Analysis Overview
SHA256
2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a
Threat Level: Known bad
The file 2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a was found to be: Known bad.
Malicious Activity Summary
Windows security bypass
SmokeLoader
Glupteba payload
Detect Fabookie payload
Detected Djvu ransomware
Fabookie
Glupteba
RedLine
Vidar
Djvu Ransomware
Suspicious use of NtCreateUserProcessOtherParentProcess
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Stops running service(s)
Reads user/profile data of web browsers
Deletes itself
Executes dropped EXE
Windows security modification
Modifies file permissions
Loads dropped DLL
Themida packer
Looks up external IP address via web service
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Drops file in System32 directory
Suspicious use of SetThreadContext
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in Program Files directory
Checks for VirtualBox DLLs, possible anti-VM trick
Launches sc.exe
Drops file in Windows directory
Unsigned PE
Enumerates physical storage devices
Delays execution with timeout.exe
Creates scheduled task(s)
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-08-14 03:51
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-14 03:51
Reported
2023-08-14 03:56
Platform
win7-20230712-en
Max time kernel
49s
Max time network
299s
Command Line
Signatures
Detect Fabookie payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Fabookie
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
RedLine
SmokeLoader
Vidar
Downloads MZ/PE file
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\EB97.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ED8B.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\F78B.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\919.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\EB97.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\301A.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\EB97.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3064 set thread context of 2272 | N/A | C:\Users\Admin\AppData\Local\Temp\EB97.exe | C:\Users\Admin\AppData\Local\Temp\EB97.exe |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\ED8B.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe
"C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe"
C:\Users\Admin\AppData\Local\Temp\EB97.exe
C:\Users\Admin\AppData\Local\Temp\EB97.exe
C:\Users\Admin\AppData\Local\Temp\ED8B.exe
C:\Users\Admin\AppData\Local\Temp\ED8B.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\F21E.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\F21E.dll
C:\Users\Admin\AppData\Local\Temp\F78B.exe
C:\Users\Admin\AppData\Local\Temp\F78B.exe
C:\Users\Admin\AppData\Local\Temp\919.exe
C:\Users\Admin\AppData\Local\Temp\919.exe
C:\Users\Admin\AppData\Local\Temp\EB97.exe
C:\Users\Admin\AppData\Local\Temp\EB97.exe
C:\Users\Admin\AppData\Local\Temp\301A.exe
C:\Users\Admin\AppData\Local\Temp\301A.exe
C:\Users\Admin\AppData\Local\Temp\3614.exe
C:\Users\Admin\AppData\Local\Temp\3614.exe
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Users\Admin\AppData\Local\Temp\4735.exe
C:\Users\Admin\AppData\Local\Temp\4735.exe
C:\Users\Admin\AppData\Local\Temp\919.exe
C:\Users\Admin\AppData\Local\Temp\919.exe
C:\Users\Admin\AppData\Local\Temp\610C.exe
C:\Users\Admin\AppData\Local\Temp\610C.exe
C:\Users\Admin\AppData\Local\Temp\7D15.exe
C:\Users\Admin\AppData\Local\Temp\7D15.exe
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\6b381365-369f-49df-ba72-9e35fdd1b471" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\610C.exe
C:\Users\Admin\AppData\Local\Temp\610C.exe
C:\Users\Admin\AppData\Local\Temp\3614.exe
C:\Users\Admin\AppData\Local\Temp\3614.exe
C:\Users\Admin\AppData\Local\Temp\919.exe
"C:\Users\Admin\AppData\Local\Temp\919.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\EB97.exe
"C:\Users\Admin\AppData\Local\Temp\EB97.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\4735.exe
C:\Users\Admin\AppData\Local\Temp\4735.exe
C:\Users\Admin\AppData\Local\Temp\EB97.exe
"C:\Users\Admin\AppData\Local\Temp\EB97.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\610C.exe
"C:\Users\Admin\AppData\Local\Temp\610C.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\4735.exe
"C:\Users\Admin\AppData\Local\Temp\4735.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build3.exe
"C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build3.exe"
C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build2.exe
"C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build2.exe"
C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build2.exe
"C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build2.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\Temp\4735.exe
"C:\Users\Admin\AppData\Local\Temp\4735.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\919.exe
"C:\Users\Admin\AppData\Local\Temp\919.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\system32\wbem\WMIADAP.EXE
wmiadap.exe /D /T
C:\Users\Admin\AppData\Local\Temp\610C.exe
"C:\Users\Admin\AppData\Local\Temp\610C.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\system32\taskeng.exe
taskeng.exe {55CA398E-5107-4F83-8D9B-ABF47A24D029} S-1-5-21-4159544280-4273523227-683900707-1000:UMAXQRGK\Admin:Interactive:[1]
C:\Users\Admin\AppData\Local\80061831-4ef6-4ac4-932b-52c7797d69be\build3.exe
"C:\Users\Admin\AppData\Local\80061831-4ef6-4ac4-932b-52c7797d69be\build3.exe"
C:\Users\Admin\AppData\Local\80061831-4ef6-4ac4-932b-52c7797d69be\build2.exe
"C:\Users\Admin\AppData\Local\80061831-4ef6-4ac4-932b-52c7797d69be\build2.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\80061831-4ef6-4ac4-932b-52c7797d69be\build2.exe
"C:\Users\Admin\AppData\Local\80061831-4ef6-4ac4-932b-52c7797d69be\build2.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\system32\makecab.exe
"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20230814035636.log C:\Windows\Logs\CBS\CbsPersist_20230814035636.cab
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.97.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| KW | 37.34.248.24:80 | colisumy.com | tcp |
| NL | 194.169.175.233:3003 | 194.169.175.233 | tcp |
| MD | 176.123.9.142:14845 | tcp | |
| KW | 37.34.248.24:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | admaiscont.com.br | udp |
| US | 142.4.24.122:443 | admaiscont.com.br | tcp |
| US | 142.4.24.122:443 | admaiscont.com.br | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| PL | 51.83.170.21:19447 | tcp | |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | us.imgjeoigaa.com | udp |
| HK | 103.100.211.218:80 | us.imgjeoigaa.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 194.169.175.233:3003 | 194.169.175.233 | tcp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| KW | 37.34.248.24:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| UZ | 195.158.3.162:80 | zexeq.com | tcp |
| UZ | 195.158.3.162:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | host-file-host6.com | udp |
| US | 8.8.8.8:53 | host-host-file8.com | udp |
| DE | 91.103.253.23:80 | host-host-file8.com | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| JP | 23.207.106.113:443 | steamcommunity.com | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| PA | 190.219.109.29:80 | colisumy.com | tcp |
| UZ | 195.158.3.162:80 | zexeq.com | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| JP | 23.207.106.113:443 | steamcommunity.com | tcp |
Files
memory/1688-54-0x0000000000220000-0x0000000000235000-memory.dmp
memory/1688-55-0x00000000002C0000-0x00000000002C9000-memory.dmp
memory/1688-56-0x0000000000400000-0x00000000018BC000-memory.dmp
memory/1316-57-0x0000000002960000-0x0000000002976000-memory.dmp
memory/1688-58-0x0000000000400000-0x00000000018BC000-memory.dmp
memory/1688-62-0x0000000000220000-0x0000000000235000-memory.dmp
memory/1688-61-0x00000000002C0000-0x00000000002C9000-memory.dmp
memory/1316-64-0x000007FF6DA20000-0x000007FF6DA2A000-memory.dmp
memory/1316-63-0x000007FEF6360000-0x000007FEF64A3000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\ED8B.exe
| MD5 | 7e00f4836c516917a5861eda86a3d75c |
| SHA1 | e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3 |
| SHA256 | 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94 |
| SHA512 | 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad |
C:\Users\Admin\AppData\Local\Temp\ED8B.exe
| MD5 | 7e00f4836c516917a5861eda86a3d75c |
| SHA1 | e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3 |
| SHA256 | 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94 |
| SHA512 | 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad |
memory/1316-83-0x000007FEF6360000-0x000007FEF64A3000-memory.dmp
memory/1316-85-0x000007FF6DA20000-0x000007FF6DA2A000-memory.dmp
memory/3056-87-0x0000000000400000-0x0000000000440000-memory.dmp
memory/3056-82-0x0000000000260000-0x0000000000290000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F21E.dll
| MD5 | 26e1245dd1956f78db2f5df66797be05 |
| SHA1 | f348aa001f8e07d0827381f2fa25a70989290960 |
| SHA256 | 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf |
| SHA512 | cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee |
C:\Users\Admin\AppData\Local\Temp\ED8B.exe
| MD5 | 7e00f4836c516917a5861eda86a3d75c |
| SHA1 | e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3 |
| SHA256 | 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94 |
| SHA512 | 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad |
\Users\Admin\AppData\Local\Temp\F21E.dll
| MD5 | 26e1245dd1956f78db2f5df66797be05 |
| SHA1 | f348aa001f8e07d0827381f2fa25a70989290960 |
| SHA256 | 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf |
| SHA512 | cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee |
memory/2100-93-0x0000000001DF0000-0x0000000002064000-memory.dmp
memory/3056-95-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/3056-94-0x0000000000590000-0x0000000000596000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F78B.exe
| MD5 | 822e9fe136e8ca72f0ac30945b7fd6a4 |
| SHA1 | e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe |
| SHA256 | e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890 |
| SHA512 | 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363 |
memory/2100-97-0x00000000001C0000-0x00000000001C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F78B.exe
| MD5 | 822e9fe136e8ca72f0ac30945b7fd6a4 |
| SHA1 | e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe |
| SHA256 | e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890 |
| SHA512 | 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363 |
memory/2100-96-0x0000000001DF0000-0x0000000002064000-memory.dmp
memory/3056-105-0x0000000004750000-0x0000000004790000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\919.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/2272-115-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/3064-117-0x0000000001940000-0x0000000001A5B000-memory.dmp
memory/3064-114-0x0000000000220000-0x00000000002B1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/2272-118-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/2272-121-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3056-122-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/2272-123-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2708-124-0x0000000003010000-0x0000000003039000-memory.dmp
memory/2708-125-0x0000000003040000-0x000000000307F000-memory.dmp
memory/2708-126-0x0000000003510000-0x0000000003548000-memory.dmp
memory/2708-127-0x0000000000400000-0x00000000018D4000-memory.dmp
memory/2708-128-0x0000000003330000-0x0000000003364000-memory.dmp
memory/2708-131-0x0000000003770000-0x0000000003776000-memory.dmp
memory/2708-130-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/2708-132-0x0000000005D00000-0x0000000005D40000-memory.dmp
memory/2708-133-0x0000000005D00000-0x0000000005D40000-memory.dmp
memory/3056-135-0x0000000004750000-0x0000000004790000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\301A.exe
| MD5 | 436228b6ce496d3e4a36911f0b0ec465 |
| SHA1 | 84627f74d472f066d4566ae894c887aa8b983060 |
| SHA256 | b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088 |
| SHA512 | 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be |
C:\Users\Admin\AppData\Local\Temp\301A.exe
| MD5 | 436228b6ce496d3e4a36911f0b0ec465 |
| SHA1 | 84627f74d472f066d4566ae894c887aa8b983060 |
| SHA256 | b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088 |
| SHA512 | 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be |
memory/2232-142-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/2232-141-0x0000000000DD0000-0x00000000012EA000-memory.dmp
memory/2100-144-0x00000000023D0000-0x00000000024C5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | b55630359c256735525cd5b616a3dd9f |
| SHA1 | 48536f5de41efa281a134ae09f10736c5693e68c |
| SHA256 | 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139 |
| SHA512 | d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419 |
\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | b55630359c256735525cd5b616a3dd9f |
| SHA1 | 48536f5de41efa281a134ae09f10736c5693e68c |
| SHA256 | 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139 |
| SHA512 | d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419 |
\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | b55630359c256735525cd5b616a3dd9f |
| SHA1 | 48536f5de41efa281a134ae09f10736c5693e68c |
| SHA256 | 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139 |
| SHA512 | d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419 |
memory/2100-158-0x00000000024D0000-0x00000000025AE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3614.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | b55630359c256735525cd5b616a3dd9f |
| SHA1 | 48536f5de41efa281a134ae09f10736c5693e68c |
| SHA256 | 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139 |
| SHA512 | d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419 |
memory/2100-163-0x00000000024D0000-0x00000000025AE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3614.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/1700-172-0x00000000FF8D0000-0x00000000FF929000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
memory/2100-179-0x00000000024D0000-0x00000000025AE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
memory/2708-183-0x0000000005D00000-0x0000000005D40000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | a7a71dc78290d758ecb02169df7c53d0 |
| SHA1 | 7247434273fe49611b4c2986994f9486cac0234c |
| SHA256 | 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779 |
| SHA512 | d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d |
memory/2232-192-0x0000000074D20000-0x000000007540E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | a7a71dc78290d758ecb02169df7c53d0 |
| SHA1 | 7247434273fe49611b4c2986994f9486cac0234c |
| SHA256 | 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779 |
| SHA512 | d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d |
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | a7a71dc78290d758ecb02169df7c53d0 |
| SHA1 | 7247434273fe49611b4c2986994f9486cac0234c |
| SHA256 | 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779 |
| SHA512 | d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d |
\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | a7a71dc78290d758ecb02169df7c53d0 |
| SHA1 | 7247434273fe49611b4c2986994f9486cac0234c |
| SHA256 | 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779 |
| SHA512 | d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d |
memory/2708-184-0x0000000074D20000-0x000000007540E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4735.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/2708-200-0x0000000005D00000-0x0000000005D40000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\919.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
\Users\Admin\AppData\Local\Temp\919.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/2708-203-0x0000000005D00000-0x0000000005D40000-memory.dmp
memory/2708-205-0x0000000005D00000-0x0000000005D40000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\919.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/1836-212-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\610C.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\Cab628C.tmp
| MD5 | 3ac860860707baaf32469fa7cc7c0192 |
| SHA1 | c33c2acdaba0e6fa41fd2f00f186804722477639 |
| SHA256 | d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904 |
| SHA512 | d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c |
memory/1700-231-0x0000000002E00000-0x0000000002F31000-memory.dmp
memory/1700-230-0x0000000002BD0000-0x0000000002D41000-memory.dmp
memory/1268-235-0x0000000003660000-0x0000000003A58000-memory.dmp
memory/1268-236-0x0000000003A60000-0x000000000434B000-memory.dmp
memory/1268-237-0x0000000000400000-0x0000000001CA5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\7D15.exe
| MD5 | 822e9fe136e8ca72f0ac30945b7fd6a4 |
| SHA1 | e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe |
| SHA256 | e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890 |
| SHA512 | 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363 |
C:\Users\Admin\AppData\Local\Temp\Tar8C1E.tmp
| MD5 | 4ff65ad929cd9a367680e0e5b1c08166 |
| SHA1 | c0af0d4396bd1f15c45f39d3b849ba444233b3a2 |
| SHA256 | c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6 |
| SHA512 | f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 979482ca9ef939d4a62f58866cbfeda6 |
| SHA1 | b0fcfbc8c9bf35a6c68d777e08a78b482127d34c |
| SHA256 | 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35 |
| SHA512 | 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 5ee37654d054276249f26a46bbb3ff08 |
| SHA1 | c5fd9ba478c11567f1ef7793b9ecc45c397b5459 |
| SHA256 | 2d72d7054bccf3cfe8832af4593ad73f4b77a116fdaadf79b3b2c8e443e61f71 |
| SHA512 | 5b355e975ffa0de814eba573c8ee035cec4e62fc67adc5bfc4892c8fa7716441e268e62354a5b9b80beaa7ad5aaa1828049b49483697381172fe80393e4b4c74 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 38fe20464f4566665a3e93bc25958d45 |
| SHA1 | f1da804263c20548ab1520bb7f728cba31aa1af9 |
| SHA256 | aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a |
| SHA512 | c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | c993da66c51017e41602541fc93778be |
| SHA1 | ccf827951a4056d22dd085a577419a12cba88e0b |
| SHA256 | 493068a9b0e329363f997610e52687adc6eb330845b226f73587195757c0f162 |
| SHA512 | 93de1a19542323f5f81527cc64e9554ec4d618c1533ecad27ae3d03b6f6d02cbf33a7abde7d3761a6f5656d8fd316a2dc2b10e329d2a52cea337f0859243e6ee |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 81d5d7271793759140042b6c15a9af08 |
| SHA1 | 53265cfe889ef5eac82d8354d4158549052172e5 |
| SHA256 | 607e12f4e1acc86bf2bff808fb8fb6ad0ee9c3a7f9f7d138b26c7cdd80a7a012 |
| SHA512 | 3f58f54af48b7a51ad6aacc4ebfd75f83d60a2880ebba16e1e7d62ff620a76f205683bba8e612f2fe7b9278c0169a2d4e05370190b432a4558376f19d692099f |
memory/2520-278-0x0000000000220000-0x00000000002B1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\610C.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
\Users\Admin\AppData\Local\Temp\610C.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/2520-281-0x0000000003170000-0x000000000328B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3614.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/2840-291-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\610C.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/2840-296-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1700-295-0x0000000002E00000-0x0000000002F31000-memory.dmp
memory/1268-283-0x0000000000400000-0x0000000001CA5000-memory.dmp
memory/2840-288-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\Temp\3614.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
\Users\Admin\AppData\Local\Temp\919.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
\Users\Admin\AppData\Local\Temp\919.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\919.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/1836-299-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\6b381365-369f-49df-ba72-9e35fdd1b471\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
C:\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/676-315-0x00000000002B0000-0x00000000002C5000-memory.dmp
memory/676-316-0x0000000000220000-0x0000000000229000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/2272-306-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4735.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/1268-318-0x0000000000400000-0x0000000001CA5000-memory.dmp
\Users\Admin\AppData\Local\Temp\4735.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\4735.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/3056-330-0x0000000074D20000-0x000000007540E000-memory.dmp
memory/2596-313-0x0000000000400000-0x0000000000409000-memory.dmp
\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/1268-331-0x0000000000400000-0x0000000001CA5000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 979482ca9ef939d4a62f58866cbfeda6 |
| SHA1 | b0fcfbc8c9bf35a6c68d777e08a78b482127d34c |
| SHA256 | 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35 |
| SHA512 | 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b |
memory/2596-348-0x0000000000400000-0x0000000000409000-memory.dmp
\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\EB97.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 6e1d4a42793841d29efe56357b148016 |
| SHA1 | 6539dd79f0a86f34da05047ecb4f528f6bf1a546 |
| SHA256 | 9d44249a9ce89211cff46692c83abcb0ec24111a3abbce5435a89af090c55584 |
| SHA512 | 6a6bfde391f19af9897f6de782b4aa43bdc5c9f8ae2b5ed3eeb3afae0119538e1fa815a165d8e90ed4da3c88ed16670f082aac8901f637e02d50046b2b1111e6 |
memory/1020-371-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
| MD5 | a266bb7dcc38a562631361bbf61dd11b |
| SHA1 | 3b1efd3a66ea28b16697394703a72ca340a05bd5 |
| SHA256 | df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e |
| SHA512 | 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
| MD5 | 152e16fe6ca8407e069bcfc6c289998c |
| SHA1 | ed8d035dbb42e4fb1621d4eb46fffa3746c9e57f |
| SHA256 | 4d9530eca0a3f5dff6659758f45cbf639706524b0afc111bb763fedf08d8db41 |
| SHA512 | 1897d3673c1020f46c92e1ffdf1c91679187effcb22772578be98e3b466db92f7a0f73383537e61fc4048c0a9d648f7e5c22a942419566d5de53a2cde09005ff |
memory/1056-372-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1716-373-0x0000000005A90000-0x0000000005AC4000-memory.dmp
memory/2840-385-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\Temp\610C.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
| MD5 | 152e16fe6ca8407e069bcfc6c289998c |
| SHA1 | ed8d035dbb42e4fb1621d4eb46fffa3746c9e57f |
| SHA256 | 4d9530eca0a3f5dff6659758f45cbf639706524b0afc111bb763fedf08d8db41 |
| SHA512 | 1897d3673c1020f46c92e1ffdf1c91679187effcb22772578be98e3b466db92f7a0f73383537e61fc4048c0a9d648f7e5c22a942419566d5de53a2cde09005ff |
\Users\Admin\AppData\Local\Temp\610C.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\610C.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/1056-382-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4735.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
\Users\Admin\AppData\Local\Temp\4735.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
\Users\Admin\AppData\Local\Temp\4735.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/1716-394-0x0000000000400000-0x00000000018D4000-memory.dmp
C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
memory/1184-441-0x0000000000250000-0x00000000002C8000-memory.dmp
memory/1184-439-0x0000000002482000-0x00000000024C4000-memory.dmp
C:\Users\Admin\AppData\Local\7e107346-f18e-4780-89d5-6a7adffcabfa\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
Analysis: behavioral2
Detonation Overview
Submitted
2023-08-14 03:51
Reported
2023-08-14 03:56
Platform
win10-20230703-en
Max time kernel
191s
Max time network
305s
Command Line
Signatures
Detect Fabookie payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Fabookie
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
RedLine
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 4764 created 3236 | N/A | C:\Windows\Temp\setup.exe | C:\Windows\Explorer.EXE |
| PID 4764 created 3236 | N/A | C:\Windows\Temp\setup.exe | C:\Windows\Explorer.EXE |
| PID 4764 created 3236 | N/A | C:\Windows\Temp\setup.exe | C:\Windows\Explorer.EXE |
| PID 4764 created 3236 | N/A | C:\Windows\Temp\setup.exe | C:\Windows\Explorer.EXE |
| PID 4764 created 3236 | N/A | C:\Windows\Temp\setup.exe | C:\Windows\Explorer.EXE |
| PID 708 created 3236 | N/A | C:\Program Files\Google\Chrome\updater.exe | C:\Windows\Explorer.EXE |
| PID 708 created 3236 | N/A | C:\Program Files\Google\Chrome\updater.exe | C:\Windows\Explorer.EXE |
| PID 708 created 3236 | N/A | C:\Program Files\Google\Chrome\updater.exe | C:\Windows\Explorer.EXE |
| PID 708 created 3236 | N/A | C:\Program Files\Google\Chrome\updater.exe | C:\Windows\Explorer.EXE |
Windows security bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Downloads MZ/PE file
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\System32\drivers\etc\hosts | C:\Windows\Temp\setup.exe | N/A |
| File created | C:\Windows\System32\drivers\etc\hosts | C:\Program Files\Google\Chrome\updater.exe | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Stops running service(s)
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Themida packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\51b771ff-f804-4bf3-91ea-8a88aed1e793\\13E1.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\13E1.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Temp\setup.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\updater.exe | N/A |
Suspicious use of SetThreadContext
Checks for VirtualBox DLLs, possible anti-VM trick
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\VBoxMiniRdrDN | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files\Google\Chrome\updater.exe | C:\Windows\Temp\setup.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\rss | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| File created | C:\Windows\rss\csrss.exe | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
| N/A | N/A | C:\Windows\System32\sc.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SYSTEM | C:\Windows\system32\netsh.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4110.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\toolspub2.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\15A7.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1C9E.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\6C7B.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\sc.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe
"C:\Users\Admin\AppData\Local\Temp\2f0f60dbd1f37c1623a927965f7aed2917bfdcd81fb9af697e87afe47e55240a.exe"
C:\Users\Admin\AppData\Local\Temp\13E1.exe
C:\Users\Admin\AppData\Local\Temp\13E1.exe
C:\Users\Admin\AppData\Local\Temp\15A7.exe
C:\Users\Admin\AppData\Local\Temp\15A7.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\19A0.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\19A0.dll
C:\Users\Admin\AppData\Local\Temp\1C9E.exe
C:\Users\Admin\AppData\Local\Temp\1C9E.exe
C:\Users\Admin\AppData\Local\Temp\32E6.exe
C:\Users\Admin\AppData\Local\Temp\32E6.exe
C:\Users\Admin\AppData\Local\Temp\13E1.exe
C:\Users\Admin\AppData\Local\Temp\13E1.exe
C:\Users\Admin\AppData\Local\Temp\4110.exe
C:\Users\Admin\AppData\Local\Temp\4110.exe
C:\Users\Admin\AppData\Local\Temp\4E8E.exe
C:\Users\Admin\AppData\Local\Temp\4E8E.exe
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\51b771ff-f804-4bf3-91ea-8a88aed1e793" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
C:\Users\Admin\AppData\Local\Temp\53A0.exe
C:\Users\Admin\AppData\Local\Temp\53A0.exe
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Users\Admin\AppData\Local\Temp\5920.exe
C:\Users\Admin\AppData\Local\Temp\5920.exe
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
C:\Users\Admin\AppData\Local\Temp\6C7B.exe
C:\Users\Admin\AppData\Local\Temp\6C7B.exe
C:\Users\Admin\AppData\Local\Temp\32E6.exe
C:\Users\Admin\AppData\Local\Temp\32E6.exe
C:\Users\Admin\AppData\Local\Temp\32E6.exe
"C:\Users\Admin\AppData\Local\Temp\32E6.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\53A0.exe
C:\Users\Admin\AppData\Local\Temp\53A0.exe
C:\Users\Admin\AppData\Local\Temp\5920.exe
C:\Users\Admin\AppData\Local\Temp\5920.exe
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
C:\Users\Admin\AppData\Local\Temp\13E1.exe
"C:\Users\Admin\AppData\Local\Temp\13E1.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\53A0.exe
"C:\Users\Admin\AppData\Local\Temp\53A0.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\5920.exe
"C:\Users\Admin\AppData\Local\Temp\5920.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
"C:\Users\Admin\AppData\Local\Temp\5FF7.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\32E6.exe
"C:\Users\Admin\AppData\Local\Temp\32E6.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe
"C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe"
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build3.exe
"C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe
"C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe"
C:\Users\Admin\AppData\Local\Temp\13E1.exe
"C:\Users\Admin\AppData\Local\Temp\13E1.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\53A0.exe
"C:\Users\Admin\AppData\Local\Temp\53A0.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\5920.exe
"C:\Users\Admin\AppData\Local\Temp\5920.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
"C:\Users\Admin\AppData\Local\Temp\5FF7.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe
"C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe"
C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build2.exe
"C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build2.exe"
C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build2.exe
"C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build2.exe"
C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build2.exe
"C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build2.exe"
C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe
"C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe"
C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build3.exe
"C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build3.exe"
C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build3.exe
"C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build3.exe"
C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build3.exe
"C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build3.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\0606ee54-548d-4433-9b94-80347d83e7b1\build2.exe
"C:\Users\Admin\AppData\Local\0606ee54-548d-4433-9b94-80347d83e7b1\build2.exe"
C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build2.exe
"C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build2.exe"
C:\Users\Admin\AppData\Local\0606ee54-548d-4433-9b94-80347d83e7b1\build2.exe
"C:\Users\Admin\AppData\Local\0606ee54-548d-4433-9b94-80347d83e7b1\build2.exe"
C:\Users\Admin\AppData\Local\0606ee54-548d-4433-9b94-80347d83e7b1\build3.exe
"C:\Users\Admin\AppData\Local\0606ee54-548d-4433-9b94-80347d83e7b1\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Users\Admin\AppData\Local\Temp\mi.exe
"C:\Users\Admin\AppData\Local\Temp\mi.exe"
C:\Windows\Temp\setup.exe
"C:\Windows\Temp\setup.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\0606ee54-548d-4433-9b94-80347d83e7b1\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
C:\Windows\System32\sc.exe
sc stop UsoSvc
C:\Windows\System32\sc.exe
sc stop WaaSMedicSvc
C:\Windows\System32\sc.exe
sc stop wuauserv
C:\Windows\System32\sc.exe
sc stop bits
C:\Windows\System32\sc.exe
sc stop dosvc
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lwilj#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build2.exe" & exit
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
C:\Windows\System32\schtasks.exe
C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
C:\Program Files\Google\Chrome\updater.exe
"C:\Program Files\Google\Chrome\updater.exe"
C:\Windows\System32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
C:\Windows\System32\sc.exe
sc stop UsoSvc
C:\Windows\System32\sc.exe
sc stop WaaSMedicSvc
C:\Windows\System32\sc.exe
sc stop wuauserv
C:\Windows\System32\sc.exe
sc stop bits
C:\Windows\System32\sc.exe
sc stop dosvc
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lwilj#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-ac 0
C:\Windows\System32\powercfg.exe
powercfg /x -hibernate-timeout-dc 0
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-ac 0
C:\Windows\System32\powercfg.exe
powercfg /x -standby-timeout-dc 0
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\System32\conhost.exe
C:\Windows\System32\conhost.exe
C:\Windows\explorer.exe
C:\Windows\explorer.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\windefender.exe
"C:\Windows\windefender.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\SysWOW64\sc.exe
sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\windefender.exe
C:\Windows\windefender.exe
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn "csrss" /f
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn "ScheduledUpdate" /f
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.96.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| KR | 211.119.84.112:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 112.84.119.211.in-addr.arpa | udp |
| NL | 194.169.175.233:3003 | 194.169.175.233 | tcp |
| US | 8.8.8.8:53 | 233.175.169.194.in-addr.arpa | udp |
| KR | 211.119.84.112:80 | colisumy.com | tcp |
| MD | 176.123.9.142:14845 | tcp | |
| US | 8.8.8.8:53 | 142.9.123.176.in-addr.arpa | udp |
| US | 8.8.8.8:53 | admaiscont.com.br | udp |
| US | 142.4.24.122:443 | admaiscont.com.br | tcp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 122.24.4.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.217.0.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.131.255.8.in-addr.arpa | udp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | 18.192.137.79.in-addr.arpa | udp |
| PL | 51.83.170.21:19447 | tcp | |
| US | 8.8.8.8:53 | 101.15.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.170.83.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | us.imgjeoigaa.com | udp |
| HK | 103.100.211.218:80 | us.imgjeoigaa.com | tcp |
| US | 8.8.8.8:53 | 218.211.100.103.in-addr.arpa | udp |
| NL | 194.169.175.233:3003 | 194.169.175.233 | tcp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 108.26.221.154.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 233.141.123.20.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| PL | 51.83.170.21:19447 | tcp | |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| KR | 211.119.84.112:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| PE | 190.187.52.42:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | greenbi.net | udp |
| US | 8.8.8.8:53 | 42.52.187.190.in-addr.arpa | udp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| PE | 190.187.52.42:80 | zexeq.com | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| US | 8.8.8.8:53 | 124.49.236.222.in-addr.arpa | udp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| US | 8.8.8.8:53 | host-file-host6.com | udp |
| US | 8.8.8.8:53 | host-host-file8.com | udp |
| US | 8.8.8.8:53 | 99.167.154.149.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| DE | 91.103.253.23:80 | host-host-file8.com | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| US | 8.8.8.8:53 | 23.253.103.91.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| KR | 211.119.84.112:80 | colisumy.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| KR | 211.119.84.112:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 41.249.124.192.in-addr.arpa | udp |
| DE | 159.69.198.239:27015 | 159.69.198.239 | tcp |
| KR | 211.119.84.112:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 239.198.69.159.in-addr.arpa | udp |
| KR | 211.119.84.112:80 | colisumy.com | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| PE | 190.187.52.42:80 | zexeq.com | tcp |
| PE | 190.187.52.42:80 | zexeq.com | tcp |
| PE | 190.187.52.42:80 | zexeq.com | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| US | 8.8.8.8:53 | transfer.sh | udp |
| DE | 144.76.136.153:443 | transfer.sh | tcp |
| HU | 84.224.216.79:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | 90.16.208.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 153.136.76.144.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.216.224.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| DE | 159.69.198.239:27015 | 159.69.198.239 | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| KR | 222.236.49.124:80 | greenbi.net | tcp |
| DE | 159.69.198.239:27015 | 159.69.198.239 | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| DE | 159.69.198.239:27015 | 159.69.198.239 | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| DE | 159.69.198.239:27015 | 159.69.198.239 | tcp |
| US | 8.8.8.8:53 | 45e19d0f-98aa-4e51-9eb5-4cdfa3502f1c.uuid.zaoshang.ooo | udp |
| US | 8.8.8.8:53 | stratum-eu.rplant.xyz | udp |
| FR | 141.94.192.217:17056 | stratum-eu.rplant.xyz | tcp |
| US | 8.8.8.8:53 | 217.192.94.141.in-addr.arpa | udp |
| US | 8.8.8.8:53 | server7.zaoshang.ooo | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 8.8.8.8:53 | stun2.l.google.com | udp |
| US | 162.159.133.233:443 | cdn.discordapp.com | tcp |
| IN | 172.253.121.127:19302 | stun2.l.google.com | udp |
| BG | 185.82.216.49:443 | server7.zaoshang.ooo | tcp |
| US | 8.8.8.8:53 | 127.121.253.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mastertryprice.com | udp |
| US | 104.21.37.186:443 | mastertryprice.com | tcp |
| US | 8.8.8.8:53 | 233.133.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 49.216.82.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 186.37.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | stun1.l.google.com | udp |
| US | 142.251.125.127:19302 | stun1.l.google.com | udp |
| US | 8.8.8.8:53 | 127.125.251.142.in-addr.arpa | udp |
Files
memory/2832-117-0x00000000019D0000-0x00000000019E5000-memory.dmp
memory/2832-118-0x00000000019B0000-0x00000000019B9000-memory.dmp
memory/2832-119-0x0000000000400000-0x00000000018BC000-memory.dmp
memory/3236-120-0x0000000000DF0000-0x0000000000E06000-memory.dmp
memory/2832-121-0x0000000000400000-0x00000000018BC000-memory.dmp
memory/2832-124-0x00000000019B0000-0x00000000019B9000-memory.dmp
memory/2832-125-0x00000000019D0000-0x00000000019E5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\13E1.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\13E1.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\15A7.exe
| MD5 | 7e00f4836c516917a5861eda86a3d75c |
| SHA1 | e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3 |
| SHA256 | 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94 |
| SHA512 | 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad |
C:\Users\Admin\AppData\Local\Temp\15A7.exe
| MD5 | 7e00f4836c516917a5861eda86a3d75c |
| SHA1 | e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3 |
| SHA256 | 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94 |
| SHA512 | 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad |
memory/4660-138-0x0000000000400000-0x0000000000440000-memory.dmp
memory/4660-139-0x00000000005A0000-0x00000000005D0000-memory.dmp
memory/4660-143-0x0000000073230000-0x000000007391E000-memory.dmp
memory/4660-145-0x00000000022F0000-0x00000000022F6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\19A0.dll
| MD5 | 26e1245dd1956f78db2f5df66797be05 |
| SHA1 | f348aa001f8e07d0827381f2fa25a70989290960 |
| SHA256 | 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf |
| SHA512 | cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee |
memory/4352-149-0x0000000000F30000-0x00000000011A4000-memory.dmp
\Users\Admin\AppData\Local\Temp\19A0.dll
| MD5 | 26e1245dd1956f78db2f5df66797be05 |
| SHA1 | f348aa001f8e07d0827381f2fa25a70989290960 |
| SHA256 | 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf |
| SHA512 | cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee |
\Users\Admin\AppData\Local\Temp\19A0.dll
| MD5 | 26e1245dd1956f78db2f5df66797be05 |
| SHA1 | f348aa001f8e07d0827381f2fa25a70989290960 |
| SHA256 | 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf |
| SHA512 | cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee |
memory/4352-152-0x0000000000F30000-0x00000000011A4000-memory.dmp
memory/4352-155-0x0000000000EF0000-0x0000000000EF6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1C9E.exe
| MD5 | 822e9fe136e8ca72f0ac30945b7fd6a4 |
| SHA1 | e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe |
| SHA256 | e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890 |
| SHA512 | 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363 |
C:\Users\Admin\AppData\Local\Temp\1C9E.exe
| MD5 | 822e9fe136e8ca72f0ac30945b7fd6a4 |
| SHA1 | e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe |
| SHA256 | e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890 |
| SHA512 | 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363 |
memory/4660-157-0x0000000009E20000-0x000000000A426000-memory.dmp
memory/4660-158-0x000000000A490000-0x000000000A59A000-memory.dmp
memory/4660-159-0x000000000A5C0000-0x000000000A5D2000-memory.dmp
memory/4660-161-0x000000000A5E0000-0x000000000A61E000-memory.dmp
memory/4660-160-0x0000000004A90000-0x0000000004AA0000-memory.dmp
memory/4660-162-0x000000000A690000-0x000000000A6DB000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\32E6.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\32E6.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/4224-167-0x0000000003490000-0x0000000003521000-memory.dmp
memory/4224-168-0x0000000003660000-0x000000000377B000-memory.dmp
memory/3532-169-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3532-171-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\13E1.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/3532-172-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3532-173-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4660-174-0x000000000A7D0000-0x000000000A846000-memory.dmp
memory/4660-175-0x000000000A850000-0x000000000A8E2000-memory.dmp
memory/4660-176-0x000000000A8F0000-0x000000000ADEE000-memory.dmp
memory/4660-177-0x000000000AE30000-0x000000000AE96000-memory.dmp
memory/4660-178-0x0000000073230000-0x000000007391E000-memory.dmp
memory/1516-181-0x0000000001A50000-0x0000000001A8F000-memory.dmp
memory/1516-179-0x0000000001900000-0x0000000001929000-memory.dmp
memory/1516-183-0x0000000003810000-0x0000000003848000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4110.exe
| MD5 | 2d2f34b3e33d664fe7c1119c7b061d4e |
| SHA1 | 2327f28f544dab2823216604d2dfec8b3d58063e |
| SHA256 | 6a67635cead184cb106d64048055ecc558038c6a57c0147b826fdbd22c9bf03c |
| SHA512 | 10fe5e80b7c8c33102277ad6401a15d96e4a519552e5f4d0e68a1bcc47a83bb57b086f21cea8d31592fd4af5bda085d64c22eb528f2ad3cb8ef0ab303768a6fe |
memory/1516-187-0x0000000000400000-0x00000000018D4000-memory.dmp
memory/1516-186-0x00000000036D0000-0x0000000003704000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4110.exe
| MD5 | 2d2f34b3e33d664fe7c1119c7b061d4e |
| SHA1 | 2327f28f544dab2823216604d2dfec8b3d58063e |
| SHA256 | 6a67635cead184cb106d64048055ecc558038c6a57c0147b826fdbd22c9bf03c |
| SHA512 | 10fe5e80b7c8c33102277ad6401a15d96e4a519552e5f4d0e68a1bcc47a83bb57b086f21cea8d31592fd4af5bda085d64c22eb528f2ad3cb8ef0ab303768a6fe |
memory/1516-191-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
memory/1516-192-0x0000000003960000-0x0000000003966000-memory.dmp
memory/1516-194-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
memory/4660-195-0x0000000004A90000-0x0000000004AA0000-memory.dmp
memory/1516-196-0x0000000073230000-0x000000007391E000-memory.dmp
memory/1516-198-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
memory/1516-197-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4E8E.exe
| MD5 | 436228b6ce496d3e4a36911f0b0ec465 |
| SHA1 | 84627f74d472f066d4566ae894c887aa8b983060 |
| SHA256 | b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088 |
| SHA512 | 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be |
memory/1412-206-0x0000000000A90000-0x0000000000FAA000-memory.dmp
memory/1412-207-0x0000000073230000-0x000000007391E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4E8E.exe
| MD5 | 436228b6ce496d3e4a36911f0b0ec465 |
| SHA1 | 84627f74d472f066d4566ae894c887aa8b983060 |
| SHA256 | b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088 |
| SHA512 | 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be |
C:\Users\Admin\AppData\Local\51b771ff-f804-4bf3-91ea-8a88aed1e793\13E1.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | b55630359c256735525cd5b616a3dd9f |
| SHA1 | 48536f5de41efa281a134ae09f10736c5693e68c |
| SHA256 | 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139 |
| SHA512 | d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419 |
C:\Users\Admin\AppData\Local\Temp\aafg31.exe
| MD5 | b55630359c256735525cd5b616a3dd9f |
| SHA1 | 48536f5de41efa281a134ae09f10736c5693e68c |
| SHA256 | 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139 |
| SHA512 | d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419 |
C:\Users\Admin\AppData\Local\Temp\53A0.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\53A0.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/4876-220-0x00007FF7022F0000-0x00007FF702349000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
C:\Users\Admin\AppData\Local\Temp\5920.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/1412-237-0x0000000073230000-0x000000007391E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5920.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | a7a71dc78290d758ecb02169df7c53d0 |
| SHA1 | 7247434273fe49611b4c2986994f9486cac0234c |
| SHA256 | 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779 |
| SHA512 | d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | a7a71dc78290d758ecb02169df7c53d0 |
| SHA1 | 7247434273fe49611b4c2986994f9486cac0234c |
| SHA256 | 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779 |
| SHA512 | d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d |
memory/3532-238-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/4876-249-0x0000000002BA0000-0x0000000002D11000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\6C7B.exe
| MD5 | 822e9fe136e8ca72f0ac30945b7fd6a4 |
| SHA1 | e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe |
| SHA256 | e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890 |
| SHA512 | 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363 |
memory/4876-252-0x0000000002D20000-0x0000000002E51000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\6C7B.exe
| MD5 | 822e9fe136e8ca72f0ac30945b7fd6a4 |
| SHA1 | e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe |
| SHA256 | e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890 |
| SHA512 | 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363 |
memory/1516-255-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
memory/1516-256-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
memory/1516-257-0x0000000073230000-0x000000007391E000-memory.dmp
memory/1516-258-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
memory/1516-259-0x0000000003BC0000-0x0000000003BD0000-memory.dmp
memory/3756-262-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4660-263-0x000000000B550000-0x000000000B712000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\32E6.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/3756-264-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3756-266-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4660-265-0x000000000B720000-0x000000000BC4C000-memory.dmp
memory/4660-267-0x000000000C900000-0x000000000C950000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 38fe20464f4566665a3e93bc25958d45 |
| SHA1 | f1da804263c20548ab1520bb7f728cba31aa1af9 |
| SHA256 | aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a |
| SHA512 | c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 3a6eb007352108617ac93d9837dad229 |
| SHA1 | edfc881674e1935c6943f88fe4f42927dc2283b5 |
| SHA256 | 84ff97a51632c3cc9e6ea65f3e374ba293c817de4e1ef6c4ca1bbf922d58950f |
| SHA512 | 6b5351dd71c27cbea1727a46a5889f8a9b435ca64d8b1916e651f05c1db2c847193be5af86ce08a4d380c0d13f34822e121bb064e644d97d7505c171c48ebbda |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 979482ca9ef939d4a62f58866cbfeda6 |
| SHA1 | b0fcfbc8c9bf35a6c68d777e08a78b482127d34c |
| SHA256 | 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35 |
| SHA512 | 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 580e74382b2c31c20953ebb145f7011e |
| SHA1 | 9b51f667c3c970705521e1648db3fe1dda3924db |
| SHA256 | e21aa1ca8537fe614c77117a87c556888cb4e10b63b7e557fd0e8646146133dd |
| SHA512 | 7ca31851dcda590b96d18c9852779d83e40555361e2b3f3c1edfd4ce4cde62095665fc100e30d434ea30d3123d39a2505fd33f2e94d71995b27d23157864e9bf |
memory/3756-274-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4352-276-0x0000000000F30000-0x00000000011A4000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\32E6.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/4352-273-0x0000000004940000-0x0000000004A35000-memory.dmp
memory/4352-279-0x0000000004A40000-0x0000000004B1E000-memory.dmp
memory/4876-282-0x0000000002D20000-0x0000000002E51000-memory.dmp
memory/4352-283-0x0000000004A40000-0x0000000004B1E000-memory.dmp
C:\Users\Admin\AppData\Local\51b771ff-f804-4bf3-91ea-8a88aed1e793\13E1.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/5060-285-0x00000000018E0000-0x00000000018F5000-memory.dmp
memory/5060-286-0x0000000001950000-0x0000000001959000-memory.dmp
memory/5060-287-0x0000000000400000-0x00000000018C0000-memory.dmp
memory/4352-288-0x0000000004A40000-0x0000000004B1E000-memory.dmp
memory/3236-290-0x0000000000FE0000-0x0000000000FF6000-memory.dmp
memory/5060-294-0x0000000000400000-0x00000000018C0000-memory.dmp
memory/4660-297-0x0000000073230000-0x000000007391E000-memory.dmp
memory/4580-300-0x0000000000400000-0x0000000000409000-memory.dmp
memory/892-301-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
memory/1276-298-0x00000000019E0000-0x00000000019F5000-memory.dmp
memory/1276-305-0x00000000001F0000-0x00000000001F9000-memory.dmp
memory/892-308-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3776-307-0x0000000003710000-0x000000000382B000-memory.dmp
memory/4580-309-0x0000000000400000-0x0000000000409000-memory.dmp
memory/892-310-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3776-306-0x0000000003480000-0x0000000003511000-memory.dmp
memory/892-304-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\53A0.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\5920.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/2312-313-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2312-314-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2312-315-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4552-316-0x0000000003AD0000-0x0000000003EC8000-memory.dmp
memory/4552-317-0x0000000003ED0000-0x00000000047BB000-memory.dmp
memory/5108-320-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5108-321-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/3532-325-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\13E1.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
memory/4580-334-0x0000000000400000-0x0000000000409000-memory.dmp
memory/3236-331-0x0000000002E40000-0x0000000002E56000-memory.dmp
memory/4552-330-0x0000000000400000-0x0000000001CA5000-memory.dmp
memory/892-342-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\53A0.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
memory/4448-346-0x0000000000400000-0x00000000018D4000-memory.dmp
memory/2312-348-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5920.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\32E6.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Roaming\jwftdaw
| MD5 | 2d2f34b3e33d664fe7c1119c7b061d4e |
| SHA1 | 2327f28f544dab2823216604d2dfec8b3d58063e |
| SHA256 | 6a67635cead184cb106d64048055ecc558038c6a57c0147b826fdbd22c9bf03c |
| SHA512 | 10fe5e80b7c8c33102277ad6401a15d96e4a519552e5f4d0e68a1bcc47a83bb57b086f21cea8d31592fd4af5bda085d64c22eb528f2ad3cb8ef0ab303768a6fe |
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\b7d675f2-a60d-4392-b5e9-7970a404381a\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\Temp\13E1.exe
| MD5 | da1690d241c106ecfe2b533c9b953858 |
| SHA1 | 53bd880fe0510a11b7ec5db121836779b2cd5387 |
| SHA256 | 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73 |
| SHA512 | d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df |
C:\Users\Admin\AppData\Roaming\ujftdaw
| MD5 | 1560b93c7e8572d9269760119315b287 |
| SHA1 | 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7 |
| SHA256 | 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8 |
| SHA512 | 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5 |
C:\Users\Admin\AppData\Local\Temp\53A0.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\Temp\5920.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\bowsakkdestx.txt
| MD5 | e3c640eced72a28f10eac99da233d9fd |
| SHA1 | 1d7678afc24a59de1da0bf74126baf3b8540b5b0 |
| SHA256 | 87de9c0701eab8d410954dc4d3e7e6013ca6a0c8a514969418a12c21135f133e |
| SHA512 | bcb94b7ba487784d343961b24107ea17a82f200961505927ef385caeb0684fbbe1a3482b7d0af7f3766b9ec2c4d6236341b50541cf7b1217acdc0a8b5b37e3d7 |
C:\SystemID\PersonalID.txt
| MD5 | 324770a7653f940b6e66d90455f6e1a8 |
| SHA1 | 5b9edb85029710a458f7a77f474721307d2fb738 |
| SHA256 | 9dda9cd8e2b81a8d0d46e39f4495130246582b673b7ddddef4ebecfeeb6bbc30 |
| SHA512 | 48ae3a8b8a45881285ff6117edd0ca42fe2b06b0d868b2d535f82a9c26157d3c434535d91b7a9f33cf3c627bc49e469bf997077edcfff6b83e4d7e30cf9dea23 |
C:\Users\Admin\AppData\Local\Temp\5FF7.exe
| MD5 | 62331a18f8f46e012b0798c8a453be60 |
| SHA1 | af5cdd07437449b329848804e43ac4752c2ce127 |
| SHA256 | 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1 |
| SHA512 | 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605 |
C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\43e3ad7c-2e91-47e5-a2bc-46977ff6fd27\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\60e1b513-3e7d-4a35-8170-7df121e6448a\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\31bd7e37-ff5d-4e3e-b48d-4b6fdb2947d6\build2.exe
| MD5 | 5fff52c407b5b46c10416067dac16d62 |
| SHA1 | c2263843ea244e5bd6c403342efaadd0af1c5522 |
| SHA256 | f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0 |
| SHA512 | 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352 |
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_teixpsyq.0th.ps1
| MD5 | c4ca4238a0b923820dcc509a6f75849b |
| SHA1 | 356a192b7913b04c54574d18c28d46e6395428ab |
| SHA256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
| SHA512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
C:\ProgramData\78253539549435776423832951
| MD5 | c9ff7748d8fcef4cf84a5501e996a641 |
| SHA1 | 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9 |
| SHA256 | 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988 |
| SHA512 | d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73 |
C:\ProgramData\nss3.dll
| MD5 | 1cc453cdf74f31e4d913ff9c10acdde2 |
| SHA1 | 6e85eae544d6e965f15fa5c39700fa7202f3aafe |
| SHA256 | ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5 |
| SHA512 | dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571 |
C:\ProgramData\56545342750215942834447324
| MD5 | d367ddfda80fdcf578726bc3b0bc3e3c |
| SHA1 | 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671 |
| SHA256 | 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0 |
| SHA512 | 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77 |
C:\ProgramData\softokn3.dll
| MD5 | 4e52d739c324db8225bd9ab2695f262f |
| SHA1 | 71c3da43dc5a0d2a1941e874a6d015a071783889 |
| SHA256 | 74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a |
| SHA512 | 2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6 |
C:\ProgramData\freebl3.dll
| MD5 | 550686c0ee48c386dfcb40199bd076ac |
| SHA1 | ee5134da4d3efcb466081fb6197be5e12a5b22ab |
| SHA256 | edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa |
| SHA512 | 0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e |
C:\ProgramData\msvcp140.dll
| MD5 | 5ff1fca37c466d6723ec67be93b51442 |
| SHA1 | 34cc4e158092083b13d67d6d2bc9e57b798a303b |
| SHA256 | 5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062 |
| SHA512 | 4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546 |
C:\ProgramData\vcruntime140.dll
| MD5 | a37ee36b536409056a86f50e67777dd7 |
| SHA1 | 1cafa159292aa736fc595fc04e16325b27cd6750 |
| SHA256 | 8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825 |
| SHA512 | 3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356 |
C:\Program Files\Google\Chrome\updater.exe
| MD5 | bc202c47461acbe8bef80e143eb3a364 |
| SHA1 | 0ef433c2e54c4097f0ac3dc722fb9e4e7b7c2634 |
| SHA256 | df144eec828ac28a99d5d148493b3a4c8f36fce79ea7c41c08511ff69d6762bb |
| SHA512 | 3bec158714630e6d38867ddba74eda37e036fa2d31c3b3b83229ab593ee85e36c9964aebb31a847bb5b0e65932d8fcfe0860cb6b2a7a31c10204887daa018e08 |
C:\ProgramData\19503816185702618566049340
| MD5 | 02d2c46697e3714e49f46b680b9a6b83 |
| SHA1 | 84f98b56d49f01e9b6b76a4e21accf64fd319140 |
| SHA256 | 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9 |
| SHA512 | 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac |
C:\Windows\rss\csrss.exe
| MD5 | a7a71dc78290d758ecb02169df7c53d0 |
| SHA1 | 7247434273fe49611b4c2986994f9486cac0234c |
| SHA256 | 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779 |
| SHA512 | d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d |