Analysis Overview
SHA256
16a3aa05cc604401212e91b8b1839a6179106c38526c04db6cebb54a01e8e462
Threat Level: Known bad
The file 2e02d69b243ca36673df03800963433d.bin was found to be: Known bad.
Malicious Activity Summary
Vidar
Detected Djvu ransomware
SmokeLoader
Fabookie
Detect Fabookie payload
Djvu Ransomware
Amadey
RedLine
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Downloads MZ/PE file
Deletes itself
Themida packer
Modifies file permissions
Loads dropped DLL
Reads user/profile data of web browsers
Checks BIOS information in registry
Executes dropped EXE
Checks computer location settings
Adds Run key to start application
Checks whether UAC is enabled
Looks up external IP address via web service
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious use of SetThreadContext
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Program crash
Enumerates physical storage devices
Suspicious use of UnmapMainImage
Creates scheduled task(s)
Suspicious behavior: MapViewOfSection
Delays execution with timeout.exe
Uses Task Scheduler COM API
Suspicious use of WriteProcessMemory
Suspicious behavior: GetForegroundWindowSpam
Checks processor information in registry
Checks SCSI registry key(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-09-13 01:07
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-13 01:07
Reported
2023-09-13 01:10
Platform
win7-20230831-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Amadey
Detect Fabookie payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Fabookie
RedLine
SmokeLoader
Vidar
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\cc.exe | N/A |
Downloads MZ/PE file
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\cc.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\cc.exe | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Themida packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c8aa42d3-4c59-4c01-812b-757f7b3a2082\\A592.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\A592.exe | N/A |
Checks installed software on the system
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\cc.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cc.exe | N/A |
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\aratuwu | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\aratuwu | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Roaming\aratuwu | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 | C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 | C:\Users\Admin\AppData\Local\Temp\AFF3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 | C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 | C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 | C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\AFF3.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aratuwu | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\ADE0.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\A777.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe
"C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe"
C:\Users\Admin\AppData\Local\Temp\A592.exe
C:\Users\Admin\AppData\Local\Temp\A592.exe
C:\Users\Admin\AppData\Local\Temp\A777.exe
C:\Users\Admin\AppData\Local\Temp\A777.exe
C:\Users\Admin\AppData\Local\Temp\A91D.exe
C:\Users\Admin\AppData\Local\Temp\A91D.exe
C:\Users\Admin\AppData\Local\Temp\AC68.exe
C:\Users\Admin\AppData\Local\Temp\AC68.exe
C:\Users\Admin\AppData\Local\Temp\ADE0.exe
C:\Users\Admin\AppData\Local\Temp\ADE0.exe
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B409.dll
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\B409.dll
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\CE5F.exe
C:\Users\Admin\AppData\Local\Temp\CE5F.exe
C:\Users\Admin\AppData\Local\Temp\E395.exe
C:\Users\Admin\AppData\Local\Temp\E395.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:R" /E
C:\Users\Admin\AppData\Local\Temp\A592.exe
C:\Users\Admin\AppData\Local\Temp\A592.exe
C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\c8aa42d3-4c59-4c01-812b-757f7b3a2082" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\cc.exe
"C:\Users\Admin\AppData\Local\Temp\cc.exe"
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
C:\Users\Admin\AppData\Local\Temp\A592.exe
"C:\Users\Admin\AppData\Local\Temp\A592.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
"C:\Users\Admin\AppData\Local\Temp\BD6D.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
"C:\Users\Admin\AppData\Local\Temp\AFF3.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\system32\taskeng.exe
taskeng.exe {447CC46B-24D9-4F7B-B1DA-CC880D269AF0} S-1-5-21-607259312-1573743425-2763420908-1000:NGTQGRML\Admin:Interactive:[1]
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 196
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
"C:\Users\Admin\AppData\Local\Temp\BD6D.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\A592.exe
"C:\Users\Admin\AppData\Local\Temp\A592.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
"C:\Users\Admin\AppData\Local\Temp\AFF3.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe
"C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe"
C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe
"C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe"
C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe
"C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe"
C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe
"C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe"
C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe
"C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe"
C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe
"C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe"
C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build3.exe
"C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build3.exe"
C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build3.exe
"C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build3.exe
"C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build3.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Roaming\aratuwu
C:\Users\Admin\AppData\Roaming\aratuwu
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.97.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| MX | 189.194.9.27:80 | colisumy.com | tcp |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| US | 38.181.25.43:3325 | tcp | |
| MX | 189.194.9.27:80 | colisumy.com | tcp |
| MD | 176.123.9.142:14845 | tcp | |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| GB | 51.38.95.107:42494 | tcp | |
| US | 8.8.8.8:53 | login-sofi.4dq.com | udp |
| DE | 45.79.249.147:443 | login-sofi.4dq.com | tcp |
| DE | 45.79.249.147:443 | login-sofi.4dq.com | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| NL | 194.169.175.232:45450 | tcp | |
| NL | 194.169.175.232:45450 | tcp | |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | transfer.sh | udp |
| DE | 144.76.136.153:443 | transfer.sh | tcp |
| US | 8.8.8.8:53 | apps.identrust.com | udp |
| US | 2.18.121.80:80 | apps.identrust.com | tcp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| US | 95.214.27.254:80 | tcp | |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | z.nnnaajjjgc.com | udp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| MX | 187.212.185.70:80 | colisumy.com | tcp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| MX | 187.212.185.70:80 | colisumy.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| MX | 187.212.185.70:80 | colisumy.com | tcp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 95.214.27.254:80 | tcp | |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | steamcommunity.com | udp |
| JP | 23.207.106.113:443 | steamcommunity.com | tcp |
| DE | 195.201.250.198:80 | 195.201.250.198 | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| JP | 23.207.106.113:443 | steamcommunity.com | tcp |
| DE | 195.201.250.198:80 | 195.201.250.198 | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| JP | 23.207.106.113:443 | steamcommunity.com | tcp |
| DE | 195.201.250.198:80 | 195.201.250.198 | tcp |
| US | 95.214.27.254:80 | tcp | |
| US | 95.214.27.254:80 | tcp |
Files
memory/1276-1-0x0000000000290000-0x0000000000390000-memory.dmp
memory/1276-2-0x0000000000400000-0x00000000022F2000-memory.dmp
memory/1276-3-0x00000000001C0000-0x00000000001C9000-memory.dmp
memory/1192-4-0x0000000002A70000-0x0000000002A86000-memory.dmp
memory/1276-5-0x0000000000400000-0x00000000022F2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\A777.exe
| MD5 | 22daa19ff6bdee095131c478f8e642eb |
| SHA1 | 1c2ddf7319dc5806e18f9098e423016c054655d7 |
| SHA256 | 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861 |
| SHA512 | 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde |
C:\Users\Admin\AppData\Local\Temp\A777.exe
| MD5 | 22daa19ff6bdee095131c478f8e642eb |
| SHA1 | 1c2ddf7319dc5806e18f9098e423016c054655d7 |
| SHA256 | 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861 |
| SHA512 | 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde |
memory/2644-23-0x0000000000400000-0x0000000000443000-memory.dmp
memory/2644-24-0x0000000000230000-0x0000000000260000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\A91D.exe
| MD5 | 3b49ab3a64388ef5be9ecb6c1bfd7bfc |
| SHA1 | 05a45d6c7733aaadff2556a0116fda034649c8ad |
| SHA256 | b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c |
| SHA512 | 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d |
C:\Users\Admin\AppData\Local\Temp\A777.exe
| MD5 | 22daa19ff6bdee095131c478f8e642eb |
| SHA1 | 1c2ddf7319dc5806e18f9098e423016c054655d7 |
| SHA256 | 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861 |
| SHA512 | 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde |
memory/2644-37-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\AC68.exe
| MD5 | 7980cd6aa2f009db138977c965cd2c1e |
| SHA1 | dbd57e3756c356abd5723ed000503a38518722d8 |
| SHA256 | b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4 |
| SHA512 | 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5 |
memory/2644-38-0x0000000000550000-0x0000000000556000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ADE0.exe
| MD5 | 8e80f352faa21ac6bd996e86cd71640a |
| SHA1 | 347e8c111508d0095a05328175c0be5b86677730 |
| SHA256 | eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3 |
| SHA512 | 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038 |
C:\Users\Admin\AppData\Local\Temp\ADE0.exe
| MD5 | 8e80f352faa21ac6bd996e86cd71640a |
| SHA1 | 347e8c111508d0095a05328175c0be5b86677730 |
| SHA256 | eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3 |
| SHA512 | 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038 |
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/2644-51-0x0000000004870000-0x00000000048B0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\B409.dll
| MD5 | ec58238fb3adab49461bce7d58730eca |
| SHA1 | c71c577fb65a59f58d61d4cc05232431e020ed6d |
| SHA256 | 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf |
| SHA512 | 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9 |
memory/2660-54-0x0000000000230000-0x0000000000260000-memory.dmp
memory/2660-58-0x0000000000400000-0x0000000000443000-memory.dmp
memory/2304-59-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2304-60-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2304-61-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2304-62-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2304-63-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
memory/2660-65-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ADE0.exe
| MD5 | 8e80f352faa21ac6bd996e86cd71640a |
| SHA1 | 347e8c111508d0095a05328175c0be5b86677730 |
| SHA256 | eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3 |
| SHA512 | 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038 |
memory/2660-66-0x0000000001E80000-0x0000000001E86000-memory.dmp
memory/2660-67-0x0000000004740000-0x0000000004780000-memory.dmp
\Users\Admin\AppData\Local\Temp\B409.dll
| MD5 | ec58238fb3adab49461bce7d58730eca |
| SHA1 | c71c577fb65a59f58d61d4cc05232431e020ed6d |
| SHA256 | 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf |
| SHA512 | 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9 |
memory/1108-70-0x0000000010000000-0x000000001021E000-memory.dmp
memory/1108-69-0x0000000000130000-0x0000000000136000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/1488-80-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1488-81-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1488-82-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1488-84-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1488-86-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1488-88-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2644-89-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CE5F.exe
| MD5 | 3b49ab3a64388ef5be9ecb6c1bfd7bfc |
| SHA1 | 05a45d6c7733aaadff2556a0116fda034649c8ad |
| SHA256 | b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c |
| SHA512 | 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d |
memory/1488-93-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CE5F.exe
| MD5 | 3b49ab3a64388ef5be9ecb6c1bfd7bfc |
| SHA1 | 05a45d6c7733aaadff2556a0116fda034649c8ad |
| SHA256 | b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c |
| SHA512 | 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d |
memory/1488-95-0x00000000001D0000-0x00000000001D6000-memory.dmp
memory/2644-96-0x0000000004870000-0x00000000048B0000-memory.dmp
memory/2660-97-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E395.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\E395.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/1108-106-0x0000000002410000-0x0000000002512000-memory.dmp
memory/1108-107-0x0000000002520000-0x000000000260A000-memory.dmp
memory/1108-108-0x0000000002520000-0x000000000260A000-memory.dmp
memory/1108-110-0x0000000002520000-0x000000000260A000-memory.dmp
memory/1108-111-0x0000000002520000-0x000000000260A000-memory.dmp
memory/2304-112-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2304-114-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2304-116-0x0000000000400000-0x0000000000430000-memory.dmp
\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/2304-120-0x0000000000260000-0x0000000000266000-memory.dmp
memory/2304-121-0x0000000073EA0000-0x000000007458E000-memory.dmp
memory/1488-122-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/2304-126-0x0000000004BB0000-0x0000000004BF0000-memory.dmp
memory/1488-125-0x0000000000CE0000-0x0000000000D20000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/1336-138-0x0000000073EA0000-0x000000007458E000-memory.dmp
memory/1336-139-0x0000000000AA0000-0x0000000000AE0000-memory.dmp
memory/1796-140-0x0000000000240000-0x00000000002D2000-memory.dmp
memory/1796-141-0x0000000002100000-0x000000000221B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/1160-144-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/1160-147-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
memory/1160-155-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1160-156-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
memory/2660-177-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CabF5E.tmp
| MD5 | f3441b8572aae8801c04f3060b550443 |
| SHA1 | 4ef0a35436125d6821831ef36c28ffaf196cda15 |
| SHA256 | 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf |
| SHA512 | 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9 |
memory/3028-184-0x00000000FFF20000-0x00000000FFF58000-memory.dmp
memory/2304-185-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 4c1ee272cb4210b0050978d94714b895 |
| SHA1 | bd8f311d7340721f626f646c55d1f171cc7406ab |
| SHA256 | 365e705b15493bdb66fadf0097d7c9c7b1da88651ea80aaf38945117b31f651a |
| SHA512 | d60c19f0b19da23bf049a15ce5a3ccdcfefd3f84e352380f84482030b3fa82a3c445602fc79c10a4f9e4229364f430629d7d0e818ca41f7874d2ec3ac1d2d51d |
C:\Users\Admin\AppData\Local\Temp\Tar1089.tmp
| MD5 | 9441737383d21192400eca82fda910ec |
| SHA1 | 725e0d606a4fc9ba44aa8ffde65bed15e65367e4 |
| SHA256 | bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5 |
| SHA512 | 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | f76f3c6b3edbf31d771cfc4d05d894ed |
| SHA1 | 6547c7ca9cc1605a376cd223c9e5fcd5bd00dfc5 |
| SHA256 | b927d565825082f6d8ca37a73d3c8d3d23d20648db7c3c5d8331aa1420f14f08 |
| SHA512 | 2e46a755565c628c54a3477579a2a09cbefa7e0a93cdbe4b628be457ed2afde7606ed651066d68da4aeec83d00c18c111a9a1ed6a89af33c0f12cb4e844e5897 |
memory/2304-257-0x0000000004BB0000-0x0000000004BF0000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9e4cdbdb3b88df2c040d35a2aa070c64 |
| SHA1 | a31d6951f3a85f445876f065445fcd9cff5c093c |
| SHA256 | 4d2c323d6cda0941ecc696019967ff0ed0b8d1fcfd8451c4eb4eb684ab810847 |
| SHA512 | 68b9e47c379083d606d7927c33fdc73ea49b2f35da0ef03054d3e3c170b91c2eba4be9bc855b0f035d53a8234fd0d62bfe6879bba8c72dc017a5d5bd1f779afa |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9d454791f2b4efe235d4d76daa18fa34 |
| SHA1 | ef0dd48bb304d2801d193de40b8fb3a39981f249 |
| SHA256 | d1d9b5f5b0928fb31704e10b29b75a9a3a071c661dad1b072dcd2174c6551e8a |
| SHA512 | 6f522bf2a3f6a4070c25161c9287603361d3dfadecc4ee7421b4f26173a4d54d3093817663515653c3d0b7ad648794b14e53691a00956615efe7be2fe22a0259 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5fad87cdbd38258418a3e179ff8001c3 |
| SHA1 | 987a5f0e5213b2627fed8f217fdbd12d79c6b9d2 |
| SHA256 | 68852d5eaba2588f4c22c4c886608b72a1873d0e40b9fcd703f25ff4cea9878b |
| SHA512 | b815d9246e6596beced8fe18ac635386db794d90b09acce3c0105f3d9bfb811d494e2ea6e7db32a44045f0faee0a8748a94a0d65b131d2e90f9e760752c13d47 |
\Users\Admin\AppData\Local\Temp\cc.exe
| MD5 | b8e2c906c844e0b56ace3307f0434c85 |
| SHA1 | f41315f4741d0b910297586edf7b864d55b62cae |
| SHA256 | abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318 |
| SHA512 | b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2 |
C:\Users\Admin\AppData\Local\Temp\cc.exe
| MD5 | b8e2c906c844e0b56ace3307f0434c85 |
| SHA1 | f41315f4741d0b910297586edf7b864d55b62cae |
| SHA256 | abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318 |
| SHA512 | b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2 |
memory/1488-312-0x000000000B9C0000-0x000000000BF2D000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\cc.exe
| MD5 | b8e2c906c844e0b56ace3307f0434c85 |
| SHA1 | f41315f4741d0b910297586edf7b864d55b62cae |
| SHA256 | abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318 |
| SHA512 | b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2 |
\Users\Admin\AppData\Local\Temp\cc.exe
| MD5 | b8e2c906c844e0b56ace3307f0434c85 |
| SHA1 | f41315f4741d0b910297586edf7b864d55b62cae |
| SHA256 | abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318 |
| SHA512 | b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2 |
memory/1100-320-0x0000000001070000-0x00000000015DD000-memory.dmp
memory/1336-321-0x0000000073EA0000-0x000000007458E000-memory.dmp
memory/1100-323-0x0000000001070000-0x00000000015DD000-memory.dmp
memory/1100-326-0x0000000001070000-0x00000000015DD000-memory.dmp
memory/1100-325-0x0000000001070000-0x00000000015DD000-memory.dmp
memory/1100-324-0x00000000770B0000-0x00000000770B2000-memory.dmp
memory/1488-322-0x000000000B9C0000-0x000000000BF2D000-memory.dmp
memory/1336-327-0x0000000000AA0000-0x0000000000AE0000-memory.dmp
memory/1488-328-0x0000000073EA0000-0x000000007458E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/2524-332-0x0000000003D90000-0x0000000003EAB000-memory.dmp
\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/1160-334-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2524-329-0x0000000003C40000-0x0000000003CD2000-memory.dmp
memory/2076-337-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/2076-344-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1100-345-0x0000000001070000-0x00000000015DD000-memory.dmp
\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/1300-354-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\c8aa42d3-4c59-4c01-812b-757f7b3a2082\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 9622537e51915638708894cb1125d8df |
| SHA1 | 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd |
| SHA256 | 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c |
| SHA512 | 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 6296b4fca340e953da8daf496a8b8a40 |
| SHA1 | 1320a7b0fe0e01193b8feb3226b314cfd4ba7e9b |
| SHA256 | a91a4247ee71c934be8310722ce8012f55669fd9fdebb48da736fc1aa393fb25 |
| SHA512 | fe56459b79fdf2726711334d179f0a9ac8fe51c598a599354e8a496fd65f0a3575a2baf6a97cc1b498f9dd79085c8d63c136e463dfdf3ead1fa74ed48368904b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | cc9ed7948b2c85db174a9eeac471a107 |
| SHA1 | 8f51c863c692ee6a1cd2be4e35aedbfac6c3e3ab |
| SHA256 | 8fc70b493f01fef4d89c45b81237101e7a564349115de177f8be92a7c823adba |
| SHA512 | cd3431ad0ddce31625ef80e9886998274d793b3b00a7ccb3f0222037e4704da6619d6d4ff625eb29112b4517fd4316ddb1ca8616de523e962864fae32ce78156 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 8cb8f90ec602fd3a3e719cb78d8c7cce |
| SHA1 | cdf764f8683ff175fb19bb0ed9e8765e28033e3b |
| SHA256 | da35784b211cae7f4696f5b33b9b2ba9295bfa1016ad92ed28a3d588c1c84651 |
| SHA512 | 939433b40ad73f85b50268616a1717dc3be47087450d7682b4dab5a657a4279a9a61d706b5e6fc24183995a27ab0803d704e0f2fde6e450d3b05d8b4c0bd6395 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 44d8252ef33adba27909d6cae7571289 |
| SHA1 | 897bbd9d952cff69633af8aee780fdd77b5f5de8 |
| SHA256 | b4386bac4712460451b97ebdc3318fc70a3c1d1351f8b5a2882ee65fc7190a00 |
| SHA512 | 8194fb54ffdc0ccc85ad9f56efb1ba8be23ec3a53fce1557ce8eceffdb9b87e40cb3b690405088b74af57b3c7374bae46bbffbbc96a9a4084d3570f71b05516a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3a729d92e9fa9fd2603773e96b17f764 |
| SHA1 | 1cab3e578dbacbd505a10bb47e695b5e480f193d |
| SHA256 | 513519cc5543014172d51962e78cda39a4cdccab9b88b3651366842367a7c8e7 |
| SHA512 | 6ce17b188e6087795622e950ce0cbbfaef48d673a04dacc88f8c3004a6b11580e11697cc3dc20d574e25f8de45654c16d57d50bec822a587b7987c4e1b834000 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 30ae0b324db4b19dc3d31641182268c8 |
| SHA1 | ba0d44de81d935134c0fb98a33e78ee849b1c69b |
| SHA256 | b89b735aac918e46db26bbd3fa2a3c82a9613bf043a8564efc90ff740233c96f |
| SHA512 | 5ff3c7085bc4223762cf0be81b0887e3c0ca44ec0538b23813caa0571a316d99a665509e055a7b5940664b27b6ef50878f84806736973fb388a4d2a1e0f15fb9 |
\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/1160-396-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/1300-406-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2076-410-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3028-497-0x0000000002C50000-0x0000000002DC1000-memory.dmp
memory/3028-499-0x00000000030B0000-0x00000000031E1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/1336-501-0x0000000073EA0000-0x000000007458E000-memory.dmp
memory/2304-502-0x0000000073EA0000-0x000000007458E000-memory.dmp
memory/2644-506-0x0000000073EA0000-0x000000007458E000-memory.dmp
memory/1100-528-0x0000000001070000-0x00000000015DD000-memory.dmp
memory/3028-529-0x00000000030B0000-0x00000000031E1000-memory.dmp
\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\BD6D.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\A592.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/2512-544-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2632-545-0x0000000000400000-0x0000000000537000-memory.dmp
\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
C:\Users\Admin\AppData\Local\Temp\AFF3.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/1548-571-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\bowsakkdestx.txt
| MD5 | e3c640eced72a28f10eac99da233d9fd |
| SHA1 | 1d7678afc24a59de1da0bf74126baf3b8540b5b0 |
| SHA256 | 87de9c0701eab8d410954dc4d3e7e6013ca6a0c8a514969418a12c21135f133e |
| SHA512 | bcb94b7ba487784d343961b24107ea17a82f200961505927ef385caeb0684fbbe1a3482b7d0af7f3766b9ec2c4d6236341b50541cf7b1217acdc0a8b5b37e3d7 |
C:\SystemID\PersonalID.txt
| MD5 | 324770a7653f940b6e66d90455f6e1a8 |
| SHA1 | 5b9edb85029710a458f7a77f474721307d2fb738 |
| SHA256 | 9dda9cd8e2b81a8d0d46e39f4495130246582b673b7ddddef4ebecfeeb6bbc30 |
| SHA512 | 48ae3a8b8a45881285ff6117edd0ca42fe2b06b0d868b2d535f82a9c26157d3c434535d91b7a9f33cf3c627bc49e469bf997077edcfff6b83e4d7e30cf9dea23 |
C:\Users\Admin\AppData\Local\bowsakkdestx.txt
| MD5 | 6ab37c6fd8c563197ef79d09241843f1 |
| SHA1 | cb9bd05e2fc8cc06999a66b7b2d396ff4b5157e5 |
| SHA256 | d4849ec7852d9467f06fde6f25823331dad6bc76e7838d530e990b62286a754f |
| SHA512 | dd1fae67d0f45ba1ec7e56347fdfc2a53f619650892c8a55e7fba80811b6c66d56544b1946a409eaaca06fa9503de20e160360445d959122e5ba3aa85b751cde |
C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
memory/1624-623-0x0000000002410000-0x0000000002510000-memory.dmp
memory/976-626-0x00000000024E0000-0x00000000025E0000-memory.dmp
memory/1624-629-0x0000000000320000-0x0000000000371000-memory.dmp
memory/2512-643-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1616-644-0x0000000000400000-0x0000000000465000-memory.dmp
memory/704-646-0x0000000000400000-0x0000000000465000-memory.dmp
memory/2440-648-0x0000000002430000-0x0000000002530000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1YQ38W2\build3[2].exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\ProgramData\93911260841008643178854163
| MD5 | c9ff7748d8fcef4cf84a5501e996a641 |
| SHA1 | 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9 |
| SHA256 | 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988 |
| SHA512 | d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73 |
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
C:\ProgramData\nss3.dll
| MD5 | 1cc453cdf74f31e4d913ff9c10acdde2 |
| SHA1 | 6e85eae544d6e965f15fa5c39700fa7202f3aafe |
| SHA256 | ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5 |
| SHA512 | dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571 |
C:\ProgramData\88855566828935727583054867
| MD5 | d367ddfda80fdcf578726bc3b0bc3e3c |
| SHA1 | 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671 |
| SHA256 | 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0 |
| SHA512 | 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77 |
Analysis: behavioral2
Detonation Overview
Submitted
2023-09-13 01:07
Reported
2023-09-13 01:10
Platform
win10v2004-20230831-en
Max time kernel
150s
Max time network
154s
Command Line
Signatures
Amadey
Detect Fabookie payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Fabookie
RedLine
SmokeLoader
Vidar
Downloads MZ/PE file
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\5B44.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\346E.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\4E41.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\2AF3.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\346E.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe | N/A |
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\aa95f932-b633-4d6e-aab9-833d1a1184a6\\2AF3.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\2AF3.exe | N/A |
Checks installed software on the system
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\2AF3.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\4E41.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\55D5.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\55D5.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\55D5.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\55D5.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\32D7.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2C7B.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe
"C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe"
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
C:\Users\Admin\AppData\Local\Temp\2C7B.exe
C:\Users\Admin\AppData\Local\Temp\2C7B.exe
C:\Users\Admin\AppData\Local\Temp\2E8F.exe
C:\Users\Admin\AppData\Local\Temp\2E8F.exe
C:\Users\Admin\AppData\Local\Temp\3036.exe
C:\Users\Admin\AppData\Local\Temp\3036.exe
C:\Users\Admin\AppData\Local\Temp\32D7.exe
C:\Users\Admin\AppData\Local\Temp\32D7.exe
C:\Users\Admin\AppData\Local\Temp\346E.exe
C:\Users\Admin\AppData\Local\Temp\346E.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\399F.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\399F.dll
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\4E41.exe
C:\Users\Admin\AppData\Local\Temp\4E41.exe
C:\Users\Admin\AppData\Local\Temp\516F.exe
C:\Users\Admin\AppData\Local\Temp\516F.exe
C:\Users\Admin\AppData\Local\Temp\55D5.exe
C:\Users\Admin\AppData\Local\Temp\55D5.exe
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
C:\Users\Admin\AppData\Local\Temp\5B44.exe
C:\Users\Admin\AppData\Local\Temp\5B44.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F
C:\Users\Admin\AppData\Local\Temp\346E.exe
C:\Users\Admin\AppData\Local\Temp\346E.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\aa95f932-b633-4d6e-aab9-833d1a1184a6" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\346E.exe
"C:\Users\Admin\AppData\Local\Temp\346E.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe"
C:\Users\Admin\AppData\Local\Temp\4E41.exe
C:\Users\Admin\AppData\Local\Temp\4E41.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:N"
C:\Users\Admin\AppData\Local\Temp\4E41.exe
"C:\Users\Admin\AppData\Local\Temp\4E41.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
"C:\Users\Admin\AppData\Local\Temp\2AF3.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:R" /E
C:\Users\Admin\AppData\Local\Temp\346E.exe
"C:\Users\Admin\AppData\Local\Temp\346E.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\4E41.exe
"C:\Users\Admin\AppData\Local\Temp\4E41.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
"C:\Users\Admin\AppData\Local\Temp\2AF3.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe
"C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3208 -ip 3208
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4588 -ip 4588
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 568
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe
"C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 568
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe
"C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 54.120.234.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.97.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| KR | 211.181.24.132:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 0.97.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 132.24.181.211.in-addr.arpa | udp |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| US | 8.8.8.8:53 | 232.175.169.194.in-addr.arpa | udp |
| US | 38.181.25.43:3325 | tcp | |
| US | 8.8.8.8:53 | colisumy.com | udp |
| MX | 187.212.185.70:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 43.25.181.38.in-addr.arpa | udp |
| MD | 176.123.9.142:14845 | tcp | |
| US | 8.8.8.8:53 | 70.185.212.187.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 142.9.123.176.in-addr.arpa | udp |
| NL | 194.169.175.232:45450 | tcp | |
| GB | 51.38.95.107:42494 | tcp | |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| US | 8.8.8.8:53 | 107.95.38.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | login-sofi.4dq.com | udp |
| DE | 45.79.249.147:443 | login-sofi.4dq.com | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | 147.249.79.45.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.192.137.79.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.217.0.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.15.18.104.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| NL | 194.169.175.232:45450 | tcp | |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | z.nnnaajjjgc.com | udp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 254.211.247.8.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 121.72.236.156.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 142.33.222.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | transfer.sh | udp |
| DE | 144.76.136.153:443 | transfer.sh | tcp |
| US | 8.8.8.8:53 | 153.136.76.144.in-addr.arpa | udp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 108.26.221.154.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| MX | 187.212.185.70:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | 233.141.123.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.230.53.211.in-addr.arpa | udp |
| KR | 211.53.230.67:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | 99.167.154.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 36.249.124.192.in-addr.arpa | udp |
| DE | 5.75.211.218:27015 | 5.75.211.218 | tcp |
| US | 8.8.8.8:53 | 218.211.75.5.in-addr.arpa | udp |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | gudintas.at | udp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 3.30.86.95.in-addr.arpa | udp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| MK | 95.86.30.3:80 | gudintas.at | tcp |
| US | 95.214.27.254:80 | tcp | |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | 169.117.168.52.in-addr.arpa | udp |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | host-file-host6.com | udp |
| US | 8.8.8.8:53 | host-host-file8.com | udp |
| NL | 194.169.175.127:80 | host-host-file8.com | tcp |
| US | 8.8.8.8:53 | 127.175.169.194.in-addr.arpa | udp |
Files
memory/1032-1-0x0000000002480000-0x0000000002580000-memory.dmp
memory/1032-2-0x0000000000400000-0x00000000022F2000-memory.dmp
memory/1032-3-0x0000000004040000-0x0000000004049000-memory.dmp
memory/2536-4-0x0000000003490000-0x00000000034A6000-memory.dmp
memory/1032-5-0x0000000000400000-0x00000000022F2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\2C7B.exe
| MD5 | 22daa19ff6bdee095131c478f8e642eb |
| SHA1 | 1c2ddf7319dc5806e18f9098e423016c054655d7 |
| SHA256 | 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861 |
| SHA512 | 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde |
C:\Users\Admin\AppData\Local\Temp\2C7B.exe
| MD5 | 22daa19ff6bdee095131c478f8e642eb |
| SHA1 | 1c2ddf7319dc5806e18f9098e423016c054655d7 |
| SHA256 | 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861 |
| SHA512 | 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde |
memory/2212-19-0x0000000000400000-0x0000000000443000-memory.dmp
memory/2212-20-0x00000000005E0000-0x0000000000610000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2E8F.exe
| MD5 | 3b49ab3a64388ef5be9ecb6c1bfd7bfc |
| SHA1 | 05a45d6c7733aaadff2556a0116fda034649c8ad |
| SHA256 | b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c |
| SHA512 | 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d |
C:\Users\Admin\AppData\Local\Temp\2E8F.exe
| MD5 | 3b49ab3a64388ef5be9ecb6c1bfd7bfc |
| SHA1 | 05a45d6c7733aaadff2556a0116fda034649c8ad |
| SHA256 | b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c |
| SHA512 | 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d |
C:\Users\Admin\AppData\Local\Temp\3036.exe
| MD5 | 7980cd6aa2f009db138977c965cd2c1e |
| SHA1 | dbd57e3756c356abd5723ed000503a38518722d8 |
| SHA256 | b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4 |
| SHA512 | 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5 |
memory/2212-29-0x0000000074B90000-0x0000000075340000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3036.exe
| MD5 | 7980cd6aa2f009db138977c965cd2c1e |
| SHA1 | dbd57e3756c356abd5723ed000503a38518722d8 |
| SHA256 | b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4 |
| SHA512 | 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5 |
C:\Users\Admin\AppData\Local\Temp\32D7.exe
| MD5 | 8e80f352faa21ac6bd996e86cd71640a |
| SHA1 | 347e8c111508d0095a05328175c0be5b86677730 |
| SHA256 | eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3 |
| SHA512 | 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038 |
memory/2212-36-0x0000000004C20000-0x0000000005238000-memory.dmp
memory/2212-39-0x00000000025A0000-0x00000000025B2000-memory.dmp
memory/2212-41-0x0000000004C10000-0x0000000004C20000-memory.dmp
memory/2212-37-0x0000000005240000-0x000000000534A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\346E.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
C:\Users\Admin\AppData\Local\Temp\346E.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/2212-44-0x00000000026D0000-0x000000000270C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\32D7.exe
| MD5 | 8e80f352faa21ac6bd996e86cd71640a |
| SHA1 | 347e8c111508d0095a05328175c0be5b86677730 |
| SHA256 | eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3 |
| SHA512 | 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038 |
memory/452-48-0x0000000000400000-0x0000000000443000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\399F.dll
| MD5 | ec58238fb3adab49461bce7d58730eca |
| SHA1 | c71c577fb65a59f58d61d4cc05232431e020ed6d |
| SHA256 | 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf |
| SHA512 | 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9 |
memory/452-47-0x00000000005F0000-0x0000000000620000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\399F.dll
| MD5 | ec58238fb3adab49461bce7d58730eca |
| SHA1 | c71c577fb65a59f58d61d4cc05232431e020ed6d |
| SHA256 | 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf |
| SHA512 | 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9 |
memory/3996-55-0x0000000010000000-0x000000001021E000-memory.dmp
memory/452-54-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/3996-56-0x00000000011C0000-0x00000000011C6000-memory.dmp
memory/452-58-0x0000000004980000-0x0000000004990000-memory.dmp
memory/4756-59-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4756-60-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/1732-61-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1732-62-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/4756-63-0x0000000005570000-0x0000000005580000-memory.dmp
memory/2212-64-0x0000000074B90000-0x0000000075340000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4E41.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/2212-69-0x0000000004C10000-0x0000000004C20000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4E41.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\516F.exe
| MD5 | 3b49ab3a64388ef5be9ecb6c1bfd7bfc |
| SHA1 | 05a45d6c7733aaadff2556a0116fda034649c8ad |
| SHA256 | b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c |
| SHA512 | 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d |
C:\Users\Admin\AppData\Local\Temp\516F.exe
| MD5 | 3b49ab3a64388ef5be9ecb6c1bfd7bfc |
| SHA1 | 05a45d6c7733aaadff2556a0116fda034649c8ad |
| SHA256 | b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c |
| SHA512 | 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d |
memory/2212-75-0x00000000054C0000-0x0000000005552000-memory.dmp
memory/2212-73-0x0000000005440000-0x00000000054B6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\55D5.exe
| MD5 | 94552b061160d163451a975066161383 |
| SHA1 | 22f28f33e1f7d4574e1961170b1cb0211c6a8fc8 |
| SHA256 | e5c0fee1dc9bc3b97fc9f620bf8ea1c6f23cf7d7129fd19e88bf9de662991523 |
| SHA512 | 3293b4ef5cb5a17f732a762630e6a5f686ccab4bc9c693ba7e0d93c19a8efad769759cb92323f2ebfc0821d6cf9269fca84633dce974469b0b9853c02ac2b48e |
memory/2212-80-0x0000000005560000-0x0000000005B04000-memory.dmp
memory/2212-81-0x0000000005B50000-0x0000000005BB6000-memory.dmp
memory/3400-83-0x0000000003BE0000-0x0000000003C72000-memory.dmp
memory/452-82-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/4604-87-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/4604-85-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3400-84-0x0000000003E00000-0x0000000003F1B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\55D5.exe
| MD5 | 94552b061160d163451a975066161383 |
| SHA1 | 22f28f33e1f7d4574e1961170b1cb0211c6a8fc8 |
| SHA256 | e5c0fee1dc9bc3b97fc9f620bf8ea1c6f23cf7d7129fd19e88bf9de662991523 |
| SHA512 | 3293b4ef5cb5a17f732a762630e6a5f686ccab4bc9c693ba7e0d93c19a8efad769759cb92323f2ebfc0821d6cf9269fca84633dce974469b0b9853c02ac2b48e |
C:\Users\Admin\AppData\Local\Temp\5B44.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/4604-88-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5B44.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/4604-95-0x0000000000400000-0x0000000000537000-memory.dmp
memory/452-96-0x0000000004980000-0x0000000004990000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/4756-105-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/3360-107-0x0000000004200000-0x000000000431B000-memory.dmp
memory/3360-108-0x0000000004020000-0x00000000040B2000-memory.dmp
memory/1732-106-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/5076-114-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4756-117-0x0000000005570000-0x0000000005580000-memory.dmp
memory/5076-115-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\346E.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/5076-109-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3996-116-0x0000000002EC0000-0x0000000002FC2000-memory.dmp
memory/1732-120-0x0000000002D10000-0x0000000002D20000-memory.dmp
memory/2212-119-0x00000000063E0000-0x0000000006430000-memory.dmp
memory/5076-118-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4224-122-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/3996-126-0x0000000002FD0000-0x00000000030BA000-memory.dmp
C:\Users\Admin\AppData\Local\aa95f932-b633-4d6e-aab9-833d1a1184a6\2AF3.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 9622537e51915638708894cb1125d8df |
| SHA1 | 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd |
| SHA256 | 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c |
| SHA512 | 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7 |
memory/3996-132-0x0000000002FD0000-0x00000000030BA000-memory.dmp
memory/3996-135-0x0000000002FD0000-0x00000000030BA000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 8cb8f90ec602fd3a3e719cb78d8c7cce |
| SHA1 | cdf764f8683ff175fb19bb0ed9e8765e28033e3b |
| SHA256 | da35784b211cae7f4696f5b33b9b2ba9295bfa1016ad92ed28a3d588c1c84651 |
| SHA512 | 939433b40ad73f85b50268616a1717dc3be47087450d7682b4dab5a657a4279a9a61d706b5e6fc24183995a27ab0803d704e0f2fde6e450d3b05d8b4c0bd6395 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 85b85bcb14c6940802359d0f79e00d2d |
| SHA1 | 96915fa7f242ec94da2228ec67d81b7720d0afe6 |
| SHA256 | b4e688453ec7a745d180588f4a956f33481e9b63fd230e396fbc09e3589e05f9 |
| SHA512 | b640ad1a53870121eeadee4c8d336d19773ce9db648d4fefcee9a251aa6e4dca1d254aa697adcdfbac374cbb7e685745e01f86761f9460a6006952cee550d0a9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | d634d274e5ceee547ec11762692850c5 |
| SHA1 | 143f28e6ec0e4aca74ccea48c643d66dca98823d |
| SHA256 | 2af2bfadfebf0308866e7705ecc26074511399fa57a9446cfec83623995ac6c7 |
| SHA512 | edd468b6bd5c1f8f72386623bb04163fab9a6bf38795a634d70950e373e602d600544ad6baad938af0d4a6f614c4c81b2018c233447fe6edc978973ccce49dd6 |
memory/4224-133-0x00000000053A0000-0x00000000053B0000-memory.dmp
memory/1732-136-0x0000000008F60000-0x0000000009122000-memory.dmp
memory/1732-137-0x0000000009660000-0x0000000009B8C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
memory/4604-152-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4216-151-0x00007FF691490000-0x00007FF6914C8000-memory.dmp
memory/3996-156-0x0000000002FD0000-0x00000000030BA000-memory.dmp
memory/5076-153-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\346E.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
C:\Users\Admin\AppData\Local\Temp\4E41.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/3928-159-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3928-160-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3928-161-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4564-162-0x0000000003B60000-0x0000000003B75000-memory.dmp
memory/4564-163-0x00000000020E0000-0x00000000020E9000-memory.dmp
memory/4564-164-0x0000000000400000-0x0000000002081000-memory.dmp
C:\Users\Admin\AppData\Local\aa95f932-b633-4d6e-aab9-833d1a1184a6\2AF3.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
C:\Users\Admin\AppData\Local\Temp\4E41.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/3928-174-0x0000000000400000-0x0000000000537000-memory.dmp
memory/452-177-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/4604-178-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/4756-184-0x0000000074B90000-0x0000000075340000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
| MD5 | 9b756bc85e5324eb8f87a69e3f9959ab |
| SHA1 | 1778b2e2d6a00c421578a284db1e743931611d66 |
| SHA256 | e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e |
| SHA512 | c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8 |
memory/4224-185-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/4216-186-0x00000000034B0000-0x0000000003621000-memory.dmp
memory/4216-187-0x0000000003630000-0x0000000003761000-memory.dmp
memory/4224-188-0x00000000053A0000-0x00000000053B0000-memory.dmp
memory/1732-191-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/2536-192-0x0000000003510000-0x0000000003526000-memory.dmp
memory/4564-194-0x0000000000400000-0x0000000002081000-memory.dmp
memory/4300-200-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2212-199-0x0000000074B90000-0x0000000075340000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\346E.exe
| MD5 | 75747bfd55fe1ae1d3cfef6264ec582b |
| SHA1 | 783e5538edcca02d061dd21085097f2d104ea098 |
| SHA256 | abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f |
| SHA512 | 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e |
memory/4300-201-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4300-202-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4224-203-0x0000000074B90000-0x0000000075340000-memory.dmp
memory/4216-204-0x0000000003630000-0x0000000003761000-memory.dmp
memory/4588-213-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4588-215-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4300-214-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4E41.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/4300-211-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4300-208-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4588-220-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\2AF3.exe
| MD5 | 49b904e73ee16058ca948bf728febd94 |
| SHA1 | 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b |
| SHA256 | bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed |
| SHA512 | 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f |
memory/3208-231-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
memory/3208-233-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
memory/3208-227-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3424-235-0x0000000002500000-0x0000000002600000-memory.dmp
memory/3424-236-0x0000000002480000-0x00000000024D1000-memory.dmp
memory/4412-237-0x0000000000400000-0x0000000000465000-memory.dmp
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
memory/4412-239-0x0000000000400000-0x0000000000465000-memory.dmp
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
memory/4412-241-0x0000000000400000-0x0000000000465000-memory.dmp
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\ProgramData\nss3.dll
| MD5 | 1cc453cdf74f31e4d913ff9c10acdde2 |
| SHA1 | 6e85eae544d6e965f15fa5c39700fa7202f3aafe |
| SHA256 | ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5 |
| SHA512 | dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571 |
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
memory/4412-314-0x0000000000400000-0x0000000000465000-memory.dmp
C:\Users\Admin\AppData\Roaming\vbshfbi
| MD5 | 94552b061160d163451a975066161383 |
| SHA1 | 22f28f33e1f7d4574e1961170b1cb0211c6a8fc8 |
| SHA256 | e5c0fee1dc9bc3b97fc9f620bf8ea1c6f23cf7d7129fd19e88bf9de662991523 |
| SHA512 | 3293b4ef5cb5a17f732a762630e6a5f686ccab4bc9c693ba7e0d93c19a8efad769759cb92323f2ebfc0821d6cf9269fca84633dce974469b0b9853c02ac2b48e |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
memory/3352-340-0x0000000002400000-0x0000000002409000-memory.dmp
memory/428-343-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
memory/3352-339-0x00000000023E0000-0x00000000023F5000-memory.dmp
memory/428-344-0x0000000000400000-0x0000000000409000-memory.dmp
memory/428-352-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |