Malware Analysis Report

2025-08-10 22:58

Sample ID 230328-bpy3magc35
Target 37d059689141316003e150dc31a34c23.bin
SHA256 0a8e7781a690d1e33b2393fdf798c239c0634bdadb2a6e874a461251c1c804b4
Tags
smokeloader backdoor trojan djvu rhadamanthys vidar pub1 sprg discovery persistence ransomware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0a8e7781a690d1e33b2393fdf798c239c0634bdadb2a6e874a461251c1c804b4

Threat Level: Known bad

The file 37d059689141316003e150dc31a34c23.bin was found to be: Known bad.

Malicious Activity Summary

smokeloader backdoor trojan djvu rhadamanthys vidar pub1 sprg discovery persistence ransomware stealer

SmokeLoader

Rhadamanthys

Djvu Ransomware

Detected Djvu ransomware

Detect rhadamanthys stealer shellcode

Vidar

Downloads MZ/PE file

Modifies file permissions

Executes dropped EXE

Looks up external IP address via web service

Adds Run key to start application

Suspicious use of SetThreadContext

Program crash

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: MapViewOfSection

Suspicious behavior: GetForegroundWindowSpam

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Checks SCSI registry key(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-28 01:19

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-28 01:19

Reported

2023-03-28 01:22

Platform

win7-20230220-en

Max time kernel

150s

Max time network

33s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe

"C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe"

Network

N/A

Files

memory/1720-55-0x00000000001B0000-0x00000000001B9000-memory.dmp

memory/1264-56-0x0000000002A00000-0x0000000002A16000-memory.dmp

memory/1720-57-0x0000000000400000-0x0000000000704000-memory.dmp

memory/1264-60-0x000007FF3AC90000-0x000007FF3AC9A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-28 01:19

Reported

2023-03-28 01:22

Platform

win10v2004-20230220-en

Max time kernel

28s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe"

Signatures

Detect rhadamanthys stealer shellcode

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Rhadamanthys

stealer rhadamanthys

SmokeLoader

trojan backdoor smokeloader

Vidar

stealer vidar

Downloads MZ/PE file

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8af9018c-b84b-479f-8be7-8b1b0ca4448d\\D14F.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\D14F.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4540 set thread context of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4616 set thread context of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe

Checks SCSI registry key(s)

Description Indicator Process Target
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3212 wrote to memory of 4540 N/A N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 3212 wrote to memory of 4540 N/A N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 3212 wrote to memory of 4540 N/A N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 3212 wrote to memory of 4616 N/A N/A C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 3212 wrote to memory of 4616 N/A N/A C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 3212 wrote to memory of 4616 N/A N/A C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4540 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Users\Admin\AppData\Local\Temp\D14F.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 4616 wrote to memory of 4840 N/A C:\Users\Admin\AppData\Local\Temp\D344.exe C:\Users\Admin\AppData\Local\Temp\D344.exe
PID 3212 wrote to memory of 552 N/A N/A C:\Users\Admin\AppData\Local\Temp\D8E2.exe
PID 3212 wrote to memory of 552 N/A N/A C:\Users\Admin\AppData\Local\Temp\D8E2.exe
PID 3212 wrote to memory of 552 N/A N/A C:\Users\Admin\AppData\Local\Temp\D8E2.exe
PID 2612 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Windows\SysWOW64\icacls.exe
PID 2612 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Windows\SysWOW64\icacls.exe
PID 2612 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\D14F.exe C:\Windows\SysWOW64\icacls.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe

"C:\Users\Admin\AppData\Local\Temp\dfafc19065140674c7b3e3ffe533f121fe6b2fe1ffb9c0a2dfc15a9d030a0630.exe"

C:\Users\Admin\AppData\Local\Temp\D14F.exe

C:\Users\Admin\AppData\Local\Temp\D14F.exe

C:\Users\Admin\AppData\Local\Temp\D344.exe

C:\Users\Admin\AppData\Local\Temp\D344.exe

C:\Users\Admin\AppData\Local\Temp\D14F.exe

C:\Users\Admin\AppData\Local\Temp\D14F.exe

C:\Users\Admin\AppData\Local\Temp\D344.exe

C:\Users\Admin\AppData\Local\Temp\D344.exe

C:\Users\Admin\AppData\Local\Temp\D8E2.exe

C:\Users\Admin\AppData\Local\Temp\D8E2.exe

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\8af9018c-b84b-479f-8be7-8b1b0ca4448d" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\D14F.exe

"C:\Users\Admin\AppData\Local\Temp\D14F.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\D344.exe

"C:\Users\Admin\AppData\Local\Temp\D344.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\92B.exe

C:\Users\Admin\AppData\Local\Temp\92B.exe

C:\Users\Admin\AppData\Local\Temp\92B.exe

C:\Users\Admin\AppData\Local\Temp\92B.exe

C:\Users\Admin\AppData\Local\Temp\D14F.exe

"C:\Users\Admin\AppData\Local\Temp\D14F.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\D344.exe

"C:\Users\Admin\AppData\Local\Temp\D344.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\92B.exe

"C:\Users\Admin\AppData\Local\Temp\92B.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\57F7.exe

C:\Users\Admin\AppData\Local\Temp\57F7.exe

C:\Users\Admin\AppData\Local\Temp\319F.exe

C:\Users\Admin\AppData\Local\Temp\319F.exe

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe

"C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe"

C:\Users\Admin\AppData\Local\Temp\5DE0.exe

C:\Users\Admin\AppData\Local\Temp\5DE0.exe

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build3.exe

"C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build3.exe"

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build2.exe

"C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build2.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\Temp\57F7.exe

C:\Users\Admin\AppData\Local\Temp\57F7.exe

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build3.exe

"C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build3.exe"

C:\Users\Admin\AppData\Local\Temp\92B.exe

"C:\Users\Admin\AppData\Local\Temp\92B.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\929D.exe

C:\Users\Admin\AppData\Local\Temp\929D.exe

C:\Users\Admin\AppData\Local\Temp\9648.exe

C:\Users\Admin\AppData\Local\Temp\9648.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3428 -ip 3428

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4176 -ip 4176

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2508 -ip 2508

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 348

C:\Windows\system32\dllhost.exe

"C:\Windows\system32\dllhost.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 340

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 348

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe

"C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe"

C:\Users\Admin\AppData\Local\Temp\A174.exe

C:\Users\Admin\AppData\Local\Temp\A174.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 552 -ip 552

C:\Users\Admin\AppData\Local\Temp\A916.exe

C:\Users\Admin\AppData\Local\Temp\A916.exe

C:\Users\Admin\AppData\Local\Temp\57F7.exe

"C:\Users\Admin\AppData\Local\Temp\57F7.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build2.exe

"C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build2.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 potunulit.org udp
US 188.114.97.0:80 potunulit.org tcp
US 8.8.8.8:53 uaery.top udp
KR 211.171.233.129:80 uaery.top tcp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 8.8.8.8:53 129.233.171.211.in-addr.arpa udp
GI 94.131.8.3:80 94.131.8.3 tcp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 3.8.131.94.in-addr.arpa udp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
KR 211.171.233.129:80 uaery.top tcp
US 8.8.8.8:53 188.155.64.172.in-addr.arpa udp
US 8.8.8.8:53 68.32.18.104.in-addr.arpa udp
US 104.208.16.90:443 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
KR 211.171.233.129:80 uaery.top tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
KR 211.171.233.129:80 uaery.top tcp
NL 173.223.113.131:80 tcp
US 204.79.197.203:80 tcp
NL 173.223.113.164:443 tcp
KR 211.171.233.129:80 uaery.top tcp
NL 84.53.175.11:80 tcp
US 8.8.8.8:53 zexeq.com udp
RO 86.122.83.142:80 zexeq.com tcp
US 8.8.8.8:53 142.83.122.86.in-addr.arpa udp
US 8.8.8.8:53 aainvestment.org udp
TR 159.253.45.38:443 aainvestment.org tcp
RO 86.122.83.142:80 zexeq.com tcp
US 8.8.8.8:53 38.45.253.159.in-addr.arpa udp
DE 77.91.84.172:80 77.91.84.172 tcp
RO 86.122.83.142:80 zexeq.com tcp
US 8.8.8.8:53 172.84.91.77.in-addr.arpa udp
IT 179.43.154.216:80 catalog.s.download.windowsupdate.com tcp
DE 45.9.74.80:80 45.9.74.80 tcp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 216.154.43.179.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 80.74.9.45.in-addr.arpa udp
KR 211.171.233.129:80 zexeq.com tcp

Files

memory/2176-134-0x0000000002300000-0x0000000002309000-memory.dmp

memory/3212-135-0x00000000008F0000-0x0000000000906000-memory.dmp

memory/2176-136-0x0000000000400000-0x0000000000704000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\D14F.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\D14F.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

memory/2612-149-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4540-155-0x00000000024F0000-0x000000000260B000-memory.dmp

memory/2612-154-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\D14F.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\D344.exe

MD5 f194ac765ef33c0ea9492348021eddc3
SHA1 1d821007587e84e9516a3c6cfc6d05221e728614
SHA256 b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA512 2276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94

memory/2612-156-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4840-157-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4840-159-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\D344.exe

MD5 f194ac765ef33c0ea9492348021eddc3
SHA1 1d821007587e84e9516a3c6cfc6d05221e728614
SHA256 b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA512 2276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94

memory/4840-161-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2612-162-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4616-160-0x00000000025A0000-0x00000000026BB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\D344.exe

MD5 f194ac765ef33c0ea9492348021eddc3
SHA1 1d821007587e84e9516a3c6cfc6d05221e728614
SHA256 b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA512 2276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94

C:\Users\Admin\AppData\Local\Temp\D8E2.exe

MD5 1d18c5aa86676409134010c44ba7ccd1
SHA1 4b195c876115ad1bd4adf41c388eb327e7b1ead1
SHA256 0cbe9e9e7a6afe378693c62d565f75bb65022e373e1e1dc21c5e345c7f8a9e21
SHA512 ccbfa84f4f15543adb7863546679e97435127fcbb910f7931b65f985f21098eaab1909e65c6825fc88aaef89cf233efa250fe5979a8c780654178ee7f7a1f4db

C:\Users\Admin\AppData\Local\Temp\D8E2.exe

MD5 1d18c5aa86676409134010c44ba7ccd1
SHA1 4b195c876115ad1bd4adf41c388eb327e7b1ead1
SHA256 0cbe9e9e7a6afe378693c62d565f75bb65022e373e1e1dc21c5e345c7f8a9e21
SHA512 ccbfa84f4f15543adb7863546679e97435127fcbb910f7931b65f985f21098eaab1909e65c6825fc88aaef89cf233efa250fe5979a8c780654178ee7f7a1f4db

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 e5b1cc0ae5af6a8277d75cff4af2c5e8
SHA1 4768fff3d4bbe02f89683b4a0e7b15b24b54eb9f
SHA256 d950c0d748aae641d71b11cd1c519b289917c23bee1a2b6bc5c496fd8e5d4655
SHA512 57a4737deeefac0124d73b52525993fecbbebd21a556ece87f8e79e845e07f037abb5e49f7458e8a010935c6691f18fbb913d77ecfb2ba902067788c483ec3d7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 a73d4ed42ab0d09c59c889d05da61cd1
SHA1 086f9d131ae90f65256dd3c14df3c7b4d153f87e
SHA256 c440583b94921f1f372c9c496f80b8f95fc16c1e8827fb7f0b30cba28ef5b4fb
SHA512 84635c8a4be95ffe46486671f5720e3c147a27c4d8f9dbd736098d253e8a0f64b36c47388f131cfca56349e35a09f46ad248a2ef02e05c72b31e32f2b41d1a33

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 3adac03b181d7980568dda0da0efc9de
SHA1 a283c4c9bd26a65b8240d21708e57f5946778341
SHA256 24c4973ced938b77d9670ac79eb76cd52411b17ab59ec78ba14c1b433f342933
SHA512 6fbd2a32fc18606628ea56311764cd879a1196405dddd4d269ad6163b2ffdcf916786f1c0328f27ec089be5cb9b4ecb3542363f4dfb3df1c1b91a0e038b67241

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 f4629cd473d2b4e71cf6b525a05068d5
SHA1 0b0b549c9f0c1f89492b71b918a44ba1753be89b
SHA256 91401c19eb6e63fff2c6cfe9dd7c952c75679e2682be9284ca7fa0a6a7b1fd86
SHA512 f9eba0879695a4c2c9de8f0fa731de6079fecb7e13ab290ef71a7503e7987cc5bdb35708727f8bbb240d5a15428bd590ae859e504552ccacab0e4d10ed08cc36

memory/4840-179-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\8af9018c-b84b-479f-8be7-8b1b0ca4448d\D14F.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\D14F.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\D344.exe

MD5 f194ac765ef33c0ea9492348021eddc3
SHA1 1d821007587e84e9516a3c6cfc6d05221e728614
SHA256 b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA512 2276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94

memory/2612-184-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4840-183-0x0000000000400000-0x0000000000537000-memory.dmp

memory/552-190-0x0000000000400000-0x0000000000710000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\92B.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\92B.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\92B.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

memory/552-194-0x0000000000980000-0x00000000009AE000-memory.dmp

memory/2952-200-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\92B.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

memory/2952-202-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\D14F.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

memory/2876-205-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2876-208-0x0000000000400000-0x0000000000537000-memory.dmp

memory/540-209-0x0000000000400000-0x0000000000537000-memory.dmp

memory/540-207-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\D344.exe

MD5 f194ac765ef33c0ea9492348021eddc3
SHA1 1d821007587e84e9516a3c6cfc6d05221e728614
SHA256 b8f105a2506e754dc7504e9f44714d5c5550fcb723e589dc70ed5d5e1de4559d
SHA512 2276dbcdad0c6c6ca3a7afce80b809da613150166b0e842a090d7a063ca902c9b5b5fbad718710f61aa096b3a1503237b66cd130cdcb4358791db8273cc54d94

memory/2952-210-0x0000000000400000-0x0000000000537000-memory.dmp

memory/540-211-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2876-212-0x0000000000400000-0x0000000000537000-memory.dmp

memory/540-213-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2952-216-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2876-215-0x0000000000400000-0x0000000000537000-memory.dmp

memory/540-214-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2876-220-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\bowsakkdestx.txt

MD5 6ab37c6fd8c563197ef79d09241843f1
SHA1 cb9bd05e2fc8cc06999a66b7b2d396ff4b5157e5
SHA256 d4849ec7852d9467f06fde6f25823331dad6bc76e7838d530e990b62286a754f
SHA512 dd1fae67d0f45ba1ec7e56347fdfc2a53f619650892c8a55e7fba80811b6c66d56544b1946a409eaaca06fa9503de20e160360445d959122e5ba3aa85b751cde

memory/2876-233-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\92B.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\57F7.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\57F7.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\SystemID\PersonalID.txt

MD5 dbe3661a216d9e3b599178758fadacb4
SHA1 29fc37cce7bc29551694d17d9eb82d4d470db176
SHA256 134967887ca1c9c78f4760e5761c11c2a8195671abccba36fcf3e76df6fff03b
SHA512 da90c77c47790b3791ee6cee8aa7d431813f2ee0c314001015158a48a117342b990aaac023b36e610cef71755e609cbf1f6932047c3b4ad4df8779544214687f

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe

MD5 6b343cd7dea3ae28d0819bc55a2f86fe
SHA1 cedd49849a5dd678d0a55da607e9b28a9680073c
SHA256 4240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA512 7c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48

memory/540-241-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2876-242-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2876-252-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

memory/540-254-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe

MD5 6b343cd7dea3ae28d0819bc55a2f86fe
SHA1 cedd49849a5dd678d0a55da607e9b28a9680073c
SHA256 4240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA512 7c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build2.exe

MD5 6b343cd7dea3ae28d0819bc55a2f86fe
SHA1 cedd49849a5dd678d0a55da607e9b28a9680073c
SHA256 4240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA512 7c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48

memory/2876-306-0x0000000000400000-0x0000000000537000-memory.dmp

memory/552-290-0x00000000001C0000-0x00000000001DC000-memory.dmp

memory/540-286-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build2.exe

MD5 6b343cd7dea3ae28d0819bc55a2f86fe
SHA1 cedd49849a5dd678d0a55da607e9b28a9680073c
SHA256 4240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA512 7c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48

C:\Users\Admin\AppData\Local\Temp\5DE0.exe

MD5 a06853218a437ab626647a0fe8400a52
SHA1 a314c45826bf8895e6f83c690f694d54c0912a63
SHA256 73d2c93eac5a168dace9a988f636fe50a92a0fe80967c3c4abd9cb2f790c0136
SHA512 d37b97131bc945ab3856d3492af8b08aed1321cac24b69c4375737290fa56ef69356cd256b52c5cbb2e9532a1af454ad728f1cab7c3716246f97b7b28e19404d

memory/552-282-0x00000000001C0000-0x00000000001DC000-memory.dmp

memory/2876-281-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\Temp\319F.exe

MD5 da65c7e9f6c37ccbdfe6491fc618806b
SHA1 0c08ed8113d93487fc58aeeb905362edf908bdfa
SHA256 aefcc8c5f77a200e8d3b91dd2cd46850a1368b987589db45592ae9ab3a79fc31
SHA512 71a16dbd66721fde5ab1e03aca9133ee90385139dca36bd377e137118cd92af6a84f717b80d84add8f0698a279acc0101c75e211ae0e3132536bd0ea0cccf19d

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe

MD5 6b343cd7dea3ae28d0819bc55a2f86fe
SHA1 cedd49849a5dd678d0a55da607e9b28a9680073c
SHA256 4240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA512 7c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\Temp\319F.exe

MD5 da65c7e9f6c37ccbdfe6491fc618806b
SHA1 0c08ed8113d93487fc58aeeb905362edf908bdfa
SHA256 aefcc8c5f77a200e8d3b91dd2cd46850a1368b987589db45592ae9ab3a79fc31
SHA512 71a16dbd66721fde5ab1e03aca9133ee90385139dca36bd377e137118cd92af6a84f717b80d84add8f0698a279acc0101c75e211ae0e3132536bd0ea0cccf19d

C:\Users\Admin\AppData\Local\Temp\5DE0.exe

MD5 a06853218a437ab626647a0fe8400a52
SHA1 a314c45826bf8895e6f83c690f694d54c0912a63
SHA256 73d2c93eac5a168dace9a988f636fe50a92a0fe80967c3c4abd9cb2f790c0136
SHA512 d37b97131bc945ab3856d3492af8b08aed1321cac24b69c4375737290fa56ef69356cd256b52c5cbb2e9532a1af454ad728f1cab7c3716246f97b7b28e19404d

memory/552-272-0x0000000000400000-0x0000000000710000-memory.dmp

memory/540-268-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\929D.exe

MD5 6ad315d207983a8b1e5f1fd24d228661
SHA1 76dbdcd43b6987aaa985025895c8255c2aca0c00
SHA256 0a208020c34b31024a98e05779577074e66848e93585295b283d5731cef8cc82
SHA512 f304b64bb9067f449ef8a047aedcde1151b69f1ed11dd338f7d179bbfd9a01ed40f8bc0da9adcd91f687bc80822a595ccc23c9c3becdfe70fbf5052c60be0416

memory/3296-311-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4652-313-0x0000000000400000-0x0000000000701000-memory.dmp

memory/3296-315-0x0000000000400000-0x0000000000537000-memory.dmp

memory/552-325-0x00000000001C0000-0x00000000001DC000-memory.dmp

memory/1664-326-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9648.exe

MD5 5a8415f7326f6542612327b5411b6a67
SHA1 d5915278feac694953077002e6213b397a5e6989
SHA256 eda6d3ec29aef5cd7a2000d17efab7dcb710fcd0906357cb43a68cee6e9b7605
SHA512 bc9308af2e28f792db6779fc4ee02e5f4049fedda0e1fc8ffb380c98dc0f1c36edcbc034ec23a90133ca346ec683eafd16e06338e8f0d4d8075c48526d5aa390

C:\Users\Admin\AppData\Local\Temp\9648.exe

MD5 5a8415f7326f6542612327b5411b6a67
SHA1 d5915278feac694953077002e6213b397a5e6989
SHA256 eda6d3ec29aef5cd7a2000d17efab7dcb710fcd0906357cb43a68cee6e9b7605
SHA512 bc9308af2e28f792db6779fc4ee02e5f4049fedda0e1fc8ffb380c98dc0f1c36edcbc034ec23a90133ca346ec683eafd16e06338e8f0d4d8075c48526d5aa390

memory/552-331-0x00000000001E0000-0x00000000001FA000-memory.dmp

memory/1664-320-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\57F7.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\Temp\92B.exe

MD5 135b751eefe23c858fb1bec740fd7c1b
SHA1 f57f08d10464654567ecf65050dbf977c9c91dfb
SHA256 062326379158ab9a337c352b73a57e6d3465cd26e92ce2247fc502985c9e15b8
SHA512 495543aa95276c91c6a55c5c217ccbbd6a3da0e3a5fc9db0f29fc3871fda3a475c572044bf61203d4311ef1688d3a8b26be8e6926a2a48a6c2e38a2530e8b667

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\Temp\929D.exe

MD5 6ad315d207983a8b1e5f1fd24d228661
SHA1 76dbdcd43b6987aaa985025895c8255c2aca0c00
SHA256 0a208020c34b31024a98e05779577074e66848e93585295b283d5731cef8cc82
SHA512 f304b64bb9067f449ef8a047aedcde1151b69f1ed11dd338f7d179bbfd9a01ed40f8bc0da9adcd91f687bc80822a595ccc23c9c3becdfe70fbf5052c60be0416

memory/3296-335-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2508-341-0x0000000000860000-0x0000000000869000-memory.dmp

C:\Users\Admin\AppData\Local\d9d0a927-c505-4289-ae95-c59a2284b33e\build2.exe

MD5 6b343cd7dea3ae28d0819bc55a2f86fe
SHA1 cedd49849a5dd678d0a55da607e9b28a9680073c
SHA256 4240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA512 7c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48

memory/552-350-0x0000000000860000-0x0000000000869000-memory.dmp

memory/2448-349-0x0000000002120000-0x0000000002177000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A174.exe

MD5 edd6a4a0d75ae6818824e6e7456b1cef
SHA1 5992864bc38181bb9ff3c3398652b102c4c9f686
SHA256 ba32dbdf06a9abe36d109a69d6010993a84ea8d396f7493837f27930a4e1cfcc
SHA512 50511d82efce0ffc36bec4dddb689dc8d0a7f2cb088599a1fc67d2c31f1d7f022a94a3a9ea0537e68f674fa4e8bf6215631c0a53ef6fdd971c49b76f9d403246

memory/2984-365-0x0000000000310000-0x000000000075A000-memory.dmp

memory/1664-370-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3428-369-0x0000000000740000-0x0000000000749000-memory.dmp

C:\Users\Admin\AppData\Local\c317c51a-d2a3-4f45-9521-2466a3c3b7bf\build2.exe

MD5 6b343cd7dea3ae28d0819bc55a2f86fe
SHA1 cedd49849a5dd678d0a55da607e9b28a9680073c
SHA256 4240b655ed2af5ae8873b49e2e2d204383b2fd675c21f02527a9a4d9b719cd49
SHA512 7c28ba260fe53879b6e8f69d65c4263d454d75033889162d000c421695e634aeb13f4d4c2b999934f8eb2e58d62913764f1590689925e120600155d8390d0a48

C:\Users\Admin\AppData\Local\Temp\A174.exe

MD5 e6e9c33d28f38d286004a3eb468fd7a7
SHA1 121cc60a4fd7d47b2ff43472f8dd89334c11d6cd
SHA256 a2140a8e06b9fe41c13b2453f0f9f84af8af91394d0981e101fc1f89bb9deebf
SHA512 fcccde94d6d751c368e0e17bceb651d6c8bc2f93f5c67a3d188948be59b057716ce2ed8e623777189da189e0d78617b28ca548ef819992daba097d31a614b8c3