Malware Analysis Report

2025-01-18 07:43

Sample ID 230815-ssjwjsbd63
Target 34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe
SHA256 34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2
Tags
djvu redline smokeloader vidar logsdiller cloud (tg: @logsdillabot) lux3 up3 backdoor discovery infostealer ransomware stealer trojan fabookie 35aa2808fb90f9e9dac907e1be77f310 spyware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2

Threat Level: Known bad

The file 34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe was found to be: Known bad.

Malicious Activity Summary

djvu redline smokeloader vidar logsdiller cloud (tg: @logsdillabot) lux3 up3 backdoor discovery infostealer ransomware stealer trojan fabookie 35aa2808fb90f9e9dac907e1be77f310 spyware

SmokeLoader

Vidar

RedLine

Detect Fabookie payload

Fabookie

Djvu Ransomware

Detected Djvu ransomware

Downloads MZ/PE file

Executes dropped EXE

Loads dropped DLL

Modifies file permissions

Deletes itself

Looks up external IP address via web service

Suspicious use of SetThreadContext

Unsigned PE

Program crash

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: MapViewOfSection

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-15 15:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-15 15:23

Reported

2023-08-15 15:25

Platform

win7-20230712-en

Max time kernel

29s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Vidar

stealer vidar

Downloads MZ/PE file

Deletes itself

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\E716.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2964 set thread context of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2920 set thread context of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\FE95.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1264 wrote to memory of 340 N/A N/A C:\Users\Admin\AppData\Local\Temp\E179.exe
PID 1264 wrote to memory of 340 N/A N/A C:\Users\Admin\AppData\Local\Temp\E179.exe
PID 1264 wrote to memory of 340 N/A N/A C:\Users\Admin\AppData\Local\Temp\E179.exe
PID 1264 wrote to memory of 340 N/A N/A C:\Users\Admin\AppData\Local\Temp\E179.exe
PID 1264 wrote to memory of 108 N/A N/A C:\Users\Admin\AppData\Local\Temp\E3CB.exe
PID 1264 wrote to memory of 108 N/A N/A C:\Users\Admin\AppData\Local\Temp\E3CB.exe
PID 1264 wrote to memory of 108 N/A N/A C:\Users\Admin\AppData\Local\Temp\E3CB.exe
PID 1264 wrote to memory of 108 N/A N/A C:\Users\Admin\AppData\Local\Temp\E3CB.exe
PID 1264 wrote to memory of 2964 N/A N/A C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 1264 wrote to memory of 2964 N/A N/A C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 1264 wrote to memory of 2964 N/A N/A C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 1264 wrote to memory of 2964 N/A N/A C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 1264 wrote to memory of 2920 N/A N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 1264 wrote to memory of 2920 N/A N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 1264 wrote to memory of 2920 N/A N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 1264 wrote to memory of 2920 N/A N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2964 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\E716.exe C:\Users\Admin\AppData\Local\Temp\E716.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 2920 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\EBE8.exe C:\Users\Admin\AppData\Local\Temp\EBE8.exe
PID 1264 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1264 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1264 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1264 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1264 wrote to memory of 2712 N/A N/A C:\Windows\system32\regsvr32.exe
PID 2712 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2712 wrote to memory of 2748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe

"C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe"

C:\Users\Admin\AppData\Local\Temp\E179.exe

C:\Users\Admin\AppData\Local\Temp\E179.exe

C:\Users\Admin\AppData\Local\Temp\E3CB.exe

C:\Users\Admin\AppData\Local\Temp\E3CB.exe

C:\Users\Admin\AppData\Local\Temp\E716.exe

C:\Users\Admin\AppData\Local\Temp\E716.exe

C:\Users\Admin\AppData\Local\Temp\E716.exe

C:\Users\Admin\AppData\Local\Temp\E716.exe

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\F710.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\F710.dll

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\FD57.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\FD57.dll

C:\Users\Admin\AppData\Local\Temp\AD0.exe

C:\Users\Admin\AppData\Local\Temp\AD0.exe

C:\Users\Admin\AppData\Local\Temp\E179.exe

C:\Users\Admin\AppData\Local\Temp\E179.exe

C:\Users\Admin\AppData\Local\Temp\1472.exe

C:\Users\Admin\AppData\Local\Temp\1472.exe

C:\Users\Admin\AppData\Local\Temp\20B2.exe

C:\Users\Admin\AppData\Local\Temp\20B2.exe

C:\Users\Admin\AppData\Local\Temp\41DA.exe

C:\Users\Admin\AppData\Local\Temp\41DA.exe

C:\Users\Admin\AppData\Local\Temp\20B2.exe

C:\Users\Admin\AppData\Local\Temp\20B2.exe

C:\Users\Admin\AppData\Local\Temp\41DA.exe

C:\Users\Admin\AppData\Local\Temp\41DA.exe

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\7c7c444a-855b-4c25-839a-61c30b995120" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\E179.exe

"C:\Users\Admin\AppData\Local\Temp\E179.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\20B2.exe

"C:\Users\Admin\AppData\Local\Temp\20B2.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\41DA.exe

"C:\Users\Admin\AppData\Local\Temp\41DA.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\E29C.exe

C:\Users\Admin\AppData\Local\Temp\E29C.exe

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

"C:\Users\Admin\AppData\Local\Temp\EBE8.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\20B2.exe

"C:\Users\Admin\AppData\Local\Temp\20B2.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

"C:\Users\Admin\AppData\Local\Temp\EBE8.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\FE95.exe

C:\Users\Admin\AppData\Local\Temp\FE95.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 544

C:\Users\Admin\AppData\Local\Temp\1467.exe

C:\Users\Admin\AppData\Local\Temp\1467.exe

C:\Users\Admin\AppData\Local\Temp\E179.exe

"C:\Users\Admin\AppData\Local\Temp\E179.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\E716.exe

"C:\Users\Admin\AppData\Local\Temp\E716.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\E716.exe

"C:\Users\Admin\AppData\Local\Temp\E716.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\41DA.exe

"C:\Users\Admin\AppData\Local\Temp\41DA.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\4180.exe

C:\Users\Admin\AppData\Local\Temp\4180.exe

C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build2.exe

"C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build2.exe"

C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build2.exe

"C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build2.exe"

C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build3.exe

"C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build3.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\06b259eb-5d8c-4702-8ad1-7b1273f9aa5f\build2.exe

"C:\Users\Admin\AppData\Local\06b259eb-5d8c-4702-8ad1-7b1273f9aa5f\build2.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 potunulit.org udp
US 188.114.96.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
RO 62.217.232.10:80 colisumy.com tcp
MD 176.123.9.142:14845 tcp
MD 176.123.9.142:14845 tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
RO 62.217.232.10:80 colisumy.com tcp
RO 62.217.232.10:80 colisumy.com tcp
PL 51.83.170.21:19447 tcp
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 admaiscont.com.br udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 142.4.24.122:443 admaiscont.com.br tcp
US 142.4.24.122:443 admaiscont.com.br tcp
US 8.8.8.8:53 crl.comodoca.com udp
US 104.18.14.101:80 crl.comodoca.com tcp
US 104.18.14.101:80 crl.comodoca.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 142.4.24.122:443 admaiscont.com.br tcp
US 142.4.24.122:443 admaiscont.com.br tcp
US 8.8.8.8:53 crl.usertrust.com udp
US 104.18.14.101:80 crl.usertrust.com tcp
US 104.18.14.101:80 crl.usertrust.com tcp
RU 79.137.192.18:80 79.137.192.18 tcp
US 104.18.14.101:80 crl.usertrust.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 us.imgjeoigaa.com udp
HK 103.100.211.218:80 us.imgjeoigaa.com tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
RO 62.217.232.10:80 colisumy.com tcp
US 8.8.8.8:53 www.microsoft.com udp
PL 51.83.170.21:19447 tcp
RO 62.217.232.10:80 colisumy.com tcp
US 8.8.8.8:53 zexeq.com udp
PA 190.219.109.29:80 zexeq.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
PA 190.219.109.29:80 zexeq.com tcp
RO 62.217.232.10:80 colisumy.com tcp
US 142.4.24.122:443 admaiscont.com.br tcp
RO 62.217.232.10:80 colisumy.com tcp
US 142.4.24.122:443 admaiscont.com.br tcp
PA 190.219.109.29:80 zexeq.com tcp
PA 190.219.109.29:80 zexeq.com tcp

Files

memory/2576-55-0x0000000002390000-0x0000000002490000-memory.dmp

memory/2576-56-0x0000000000400000-0x00000000022E6000-memory.dmp

memory/2576-57-0x0000000000220000-0x0000000000229000-memory.dmp

memory/1264-58-0x00000000025F0000-0x0000000002606000-memory.dmp

memory/2576-59-0x0000000000400000-0x00000000022E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\E3CB.exe

MD5 a060fab23a37378e1603bbb37dbcc3c4
SHA1 7b051af36964d2a33a1127aa1bc772437a508cbd
SHA256 0f8eb3245a569035ee103d68752b0e816e83dc01c076d25abdfc98c49ee7001c
SHA512 772b0449895bf34cdb8420aaafa60d424603ed8920be0af4242e30f7f3a13ace96af7622291d92e5eade761d8cd86ac9d389375bb6a4e86e93786d98ac120dfb

C:\Users\Admin\AppData\Local\Temp\E3CB.exe

MD5 a060fab23a37378e1603bbb37dbcc3c4
SHA1 7b051af36964d2a33a1127aa1bc772437a508cbd
SHA256 0f8eb3245a569035ee103d68752b0e816e83dc01c076d25abdfc98c49ee7001c
SHA512 772b0449895bf34cdb8420aaafa60d424603ed8920be0af4242e30f7f3a13ace96af7622291d92e5eade761d8cd86ac9d389375bb6a4e86e93786d98ac120dfb

memory/108-78-0x00000000003A0000-0x00000000003D0000-memory.dmp

memory/108-77-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E3CB.exe

MD5 a060fab23a37378e1603bbb37dbcc3c4
SHA1 7b051af36964d2a33a1127aa1bc772437a508cbd
SHA256 0f8eb3245a569035ee103d68752b0e816e83dc01c076d25abdfc98c49ee7001c
SHA512 772b0449895bf34cdb8420aaafa60d424603ed8920be0af4242e30f7f3a13ace96af7622291d92e5eade761d8cd86ac9d389375bb6a4e86e93786d98ac120dfb

C:\Users\Admin\AppData\Local\Temp\E716.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\E716.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/108-90-0x0000000000790000-0x0000000000796000-memory.dmp

memory/108-89-0x0000000074280000-0x000000007496E000-memory.dmp

memory/108-91-0x0000000004670000-0x00000000046B0000-memory.dmp

memory/2964-93-0x0000000003B20000-0x0000000003BB1000-memory.dmp

memory/2964-94-0x0000000003B20000-0x0000000003BB1000-memory.dmp

memory/2964-95-0x0000000003BC0000-0x0000000003CDB000-memory.dmp

\Users\Admin\AppData\Local\Temp\E716.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\E716.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/2876-103-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2876-105-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E716.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/2920-108-0x0000000000220000-0x00000000002B1000-memory.dmp

memory/2920-109-0x0000000000220000-0x00000000002B1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

\Users\Admin\AppData\Local\Temp\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/2888-118-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F710.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

memory/2888-120-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2748-122-0x00000000009A0000-0x0000000000C14000-memory.dmp

\Users\Admin\AppData\Local\Temp\F710.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

memory/2748-123-0x00000000009A0000-0x0000000000C14000-memory.dmp

memory/2748-124-0x00000000002D0000-0x00000000002D6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FD57.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

memory/836-129-0x0000000000B50000-0x0000000000DC4000-memory.dmp

\Users\Admin\AppData\Local\Temp\FD57.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

memory/108-131-0x0000000074280000-0x000000007496E000-memory.dmp

memory/836-130-0x0000000000B50000-0x0000000000DC4000-memory.dmp

memory/836-133-0x00000000002F0000-0x00000000002F6000-memory.dmp

\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

memory/2252-138-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AD0.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

memory/2252-146-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\AD0.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

memory/2252-149-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2252-150-0x0000000000400000-0x0000000000537000-memory.dmp

memory/340-135-0x0000000001C50000-0x0000000001D6B000-memory.dmp

memory/340-134-0x0000000001BB0000-0x0000000001C42000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1472.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

C:\Users\Admin\AppData\Local\Temp\Cab1FD1.tmp

MD5 3ac860860707baaf32469fa7cc7c0192
SHA1 c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256 d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512 d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

C:\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

memory/3036-182-0x0000000001980000-0x00000000019B8000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a698472cadb3010c3a4fe185391d6307
SHA1 a82087d5ff54430ae42941e28d166d26c2bf89f6
SHA256 4d5710f626b1734b63f6cd126be1311e44cc150c8e4ccf3f82be4cc546998da3
SHA512 d161c5d51edc9b7b83a88f8cac2ef529b3c7279735d26a593eee5be70e3c3e83cf6702ea992a42b47af027768fe8177f6c0fdabe588d2015d0d774731de508dc

C:\Users\Admin\AppData\Local\Temp\Tar409C.tmp

MD5 4ff65ad929cd9a367680e0e5b1c08166
SHA1 c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256 c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512 f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

memory/3036-200-0x00000000019E0000-0x0000000001A14000-memory.dmp

memory/3036-202-0x0000000003370000-0x0000000003376000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\41DA.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

memory/836-208-0x0000000000A30000-0x0000000000B21000-memory.dmp

memory/836-209-0x0000000000DD0000-0x0000000000EAA000-memory.dmp

memory/836-212-0x0000000000DD0000-0x0000000000EAA000-memory.dmp

memory/836-213-0x0000000000DD0000-0x0000000000EAA000-memory.dmp

memory/2980-214-0x0000000001C90000-0x0000000001CC4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 979482ca9ef939d4a62f58866cbfeda6
SHA1 b0fcfbc8c9bf35a6c68d777e08a78b482127d34c
SHA256 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35
SHA512 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 c60b37c94852ab2cc7c106180872f3b7
SHA1 a78758a74afbf4a79de1c1d244bd38f25cc820a9
SHA256 d1e11604639a033445e1fbd350e876a7445a9dd641a12da510b1120b0be4a701
SHA512 112396ee8c0f228beb011315fa820ff42dfcc0450d77cfb67dc18f1e62820bf74c2c142dbd9c8987692b248b455bf1ae259262c7a6be8df9530bbb6afb7d1ddf

memory/2748-229-0x0000000000E50000-0x0000000000F41000-memory.dmp

memory/2748-230-0x0000000002470000-0x000000000254A000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 d62098ddb9ca8aae18e9eb0b703f114e
SHA1 9d812a1c01a19ca8162cc800a8aff015e323157d
SHA256 927ca7e0f2871ec7ffafc878b1ed3ddba55295040af3c4491c2e9889949773c1
SHA512 972191d8d39f74a135e77eacb793bf77117e5740bfc28a73ac3bd0b783e713c9a69e65f79c609bd9d73af005237bd957322fbc4208d264c48c40335a35fc7405

memory/2748-234-0x0000000002470000-0x000000000254A000-memory.dmp

memory/2748-235-0x0000000002470000-0x000000000254A000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 979482ca9ef939d4a62f58866cbfeda6
SHA1 b0fcfbc8c9bf35a6c68d777e08a78b482127d34c
SHA256 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35
SHA512 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b

C:\Users\Admin\AppData\Local\Temp\41DA.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

\Users\Admin\AppData\Local\Temp\41DA.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\41DA.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\572BF21E454637C9F000BE1AF9B1E1A9

MD5 4c85c8e8827ee0707602bee186897416
SHA1 c53853dad0ec6f3343cef3494dae21b24974bb03
SHA256 38f103a117d50dde9602f3296df9dbdffb14411d95013579f4afed653f3805a2
SHA512 4634de43d922bfaf3a9a89bdca5ee91367620fd0a50ef6eefb5308661b56765707ed36bd68912290ca737194171cf7b9c949fff2f3edd9e7b2a232f8c73d6207

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\572BF21E454637C9F000BE1AF9B1E1A9

MD5 c233297b218486061513b8f08c560006
SHA1 b5868bf06977e80223363529e842379245978445
SHA256 b923d03402b97deb0038fe314f3aa91a27f792303351d4d020c649497af2d4d5
SHA512 beb123eede69d5d718a656835097d28107554209bb8bdfbcda46c8a85d674fb370d29aba7d0ad6f375660c8deaf57c0ba168514cc206228bb8581350d22d6de0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 25fc4e4815b4f37af93ddcea67a8e7c0
SHA1 3c42970d136bf7605dd4edf58988e144f292f657
SHA256 a8c4e3b5e53da681524e7aef889a60a5e072f15559791c5f56846bcc4658e7c3
SHA512 03a4fbf748d9476848b483e5434fa674839e791a2ef71282ee79a5f44200ac2c05f172ae893e31eb91ca9cfba2617403973b821a58d7b166ea252d44a1438819

\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 0c7e54ab1da31502fda880efab99af2f
SHA1 bf2ec2164869a44b2deb3dd4e5805aeb92ac65ea
SHA256 03ad657ee87e28a6982b1db858062b3a75739f3d7dc3d14fad585d10ec1a61bc
SHA512 8eba11e7bd1360216aee670b74e2a908e70e72b01eff58b85e1090c15673f9c450e499cce8cf092b8051ca5e1620af76728e1f8b4caee49a54828b9449ff956c

memory/2252-282-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E179.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 38fe20464f4566665a3e93bc25958d45
SHA1 f1da804263c20548ab1520bb7f728cba31aa1af9
SHA256 aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a
SHA512 c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 38fe20464f4566665a3e93bc25958d45
SHA1 f1da804263c20548ab1520bb7f728cba31aa1af9
SHA256 aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a
SHA512 c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 d5b3ca026d77e785d22e566e73fb244b
SHA1 26a1fa81e91380ba34e9f4319fc6e9538d282588
SHA256 aac02a7421cedd72b7462c368178e514d618d0c1f8ac76f265797a867f6c7296
SHA512 54f6ecfa2599d8566f522a6ef6b3c526db1cde728c968028a865fd3b14f8a6f6775e0201eabf1f2645088f6169f2a98789bc7249624487ede76c4a4eda2702b3

C:\Users\Admin\AppData\Local\7c7c444a-855b-4c25-839a-61c30b995120\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/1952-296-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3538626A1FCCCA43C7E18F220BDD9B02

MD5 819d90b607add8d2e24a16fab0d88e38
SHA1 7ac00a88262b2dbe6335a68979d0fb8cc8074b2d
SHA256 66d967cb9a4d28e24d22ce2e150f323036dcf2d83285cb052dbc46ff904cfcb7
SHA512 fca78f47140ea9533fce116093b719c76f67c857fae229856580a52756dce93d993fb2c31e1877eb323318c52c16cdf6c22b71d5ea6245d73b9011e7b591efb3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3538626A1FCCCA43C7E18F220BDD9B02

MD5 d7aa1ebfedd4a5bc41e0a5eac87cf984
SHA1 3c04608eaad5d675c2d72dc85bfe31740a27e763
SHA256 c283f0713cc51c6cb2d8a8065cfc77704a2106933ceff9cad0ca98bac679b198
SHA512 8642bb6de69c6445fd682b86514dbe958ce20c43638c8ce9f158e2cf7fd4e66277a1a71d5139815ac520eda6024e73c9402c95b76bddeec2d4777ebe247237ba

\Users\Admin\AppData\Local\Temp\41DA.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

\Users\Admin\AppData\Local\Temp\41DA.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\41DA.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

memory/2676-313-0x0000000000400000-0x0000000000537000-memory.dmp

\Users\Admin\AppData\Local\Temp\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/2888-328-0x0000000000400000-0x0000000000537000-memory.dmp

\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/2408-324-0x0000000000830000-0x0000000000D4A000-memory.dmp

\Users\Admin\AppData\Local\Temp\EBE8.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\E29C.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Temp\E29C.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Temp\20B2.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

memory/2408-358-0x0000000074280000-0x000000007496E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

memory/1840-363-0x00000000025E0000-0x0000000002671000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FE95.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

memory/2552-369-0x0000000000D00000-0x000000000121A000-memory.dmp

memory/108-379-0x0000000074280000-0x000000007496E000-memory.dmp

memory/2876-392-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3048-424-0x00000000002D0000-0x0000000000361000-memory.dmp

memory/1948-430-0x00000000001B0000-0x00000000001C5000-memory.dmp

memory/1948-432-0x00000000001D0000-0x00000000001D9000-memory.dmp

memory/1820-467-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2264-470-0x00000000033D0000-0x0000000003404000-memory.dmp

C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build2.exe

MD5 6076ec9fc98856b3b627751f92843a35
SHA1 5520b12ee2f8d39d6c8def16c7d472d08d43ec65
SHA256 a3ec2956fea5d99ce309b2b2209dc4dbcbf5330482ebbe46a754eb8c0885a209
SHA512 36bba1852037db9c81808382bca048cd94dcdbdaa1e7108e39493fa4d48aa9164b79abb44fb2f766592516b586a558d14b20ae6e8ebb131f61d738b892a6d1be

memory/2820-503-0x0000000000280000-0x00000000002DB000-memory.dmp

memory/2820-501-0x00000000024B2000-0x00000000024E5000-memory.dmp

C:\Users\Admin\AppData\Local\8d71c9b4-0b98-410f-8402-a1715f538a24\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-15 15:23

Reported

2023-08-15 15:25

Platform

win10v2004-20230703-en

Max time kernel

139s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Fabookie

spyware stealer fabookie

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Vidar

stealer vidar

Downloads MZ/PE file

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3824 set thread context of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 448 set thread context of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3160 wrote to memory of 2332 N/A N/A C:\Users\Admin\AppData\Local\Temp\AB2F.exe
PID 3160 wrote to memory of 2332 N/A N/A C:\Users\Admin\AppData\Local\Temp\AB2F.exe
PID 3160 wrote to memory of 2332 N/A N/A C:\Users\Admin\AppData\Local\Temp\AB2F.exe
PID 3160 wrote to memory of 4524 N/A N/A C:\Users\Admin\AppData\Local\Temp\AD05.exe
PID 3160 wrote to memory of 4524 N/A N/A C:\Users\Admin\AppData\Local\Temp\AD05.exe
PID 3160 wrote to memory of 4524 N/A N/A C:\Users\Admin\AppData\Local\Temp\AD05.exe
PID 3160 wrote to memory of 3824 N/A N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3160 wrote to memory of 3824 N/A N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3160 wrote to memory of 3824 N/A N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3160 wrote to memory of 448 N/A N/A C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 3160 wrote to memory of 448 N/A N/A C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 3160 wrote to memory of 448 N/A N/A C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 3160 wrote to memory of 4448 N/A N/A C:\Windows\system32\regsvr32.exe
PID 3160 wrote to memory of 4448 N/A N/A C:\Windows\system32\regsvr32.exe
PID 4448 wrote to memory of 4716 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4448 wrote to memory of 4716 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4448 wrote to memory of 4716 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 3824 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\AEDB.exe C:\Users\Admin\AppData\Local\Temp\AEDB.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 448 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\B062.exe C:\Users\Admin\AppData\Local\Temp\B062.exe
PID 3160 wrote to memory of 1248 N/A N/A C:\Windows\system32\regsvr32.exe
PID 3160 wrote to memory of 1248 N/A N/A C:\Windows\system32\regsvr32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe

"C:\Users\Admin\AppData\Local\Temp\34371928b08dbffed7258071a899cd4e59b57a69db04518117dfdc3d5df33cf2_JC.exe"

C:\Users\Admin\AppData\Local\Temp\AB2F.exe

C:\Users\Admin\AppData\Local\Temp\AB2F.exe

C:\Users\Admin\AppData\Local\Temp\AD05.exe

C:\Users\Admin\AppData\Local\Temp\AD05.exe

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

C:\Users\Admin\AppData\Local\Temp\B062.exe

C:\Users\Admin\AppData\Local\Temp\B062.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B4D8.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\B4D8.dll

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

C:\Users\Admin\AppData\Local\Temp\B062.exe

C:\Users\Admin\AppData\Local\Temp\B062.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\C0C0.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\C0C0.dll

C:\Users\Admin\AppData\Local\Temp\C39F.exe

C:\Users\Admin\AppData\Local\Temp\C39F.exe

C:\Users\Admin\AppData\Local\Temp\C6FC.exe

C:\Users\Admin\AppData\Local\Temp\C6FC.exe

C:\Users\Admin\AppData\Local\Temp\D11E.exe

C:\Users\Admin\AppData\Local\Temp\D11E.exe

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\55727432-d171-4ac9-94a2-cdc0a8a65bc1" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

"C:\Users\Admin\AppData\Local\Temp\AEDB.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\DB41.exe

C:\Users\Admin\AppData\Local\Temp\DB41.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=AD05.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeea6046f8,0x7ffeea604708,0x7ffeea604718

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

"C:\Users\Admin\AppData\Local\Temp\AEDB.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\EBEC.exe

C:\Users\Admin\AppData\Local\Temp\EBEC.exe

C:\Users\Admin\AppData\Local\Temp\F543.exe

C:\Users\Admin\AppData\Local\Temp\F543.exe

C:\Users\Admin\AppData\Local\Temp\FE7C.exe

C:\Users\Admin\AppData\Local\Temp\FE7C.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=AD05.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeea6046f8,0x7ffeea604708,0x7ffeea604718

C:\Users\Admin\AppData\Local\Temp\727.exe

C:\Users\Admin\AppData\Local\Temp\727.exe

C:\Users\Admin\AppData\Local\Temp\E0E.exe

C:\Users\Admin\AppData\Local\Temp\E0E.exe

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build2.exe

"C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build2.exe"

C:\Users\Admin\AppData\Local\Temp\1775.exe

C:\Users\Admin\AppData\Local\Temp\1775.exe

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build3.exe

"C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build3.exe"

C:\Users\Admin\AppData\Local\Temp\B062.exe

"C:\Users\Admin\AppData\Local\Temp\B062.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\Temp\4ADB.exe

C:\Users\Admin\AppData\Local\Temp\4ADB.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\63F1.exe

C:\Users\Admin\AppData\Local\Temp\63F1.exe

C:\Users\Admin\AppData\Local\Temp\6615.exe

C:\Users\Admin\AppData\Local\Temp\6615.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6962.dll

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build2.exe

"C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build2.exe"

C:\Users\Admin\AppData\Local\Temp\B062.exe

"C:\Users\Admin\AppData\Local\Temp\B062.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\6BA5.exe

C:\Users\Admin\AppData\Local\Temp\6BA5.exe

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\6962.dll

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1436 -ip 1436

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 3468 -ip 3468

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1

C:\Users\Admin\AppData\Local\Temp\6615.exe

C:\Users\Admin\AppData\Local\Temp\6615.exe

C:\Users\Admin\AppData\Local\Temp\6BA5.exe

C:\Users\Admin\AppData\Local\Temp\6BA5.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\92F5.dll

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:1

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\92F5.dll

C:\Users\Admin\AppData\Local\Temp\97E7.exe

C:\Users\Admin\AppData\Local\Temp\97E7.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 820

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10081519411209708243,4637807517765898265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14077535057509142970,15240661927505582508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:3

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 1440

C:\Users\Admin\AppData\Local\Temp\A565.exe

C:\Users\Admin\AppData\Local\Temp\A565.exe

C:\Users\Admin\AppData\Local\Temp\AF2A.exe

C:\Users\Admin\AppData\Local\Temp\AF2A.exe

C:\Users\Admin\AppData\Local\Temp\6615.exe

"C:\Users\Admin\AppData\Local\Temp\6615.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\C488.exe

C:\Users\Admin\AppData\Local\Temp\C488.exe

C:\Users\Admin\AppData\Local\1135d1d0-99b5-4093-9e2d-97d58f5fc489\build2.exe

"C:\Users\Admin\AppData\Local\1135d1d0-99b5-4093-9e2d-97d58f5fc489\build2.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 812

C:\Users\Admin\AppData\Local\1135d1d0-99b5-4093-9e2d-97d58f5fc489\build2.exe

"C:\Users\Admin\AppData\Local\1135d1d0-99b5-4093-9e2d-97d58f5fc489\build2.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3196 -ip 3196

C:\Users\Admin\AppData\Local\Temp\6BA5.exe

"C:\Users\Admin\AppData\Local\Temp\6BA5.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\1135d1d0-99b5-4093-9e2d-97d58f5fc489\build3.exe

"C:\Users\Admin\AppData\Local\1135d1d0-99b5-4093-9e2d-97d58f5fc489\build3.exe"

C:\Users\Admin\AppData\Local\Temp\6615.exe

"C:\Users\Admin\AppData\Local\Temp\6615.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\6BA5.exe

"C:\Users\Admin\AppData\Local\Temp\6BA5.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\AB2F.exe

C:\Users\Admin\AppData\Local\Temp\AB2F.exe

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\7d1447e8-475e-44bf-9393-b5622be0f8c3\build2.exe

"C:\Users\Admin\AppData\Local\7d1447e8-475e-44bf-9393-b5622be0f8c3\build2.exe"

C:\Users\Admin\AppData\Local\c0a6f742-0de0-40cb-82b2-5964a7c996d0\build2.exe

"C:\Users\Admin\AppData\Local\c0a6f742-0de0-40cb-82b2-5964a7c996d0\build2.exe"

C:\Users\Admin\AppData\Local\Temp\AB2F.exe

"C:\Users\Admin\AppData\Local\Temp\AB2F.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\7d1447e8-475e-44bf-9393-b5622be0f8c3\build3.exe

"C:\Users\Admin\AppData\Local\7d1447e8-475e-44bf-9393-b5622be0f8c3\build3.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 potunulit.org udp
US 188.114.97.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
MX 187.204.4.127:80 colisumy.com tcp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 8.8.8.8:53 127.4.204.187.in-addr.arpa udp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
US 8.8.8.8:53 233.175.169.194.in-addr.arpa udp
MX 187.204.4.127:80 colisumy.com tcp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 101.15.18.104.in-addr.arpa udp
MX 187.204.4.127:80 colisumy.com tcp
US 8.8.8.8:53 admaiscont.com.br udp
US 142.4.24.122:443 admaiscont.com.br tcp
US 8.8.8.8:53 122.24.4.142.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
RU 79.137.192.18:80 79.137.192.18 tcp
US 8.8.8.8:53 18.192.137.79.in-addr.arpa udp
MX 187.204.4.127:80 colisumy.com tcp
US 8.8.8.8:53 zexeq.com udp
KR 183.100.39.157:80 zexeq.com tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
MX 187.204.4.127:80 zexeq.com tcp
KR 183.100.39.157:80 zexeq.com tcp
US 8.8.8.8:53 157.39.100.183.in-addr.arpa udp
US 142.4.24.122:443 admaiscont.com.br tcp
US 8.8.8.8:53 224.104.207.23.in-addr.arpa udp
US 8.8.8.8:53 us.imgjeoigaa.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 learn.microsoft.com udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
HK 103.100.211.218:80 us.imgjeoigaa.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
US 8.8.8.8:53 139.2.85.104.in-addr.arpa udp
US 8.8.8.8:53 218.211.100.103.in-addr.arpa udp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
NL 194.169.175.233:3003 194.169.175.233 tcp
HK 103.100.211.218:80 us.imgjeoigaa.com tcp
US 8.8.8.8:53 99.167.154.149.in-addr.arpa udp
MX 187.204.4.127:80 zexeq.com tcp
US 8.8.8.8:53 45.8.109.52.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 142.4.24.122:443 admaiscont.com.br tcp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
MX 187.204.4.127:80 zexeq.com tcp
US 8.8.8.8:53 36.249.124.192.in-addr.arpa udp
KR 183.100.39.157:80 zexeq.com tcp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 254.131.241.8.in-addr.arpa udp
DE 94.130.190.4:8080 94.130.190.4 tcp
US 8.8.8.8:53 4.190.130.94.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MX 187.204.4.127:80 zexeq.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MX 187.204.4.127:80 zexeq.com tcp
KR 183.100.39.157:80 zexeq.com tcp
KR 183.100.39.157:80 zexeq.com tcp

Files

memory/2596-134-0x0000000002380000-0x0000000002480000-memory.dmp

memory/2596-135-0x0000000002370000-0x0000000002379000-memory.dmp

memory/2596-136-0x0000000000400000-0x00000000022E6000-memory.dmp

memory/3160-137-0x0000000002740000-0x0000000002756000-memory.dmp

memory/2596-138-0x0000000000400000-0x00000000022E6000-memory.dmp

memory/2596-141-0x0000000002370000-0x0000000002379000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AB2F.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\AB2F.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\AD05.exe

MD5 a060fab23a37378e1603bbb37dbcc3c4
SHA1 7b051af36964d2a33a1127aa1bc772437a508cbd
SHA256 0f8eb3245a569035ee103d68752b0e816e83dc01c076d25abdfc98c49ee7001c
SHA512 772b0449895bf34cdb8420aaafa60d424603ed8920be0af4242e30f7f3a13ace96af7622291d92e5eade761d8cd86ac9d389375bb6a4e86e93786d98ac120dfb

C:\Users\Admin\AppData\Local\Temp\AD05.exe

MD5 a060fab23a37378e1603bbb37dbcc3c4
SHA1 7b051af36964d2a33a1127aa1bc772437a508cbd
SHA256 0f8eb3245a569035ee103d68752b0e816e83dc01c076d25abdfc98c49ee7001c
SHA512 772b0449895bf34cdb8420aaafa60d424603ed8920be0af4242e30f7f3a13ace96af7622291d92e5eade761d8cd86ac9d389375bb6a4e86e93786d98ac120dfb

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/4524-159-0x00000000001C0000-0x00000000001F0000-memory.dmp

memory/4524-161-0x0000000000400000-0x000000000043D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B062.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\B062.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\B4D8.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

memory/3824-170-0x0000000003E70000-0x0000000003F07000-memory.dmp

memory/3824-171-0x0000000004040000-0x000000000415B000-memory.dmp

memory/4056-173-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\B4D8.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

C:\Users\Admin\AppData\Local\Temp\B4D8.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

memory/448-176-0x0000000002420000-0x00000000024C1000-memory.dmp

memory/4716-179-0x0000000002460000-0x00000000026D4000-memory.dmp

memory/4056-175-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4056-180-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4716-181-0x0000000002460000-0x00000000026D4000-memory.dmp

memory/4056-187-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B062.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/1644-188-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1644-186-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1644-189-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4716-183-0x0000000000A30000-0x0000000000A36000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C0C0.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

C:\Users\Admin\AppData\Local\Temp\C39F.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

C:\Users\Admin\AppData\Local\Temp\C39F.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

C:\Users\Admin\AppData\Local\Temp\C0C0.dll

MD5 b8dfd5e196e6a5ff54c7a8534cc43225
SHA1 5d6fa2497e8c8910b059c4d156cf93b6d53962d5
SHA256 7e9bc698d3d4fd6ab4d9e155440fd4977d6ffd9f80a786c7be944ed386960277
SHA512 e60c2f66e1aba6ed523d125949d6acd8d04cdad7ef312e5788847d986ac313ca2362b15b4e5f2e7a736959e735955cee50abc1a8bf35558fab0299cf1d8d960d

memory/4384-198-0x0000000002970000-0x0000000002976000-memory.dmp

memory/4384-197-0x0000000000400000-0x0000000000674000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C6FC.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

C:\Users\Admin\AppData\Local\Temp\C6FC.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 979482ca9ef939d4a62f58866cbfeda6
SHA1 b0fcfbc8c9bf35a6c68d777e08a78b482127d34c
SHA256 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35
SHA512 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 a7e8b4fececce4ba44b23c07513df1ce
SHA1 41bd437952390f082bef7862f8d58fd8f48d11e6
SHA256 889ff9a89113a84e3264b30db46a3ba74298582e042e30e2a8bc1cabe7427b6f
SHA512 290a5c7ab13c5c81375ab966078afa89d81635998a762fa7d0d6629ef1cc53bc8c77bd6e7e8fd24816fd1f9d20be88b8b8bb36c93efdba915a287a8925de3e4e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 a7e8b4fececce4ba44b23c07513df1ce
SHA1 41bd437952390f082bef7862f8d58fd8f48d11e6
SHA256 889ff9a89113a84e3264b30db46a3ba74298582e042e30e2a8bc1cabe7427b6f
SHA512 290a5c7ab13c5c81375ab966078afa89d81635998a762fa7d0d6629ef1cc53bc8c77bd6e7e8fd24816fd1f9d20be88b8b8bb36c93efdba915a287a8925de3e4e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 8f05806e76daedf1a46e47d8bffdb3bd
SHA1 b6834f9210f8d533dc3c91275359fc5aaaaba123
SHA256 d46881a7cfc3fdd87a7e7045a6836556809f17fb190bb293aca9ee3a18fcd440
SHA512 3e38cb161441020b48620a3f4b49a76b9b2af6582cbed18c73567207670461e863a6e7e7dd4d0d1b97ac207fa659082ed9d0cdcc2c43a836df425c849523d9ad

C:\Users\Admin\AppData\Local\55727432-d171-4ac9-94a2-cdc0a8a65bc1\B062.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 38fe20464f4566665a3e93bc25958d45
SHA1 f1da804263c20548ab1520bb7f728cba31aa1af9
SHA256 aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a
SHA512 c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 8f05806e76daedf1a46e47d8bffdb3bd
SHA1 b6834f9210f8d533dc3c91275359fc5aaaaba123
SHA256 d46881a7cfc3fdd87a7e7045a6836556809f17fb190bb293aca9ee3a18fcd440
SHA512 3e38cb161441020b48620a3f4b49a76b9b2af6582cbed18c73567207670461e863a6e7e7dd4d0d1b97ac207fa659082ed9d0cdcc2c43a836df425c849523d9ad

C:\Users\Admin\AppData\Local\Temp\D11E.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\D11E.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

memory/4056-225-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\DB41.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\DB41.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\DB41.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

memory/1644-233-0x0000000000400000-0x0000000000537000-memory.dmp

memory/32-235-0x0000000003EB0000-0x0000000003F48000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AEDB.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/1124-238-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1124-239-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EBEC.exe

MD5 20bf668679b53bf93fd34fe26bcbabba
SHA1 91d66b17f5d9b1b8b187bd3bb997fbf440acf435
SHA256 54b3c96cc48eaa3abf603c1ec096ed270159f52c7be1455501b827724f0fb6eb
SHA512 d28ed74e0b6af809ad12b5484cd921e44593a30fccc1b11ddd206ed0508cfbb7601ca52116243ea7146877d570154f2f636d8d708d64aba1001a051522851d13

memory/1124-245-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1124-246-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EBEC.exe

MD5 20bf668679b53bf93fd34fe26bcbabba
SHA1 91d66b17f5d9b1b8b187bd3bb997fbf440acf435
SHA256 54b3c96cc48eaa3abf603c1ec096ed270159f52c7be1455501b827724f0fb6eb
SHA512 d28ed74e0b6af809ad12b5484cd921e44593a30fccc1b11ddd206ed0508cfbb7601ca52116243ea7146877d570154f2f636d8d708d64aba1001a051522851d13

C:\Users\Admin\AppData\Local\Temp\F543.exe

MD5 20bf668679b53bf93fd34fe26bcbabba
SHA1 91d66b17f5d9b1b8b187bd3bb997fbf440acf435
SHA256 54b3c96cc48eaa3abf603c1ec096ed270159f52c7be1455501b827724f0fb6eb
SHA512 d28ed74e0b6af809ad12b5484cd921e44593a30fccc1b11ddd206ed0508cfbb7601ca52116243ea7146877d570154f2f636d8d708d64aba1001a051522851d13

C:\Users\Admin\AppData\Local\Temp\F543.exe

MD5 20bf668679b53bf93fd34fe26bcbabba
SHA1 91d66b17f5d9b1b8b187bd3bb997fbf440acf435
SHA256 54b3c96cc48eaa3abf603c1ec096ed270159f52c7be1455501b827724f0fb6eb
SHA512 d28ed74e0b6af809ad12b5484cd921e44593a30fccc1b11ddd206ed0508cfbb7601ca52116243ea7146877d570154f2f636d8d708d64aba1001a051522851d13

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 38fe20464f4566665a3e93bc25958d45
SHA1 f1da804263c20548ab1520bb7f728cba31aa1af9
SHA256 aa075f76b582d3c8d6aecc2a2b643a6434a818e44b20933625a2c30d21d78d7a
SHA512 c1ed7d73f7864e274259580c432f6efcd5b08251fa7e131d731b8421cfcb440d6436a57bac81fa74db9f12eb3aef8853bdf5454773dc33d89354ba1e9ba2679e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 8411007bafe7b1182af1ad3a1809b4f8
SHA1 4a78ee0762aadd53accae8bb211b8b18dc602070
SHA256 1f274d0d144942d00e43fb94f9c27fc91c68dce50cd374ac6be4472b08215ca3
SHA512 909e2e33b7614cb8bbd14e0dfff1b7f98f4abbf735f88292546ce3bfa665e4cb5ee4418561004e56afc5dd30d21483b05f6358dad5624c0dc3ab1ba9a3be18eb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 979482ca9ef939d4a62f58866cbfeda6
SHA1 b0fcfbc8c9bf35a6c68d777e08a78b482127d34c
SHA256 30581896718a00f5ca49085d01bbb9d715d99231c20c46ee88e3539e7a117c35
SHA512 7baf0e98e8b8245d959cb6d232e366533d5a37bcd57fea13f979d422c019ad458a5b5a7d3b3bbed919750e128792444f692b1d583a8b9a96a83922bea4aa983b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 484e42a899af545673ecf24866528da1
SHA1 33d494992622884c367aa9be1f54c4e529e8369e
SHA256 ab369d3449651bb1c124b6ef96842ade659803f6e45288d455b628a4db1b5b4c
SHA512 098bceec366bdf206268a308c10635bba006d9b96afadc118f34078b3f83eaf7ef55a3635c5134d960f79b1e86c5d6b169dcd536b18d0c4941a99d8667657864

C:\Users\Admin\AppData\Local\55727432-d171-4ac9-94a2-cdc0a8a65bc1\B062.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\FE7C.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Temp\FE7C.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 8411007bafe7b1182af1ad3a1809b4f8
SHA1 4a78ee0762aadd53accae8bb211b8b18dc602070
SHA256 1f274d0d144942d00e43fb94f9c27fc91c68dce50cd374ac6be4472b08215ca3
SHA512 909e2e33b7614cb8bbd14e0dfff1b7f98f4abbf735f88292546ce3bfa665e4cb5ee4418561004e56afc5dd30d21483b05f6358dad5624c0dc3ab1ba9a3be18eb

memory/1124-268-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4716-272-0x0000000002460000-0x00000000026D4000-memory.dmp

memory/1124-270-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4716-275-0x0000000002A20000-0x0000000002B11000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\727.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

memory/1436-278-0x00000000005E0000-0x0000000000AFA000-memory.dmp

memory/1436-281-0x0000000071CF0000-0x00000000724A0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E0E.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

C:\Users\Admin\AppData\Local\Temp\E0E.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

C:\Users\Admin\AppData\Local\Temp\727.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

memory/1124-285-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E0E.exe

MD5 72b7e5dacee6ac82279003a1d8d8cf3d
SHA1 ed859434a8c1d3fe75a9ccdd4eea60d079a0ab4b
SHA256 e93d45fccd72e712cd61bec8a8cbe371e2e2038819260f8d4628a5f24bc5458f
SHA512 d1b8a9a8c5466ed8ed645aa721b0abfe1e9bf58313aadd090476b051eaca73fad8b5df3ec76b081d446ab848675ab91d6fe35666d82c25cde893ce4fc486553e

memory/3912-310-0x0000000071CF0000-0x00000000724A0000-memory.dmp

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build2.exe

MD5 6076ec9fc98856b3b627751f92843a35
SHA1 5520b12ee2f8d39d6c8def16c7d472d08d43ec65
SHA256 a3ec2956fea5d99ce309b2b2209dc4dbcbf5330482ebbe46a754eb8c0885a209
SHA512 36bba1852037db9c81808382bca048cd94dcdbdaa1e7108e39493fa4d48aa9164b79abb44fb2f766592516b586a558d14b20ae6e8ebb131f61d738b892a6d1be

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build2.exe

MD5 6076ec9fc98856b3b627751f92843a35
SHA1 5520b12ee2f8d39d6c8def16c7d472d08d43ec65
SHA256 a3ec2956fea5d99ce309b2b2209dc4dbcbf5330482ebbe46a754eb8c0885a209
SHA512 36bba1852037db9c81808382bca048cd94dcdbdaa1e7108e39493fa4d48aa9164b79abb44fb2f766592516b586a558d14b20ae6e8ebb131f61d738b892a6d1be

memory/1644-317-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1124-313-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 b55630359c256735525cd5b616a3dd9f
SHA1 48536f5de41efa281a134ae09f10736c5693e68c
SHA256 4ad66b686720799c8eb7abaeec6228c166b768c5e857edd53119561a50903139
SHA512 d71c9e1d97a27fb65071db150b563b5419fabcaf629050dd20c3cb0519b644c3ed85373ed90318890665dccf29f381298c26dce5e404c4d8d1c6cff0dc589419

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build2.exe

MD5 6076ec9fc98856b3b627751f92843a35
SHA1 5520b12ee2f8d39d6c8def16c7d472d08d43ec65
SHA256 a3ec2956fea5d99ce309b2b2209dc4dbcbf5330482ebbe46a754eb8c0885a209
SHA512 36bba1852037db9c81808382bca048cd94dcdbdaa1e7108e39493fa4d48aa9164b79abb44fb2f766592516b586a558d14b20ae6e8ebb131f61d738b892a6d1be

memory/1124-300-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1775.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\1775.exe

MD5 287fc87302af4bc85da83450fc5e1189
SHA1 b9eda077e459068fa69c2a93317dcb577b5be81e
SHA256 0e1274030a0b2a26e3635ef393a39c153d0f09346fd22bc64e88b9b7d700340e
SHA512 1b2dc03b101064303f797fabe2c9e44ad28b0792a69222d3240bbdbee2a9f7d98f033128f2cc091b27033363097af01001259c8aaf689d9486eda5775c897cf8

C:\Users\Admin\AppData\Local\Temp\B062.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

memory/1124-330-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 8411007bafe7b1182af1ad3a1809b4f8
SHA1 4a78ee0762aadd53accae8bb211b8b18dc602070
SHA256 1f274d0d144942d00e43fb94f9c27fc91c68dce50cd374ac6be4472b08215ca3
SHA512 909e2e33b7614cb8bbd14e0dfff1b7f98f4abbf735f88292546ce3bfa665e4cb5ee4418561004e56afc5dd30d21483b05f6358dad5624c0dc3ab1ba9a3be18eb

C:\Users\Admin\AppData\Local\Temp\4ADB.exe

MD5 20bf668679b53bf93fd34fe26bcbabba
SHA1 91d66b17f5d9b1b8b187bd3bb997fbf440acf435
SHA256 54b3c96cc48eaa3abf603c1ec096ed270159f52c7be1455501b827724f0fb6eb
SHA512 d28ed74e0b6af809ad12b5484cd921e44593a30fccc1b11ddd206ed0508cfbb7601ca52116243ea7146877d570154f2f636d8d708d64aba1001a051522851d13

C:\Users\Admin\AppData\Local\Temp\4ADB.exe

MD5 20bf668679b53bf93fd34fe26bcbabba
SHA1 91d66b17f5d9b1b8b187bd3bb997fbf440acf435
SHA256 54b3c96cc48eaa3abf603c1ec096ed270159f52c7be1455501b827724f0fb6eb
SHA512 d28ed74e0b6af809ad12b5484cd921e44593a30fccc1b11ddd206ed0508cfbb7601ca52116243ea7146877d570154f2f636d8d708d64aba1001a051522851d13

C:\Users\Admin\AppData\Local\Temp\4ADB.exe

MD5 20bf668679b53bf93fd34fe26bcbabba
SHA1 91d66b17f5d9b1b8b187bd3bb997fbf440acf435
SHA256 54b3c96cc48eaa3abf603c1ec096ed270159f52c7be1455501b827724f0fb6eb
SHA512 d28ed74e0b6af809ad12b5484cd921e44593a30fccc1b11ddd206ed0508cfbb7601ca52116243ea7146877d570154f2f636d8d708d64aba1001a051522851d13

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\a35e94da-5cd8-4f03-b6c2-ea1b71f7b184\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

memory/4716-345-0x0000000002B20000-0x0000000002BFA000-memory.dmp

memory/4716-350-0x0000000002B20000-0x0000000002BFA000-memory.dmp

\??\pipe\LOCAL\crashpad_4820_UXLPNKBPIBWQEJEV

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\63F1.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Temp\6615.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\6615.exe

MD5 ff584d2977080cc482ef59ba8989f523
SHA1 99438b1ea99018216ca2a4486d697614c9b9d19a
SHA256 75e0b55377343ebebb0d55ae63a70ccd0c5e8116de42dda76773ec55e1c3ce24
SHA512 912b28d1f67ab27daed084457c8a2c38b4e291828de0c0e45fa362c9b53fd845ee4e9642309c7185726954bfb8d4566a5f1d499014a464e54636be825d15369b

C:\Users\Admin\AppData\Local\Temp\63F1.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

C:\Users\Admin\AppData\Local\Temp\63F1.exe

MD5 436228b6ce496d3e4a36911f0b0ec465
SHA1 84627f74d472f066d4566ae894c887aa8b983060
SHA256 b6f607785f04df2fcd5fa6d1050b17ef6749e3e9af584e2a47fce3eb623d2088
SHA512 57bc704394564131774c4b898bc592d8314318e022e6f577050bd42edbd55d6d6016a69f23a5c4fdc675bedd080c3ce087d3e2257fcdf45fe4e637b9340c46be

memory/4628-375-0x0000000000400000-0x000000000046F000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b16cd501-0ae9-47a9-b492-92d5a5e585e8.tmp

MD5 7d20a3d62fbfe1983cf73502f3ab1899
SHA1 c671c2cbeda51c63b537cd4a901e0b66c0716868
SHA256 462c8f0eb4fd426a1fe701787feacfbc85c99ba991dc23cc31701908efc58cc0
SHA512 0f060919357bd200a3231fdd5e77f5c637f164c5317697a4176122603c435a9b1ded6915e3c5fa336bb346c6bbe30a57c57bf38139c44a99e82b71ca4f288473

memory/4628-397-0x0000000000400000-0x000000000046F000-memory.dmp

memory/4628-401-0x0000000000400000-0x000000000046F000-memory.dmp

memory/3412-400-0x00000000025FA000-0x000000000262C000-memory.dmp

memory/3896-403-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4716-399-0x0000000002B20000-0x0000000002BFA000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 673377968d0f17706d4e9403239c0563
SHA1 12200256fd612f5b966d500c315f615c36acd026
SHA256 9b08ed10eb171398fe7223d0fa5ac3199d7a787517ccdbd7fc388c288a80b825
SHA512 acb4b59d034e808f0ea05290fb3addf6a0631856886f8a962f5e94651e58031cda6a903192b2a1f66c79f9f2084d82504e6d507f0b35a1feef97dafeb0e260c3

memory/3896-405-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3896-419-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 a7a71dc78290d758ecb02169df7c53d0
SHA1 7247434273fe49611b4c2986994f9486cac0234c
SHA256 9a21241009e84e6b12399b7d13763aa47596a213d82a72953a6fd399eec59779
SHA512 d7c57d1d65fe7930465528d47bc518764cc56afd5189c7e6745c0ab04410787754b81a6855e2b8cd03d606a948870a8d0b715a47e90499e718e54fa7faa6f96d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 e2220bc3d6453ca5d3c8f6c75d04dc0d
SHA1 33e84259c509c399ffe9ecfc48e3dc65f09c622a
SHA256 111d94afacf5e6e00f42acfc5feaaccf1ec734e213727e645d399ec7e37c900a
SHA512 1700922ac3db56e37d734d75d16470ad81fa449bff2c87f48e880e6c85fd7332af5195a3c6f494908a61deb97eff135d3b785c46429ccac3049278c9c91d4789

memory/4384-433-0x0000000002D50000-0x0000000002E41000-memory.dmp

memory/4628-427-0x0000000000400000-0x000000000046F000-memory.dmp

memory/4384-437-0x0000000000400000-0x0000000000674000-memory.dmp

memory/4700-444-0x0000000004000000-0x00000000040A1000-memory.dmp

memory/3912-443-0x0000000071CF0000-0x00000000724A0000-memory.dmp

memory/212-458-0x0000000002960000-0x0000000002A90000-memory.dmp

memory/3196-449-0x0000000003FE0000-0x0000000004076000-memory.dmp

memory/3896-448-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4004-445-0x00007FF6A02A0000-0x00007FF6A02F9000-memory.dmp

memory/212-418-0x00007FF6A02A0000-0x00007FF6A02F9000-memory.dmp

memory/3468-412-0x0000000071CF0000-0x00000000724A0000-memory.dmp

memory/3412-404-0x0000000002570000-0x00000000025CB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 1560b93c7e8572d9269760119315b287
SHA1 6c8d369fbd33708e80d8dfbf76d4556ab5c2a2d7
SHA256 232a93d993db0a50da33d08087633468449b1582c725411700841ba6c21d7ff8
SHA512 9ec5dfa36fc588a70648e8eee98749f07325b2a1da0f29fe40dfbfa1e21d330b6aaec5aada3f28675d7e3ccd017247df9946f591e914972477778a5d06e528d5

memory/1680-374-0x0000000004000000-0x0000000004098000-memory.dmp

memory/212-499-0x00000000027F0000-0x0000000002960000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 a65beccfd844cfadbbf54711a65fc016
SHA1 57f5d7c96a13fba532a27ce84057fcc716ce783c
SHA256 a478352f1d020bec79bb8fde3608ce46b8ccb8226e507eeec55d5b8fa8ab6f24
SHA512 54549909aa9269c03e90462c1e72eaf8e685ec93c0f25d943114f1167fbd214f33f47e202667450225bd966db16766d6a0d92fc51ae6e227740b1e82f30e1b14

memory/5644-502-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1124-504-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

MD5 4a6fc19a5fae3a523cc04ecb179fd12d
SHA1 be8ba2d26bb5c2a563b132900a4e6c383b63ed59
SHA256 bedbd54212dc789389294403a32e423c2a5a1ec4f23d0f592e64e433a18385f6
SHA512 f44ddb51ce932b981a0261dee2dd9d5781199381fdfb54783b75106a0916bfdfda092d34c9c40a8d8dfcdd04a066748729142ae984ea2771da97f528f7c6f868

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 b09e6430bf4a76e7f2fafedcc1aba378
SHA1 b79fde3bf5b393449889f6c8b5c71419c70966ca
SHA256 5179210f3cae5e17e5215b4c74d58ec9d850e4c9cfd74d31a30eb57a136b0536
SHA512 35e7c8aff535e20aad8a6fe70f3f192ae5a145cc6fa1060af3f4ce3bcdf6e507d30e3b37ee40b9b7b55d63c3cb4a35ecd5e8022b03a1434c2558377da76bc0f6

memory/5744-512-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 87c343c3eb9c26d0f7be1e6dac94fa29
SHA1 e11a941e5e7d5dc13554652077cd15b525967e23
SHA256 cb1a734cea8488d2afb2407e6b4246cd9bc9ba73b6147537676e5e3bf0ac3b9e
SHA512 ee56149692b40a5643ca08e2faeacb9839d9b2c6adb1754df10765dce19b6fa46d52302b4fd69338946862e7ac433d8ce755ff92f8ad54b3ac8f3cdaec1b4f67

memory/5972-559-0x0000000000E10000-0x0000000000E16000-memory.dmp

memory/4004-564-0x0000000002E90000-0x0000000002FC0000-memory.dmp

memory/5644-600-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

memory/1436-628-0x0000000071CF0000-0x00000000724A0000-memory.dmp

memory/5744-646-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3196-651-0x0000000071CF0000-0x00000000724A0000-memory.dmp

memory/3468-652-0x0000000071CF0000-0x00000000724A0000-memory.dmp

memory/1436-654-0x0000000071CF0000-0x00000000724A0000-memory.dmp

memory/5900-659-0x0000000002310000-0x0000000002410000-memory.dmp

memory/5940-663-0x0000000002610000-0x00000000026B0000-memory.dmp

memory/5344-669-0x0000000000400000-0x000000000046F000-memory.dmp

memory/5276-673-0x0000000003EE0000-0x0000000003F74000-memory.dmp

memory/3896-677-0x0000000000400000-0x0000000000537000-memory.dmp

memory/212-679-0x0000000002960000-0x0000000002A90000-memory.dmp

memory/4164-681-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5716-689-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2332-693-0x0000000001AF0000-0x0000000001C0B000-memory.dmp

memory/2332-692-0x00000000034E0000-0x0000000003572000-memory.dmp

memory/3992-697-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3196-710-0x0000000071CF0000-0x00000000724A0000-memory.dmp

memory/4004-728-0x0000000002E90000-0x0000000002FC0000-memory.dmp

C:\ProgramData\13130764837695101494661818

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

memory/3992-788-0x0000000000400000-0x0000000000537000-memory.dmp