.dmp
memory/1188-359-0x0000000003150000-0x000000000329A000-memory.dmp
memory/1188-362-0x0000000003150000-0x000000000329A000-memory.dmp
memory/1188-393-0x0000000000400000-0x000000000301B000-memory.dmp
memory/792-398-0x00000000001E0000-0x00000000001E9000-memory.dmp
memory/4624-422-0x0000000007E60000-0x0000000008466000-memory.dmp
memory/792-427-0x0000000000400000-0x0000000003013000-memory.dmp
memory/4624-425-0x0000000007800000-0x000000000790A000-memory.dmp
memory/4624-432-0x0000000008470000-0x0000000008482000-memory.dmp
memory/3464-434-0x00000000030E0000-0x000000000318E000-memory.dmp
memory/3464-437-0x0000000003080000-0x00000000030CB000-memory.dmp
memory/4624-438-0x0000000008490000-0x00000000084CE000-memory.dmp
memory/4204-441-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4624-447-0x00000000085D0000-0x000000000861B000-memory.dmp
memory/792-462-0x0000000003020000-0x000000000316A000-memory.dmp
memory/3464-481-0x0000000000400000-0x000000000302C000-memory.dmp
memory/1188-494-0x0000000000400000-0x000000000301B000-memory.dmp
memory/2732-500-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\ed6de1d9-1b39-4e0d-bdf4-4450f4ed5cf0\2A1E.exe
| MD5 | 6e327dfaf7c938622faf253bf3811b1f |
| SHA1 | f465857772cb95a80dade25c65accd1a125b5b0b |
| SHA256 | 8a519dd3c4b60bba2789f6f9ca26bcdb6adfc32f6acc327e55b0274c395328c6 |
| SHA512 | 1a9670d4bf91f81bf9d45009bf6c89aa78dda0ae1432f028376e01c16ac766e869998237dd35928325a2a82800b23655c014f53f00ef49b051720d3272ee4321 |
memory/4624-519-0x0000000008760000-0x00000000087F2000-memory.dmp
memory/3464-523-0x0000000008610000-0x0000000008676000-memory.dmp
memory/4184-545-0x0000000000000000-mapping.dmp
memory/4204-548-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
| MD5 | 6e327dfaf7c938622faf253bf3811b1f |
| SHA1 | f465857772cb95a80dade25c65accd1a125b5b0b |
| SHA256 | 8a519dd3c4b60bba2789f6f9ca26bcdb6adfc32f6acc327e55b0274c395328c6 |
| SHA512 | 1a9670d4bf91f81bf9d45009bf6c89aa78dda0ae1432f028376e01c16ac766e869998237dd35928325a2a82800b23655c014f53f00ef49b051720d3272ee4321 |
memory/4624-557-0x0000000008F00000-0x00000000090C2000-memory.dmp
memory/4624-562-0x00000000090D0000-0x00000000095FC000-memory.dmp
memory/4624-572-0x0000000003170000-0x00000000032BA000-memory.dmp
memory/4624-573-0x00000000032EA000-0x0000000003318000-memory.dmp
memory/792-574-0x0000000000400000-0x0000000003013000-memory.dmp
memory/3464-575-0x00000000030E0000-0x000000000318E000-memory.dmp
memory/792-576-0x0000000003020000-0x000000000316A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2A1E.exe
| MD5 | 6e327dfaf7c938622faf253bf3811b1f |
| SHA1 | f465857772cb95a80dade25c65accd1a125b5b0b |
| SHA256 | 8a519dd3c4b60bba2789f6f9ca26bcdb6adfc32f6acc327e55b0274c395328c6 |
| SHA512 | 1a9670d4bf91f81bf9d45009bf6c89aa78dda0ae1432f028376e01c16ac766e869998237dd35928325a2a82800b23655c014f53f00ef49b051720d3272ee4321 |
memory/3668-589-0x0000000000424141-mapping.dmp
memory/3464-609-0x0000000000400000-0x000000000302C000-memory.dmp
memory/4624-613-0x00000000032EA000-0x0000000003318000-memory.dmp
memory/4624-623-0x0000000000400000-0x0000000003034000-memory.dmp
memory/3668-644-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 7c56401cb6bd1ae402e06f0fe35f81c4 |
| SHA1 | b82bbb9fa39266796cafcd308ef4300fc92e3399 |
| SHA256 | 0c58c7bc18d38a3096da6f3575f1c6f8d79b69382d8e89bb5fca917d3cdb7f65 |
| SHA512 | 2ea607c2dc04c8ef34ecb4c4bd297e0f0882b179303565863d1745172322133b78186fa04334e82c135e25fd717719ceec917f49682a4eac37034ea87bb2b6f3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 5be9680e3034bfd1ee67ff775cfd738f |
| SHA1 | 91c904f52ad21ce63f81852436255c43d98f638d |
| SHA256 | 8ef9d42dd968a09967b53b5fcc2df84f2129567b53300b494225bc2300751eb7 |
| SHA512 | 9e6c0ee457e388e2c89e61c0dd891bc4416512d13b6ff3d874ea14307319f3a7a10f9b884982e6158ce81019fd7f2c6e13fc9faf6822d0427af3e84a48494101 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 411cd537dcecbf901759b8e6c1bdb076 |
| SHA1 | 655df9870867a1760ad1a2c967b330c61767437a |
| SHA256 | aa9e441c6cf813efd9ba76fe4ae52d884a5c7d222ed221903c42f09bc14eb7db |
| SHA512 | ea780f875c86f8694f67d236a0af066b952862356edb681375e6c387103a91ce085345359f8fe83dd630d310ee6b7637512e5868951c4c257daa411ab9c03e71 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 1bbd8045b8fac40cc0225929b0b594fa |
| SHA1 | 297ec8b1494ce9f613ddf7a2deb2547fb4a5b677 |
| SHA256 | af8645e2426432da28e69e7d705467bf1e88d34031ed7c8c83653021c7fe5555 |
| SHA512 | 0e5f6a0d7f9bef17f96ea5cd06d620effe8b982617d467eb51c0efd6f911311949720a7ef00a1553c0f3f6407239f8ef50e290933fec637bf2507b2722160708 |
memory/5104-691-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe
| MD5 | 8c14bb1505244971374a88f37a4ec22a |
| SHA1 | cebd478fd7ca3956c983fb3e33e2cbb7c54fa4d0 |
| SHA256 | f333289bf29805ee697908ecb974aeb81206b471252ec2e51f382d53ac35d962 |
| SHA512 | 5e08686f2cbc783716442004d39ee11a4fabec7aaa92f33f758df7861ed0730c211551ecb85dd9dc93c2b83983fc4df08bcfeeb38c9e51bd3dcd138b10cf103e |
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe
| MD5 | 8c14bb1505244971374a88f37a4ec22a |
| SHA1 | cebd478fd7ca3956c983fb3e33e2cbb7c54fa4d0 |
| SHA256 | f333289bf29805ee697908ecb974aeb81206b471252ec2e51f382d53ac35d962 |
| SHA512 | 5e08686f2cbc783716442004d39ee11a4fabec7aaa92f33f758df7861ed0730c211551ecb85dd9dc93c2b83983fc4df08bcfeeb38c9e51bd3dcd138b10cf103e |
memory/4752-709-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/864-744-0x0000000000000000-mapping.dmp
memory/3044-775-0x0000000000421BEC-mapping.dmp
C:\Users\Admin\AppData\Local\381dad7c-1f3f-4bf1-9eca-f3c890199f43\build2.exe
| MD5 | 8c14bb1505244971374a88f37a4ec22a |
| SHA1 | cebd478fd7ca3956c983fb3e33e2cbb7c54fa4d0 |
| SHA256 | f333289bf29805ee697908ecb974aeb81206b471252ec2e51f382d53ac35d962 |
| SHA512 | 5e08686f2cbc783716442004d39ee11a4fabec7aaa92f33f758df7861ed0730c211551ecb85dd9dc93c2b83983fc4df08bcfeeb38c9e51bd3dcd138b10cf103e |
memory/5104-778-0x0000000000686000-0x00000000006B3000-memory.dmp
memory/3668-782-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3044-802-0x0000000000400000-0x0000000000460000-memory.dmp
\ProgramData\nss3.dll
| MD5 | bfac4e3c5908856ba17d41edcd455a51 |
| SHA1 | 8eec7e888767aa9e4cca8ff246eb2aacb9170428 |
| SHA256 | e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78 |
| SHA512 | 2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66 |
\ProgramData\mozglue.dll
| MD5 | 8f73c08a9660691143661bf7332c3c27 |
| SHA1 | 37fa65dd737c50fda710fdbde89e51374d0c204a |
| SHA256 | 3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd |
| SHA512 | 0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89 |
memory/900-885-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\440E.exe
| MD5 | dcbc5a70b4e08eaa9cc8a5d5f082bb2f |
| SHA1 | 2a011ebdb768f1bcc2d6d81f4bf7dd726975c603 |
| SHA256 | 3d4fc663c27c5068d17d1237ca674416457708e18301db8514f334d22e6aabd8 |
| SHA512 | 835be5dec8a97c92feb64a457546a8dda78bba3d28a90d7fb281bb6354d1818d135fbd0959209abd82093116a1f4a5c9b2f9e02972b97a0bafbcb4ba66323d85 |
C:\Users\Admin\AppData\Local\Temp\440E.exe
| MD5 | dcbc5a70b4e08eaa9cc8a5d5f082bb2f |
| SHA1 | 2a011ebdb768f1bcc2d6d81f4bf7dd726975c603 |
| SHA256 | 3d4fc663c27c5068d17d1237ca674416457708e18301db8514f334d22e6aabd8 |
| SHA512 | 835be5dec8a97c92feb64a457546a8dda78bba3d28a90d7fb281bb6354d1818d135fbd0959209abd82093116a1f4a5c9b2f9e02972b97a0bafbcb4ba66323d85 |
memory/3044-919-0x0000000000400000-0x0000000000460000-memory.dmp
memory/4248-927-0x0000000000000000-mapping.dmp
memory/3044-929-0x0000000000400000-0x0000000000460000-memory.dmp
memory/4224-934-0x0000000000000000-mapping.dmp
memory/4316-977-0x0000000000000000-mapping.dmp
memory/900-979-0x0000000004E90000-0x0000000004FA5000-memory.dmp
memory/900-993-0x0000000000400000-0x00000000030DA000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp
| MD5 | 9dd70d24b2657a9254b9fd536a4d06d5 |
| SHA1 | 348a1d210d7c4daef8ecdb692eadf3975971e8ee |
| SHA256 | d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd |
| SHA512 | dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6 |
\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp
| MD5 | 9dd70d24b2657a9254b9fd536a4d06d5 |
| SHA1 | 348a1d210d7c4daef8ecdb692eadf3975971e8ee |
| SHA256 | d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd |
| SHA512 | dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6 |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/2136-1094-0x0000000000000000-mapping.dmp
memory/4316-1131-0x0000000006630000-0x0000000007171000-memory.dmp
memory/2528-1140-0x00007FF721255FD0-mapping.dmp
memory/2528-1145-0x0000000000E50000-0x00000000010F1000-memory.dmp
memory/2528-1146-0x000001A3712F0000-0x000001A3715A2000-memory.dmp
memory/1264-1176-0x0000000000000000-mapping.dmp
memory/4316-1194-0x0000000006630000-0x0000000007171000-memory.dmp
memory/3740-1195-0x0000000000000000-mapping.dmp