Malware Analysis Report

2025-01-18 07:10

Sample ID 230814-efwgxsbc6z
Target 6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c
SHA256 6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c
Tags
djvu fabookie glupteba redline smokeloader logsdiller cloud (tg: @logsdillabot) lux3 up3 backdoor discovery dropper evasion infostealer loader persistence ransomware spyware stealer trojan pub1 rootkit
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c

Threat Level: Known bad

The file 6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c was found to be: Known bad.

Malicious Activity Summary

djvu fabookie glupteba redline smokeloader logsdiller cloud (tg: @logsdillabot) lux3 up3 backdoor discovery dropper evasion infostealer loader persistence ransomware spyware stealer trojan pub1 rootkit

Djvu Ransomware

Fabookie

Detected Djvu ransomware

Windows security bypass

RedLine

Glupteba

Glupteba payload

Detect Fabookie payload

SmokeLoader

Modifies boot configuration data using bcdedit

Possible attempt to disable PatchGuard

Modifies Windows Firewall

Downloads MZ/PE file

Modifies file permissions

Loads dropped DLL

Windows security modification

Deletes itself

Executes dropped EXE

Reads user/profile data of web browsers

Looks up external IP address via web service

Manipulates WinMonFS driver.

Adds Run key to start application

Accesses 2FA software files, possible credential harvesting

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Drops file in System32 directory

Drops file in Windows directory

Checks for VirtualBox DLLs, possible anti-VM trick

Launches sc.exe

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Modifies data under HKEY_USERS

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: MapViewOfSection

Delays execution with timeout.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-14 03:53

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-14 03:53

Reported

2023-08-14 03:58

Platform

win7-20230712-en

Max time kernel

51s

Max time network

297s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Fabookie

spyware stealer fabookie

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Downloads MZ/PE file

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Possible attempt to disable PatchGuard

evasion

Deletes itself

Description Indicator Process Target
N/A N/A N/A N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\6417028b-2a81-42eb-b245-33b5db6b2a0e\\F43E.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\F43E.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2708 set thread context of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 1428 set thread context of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\F43E.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\F43E.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\F43E.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\F632.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1244 wrote to memory of 2708 N/A N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 1244 wrote to memory of 2708 N/A N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 1244 wrote to memory of 2708 N/A N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 1244 wrote to memory of 2708 N/A N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 1244 wrote to memory of 2904 N/A N/A C:\Users\Admin\AppData\Local\Temp\F632.exe
PID 1244 wrote to memory of 2904 N/A N/A C:\Users\Admin\AppData\Local\Temp\F632.exe
PID 1244 wrote to memory of 2904 N/A N/A C:\Users\Admin\AppData\Local\Temp\F632.exe
PID 1244 wrote to memory of 2904 N/A N/A C:\Users\Admin\AppData\Local\Temp\F632.exe
PID 1244 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1244 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1244 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1244 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1244 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 2712 wrote to memory of 2752 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2752 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2752 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2752 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2752 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2752 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2752 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1244 wrote to memory of 2208 N/A N/A C:\Users\Admin\AppData\Local\Temp\FF58.exe
PID 1244 wrote to memory of 2208 N/A N/A C:\Users\Admin\AppData\Local\Temp\FF58.exe
PID 1244 wrote to memory of 2208 N/A N/A C:\Users\Admin\AppData\Local\Temp\FF58.exe
PID 1244 wrote to memory of 2208 N/A N/A C:\Users\Admin\AppData\Local\Temp\FF58.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 2708 wrote to memory of 336 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Users\Admin\AppData\Local\Temp\F43E.exe
PID 1244 wrote to memory of 1428 N/A N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1244 wrote to memory of 1428 N/A N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1244 wrote to memory of 1428 N/A N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1244 wrote to memory of 1428 N/A N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 1428 wrote to memory of 328 N/A C:\Users\Admin\AppData\Local\Temp\1FA5.exe C:\Users\Admin\AppData\Local\Temp\1FA5.exe
PID 336 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Windows\SysWOW64\icacls.exe
PID 336 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Windows\SysWOW64\icacls.exe
PID 336 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Windows\SysWOW64\icacls.exe
PID 336 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\F43E.exe C:\Windows\SysWOW64\icacls.exe
PID 1244 wrote to memory of 2984 N/A N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe
PID 1244 wrote to memory of 2984 N/A N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe
PID 1244 wrote to memory of 2984 N/A N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe
PID 1244 wrote to memory of 2984 N/A N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe
PID 2984 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe C:\Users\Admin\AppData\Local\Temp\aafg31.exe
PID 2984 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe C:\Users\Admin\AppData\Local\Temp\aafg31.exe
PID 2984 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe C:\Users\Admin\AppData\Local\Temp\aafg31.exe
PID 2984 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe C:\Users\Admin\AppData\Local\Temp\aafg31.exe
PID 2984 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
PID 2984 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\3B22.exe C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe

"C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe"

C:\Users\Admin\AppData\Local\Temp\F43E.exe

C:\Users\Admin\AppData\Local\Temp\F43E.exe

C:\Users\Admin\AppData\Local\Temp\F632.exe

C:\Users\Admin\AppData\Local\Temp\F632.exe

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\FBDE.dll

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\FBDE.dll

C:\Users\Admin\AppData\Local\Temp\FF58.exe

C:\Users\Admin\AppData\Local\Temp\FF58.exe

C:\Users\Admin\AppData\Local\Temp\F43E.exe

C:\Users\Admin\AppData\Local\Temp\F43E.exe

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\6417028b-2a81-42eb-b245-33b5db6b2a0e" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\3B22.exe

C:\Users\Admin\AppData\Local\Temp\3B22.exe

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\40ED.exe

C:\Users\Admin\AppData\Local\Temp\40ED.exe

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Local\Temp\F43E.exe

"C:\Users\Admin\AppData\Local\Temp\F43E.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\5577.exe

C:\Users\Admin\AppData\Local\Temp\5577.exe

C:\Users\Admin\AppData\Local\Temp\64E3.exe

C:\Users\Admin\AppData\Local\Temp\64E3.exe

C:\Users\Admin\AppData\Local\Temp\7A96.exe

C:\Users\Admin\AppData\Local\Temp\7A96.exe

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

"C:\Users\Admin\AppData\Local\Temp\1FA5.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\40ED.exe

C:\Users\Admin\AppData\Local\Temp\40ED.exe

C:\Users\Admin\AppData\Local\Temp\5577.exe

C:\Users\Admin\AppData\Local\Temp\5577.exe

C:\Users\Admin\AppData\Local\Temp\F43E.exe

"C:\Users\Admin\AppData\Local\Temp\F43E.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\64E3.exe

C:\Users\Admin\AppData\Local\Temp\64E3.exe

C:\Users\Admin\AppData\Local\Temp\40ED.exe

"C:\Users\Admin\AppData\Local\Temp\40ED.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

"C:\Users\Admin\AppData\Local\Temp\1FA5.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\40ED.exe

"C:\Users\Admin\AppData\Local\Temp\40ED.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\64E3.exe

"C:\Users\Admin\AppData\Local\Temp\64E3.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build2.exe

"C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build2.exe"

C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build2.exe

"C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build2.exe"

C:\Users\Admin\AppData\Local\d60d27cb-7f32-4d8c-9cde-7d3f8337c05c\build2.exe

"C:\Users\Admin\AppData\Local\d60d27cb-7f32-4d8c-9cde-7d3f8337c05c\build2.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\d60d27cb-7f32-4d8c-9cde-7d3f8337c05c\build3.exe

"C:\Users\Admin\AppData\Local\d60d27cb-7f32-4d8c-9cde-7d3f8337c05c\build3.exe"

C:\Users\Admin\AppData\Local\Temp\64E3.exe

"C:\Users\Admin\AppData\Local\Temp\64E3.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\d60d27cb-7f32-4d8c-9cde-7d3f8337c05c\build2.exe

"C:\Users\Admin\AppData\Local\d60d27cb-7f32-4d8c-9cde-7d3f8337c05c\build2.exe"

C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build3.exe

"C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build3.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\80268b0a-fee9-4886-9c8e-870cbb17de41\build2.exe

"C:\Users\Admin\AppData\Local\80268b0a-fee9-4886-9c8e-870cbb17de41\build2.exe"

C:\Users\Admin\AppData\Local\b04445d2-2247-460e-80e2-cd7afd863d26\build2.exe

"C:\Users\Admin\AppData\Local\b04445d2-2247-460e-80e2-cd7afd863d26\build2.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\b04445d2-2247-460e-80e2-cd7afd863d26\build3.exe

"C:\Users\Admin\AppData\Local\b04445d2-2247-460e-80e2-cd7afd863d26\build3.exe"

C:\Users\Admin\AppData\Local\80268b0a-fee9-4886-9c8e-870cbb17de41\build3.exe

"C:\Users\Admin\AppData\Local\80268b0a-fee9-4886-9c8e-870cbb17de41\build3.exe"

C:\Windows\system32\wbem\WMIADAP.EXE

wmiadap.exe /D /T

C:\Windows\system32\taskeng.exe

taskeng.exe {CF4E3024-2C75-4EB8-82E3-D1511956BC92} S-1-5-21-4219371764-2579186923-3390623117-1000:NVACMPYA\Admin:Interactive:[1]

C:\Users\Admin\AppData\Local\b04445d2-2247-460e-80e2-cd7afd863d26\build2.exe

"C:\Users\Admin\AppData\Local\b04445d2-2247-460e-80e2-cd7afd863d26\build2.exe"

C:\Users\Admin\AppData\Local\80268b0a-fee9-4886-9c8e-870cbb17de41\build2.exe

"C:\Users\Admin\AppData\Local\80268b0a-fee9-4886-9c8e-870cbb17de41\build2.exe"

C:\Windows\system32\makecab.exe

"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20230814035651.log C:\Windows\Logs\CBS\CbsPersist_20230814035651.cab

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\system32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\system32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -timeout 0

C:\Windows\system32\bcdedit.exe

C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}

C:\Windows\system32\bcdedit.exe

C:\Windows\Sysnative\bcdedit.exe /v

C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

C:\Windows\system32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 potunulit.org udp
US 188.114.97.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
PA 190.219.109.29:80 colisumy.com tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
MD 176.123.9.142:14845 tcp
PA 190.219.109.29:80 colisumy.com tcp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 admaiscont.com.br udp
US 142.4.24.122:443 admaiscont.com.br tcp
US 142.4.24.122:443 admaiscont.com.br tcp
RU 79.137.192.18:80 79.137.192.18 tcp
US 8.8.8.8:53 us.imgjeoigaa.com udp
HK 103.100.211.218:80 us.imgjeoigaa.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 host-file-host6.com udp
US 8.8.8.8:53 host-host-file8.com udp
DE 91.103.253.23:80 host-host-file8.com tcp
PA 190.219.109.29:80 colisumy.com tcp
US 8.8.8.8:53 zexeq.com udp
HU 84.224.216.79:80 zexeq.com tcp
PA 190.219.109.29:80 colisumy.com tcp
HU 84.224.216.79:80 zexeq.com tcp
US 8.8.8.8:53 t.me udp
HU 84.224.216.79:80 zexeq.com tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 steamcommunity.com udp
JP 23.207.106.113:443 steamcommunity.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
PA 190.219.109.29:80 colisumy.com tcp
PA 190.219.109.29:80 colisumy.com tcp
US 8.8.8.8:53 zexeq.com udp
US 8.8.8.8:53 zexeq.com udp
PE 190.187.52.42:80 zexeq.com tcp
IR 2.180.10.7:80 zexeq.com tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
JP 23.207.106.113:443 steamcommunity.com tcp
DE 37.27.11.1:80 37.27.11.1 tcp
US 8.8.8.8:53 2ed54821-1677-49f5-8585-eb24cf535690.uuid.zaoshang.ooo udp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 steamcommunity.com udp
JP 23.207.106.113:443 steamcommunity.com tcp
DE 37.27.11.1:80 37.27.11.1 tcp
US 8.8.8.8:53 msdl.microsoft.com udp
US 204.79.197.219:443 msdl.microsoft.com tcp
US 8.8.8.8:53 vsblobprodscussu5shard30.blob.core.windows.net udp
US 20.150.38.228:443 vsblobprodscussu5shard30.blob.core.windows.net tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
JP 23.207.106.113:443 steamcommunity.com tcp
DE 37.27.11.1:80 37.27.11.1 tcp
US 8.8.8.8:53 vsblobprodscussu5shard58.blob.core.windows.net udp
US 20.150.70.36:443 vsblobprodscussu5shard58.blob.core.windows.net tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 steamcommunity.com udp
JP 23.207.106.113:443 steamcommunity.com tcp
DE 37.27.11.1:80 37.27.11.1 tcp
US 8.8.8.8:53 server6.zaoshang.ooo udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 stun3.l.google.com udp
US 162.159.134.233:443 cdn.discordapp.com tcp
BG 185.82.216.49:443 server6.zaoshang.ooo tcp
SG 74.125.24.127:19302 stun3.l.google.com udp
US 8.8.8.8:53 mastertryprice.com udp
US 104.21.37.186:443 mastertryprice.com tcp

Files

memory/2628-53-0x0000000000220000-0x0000000000235000-memory.dmp

memory/2628-54-0x0000000000240000-0x0000000000249000-memory.dmp

memory/2628-55-0x0000000000400000-0x00000000018C0000-memory.dmp

memory/1244-56-0x0000000002A60000-0x0000000002A76000-memory.dmp

memory/2628-57-0x0000000000400000-0x00000000018C0000-memory.dmp

memory/2628-61-0x0000000000220000-0x0000000000235000-memory.dmp

memory/2628-60-0x0000000000240000-0x0000000000249000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\F632.exe

MD5 7e00f4836c516917a5861eda86a3d75c
SHA1 e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3
SHA256 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94
SHA512 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad

C:\Users\Admin\AppData\Local\Temp\F632.exe

MD5 7e00f4836c516917a5861eda86a3d75c
SHA1 e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3
SHA256 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94
SHA512 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad

memory/2904-77-0x0000000000230000-0x0000000000260000-memory.dmp

memory/2904-78-0x0000000000400000-0x0000000000440000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F632.exe

MD5 7e00f4836c516917a5861eda86a3d75c
SHA1 e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3
SHA256 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94
SHA512 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad

memory/2904-83-0x0000000074A40000-0x000000007512E000-memory.dmp

memory/2904-85-0x0000000000520000-0x0000000000526000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FBDE.dll

MD5 26e1245dd1956f78db2f5df66797be05
SHA1 f348aa001f8e07d0827381f2fa25a70989290960
SHA256 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf
SHA512 cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee

memory/2752-88-0x0000000001E10000-0x0000000002084000-memory.dmp

\Users\Admin\AppData\Local\Temp\FBDE.dll

MD5 26e1245dd1956f78db2f5df66797be05
SHA1 f348aa001f8e07d0827381f2fa25a70989290960
SHA256 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf
SHA512 cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee

memory/2904-91-0x00000000046C0000-0x0000000004700000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FF58.exe

MD5 822e9fe136e8ca72f0ac30945b7fd6a4
SHA1 e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe
SHA256 e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890
SHA512 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363

C:\Users\Admin\AppData\Local\Temp\FF58.exe

MD5 822e9fe136e8ca72f0ac30945b7fd6a4
SHA1 e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe
SHA256 e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890
SHA512 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363

memory/2752-97-0x0000000001E10000-0x0000000002084000-memory.dmp

memory/2752-96-0x00000000000D0000-0x00000000000D6000-memory.dmp

memory/2708-99-0x00000000030E0000-0x0000000003171000-memory.dmp

memory/2708-100-0x00000000031B0000-0x00000000032CB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/336-103-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/336-105-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/336-108-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2904-109-0x0000000074A40000-0x000000007512E000-memory.dmp

memory/336-110-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2208-112-0x0000000003280000-0x00000000032B8000-memory.dmp

memory/2904-111-0x00000000046C0000-0x0000000004700000-memory.dmp

memory/2208-113-0x0000000000220000-0x0000000000249000-memory.dmp

memory/2208-114-0x0000000000250000-0x000000000028F000-memory.dmp

memory/2208-115-0x0000000000400000-0x00000000018D4000-memory.dmp

memory/2208-116-0x0000000005D10000-0x0000000005D50000-memory.dmp

memory/2208-119-0x0000000005D10000-0x0000000005D50000-memory.dmp

memory/2208-118-0x0000000005D10000-0x0000000005D50000-memory.dmp

memory/2208-117-0x0000000074A40000-0x000000007512E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/2208-126-0x00000000034E0000-0x0000000003514000-memory.dmp

memory/2208-127-0x00000000031B0000-0x00000000031B6000-memory.dmp

memory/2208-135-0x0000000005D10000-0x0000000005D50000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab2AF9.tmp

MD5 3ac860860707baaf32469fa7cc7c0192
SHA1 c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256 d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512 d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\Tar395D.tmp

MD5 4ff65ad929cd9a367680e0e5b1c08166
SHA1 c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256 c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512 f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

memory/2208-173-0x0000000005D10000-0x0000000005D50000-memory.dmp

memory/2208-170-0x0000000005D10000-0x0000000005D50000-memory.dmp

memory/328-174-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2208-182-0x0000000074A40000-0x000000007512E000-memory.dmp

memory/2984-181-0x0000000000D90000-0x00000000012AA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3B22.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Temp\3B22.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

memory/2984-183-0x0000000074A40000-0x000000007512E000-memory.dmp

C:\Users\Admin\AppData\Local\6417028b-2a81-42eb-b245-33b5db6b2a0e\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

memory/2208-204-0x0000000005D10000-0x0000000005D50000-memory.dmp

\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

memory/816-210-0x00000000FF3A0000-0x00000000FF3F9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/2984-221-0x0000000074A40000-0x000000007512E000-memory.dmp

memory/336-222-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/2208-228-0x0000000005D10000-0x0000000005D50000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5577.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2752-235-0x00000000023F0000-0x00000000024E5000-memory.dmp

memory/2752-241-0x00000000024F0000-0x00000000025CE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\64E3.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2752-245-0x00000000024F0000-0x00000000025CE000-memory.dmp

memory/2752-246-0x0000000001E10000-0x0000000002084000-memory.dmp

memory/2752-247-0x00000000024F0000-0x00000000025CE000-memory.dmp

memory/816-256-0x0000000003080000-0x00000000031F1000-memory.dmp

memory/816-258-0x0000000002E90000-0x0000000002FC1000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 38fe20464f4566665a3e93bc25958d45
SHA1 f1da804263c20548ab1520bb7f728cba31aa1af9
SHA256 aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a
SHA512 c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 d5e02cad746070ac4996c06fcbaee489
SHA1 9201fc4fd12827825eeb5015e2a521cfcef57c9e
SHA256 01e504d96a413d0801bc7586f21cbe0cbf8af286640ca98e4045b5cacb9d9db5
SHA512 ac2cd64be798cc921c3945dabe0bb8f5e54bb091005d0c808e2b06ad56ac17734173609c082691b9e6abd49127073f1dcb9d7b32654227d303da717637977875

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 979482ca9ef939d4a62f58866cbfeda6
SHA1 b0fcfbc8c9bf35a6c68d777e08a78b482127d34c
SHA256 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35
SHA512 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 54083dbb9a12d22126a3a4207f834fe1
SHA1 22bef1bead0a67ae5a1058715ef1f9b30f679dd0
SHA256 5489e5544a9570cc3f05731ff1f1b96db5281da7e91a4a75ef914b7f1043fa2c
SHA512 1a659fedc0536cbfed7bc83f0ab250c66981291deabc9981442822be71fc30a43ec0ee7cd963fda6e296d657d4447e130c50b735cfe039e49cebdd7600db5fda

C:\Users\Admin\AppData\Local\Temp\7A96.exe

MD5 822e9fe136e8ca72f0ac30945b7fd6a4
SHA1 e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe
SHA256 e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890
SHA512 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9ad5e1ba738b019b37b6dc2a44ddca97
SHA1 6471690b2782162be8ebffaff7e668240b3cfb56
SHA256 2ffc8718565b35cd572db9eb4b4c81bb66abaff37ceb7a7796a9ed0c4c8c3e92
SHA512 fcc0be799d41100c90b3ba807a94c8d1178f391ce8eb2e6677970bf99fb9d26410178c3ce6ab9acfa76c8017cef3a3e3a1c1c7d26a55ecbc46e8aec0d45099c5

memory/328-273-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2904-275-0x0000000074A40000-0x000000007512E000-memory.dmp

\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/328-278-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/1900-281-0x0000000000230000-0x0000000000245000-memory.dmp

memory/1900-282-0x0000000000250000-0x0000000000259000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

memory/2940-287-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

memory/2940-290-0x0000000000400000-0x0000000000409000-memory.dmp

memory/816-291-0x0000000002E90000-0x0000000002FC1000-memory.dmp

memory/2576-292-0x0000000003650000-0x0000000003A48000-memory.dmp

memory/2576-293-0x0000000003A50000-0x000000000433B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2576-297-0x0000000000400000-0x0000000001CA5000-memory.dmp

memory/1244-299-0x0000000002A80000-0x0000000002A96000-memory.dmp

\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2940-303-0x0000000000400000-0x0000000000409000-memory.dmp

memory/1888-308-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2168-302-0x0000000000320000-0x00000000003B1000-memory.dmp

memory/1888-301-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2168-300-0x00000000032C0000-0x00000000033DB000-memory.dmp

memory/1888-310-0x0000000000400000-0x0000000000537000-memory.dmp

\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\5577.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

\Users\Admin\AppData\Local\Temp\5577.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\F43E.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\5577.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/368-327-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2628-336-0x0000000000400000-0x00000000018D4000-memory.dmp

memory/2628-337-0x0000000074A40000-0x000000007512E000-memory.dmp

memory/2628-340-0x0000000005CD0000-0x0000000005D10000-memory.dmp

memory/2628-339-0x0000000005CD0000-0x0000000005D10000-memory.dmp

memory/2576-343-0x0000000000400000-0x0000000001CA5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\64E3.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

\Users\Admin\AppData\Local\Temp\64E3.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2168-345-0x0000000000320000-0x00000000003B1000-memory.dmp

memory/1620-344-0x0000000000350000-0x00000000003E1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\64E3.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2456-355-0x0000000000400000-0x0000000000537000-memory.dmp

\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\1FA5.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/1888-361-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 54c550f5e247a21f09ed70a76eee7ef5
SHA1 f0ccbe4c63892426e56f9208b49b9ddb2d51b623
SHA256 f9887917b1eab74e8b80b40d7c68603a56cfb04ca7f728da53bcb3bb9567b69e
SHA512 38edd8b7b8c0984ffde63e803e47946eb0637fccd862faec1139f54541fad9a88c3e2768d9ef5af9b495b57806f1665e34fa81f0c6d64458d89bb5842fbc7161

memory/484-396-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1972-418-0x0000000000400000-0x0000000000537000-memory.dmp

memory/368-417-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

\Users\Admin\AppData\Local\Temp\40ED.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

\Users\Admin\AppData\Local\Temp\64E3.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2456-423-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\c665ad72-3fcd-4bd5-9b00-8ff0c530dd6c\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

memory/324-467-0x0000000002442000-0x0000000002484000-memory.dmp

C:\Users\Admin\AppData\Local\d60d27cb-7f32-4d8c-9cde-7d3f8337c05c\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

MD5 1afff8d5352aecef2ecd47ffa02d7f7d
SHA1 8b115b84efdb3a1b87f750d35822b2609e665bef
SHA256 c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512 e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

C:\ProgramData\81014047920224352298679970

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\41194523651128922608670159

MD5 d367ddfda80fdcf578726bc3b0bc3e3c
SHA1 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA256 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA512 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

MD5 fd2727132edd0b59fa33733daa11d9ef
SHA1 63e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA256 3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA512 3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

C:\Users\Admin\AppData\Local\Temp\osloader.exe

MD5 e2f68dc7fbd6e0bf031ca3809a739346
SHA1 9c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256 b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA512 26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

MD5 5da3a881ef991e8010deed799f1a5aaf
SHA1 fea1acea7ed96d7c9788783781e90a2ea48c1a53
SHA256 f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4
SHA512 24fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-14 03:53

Reported

2023-08-14 03:58

Platform

win10-20230703-en

Max time kernel

300s

Max time network

231s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Fabookie

spyware stealer fabookie

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Downloads MZ/PE file

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1345.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\14DC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1A6C.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3326.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1345.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\aafg31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\523A.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\596F.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\60A3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\523A.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\596F.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1345.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\523A.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\596F.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1345.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\523A.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\596F.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Accesses 2FA software files, possible credential harvesting

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\209c4d52-ca1a-48e2-85a3-6277c757a6f6\\1345.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\1345.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 376 set thread context of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 4356 set thread context of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 5032 set thread context of 1428 N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe C:\Users\Admin\AppData\Local\Temp\49BD.exe
PID 3408 set thread context of 4036 N/A C:\Users\Admin\AppData\Local\Temp\523A.exe C:\Users\Admin\AppData\Local\Temp\523A.exe
PID 2168 set thread context of 2324 N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
PID 5104 set thread context of 2960 N/A C:\Users\Admin\AppData\Local\Temp\596F.exe C:\Users\Admin\AppData\Local\Temp\596F.exe
PID 652 set thread context of 4256 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 2968 set thread context of 4872 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 4852 set thread context of 748 N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe C:\Users\Admin\AppData\Local\Temp\49BD.exe
PID 3668 set thread context of 32 N/A C:\Users\Admin\AppData\Local\Temp\523A.exe C:\Users\Admin\AppData\Local\Temp\523A.exe
PID 1308 set thread context of 4100 N/A C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe
PID 3784 set thread context of 2244 N/A C:\Users\Admin\AppData\Local\Temp\596F.exe C:\Users\Admin\AppData\Local\Temp\596F.exe
PID 1124 set thread context of 1616 N/A C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe
PID 2552 set thread context of 2784 N/A C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe
PID 2584 set thread context of 4968 N/A C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe
PID 5000 set thread context of 3388 N/A C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace C:\Windows\system32\netsh.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace C:\Windows\system32\netsh.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\14DC.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1A6C.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\60A3.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3228 wrote to memory of 376 N/A N/A C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 3228 wrote to memory of 376 N/A N/A C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 3228 wrote to memory of 376 N/A N/A C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 3228 wrote to memory of 4568 N/A N/A C:\Users\Admin\AppData\Local\Temp\14DC.exe
PID 3228 wrote to memory of 4568 N/A N/A C:\Users\Admin\AppData\Local\Temp\14DC.exe
PID 3228 wrote to memory of 4568 N/A N/A C:\Users\Admin\AppData\Local\Temp\14DC.exe
PID 3228 wrote to memory of 4492 N/A N/A C:\Windows\system32\regsvr32.exe
PID 3228 wrote to memory of 4492 N/A N/A C:\Windows\system32\regsvr32.exe
PID 4492 wrote to memory of 4412 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4492 wrote to memory of 4412 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4492 wrote to memory of 4412 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 3228 wrote to memory of 2220 N/A N/A C:\Users\Admin\AppData\Local\Temp\1A6C.exe
PID 3228 wrote to memory of 2220 N/A N/A C:\Users\Admin\AppData\Local\Temp\1A6C.exe
PID 3228 wrote to memory of 2220 N/A N/A C:\Users\Admin\AppData\Local\Temp\1A6C.exe
PID 3228 wrote to memory of 4356 N/A N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 3228 wrote to memory of 4356 N/A N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 3228 wrote to memory of 4356 N/A N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 3228 wrote to memory of 3776 N/A N/A C:\Users\Admin\AppData\Local\Temp\3326.exe
PID 3228 wrote to memory of 3776 N/A N/A C:\Users\Admin\AppData\Local\Temp\3326.exe
PID 3228 wrote to memory of 3776 N/A N/A C:\Users\Admin\AppData\Local\Temp\3326.exe
PID 3228 wrote to memory of 3204 N/A N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe
PID 3228 wrote to memory of 3204 N/A N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe
PID 3228 wrote to memory of 3204 N/A N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe
PID 3228 wrote to memory of 5032 N/A N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe
PID 3228 wrote to memory of 5032 N/A N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe
PID 3228 wrote to memory of 5032 N/A N/A C:\Users\Admin\AppData\Local\Temp\49BD.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 376 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Users\Admin\AppData\Local\Temp\1345.exe
PID 3204 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\aafg31.exe
PID 3204 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\aafg31.exe
PID 3228 wrote to memory of 3408 N/A N/A C:\Users\Admin\AppData\Local\Temp\523A.exe
PID 3228 wrote to memory of 3408 N/A N/A C:\Users\Admin\AppData\Local\Temp\523A.exe
PID 3228 wrote to memory of 3408 N/A N/A C:\Users\Admin\AppData\Local\Temp\523A.exe
PID 3204 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
PID 3204 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
PID 3204 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
PID 3228 wrote to memory of 5104 N/A N/A C:\Users\Admin\AppData\Local\Temp\596F.exe
PID 3228 wrote to memory of 5104 N/A N/A C:\Users\Admin\AppData\Local\Temp\596F.exe
PID 3228 wrote to memory of 5104 N/A N/A C:\Users\Admin\AppData\Local\Temp\596F.exe
PID 3204 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
PID 3204 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
PID 3204 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\41CD.exe C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
PID 3228 wrote to memory of 4252 N/A N/A C:\Users\Admin\AppData\Local\Temp\60A3.exe
PID 3228 wrote to memory of 4252 N/A N/A C:\Users\Admin\AppData\Local\Temp\60A3.exe
PID 3228 wrote to memory of 4252 N/A N/A C:\Users\Admin\AppData\Local\Temp\60A3.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 4356 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\27F9.exe C:\Users\Admin\AppData\Local\Temp\27F9.exe
PID 2356 wrote to memory of 204 N/A C:\Users\Admin\AppData\Local\Temp\1345.exe C:\Windows\SysWOW64\icacls.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe

"C:\Users\Admin\AppData\Local\Temp\6a5d13e17c88b926b526ce2b50dd0efe1b4eb988c1b4e236d9776d4f7f6d7f5c.exe"

C:\Users\Admin\AppData\Local\Temp\1345.exe

C:\Users\Admin\AppData\Local\Temp\1345.exe

C:\Users\Admin\AppData\Local\Temp\14DC.exe

C:\Users\Admin\AppData\Local\Temp\14DC.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\17CB.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\17CB.dll

C:\Users\Admin\AppData\Local\Temp\1A6C.exe

C:\Users\Admin\AppData\Local\Temp\1A6C.exe

C:\Users\Admin\AppData\Local\Temp\27F9.exe

C:\Users\Admin\AppData\Local\Temp\27F9.exe

C:\Users\Admin\AppData\Local\Temp\3326.exe

C:\Users\Admin\AppData\Local\Temp\3326.exe

C:\Users\Admin\AppData\Local\Temp\41CD.exe

C:\Users\Admin\AppData\Local\Temp\41CD.exe

C:\Users\Admin\AppData\Local\Temp\49BD.exe

C:\Users\Admin\AppData\Local\Temp\49BD.exe

C:\Users\Admin\AppData\Local\Temp\1345.exe

C:\Users\Admin\AppData\Local\Temp\1345.exe

C:\Users\Admin\AppData\Local\Temp\523A.exe

C:\Users\Admin\AppData\Local\Temp\523A.exe

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\596F.exe

C:\Users\Admin\AppData\Local\Temp\596F.exe

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Local\Temp\60A3.exe

C:\Users\Admin\AppData\Local\Temp\60A3.exe

C:\Users\Admin\AppData\Local\Temp\27F9.exe

C:\Users\Admin\AppData\Local\Temp\27F9.exe

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\209c4d52-ca1a-48e2-85a3-6277c757a6f6" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\27F9.exe

"C:\Users\Admin\AppData\Local\Temp\27F9.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\49BD.exe

C:\Users\Admin\AppData\Local\Temp\49BD.exe

C:\Users\Admin\AppData\Local\Temp\523A.exe

C:\Users\Admin\AppData\Local\Temp\523A.exe

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\596F.exe

C:\Users\Admin\AppData\Local\Temp\596F.exe

C:\Users\Admin\AppData\Local\Temp\49BD.exe

"C:\Users\Admin\AppData\Local\Temp\49BD.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\1345.exe

"C:\Users\Admin\AppData\Local\Temp\1345.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\523A.exe

"C:\Users\Admin\AppData\Local\Temp\523A.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\596F.exe

"C:\Users\Admin\AppData\Local\Temp\596F.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\27F9.exe

"C:\Users\Admin\AppData\Local\Temp\27F9.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\1345.exe

"C:\Users\Admin\AppData\Local\Temp\1345.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\49BD.exe

"C:\Users\Admin\AppData\Local\Temp\49BD.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\523A.exe

"C:\Users\Admin\AppData\Local\Temp\523A.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe

"C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe"

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build3.exe

"C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build3.exe"

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe

"C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\Temp\596F.exe

"C:\Users\Admin\AppData\Local\Temp\596F.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe

"C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe"

C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe

"C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe"

C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe

"C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe"

C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build3.exe

"C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build3.exe"

C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build3.exe

"C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build3.exe"

C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build3.exe

"C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build3.exe"

C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe

"C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build3.exe

"C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build3.exe"

C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe

"C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe"

C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe

"C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe"

C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe

"C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe"

C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe

"C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Windows\System32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\db9326d1-a94e-435f-b19e-e50323ce1ddb\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn "csrss" /f

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn "ScheduledUpdate" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 potunulit.org udp
US 188.114.96.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
KW 37.34.248.24:80 colisumy.com tcp
US 8.8.8.8:53 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 24.248.34.37.in-addr.arpa udp
US 8.8.8.8:53 0.96.114.188.in-addr.arpa udp
NL 194.169.175.233:3003 194.169.175.233 tcp
US 8.8.8.8:53 233.175.169.194.in-addr.arpa udp
KW 37.34.248.24:80 colisumy.com tcp
MD 176.123.9.142:14845 tcp
US 8.8.8.8:53 admaiscont.com.br udp
US 142.4.24.122:443 admaiscont.com.br tcp
US 8.8.8.8:53 142.9.123.176.in-addr.arpa udp
US 8.8.8.8:53 122.24.4.142.in-addr.arpa udp
RU 79.137.192.18:80 79.137.192.18 tcp
US 8.8.8.8:53 18.192.137.79.in-addr.arpa udp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
US 8.8.8.8:53 us.imgjeoigaa.com udp
HK 103.100.211.218:80 us.imgjeoigaa.com tcp
US 8.8.8.8:53 218.211.100.103.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 21.170.83.51.in-addr.arpa udp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 101.15.18.104.in-addr.arpa udp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 45.8.109.52.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
PL 51.83.170.21:19447 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 greenbi.net udp
KR 211.171.233.126:80 greenbi.net tcp
US 8.8.8.8:53 126.233.171.211.in-addr.arpa udp
KR 211.171.233.126:80 greenbi.net tcp
NL 162.0.217.254:443 api.2ip.ua tcp
KW 37.34.248.24:80 colisumy.com tcp
US 8.8.8.8:53 zexeq.com udp
HU 84.224.216.79:80 zexeq.com tcp
US 8.8.8.8:53 79.216.224.84.in-addr.arpa udp
KR 211.171.233.126:80 greenbi.net tcp
KR 211.171.233.126:80 greenbi.net tcp
US 8.8.8.8:53 host-file-host6.com udp
US 8.8.8.8:53 host-host-file8.com udp
DE 91.103.253.23:80 host-host-file8.com tcp
US 8.8.8.8:53 23.253.103.91.in-addr.arpa udp
KR 211.171.233.126:80 greenbi.net tcp
HU 84.224.216.79:80 zexeq.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
KR 211.171.233.126:80 greenbi.net tcp
KW 37.34.248.24:80 zexeq.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
KW 37.34.248.24:80 zexeq.com tcp
US 8.8.8.8:53 t.me udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 149.154.167.99:443 t.me tcp
KW 37.34.248.24:80 zexeq.com tcp
KW 37.34.248.24:80 zexeq.com tcp
DE 159.69.198.239:27015 159.69.198.239 tcp
US 8.8.8.8:53 99.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 22.249.124.192.in-addr.arpa udp
KR 211.171.233.126:80 greenbi.net tcp
US 8.8.8.8:53 239.198.69.159.in-addr.arpa udp
HU 84.224.216.79:80 zexeq.com tcp
HU 84.224.216.79:80 zexeq.com tcp
HU 84.224.216.79:80 zexeq.com tcp
KR 211.171.233.126:80 greenbi.net tcp
HU 84.224.216.79:80 zexeq.com tcp
KR 211.171.233.126:80 greenbi.net tcp
KR 211.171.233.126:80 greenbi.net tcp
KR 211.171.233.126:80 greenbi.net tcp
KR 211.171.233.126:80 greenbi.net tcp
NL 149.154.167.99:443 t.me tcp
DE 159.69.198.239:27015 159.69.198.239 tcp
KR 211.171.233.126:80 greenbi.net tcp
NL 149.154.167.99:443 t.me tcp
DE 159.69.198.239:27015 159.69.198.239 tcp
KR 211.171.233.126:80 greenbi.net tcp
KR 211.171.233.126:80 greenbi.net tcp
KR 211.171.233.126:80 greenbi.net tcp
NL 149.154.167.99:443 t.me tcp
DE 159.69.198.239:27015 159.69.198.239 tcp
NL 149.154.167.99:443 t.me tcp
DE 159.69.198.239:27015 159.69.198.239 tcp
US 8.8.8.8:53 b90527ac-0cc0-4fcc-bf7d-a9b1097f5ae3.uuid.zaoshang.ooo udp
US 8.8.8.8:53 server2.zaoshang.ooo udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 stun2.l.google.com udp
IN 172.253.121.127:19302 stun2.l.google.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
BG 185.82.216.49:443 server2.zaoshang.ooo tcp
US 8.8.8.8:53 mastertryprice.com udp
US 104.21.37.186:443 mastertryprice.com tcp
US 8.8.8.8:53 127.121.253.172.in-addr.arpa udp
US 8.8.8.8:53 233.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 49.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 186.37.21.104.in-addr.arpa udp
US 8.8.8.8:53 stun1.l.google.com udp
US 142.251.125.127:19302 stun1.l.google.com udp
US 8.8.8.8:53 127.125.251.142.in-addr.arpa udp

Files

memory/4052-120-0x00000000019D0000-0x00000000019E5000-memory.dmp

memory/4052-121-0x00000000019B0000-0x00000000019B9000-memory.dmp

memory/4052-122-0x0000000000400000-0x00000000018C0000-memory.dmp

memory/3228-123-0x00000000006D0000-0x00000000006E6000-memory.dmp

memory/4052-124-0x0000000000400000-0x00000000018C0000-memory.dmp

memory/4052-127-0x00000000019D0000-0x00000000019E5000-memory.dmp

memory/4052-128-0x00000000019B0000-0x00000000019B9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1345.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\1345.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\14DC.exe

MD5 7e00f4836c516917a5861eda86a3d75c
SHA1 e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3
SHA256 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94
SHA512 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad

C:\Users\Admin\AppData\Local\Temp\14DC.exe

MD5 7e00f4836c516917a5861eda86a3d75c
SHA1 e1c3fbb897f8bf71ab9dd061aff0b6fef96cd9f3
SHA256 0b3a3447266821c3576804ab0e6dfad149cd31475f94c4aed70dd1591410ee94
SHA512 6b9d9918b7c9cc743d4d68707524a466ede53d51206556c94de7cfe59e1538781f009c0ba01e99170aedd9444832224567e843dcad56d94a807e60f10275caad

memory/4568-141-0x0000000000400000-0x0000000000440000-memory.dmp

memory/4568-142-0x00000000004A0000-0x00000000004D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\17CB.dll

MD5 26e1245dd1956f78db2f5df66797be05
SHA1 f348aa001f8e07d0827381f2fa25a70989290960
SHA256 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf
SHA512 cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee

memory/4568-148-0x0000000073470000-0x0000000073B5E000-memory.dmp

memory/4568-149-0x0000000002300000-0x0000000002306000-memory.dmp

\Users\Admin\AppData\Local\Temp\17CB.dll

MD5 26e1245dd1956f78db2f5df66797be05
SHA1 f348aa001f8e07d0827381f2fa25a70989290960
SHA256 9a2ea82915649317faa2505844939408e36d42d3a8f1e5297183f27996bd2cbf
SHA512 cece910e924c6954169b32e323f917f34728ede52874ff28f09c4dc4c4f170bdd208aa2fd9d0b3183cad0beeb59e186249da9e415e720c964099df43f1378cee

memory/4412-151-0x0000000000400000-0x0000000000674000-memory.dmp

memory/4412-152-0x0000000002DC0000-0x0000000002DC6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1A6C.exe

MD5 822e9fe136e8ca72f0ac30945b7fd6a4
SHA1 e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe
SHA256 e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890
SHA512 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363

C:\Users\Admin\AppData\Local\Temp\1A6C.exe

MD5 822e9fe136e8ca72f0ac30945b7fd6a4
SHA1 e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe
SHA256 e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890
SHA512 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363

memory/4568-158-0x0000000009EC0000-0x000000000A4C6000-memory.dmp

memory/4568-159-0x000000000A4D0000-0x000000000A5DA000-memory.dmp

memory/4568-161-0x0000000004B30000-0x0000000004B40000-memory.dmp

memory/4568-160-0x0000000004B10000-0x0000000004B22000-memory.dmp

memory/4568-162-0x000000000A5E0000-0x000000000A61E000-memory.dmp

memory/4568-163-0x000000000A690000-0x000000000A6DB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\27F9.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\27F9.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\3326.exe

MD5 2d2f34b3e33d664fe7c1119c7b061d4e
SHA1 2327f28f544dab2823216604d2dfec8b3d58063e
SHA256 6a67635cead184cb106d64048055ecc558038c6a57c0147b826fdbd22c9bf03c
SHA512 10fe5e80b7c8c33102277ad6401a15d96e4a519552e5f4d0e68a1bcc47a83bb57b086f21cea8d31592fd4af5bda085d64c22eb528f2ad3cb8ef0ab303768a6fe

C:\Users\Admin\AppData\Local\Temp\3326.exe

MD5 2d2f34b3e33d664fe7c1119c7b061d4e
SHA1 2327f28f544dab2823216604d2dfec8b3d58063e
SHA256 6a67635cead184cb106d64048055ecc558038c6a57c0147b826fdbd22c9bf03c
SHA512 10fe5e80b7c8c33102277ad6401a15d96e4a519552e5f4d0e68a1bcc47a83bb57b086f21cea8d31592fd4af5bda085d64c22eb528f2ad3cb8ef0ab303768a6fe

memory/4568-172-0x000000000A7D0000-0x000000000A846000-memory.dmp

memory/4568-173-0x000000000A850000-0x000000000A8E2000-memory.dmp

memory/4568-174-0x000000000A8F0000-0x000000000ADEE000-memory.dmp

memory/4568-175-0x000000000AE30000-0x000000000AE96000-memory.dmp

memory/4568-177-0x0000000073470000-0x0000000073B5E000-memory.dmp

memory/3204-182-0x00000000008E0000-0x0000000000DFA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\41CD.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Temp\41CD.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

memory/3204-183-0x0000000073470000-0x0000000073B5E000-memory.dmp

memory/4568-185-0x0000000004B30000-0x0000000004B40000-memory.dmp

memory/376-188-0x0000000003400000-0x0000000003491000-memory.dmp

memory/376-191-0x0000000003600000-0x000000000371B000-memory.dmp

memory/2356-192-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\49BD.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\49BD.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2356-194-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1345.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/2356-195-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2356-196-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

memory/3284-205-0x00007FF7672B0000-0x00007FF767309000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\523A.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\523A.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

C:\Users\Admin\AppData\Local\Temp\596F.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\596F.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\596F.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

memory/3204-222-0x0000000073470000-0x0000000073B5E000-memory.dmp

memory/2220-223-0x0000000001990000-0x00000000019CF000-memory.dmp

memory/2220-221-0x0000000001900000-0x0000000001929000-memory.dmp

memory/4568-224-0x000000000B3F0000-0x000000000B440000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\60A3.exe

MD5 822e9fe136e8ca72f0ac30945b7fd6a4
SHA1 e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe
SHA256 e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890
SHA512 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363

C:\Users\Admin\AppData\Local\Temp\60A3.exe

MD5 822e9fe136e8ca72f0ac30945b7fd6a4
SHA1 e0b82ca3bcfdd7ba46c2a5cd86e5204251137cbe
SHA256 e32f5743076f736c8a54a5f295785decdb100882c0bf0e76da711b92fc9d7890
SHA512 34c102ad716355e582d3bae3f1186f3b481f745d6e507c6ef7a42f9bdcbd2c4918465e448d761def482a47a2f83b500f3baf4e248bf4a0c18d835273d6ab1363

memory/2220-230-0x0000000003950000-0x0000000003988000-memory.dmp

memory/2220-229-0x0000000000400000-0x00000000018D4000-memory.dmp

memory/2220-231-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/2220-233-0x0000000005E90000-0x0000000005EC4000-memory.dmp

memory/2220-232-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/2220-234-0x0000000073470000-0x0000000073B5E000-memory.dmp

memory/2220-235-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/2220-237-0x0000000003A30000-0x0000000003A36000-memory.dmp

memory/2220-238-0x0000000000400000-0x00000000018D4000-memory.dmp

memory/2220-241-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/3284-245-0x00000000027B0000-0x0000000002921000-memory.dmp

memory/3284-246-0x0000000002930000-0x0000000002A61000-memory.dmp

memory/2220-251-0x0000000001990000-0x00000000019CF000-memory.dmp

memory/2220-254-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/2220-253-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/4908-257-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4908-258-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\27F9.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/2220-260-0x0000000073470000-0x0000000073B5E000-memory.dmp

memory/2220-262-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/4908-265-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4568-266-0x000000000C200000-0x000000000C3C2000-memory.dmp

memory/4568-267-0x000000000C3D0000-0x000000000C8FC000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 38fe20464f4566665a3e93bc25958d45
SHA1 f1da804263c20548ab1520bb7f728cba31aa1af9
SHA256 aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a
SHA512 c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 74080d394bf3e9f2f6452bef5d372441
SHA1 b974c4b129a27884f89f8ab18dc458b91808ce2c
SHA256 219254fcc6c36a748e7dabf4d7975447208d47d68ccab2f8ccbc5ab3e597796f
SHA512 385c67617f09e754ad019ca3fcc12a960704685b5ef111fc94e2a66513b68fe7bc421f7b7c313efcb9bd71f618696114ec35d3db8f0ec48787b3a7304efe16ce

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 979482ca9ef939d4a62f58866cbfeda6
SHA1 b0fcfbc8c9bf35a6c68d777e08a78b482127d34c
SHA256 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35
SHA512 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 5be192dc86b9def69b71dedd759cf2fb
SHA1 0c768d00b84848b9291b1e3574c903979771f697
SHA256 f7cc6cba4d7c51951039ff3a774174e15a1e1cccc4f7d48ce3fdea5b20b46b9b
SHA512 616472bbe6ef9dceae6f59e5eca9ec3a69048750cedf9eb2b5079de87d74b16da3a72cc834159775dc52213247b73a52f14f4cffcdf7aa7b206945dd44b1ae11

C:\Users\Admin\AppData\Local\209c4d52-ca1a-48e2-85a3-6277c757a6f6\1345.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/2356-274-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3776-276-0x00000000019B0000-0x00000000019C5000-memory.dmp

memory/3776-277-0x0000000001A10000-0x0000000001A19000-memory.dmp

memory/2220-275-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

memory/3776-278-0x0000000000400000-0x00000000018C0000-memory.dmp

memory/3284-282-0x0000000002930000-0x0000000002A61000-memory.dmp

memory/4908-279-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\27F9.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/3776-283-0x0000000000400000-0x00000000018C0000-memory.dmp

memory/3228-284-0x0000000000750000-0x0000000000766000-memory.dmp

memory/3776-286-0x0000000000400000-0x00000000018C0000-memory.dmp

memory/4568-291-0x0000000073470000-0x0000000073B5E000-memory.dmp

memory/5032-293-0x00000000034A0000-0x0000000003531000-memory.dmp

memory/5032-294-0x0000000003640000-0x000000000375B000-memory.dmp

C:\Users\Admin\AppData\Local\209c4d52-ca1a-48e2-85a3-6277c757a6f6\1345.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/1428-297-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1428-299-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1428-300-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1428-301-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\49BD.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2168-302-0x00000000019E0000-0x00000000019E9000-memory.dmp

memory/2168-303-0x00000000019C0000-0x00000000019D5000-memory.dmp

memory/4036-306-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\523A.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/4036-307-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4036-309-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2324-311-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4412-312-0x0000000004AB0000-0x0000000004BA5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

memory/2324-308-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4252-313-0x0000000000400000-0x00000000018D4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\596F.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/2960-320-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2960-323-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4412-322-0x0000000004F30000-0x000000000500E000-memory.dmp

memory/1428-326-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\49BD.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

memory/4252-328-0x0000000000400000-0x00000000018D4000-memory.dmp

memory/2324-337-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4036-340-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2960-341-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1345.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

memory/4412-333-0x0000000004F30000-0x000000000500E000-memory.dmp

memory/3228-332-0x0000000000790000-0x00000000007A6000-memory.dmp

memory/2356-330-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4412-342-0x0000000000400000-0x0000000000674000-memory.dmp

memory/2160-344-0x0000000000400000-0x0000000001CA5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\523A.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Roaming\ucwieha

MD5 2d2f34b3e33d664fe7c1119c7b061d4e
SHA1 2327f28f544dab2823216604d2dfec8b3d58063e
SHA256 6a67635cead184cb106d64048055ecc558038c6a57c0147b826fdbd22c9bf03c
SHA512 10fe5e80b7c8c33102277ad6401a15d96e4a519552e5f4d0e68a1bcc47a83bb57b086f21cea8d31592fd4af5bda085d64c22eb528f2ad3cb8ef0ab303768a6fe

C:\Users\Admin\AppData\Local\Temp\596F.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\27F9.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Roaming\aiwieha

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

C:\Users\Admin\AppData\Local\Temp\1345.exe

MD5 da1690d241c106ecfe2b533c9b953858
SHA1 53bd880fe0510a11b7ec5db121836779b2cd5387
SHA256 038123ca777987b5dcd25665be3d43455cbe9c67accfee86d61b96402d3eff73
SHA512 d8a520788625ac5dcebe9e3c34a270350d02a543ed6794762bbe75f868315908b34f2e7e139b581f2c6c69d7f393206602416ad56311a48d5225662f8abf41df

C:\Users\Admin\AppData\Local\Temp\49BD.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\Temp\523A.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\c3dc5b25-79d6-4e4b-9c49-b4764738b193\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\Temp\596F.exe

MD5 62331a18f8f46e012b0798c8a453be60
SHA1 af5cdd07437449b329848804e43ac4752c2ce127
SHA256 7f1300f341eb3d29b55ee6ca957d260baf7106e56c0674b12de6ff99e1ce07f1
SHA512 754d5db14f2a592f4590a7c2b8eb1a8b824b96b49771920afddadf141437e652a6c088a9d75938f465fa571ef94e15e4a4353b05f9d05601b7587664210e8605

C:\Users\Admin\AppData\Local\bowsakkdestx.txt

MD5 e3c640eced72a28f10eac99da233d9fd
SHA1 1d7678afc24a59de1da0bf74126baf3b8540b5b0
SHA256 87de9c0701eab8d410954dc4d3e7e6013ca6a0c8a514969418a12c21135f133e
SHA512 bcb94b7ba487784d343961b24107ea17a82f200961505927ef385caeb0684fbbe1a3482b7d0af7f3766b9ec2c4d6236341b50541cf7b1217acdc0a8b5b37e3d7

C:\SystemID\PersonalID.txt

MD5 324770a7653f940b6e66d90455f6e1a8
SHA1 5b9edb85029710a458f7a77f474721307d2fb738
SHA256 9dda9cd8e2b81a8d0d46e39f4495130246582b673b7ddddef4ebecfeeb6bbc30
SHA512 48ae3a8b8a45881285ff6117edd0ca42fe2b06b0d868b2d535f82a9c26157d3c434535d91b7a9f33cf3c627bc49e469bf997077edcfff6b83e4d7e30cf9dea23

C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\a41771ea-016e-40cd-aa35-9f468b77930d\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\27e99749-b7ae-4ea9-a051-2bce55cbe4b6\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

C:\Users\Admin\AppData\Local\35a9fae7-29a1-4a38-8672-8b8725dce39a\build2.exe

MD5 5fff52c407b5b46c10416067dac16d62
SHA1 c2263843ea244e5bd6c403342efaadd0af1c5522
SHA256 f57210d90101da3bc77c55f813ba64f35dbb6d0db50f71467f18816486b9d6d0
SHA512 37a041b7844f19d022adb5ab00e3d3705a8fd605ddc8ce5fe3354f36626a0aa055226b01d0b19bdd5e083d3e25fbf451369975dd54f6acf7ef9bb1d6b15d6352

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jsxv0fe3.g2v.ps1

MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA512 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

C:\ProgramData\66671883414770366231216106

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\02886645253006285557647762

MD5 d367ddfda80fdcf578726bc3b0bc3e3c
SHA1 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA256 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA512 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

C:\ProgramData\softokn3.dll

MD5 4e52d739c324db8225bd9ab2695f262f
SHA1 71c3da43dc5a0d2a1941e874a6d015a071783889
SHA256 74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA512 2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

C:\ProgramData\vcruntime140.dll

MD5 a37ee36b536409056a86f50e67777dd7
SHA1 1cafa159292aa736fc595fc04e16325b27cd6750
SHA256 8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA512 3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

C:\ProgramData\msvcp140.dll

MD5 5ff1fca37c466d6723ec67be93b51442
SHA1 34cc4e158092083b13d67d6d2bc9e57b798a303b
SHA256 5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA512 4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

C:\ProgramData\freebl3.dll

MD5 550686c0ee48c386dfcb40199bd076ac
SHA1 ee5134da4d3efcb466081fb6197be5e12a5b22ab
SHA256 edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
SHA512 0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

C:\ProgramData\06657133214033791048263878

MD5 02d2c46697e3714e49f46b680b9a6b83
SHA1 84f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA512 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

C:\Windows\rss\csrss.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d