Malware Analysis Report

2025-01-18 07:44

Sample ID 230813-kwz3yacb3w
Target 0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5
SHA256 0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5
Tags
amadey djvu redline smokeloader logsdiller cloud (tg: @logsdillabot) lux3 backdoor discovery infostealer ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5

Threat Level: Known bad

The file 0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5 was found to be: Known bad.

Malicious Activity Summary

amadey djvu redline smokeloader logsdiller cloud (tg: @logsdillabot) lux3 backdoor discovery infostealer ransomware trojan

Detected Djvu ransomware

RedLine

SmokeLoader

Amadey

Djvu Ransomware

Downloads MZ/PE file

Deletes itself

Loads dropped DLL

Modifies file permissions

Executes dropped EXE

Looks up external IP address via web service

Suspicious use of SetThreadContext

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-13 08:57

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-13 08:57

Reported

2023-08-13 09:00

Platform

win10-20230703-en

Max time kernel

43s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5.exe"

Signatures

Amadey

trojan amadey

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Downloads MZ/PE file

Deletes itself

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4316 set thread context of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3228 wrote to memory of 4316 N/A N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 3228 wrote to memory of 4316 N/A N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 3228 wrote to memory of 4316 N/A N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 3228 wrote to memory of 1800 N/A N/A C:\Users\Admin\AppData\Local\Temp\FE85.exe
PID 3228 wrote to memory of 1800 N/A N/A C:\Users\Admin\AppData\Local\Temp\FE85.exe
PID 3228 wrote to memory of 1800 N/A N/A C:\Users\Admin\AppData\Local\Temp\FE85.exe
PID 3228 wrote to memory of 4372 N/A N/A C:\Windows\system32\regsvr32.exe
PID 3228 wrote to memory of 4372 N/A N/A C:\Windows\system32\regsvr32.exe
PID 4372 wrote to memory of 3112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4372 wrote to memory of 3112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4372 wrote to memory of 3112 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 3228 wrote to memory of 1916 N/A N/A C:\Users\Admin\AppData\Local\Temp\453.exe
PID 3228 wrote to memory of 1916 N/A N/A C:\Users\Admin\AppData\Local\Temp\453.exe
PID 3228 wrote to memory of 1916 N/A N/A C:\Users\Admin\AppData\Local\Temp\453.exe
PID 3228 wrote to memory of 1812 N/A N/A C:\Users\Admin\AppData\Local\Temp\1665.exe
PID 3228 wrote to memory of 1812 N/A N/A C:\Users\Admin\AppData\Local\Temp\1665.exe
PID 3228 wrote to memory of 1812 N/A N/A C:\Users\Admin\AppData\Local\Temp\1665.exe
PID 3228 wrote to memory of 4836 N/A N/A C:\Users\Admin\AppData\Local\Temp\21F0.exe
PID 3228 wrote to memory of 4836 N/A N/A C:\Users\Admin\AppData\Local\Temp\21F0.exe
PID 3228 wrote to memory of 4836 N/A N/A C:\Users\Admin\AppData\Local\Temp\21F0.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe
PID 4316 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\FCAF.exe C:\Users\Admin\AppData\Local\Temp\FCAF.exe

Processes

C:\Users\Admin\AppData\Local\Temp\0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5.exe

"C:\Users\Admin\AppData\Local\Temp\0698e5210c3389e21ba5e0ae872ec213c3e3848b7ccd1bb32d278c8f8c95b2a5.exe"

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

C:\Users\Admin\AppData\Local\Temp\FE85.exe

C:\Users\Admin\AppData\Local\Temp\FE85.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\230.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\230.dll

C:\Users\Admin\AppData\Local\Temp\453.exe

C:\Users\Admin\AppData\Local\Temp\453.exe

C:\Users\Admin\AppData\Local\Temp\1665.exe

C:\Users\Admin\AppData\Local\Temp\1665.exe

C:\Users\Admin\AppData\Local\Temp\21F0.exe

C:\Users\Admin\AppData\Local\Temp\21F0.exe

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

C:\Users\Admin\AppData\Local\Temp\3673.exe

C:\Users\Admin\AppData\Local\Temp\3673.exe

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\latestplayer.exe

"C:\Users\Admin\AppData\Local\Temp\latestplayer.exe"

C:\Users\Admin\AppData\Local\Temp\4190.exe

C:\Users\Admin\AppData\Local\Temp\4190.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\f0c83269-45d5-4366-b977-082ae598e668" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\4971.exe

C:\Users\Admin\AppData\Local\Temp\4971.exe

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit

C:\Users\Admin\AppData\Local\Temp\1665.exe

C:\Users\Admin\AppData\Local\Temp\1665.exe

C:\Users\Admin\AppData\Local\Temp\50E4.exe

C:\Users\Admin\AppData\Local\Temp\50E4.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Users\Admin\AppData\Local\Temp\1665.exe

"C:\Users\Admin\AppData\Local\Temp\1665.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:N"

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

C:\Users\Admin\AppData\Local\Temp\4971.exe

C:\Users\Admin\AppData\Local\Temp\4971.exe

C:\Users\Admin\AppData\Local\Temp\4190.exe

C:\Users\Admin\AppData\Local\Temp\4190.exe

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

"C:\Users\Admin\AppData\Local\Temp\FCAF.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\1665.exe

"C:\Users\Admin\AppData\Local\Temp\1665.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

"C:\Users\Admin\AppData\Local\Temp\3BF2.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\4190.exe

"C:\Users\Admin\AppData\Local\Temp\4190.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:N"

C:\Users\Admin\AppData\Local\Temp\4971.exe

"C:\Users\Admin\AppData\Local\Temp\4971.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\e2c3ae05-d788-4490-8d22-5e7d5055badc\build2.exe

"C:\Users\Admin\AppData\Local\e2c3ae05-d788-4490-8d22-5e7d5055badc\build2.exe"

C:\Users\Admin\AppData\Local\e2c3ae05-d788-4490-8d22-5e7d5055badc\build2.exe

"C:\Users\Admin\AppData\Local\e2c3ae05-d788-4490-8d22-5e7d5055badc\build2.exe"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

"C:\Users\Admin\AppData\Local\Temp\FCAF.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

"C:\Users\Admin\AppData\Local\Temp\3BF2.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\4190.exe

"C:\Users\Admin\AppData\Local\Temp\4190.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\4971.exe

"C:\Users\Admin\AppData\Local\Temp\4971.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\49637ee0-34c1-4369-915e-208039d007fe\build2.exe

"C:\Users\Admin\AppData\Local\49637ee0-34c1-4369-915e-208039d007fe\build2.exe"

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 potunulit.org udp
US 188.114.97.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
UY 179.25.14.174:80 colisumy.com tcp
US 8.8.8.8:53 0.0.a.0.0.0.8.2.0.0.9.0.0.0.9.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 8.8.8.8:53 174.14.25.179.in-addr.arpa udp
NL 194.169.175.233:3003 194.169.175.233 tcp
UY 179.25.14.174:80 colisumy.com tcp
US 8.8.8.8:53 233.175.169.194.in-addr.arpa udp
MD 176.123.9.142:14845 tcp
US 8.8.8.8:53 admaiscont.com.br udp
US 142.4.24.122:443 admaiscont.com.br tcp
US 8.8.8.8:53 122.24.4.142.in-addr.arpa udp
MD 176.123.9.142:14845 tcp
RU 79.137.192.18:80 79.137.192.18 tcp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
US 8.8.8.8:53 18.192.137.79.in-addr.arpa udp
US 8.8.8.8:53 163.252.72.23.in-addr.arpa udp
US 8.8.8.8:53 101.15.18.104.in-addr.arpa udp
MD 176.123.9.142:14845 tcp
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 us.imgjeoigaa.com udp
HK 103.100.211.218:80 us.imgjeoigaa.com tcp
US 8.8.8.8:53 21.170.83.51.in-addr.arpa udp
US 8.8.8.8:53 101.14.18.104.in-addr.arpa udp
NL 194.169.175.233:3003 194.169.175.233 tcp
US 8.8.8.8:53 218.211.100.103.in-addr.arpa udp
MD 176.123.9.142:14845 tcp
RU 79.137.192.18:80 79.137.192.18 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
MD 176.123.9.142:14845 tcp
MD 176.123.9.142:14845 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MD 176.123.9.142:14845 tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
PL 51.83.170.21:19447 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MD 176.123.9.142:14845 tcp
MD 176.123.9.142:14845 tcp
MD 176.123.9.142:14845 tcp
MD 176.123.9.142:14845 tcp
US 8.8.8.8:53 zexeq.com udp
UY 179.25.14.174:80 colisumy.com tcp
US 8.8.8.8:53 greenbi.net udp
MO 60.246.84.247:80 zexeq.com tcp
PE 190.12.87.61:80 greenbi.net tcp
MO 60.246.84.247:80 zexeq.com tcp
US 8.8.8.8:53 247.84.246.60.in-addr.arpa udp
US 8.8.8.8:53 61.87.12.190.in-addr.arpa udp
PE 190.12.87.61:80 greenbi.net tcp
MO 45.64.21.244:80 45.64.21.244 tcp
US 8.8.8.8:53 244.21.64.45.in-addr.arpa udp
PE 190.12.87.61:80 greenbi.net tcp
US 8.8.8.8:53 t.me udp
MD 176.123.9.142:14845 tcp
NL 149.154.167.99:443 t.me tcp
PE 190.12.87.61:80 greenbi.net tcp
US 8.8.8.8:53 99.167.154.149.in-addr.arpa udp
PE 190.12.87.61:80 greenbi.net tcp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
PE 190.12.87.61:80 greenbi.net tcp
NL 162.0.217.254:443 api.2ip.ua tcp
PE 190.12.87.61:80 greenbi.net tcp
US 8.8.8.8:53 36.249.124.192.in-addr.arpa udp
UY 179.25.14.174:80 colisumy.com tcp
PE 190.12.87.61:80 greenbi.net tcp
DE 159.69.198.239:27015 159.69.198.239 tcp
MD 176.123.9.142:14845 tcp
PE 190.12.87.61:80 greenbi.net tcp
US 8.8.8.8:53 239.198.69.159.in-addr.arpa udp
PE 190.12.87.61:80 greenbi.net tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MO 60.246.84.247:80 zexeq.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MD 176.123.9.142:14845 tcp
MO 45.64.21.244:80 45.64.21.244 tcp
MD 176.123.9.142:14845 tcp
UY 179.25.14.174:80 colisumy.com tcp
MD 176.123.9.142:14845 tcp
UY 179.25.14.174:80 colisumy.com tcp
MD 176.123.9.142:14845 tcp
MD 176.123.9.142:14845 tcp

Files

memory/1632-117-0x00000000019C0000-0x00000000019D5000-memory.dmp

memory/1632-118-0x00000000019E0000-0x00000000019E9000-memory.dmp

memory/1632-119-0x0000000000400000-0x00000000018C5000-memory.dmp

memory/3228-120-0x0000000001470000-0x0000000001486000-memory.dmp

memory/1632-121-0x0000000000400000-0x00000000018C5000-memory.dmp

memory/1632-125-0x00000000019C0000-0x00000000019D5000-memory.dmp

memory/1632-124-0x00000000019E0000-0x00000000019E9000-memory.dmp

memory/3228-128-0x0000000001490000-0x00000000014A0000-memory.dmp

memory/3228-129-0x0000000001490000-0x00000000014A0000-memory.dmp

memory/3228-131-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-133-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-134-0x0000000003310000-0x0000000003320000-memory.dmp

memory/3228-136-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-137-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-139-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-141-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-140-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-143-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-146-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-145-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-148-0x0000000003330000-0x0000000003340000-memory.dmp

memory/3228-150-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-152-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-153-0x0000000003330000-0x0000000003340000-memory.dmp

memory/3228-155-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-157-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-159-0x0000000003310000-0x0000000003320000-memory.dmp

memory/3228-158-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-163-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-161-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-164-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-166-0x0000000003330000-0x0000000003340000-memory.dmp

memory/3228-168-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-169-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-170-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-174-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-172-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-171-0x00000000014E0000-0x00000000014F0000-memory.dmp

memory/3228-175-0x00000000014E0000-0x00000000014F0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

C:\Users\Admin\AppData\Local\Temp\FE85.exe

MD5 32b66cce104f208bcf782837e93260ee
SHA1 6ae84fd00374084bb5d9c22943bf5100de1df7e6
SHA256 0fa3a660aa9ec5ece4593041613c66a58ffb74aafd16d18beb04c131495e48dc
SHA512 3a783f5acceed03327b242d35f04c249760771013756f723362403a3944c6767d3e00242566954f70a584720acdfb91d8c6be8ad1ab7474dd17c861d1eca81ac

C:\Users\Admin\AppData\Local\Temp\FE85.exe

MD5 32b66cce104f208bcf782837e93260ee
SHA1 6ae84fd00374084bb5d9c22943bf5100de1df7e6
SHA256 0fa3a660aa9ec5ece4593041613c66a58ffb74aafd16d18beb04c131495e48dc
SHA512 3a783f5acceed03327b242d35f04c249760771013756f723362403a3944c6767d3e00242566954f70a584720acdfb91d8c6be8ad1ab7474dd17c861d1eca81ac

memory/1800-189-0x0000000002020000-0x0000000002050000-memory.dmp

memory/1800-188-0x0000000000400000-0x0000000000440000-memory.dmp

memory/1800-193-0x00000000730D0000-0x00000000737BE000-memory.dmp

memory/1800-194-0x0000000002340000-0x0000000002346000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\230.dll

MD5 26e1245dd1956f78db2f5df66797be05
SHA1 f348aa001f8e07d0827381f2fa25a70989290960
SHA256 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf
SHA512 cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee

\Users\Admin\AppData\Local\Temp\230.dll

MD5 26e1245dd1956f78db2f5df66797be05
SHA1 f348aa001f8e07d0827381f2fa25a70989290960
SHA256 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf
SHA512 cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee

C:\Users\Admin\AppData\Local\Temp\453.exe

MD5 95b5d704628cc3f5f08243004b573934
SHA1 05893e3fcf028894e3519dd402279554ebec5189
SHA256 e05618242af3612fcdbf617c7764a105fc9b44f849fb2e411593c746ae996482
SHA512 f252934fc25b94d50e0e39ed15740b12d6ecbeffe906d305621e0b583f0bb7f08fde6266d23d31db85ba05ba325e66e7e8b05ec3e462518ab714a4ee7b29b9a0

C:\Users\Admin\AppData\Local\Temp\453.exe

MD5 95b5d704628cc3f5f08243004b573934
SHA1 05893e3fcf028894e3519dd402279554ebec5189
SHA256 e05618242af3612fcdbf617c7764a105fc9b44f849fb2e411593c746ae996482
SHA512 f252934fc25b94d50e0e39ed15740b12d6ecbeffe906d305621e0b583f0bb7f08fde6266d23d31db85ba05ba325e66e7e8b05ec3e462518ab714a4ee7b29b9a0

memory/3112-202-0x0000000000400000-0x0000000000674000-memory.dmp

memory/3112-203-0x0000000003250000-0x0000000003256000-memory.dmp

memory/1800-205-0x0000000009E70000-0x000000000A476000-memory.dmp

memory/1800-206-0x000000000A490000-0x000000000A59A000-memory.dmp

memory/1800-207-0x000000000A5C0000-0x000000000A5D2000-memory.dmp

memory/1800-208-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

memory/1800-209-0x000000000A5E0000-0x000000000A61E000-memory.dmp

memory/1800-210-0x000000000A690000-0x000000000A6DB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1665.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

C:\Users\Admin\AppData\Local\Temp\1665.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

C:\Users\Admin\AppData\Local\Temp\21F0.exe

MD5 dd637ef7098a49cb61800e9efd85b1fc
SHA1 c290bc05fc441f1162bbc1030cde87b3dc38b9c9
SHA256 9014fe8d07e8429116fc6c8d0d55bc46773e0cd5d89271640b982eac91db19d9
SHA512 65969c48f98104ae5d15299665ef97da119b3451ea1fc89693b564273a610e419ff002036346a8aca4600d4f3f8eae564e110968209b0654b05d4435b30c9064

C:\Users\Admin\AppData\Local\Temp\21F0.exe

MD5 dd637ef7098a49cb61800e9efd85b1fc
SHA1 c290bc05fc441f1162bbc1030cde87b3dc38b9c9
SHA256 9014fe8d07e8429116fc6c8d0d55bc46773e0cd5d89271640b982eac91db19d9
SHA512 65969c48f98104ae5d15299665ef97da119b3451ea1fc89693b564273a610e419ff002036346a8aca4600d4f3f8eae564e110968209b0654b05d4435b30c9064

memory/1800-219-0x00000000730D0000-0x00000000737BE000-memory.dmp

memory/4316-220-0x0000000003560000-0x00000000035F1000-memory.dmp

memory/4316-221-0x0000000003700000-0x000000000381B000-memory.dmp

memory/2916-223-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2916-225-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

memory/2916-226-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1800-227-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

memory/2916-228-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1916-229-0x00000000019D0000-0x00000000019F9000-memory.dmp

memory/1916-230-0x0000000001A40000-0x0000000001A7F000-memory.dmp

memory/1916-233-0x0000000006120000-0x0000000006130000-memory.dmp

memory/1916-235-0x0000000006130000-0x000000000662E000-memory.dmp

memory/1916-234-0x0000000006120000-0x0000000006130000-memory.dmp

memory/1916-236-0x0000000006120000-0x0000000006130000-memory.dmp

memory/1916-237-0x0000000003910000-0x0000000003944000-memory.dmp

memory/1916-232-0x0000000000400000-0x00000000018D6000-memory.dmp

memory/1916-231-0x0000000003670000-0x00000000036A8000-memory.dmp

memory/1916-238-0x00000000730D0000-0x00000000737BE000-memory.dmp

memory/1916-241-0x0000000003990000-0x0000000003996000-memory.dmp

memory/5020-244-0x0000000000F30000-0x0000000000FEE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3673.exe

MD5 00f2d53d4e13ead70fb44c3a7c251675
SHA1 5933e3de281fb95625099ef9a788b3cddf48c96a
SHA256 6000f428bfd3149bfcab76cbfa53385e71d2c99539b78d2b5e671d4721d6c2c7
SHA512 9915af42f02ff5964de413a4c0ae94cb4ba29daf3d9219c1ad529d7240120652fd91677813e4a96966c32eaf8ecd2604aa92363ad0be4b7144de1cba1c59ec7a

C:\Users\Admin\AppData\Local\Temp\3673.exe

MD5 00f2d53d4e13ead70fb44c3a7c251675
SHA1 5933e3de281fb95625099ef9a788b3cddf48c96a
SHA256 6000f428bfd3149bfcab76cbfa53385e71d2c99539b78d2b5e671d4721d6c2c7
SHA512 9915af42f02ff5964de413a4c0ae94cb4ba29daf3d9219c1ad529d7240120652fd91677813e4a96966c32eaf8ecd2604aa92363ad0be4b7144de1cba1c59ec7a

memory/5020-247-0x00000000730D0000-0x00000000737BE000-memory.dmp

memory/1916-249-0x0000000006120000-0x0000000006130000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 9c41471456337de6ded08b8c1ea8902d
SHA1 2fac2ac9cc8f3ccc6ba1fb3ee85758d9b2ac8eba
SHA256 d4e3a6ec539bb0645ff32de20144d8af9c4e143cb592d9432bbf12ff846ee79b
SHA512 4284ba92f234000d6b78ac5bb6679d04670eec27001d165314adb30d82cb6c4bb6224fc3da777fc41f26b81664ebb2cff502cb55caf3465240a29d1fbf931efc

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 9c41471456337de6ded08b8c1ea8902d
SHA1 2fac2ac9cc8f3ccc6ba1fb3ee85758d9b2ac8eba
SHA256 d4e3a6ec539bb0645ff32de20144d8af9c4e143cb592d9432bbf12ff846ee79b
SHA512 4284ba92f234000d6b78ac5bb6679d04670eec27001d165314adb30d82cb6c4bb6224fc3da777fc41f26b81664ebb2cff502cb55caf3465240a29d1fbf931efc

C:\Users\Admin\AppData\Local\Temp\latestplayer.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/5020-270-0x00000000730D0000-0x00000000737BE000-memory.dmp

memory/1592-264-0x00007FF67E890000-0x00007FF67E8FA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\latestplayer.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\4190.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\4190.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\f0c83269-45d5-4366-b977-082ae598e668\FCAF.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

C:\Users\Admin\AppData\Local\Temp\4971.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\4971.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\4971.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/1916-288-0x0000000001A40000-0x0000000001A7F000-memory.dmp

memory/2916-287-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2716-291-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1665.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

C:\Users\Admin\AppData\Local\Temp\50E4.exe

MD5 95b5d704628cc3f5f08243004b573934
SHA1 05893e3fcf028894e3519dd402279554ebec5189
SHA256 e05618242af3612fcdbf617c7764a105fc9b44f849fb2e411593c746ae996482
SHA512 f252934fc25b94d50e0e39ed15740b12d6ecbeffe906d305621e0b583f0bb7f08fde6266d23d31db85ba05ba325e66e7e8b05ec3e462518ab714a4ee7b29b9a0

C:\Users\Admin\AppData\Local\Temp\50E4.exe

MD5 95b5d704628cc3f5f08243004b573934
SHA1 05893e3fcf028894e3519dd402279554ebec5189
SHA256 e05618242af3612fcdbf617c7764a105fc9b44f849fb2e411593c746ae996482
SHA512 f252934fc25b94d50e0e39ed15740b12d6ecbeffe906d305621e0b583f0bb7f08fde6266d23d31db85ba05ba325e66e7e8b05ec3e462518ab714a4ee7b29b9a0

memory/2716-294-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1916-299-0x0000000000400000-0x00000000018D6000-memory.dmp

memory/2716-300-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1916-301-0x0000000006120000-0x0000000006130000-memory.dmp

memory/1916-302-0x0000000006120000-0x0000000006130000-memory.dmp

memory/1916-305-0x0000000006120000-0x0000000006130000-memory.dmp

memory/1916-306-0x0000000006ED0000-0x0000000006F46000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 a8cfb50a0e434d61c5950c39939c75ab
SHA1 bed51ce8cf805476ca8763e14a8fb83224734587
SHA256 418a1bfd833d82ff4c82f9326971c97b57d048413b142dd3268e4192b09f4b67
SHA512 4b2dc5c0cf7e3557cd1f9c6e7898915f789c0c45a0573f4ef8775ad473411a0a1c383199a80f9c830f9dd37a65531212cea0cedb60964e4a75fd9dff92171b61

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 4d96163df04210828bb606fe89599962
SHA1 52e230bcab9d36854f60af6c995d319efc4df17b
SHA256 1678c1b1999e15169b092771126485a5e35a2d389717ad95a52f6e4f916bd09f
SHA512 8a0b3b8cc54a8f9685ec6d72868e885beaab074dd8d2606b5c35a6a69c21282ec5c3a5b450fbb2ae5981e74fe1523cde408023699e24d1555bd2a5e2cf852276

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 91d59ea2f3257a955e2255f336da59bb
SHA1 f138077c1e604bb60062004fa2a4fb0ebbc6be34
SHA256 d1a14d2fb21738523a59e22ded7d5d14eb4157be7de0791c53398c1c9e3b050a
SHA512 21ddc22a1831e84bf097de9a637a3e60a82e5f9270200856c26f5d40fe0a7e372a81877746a09ef33bbe7cd4e821fdd1689e5d42c16f824ff3e05dfc4cc22e73

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 f19d5752099d3609436798b023bef347
SHA1 3023112001d2436cb8e8e158773286c106f1669b
SHA256 ddb2d0c7a6a147871dd59d65f0dda22b4e7bd337f4e3a77511b7c252754c28f0
SHA512 a7049e9197428636b82350b3d6f91b1141499e0607ee5af7be7d713c62dc2b38423c7bddb59aa8c5672f43441457ee5cb0e0283d399868c6d9088ddd02416d10

memory/2716-322-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1665.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

memory/3228-328-0x00000000032C0000-0x00000000032D6000-memory.dmp

memory/4836-331-0x0000000000400000-0x00000000018C2000-memory.dmp

C:\Users\Admin\AppData\Local\f0c83269-45d5-4366-b977-082ae598e668\FCAF.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

memory/4876-338-0x0000000001940000-0x00000000019EE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/3008-340-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3008-342-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3008-343-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5016-347-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\4971.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/4108-351-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\4190.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/4108-353-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5016-349-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

memory/2916-355-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1665.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

memory/4912-362-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/3008-370-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\4190.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Roaming\gurjhev

MD5 dd637ef7098a49cb61800e9efd85b1fc
SHA1 c290bc05fc441f1162bbc1030cde87b3dc38b9c9
SHA256 9014fe8d07e8429116fc6c8d0d55bc46773e0cd5d89271640b982eac91db19d9
SHA512 65969c48f98104ae5d15299665ef97da119b3451ea1fc89693b564273a610e419ff002036346a8aca4600d4f3f8eae564e110968209b0654b05d4435b30c9064

C:\Users\Admin\AppData\Local\Temp\4971.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\e2c3ae05-d788-4490-8d22-5e7d5055badc\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\e2c3ae05-d788-4490-8d22-5e7d5055badc\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\e2c3ae05-d788-4490-8d22-5e7d5055badc\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\Temp\FCAF.exe

MD5 8cb6fb9c01029e0fe5e3c0aff674294e
SHA1 ef1f4bfecf9283a636500c04afdd0c7dc3c903db
SHA256 a0567dbd46b72b678620804b7bf94d38e4d5bd6c14108f53357543c1c2ef201e
SHA512 b759621d84a7dfb6c0c2df54f32263893ab1635982f1f8d6b9f6d2ee291296e58be3457115c6963a211df448881345b2a3a5b18575012847326f12836538fc53

C:\Users\Admin\AppData\Local\bowsakkdestx.txt

MD5 e3c640eced72a28f10eac99da233d9fd
SHA1 1d7678afc24a59de1da0bf74126baf3b8540b5b0
SHA256 87de9c0701eab8d410954dc4d3e7e6013ca6a0c8a514969418a12c21135f133e
SHA512 bcb94b7ba487784d343961b24107ea17a82f200961505927ef385caeb0684fbbe1a3482b7d0af7f3766b9ec2c4d6236341b50541cf7b1217acdc0a8b5b37e3d7

C:\SystemID\PersonalID.txt

MD5 324770a7653f940b6e66d90455f6e1a8
SHA1 5b9edb85029710a458f7a77f474721307d2fb738
SHA256 9dda9cd8e2b81a8d0d46e39f4495130246582b673b7ddddef4ebecfeeb6bbc30
SHA512 48ae3a8b8a45881285ff6117edd0ca42fe2b06b0d868b2d535f82a9c26157d3c434535d91b7a9f33cf3c627bc49e469bf997077edcfff6b83e4d7e30cf9dea23

C:\Users\Admin\AppData\Local\Temp\3BF2.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\4190.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\4971.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\49637ee0-34c1-4369-915e-208039d007fe\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\49637ee0-34c1-4369-915e-208039d007fe\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\49637ee0-34c1-4369-915e-208039d007fe\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040