Malware Analysis Report

2025-04-14 07:17

Sample ID 230913-bgy3nabd45
Target 2e02d69b243ca36673df03800963433d.bin
SHA256 16a3aa05cc604401212e91b8b1839a6179106c38526c04db6cebb54a01e8e462
Tags
amadey djvu fabookie redline smokeloader vidar 7b01483643983171e949f923c5bc80e7 logsdiller cloud (tg: @logsdillabot) lux3 smokiez_build backdoor discovery evasion infostealer persistence ransomware spyware stealer themida trojan pub1 up3
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

16a3aa05cc604401212e91b8b1839a6179106c38526c04db6cebb54a01e8e462

Threat Level: Known bad

The file 2e02d69b243ca36673df03800963433d.bin was found to be: Known bad.

Malicious Activity Summary

amadey djvu fabookie redline smokeloader vidar 7b01483643983171e949f923c5bc80e7 logsdiller cloud (tg: @logsdillabot) lux3 smokiez_build backdoor discovery evasion infostealer persistence ransomware spyware stealer themida trojan pub1 up3

Vidar

Detected Djvu ransomware

SmokeLoader

Fabookie

Detect Fabookie payload

Djvu Ransomware

Amadey

RedLine

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Deletes itself

Themida packer

Modifies file permissions

Loads dropped DLL

Reads user/profile data of web browsers

Checks BIOS information in registry

Executes dropped EXE

Checks computer location settings

Adds Run key to start application

Checks whether UAC is enabled

Looks up external IP address via web service

Accesses 2FA software files, possible credential harvesting

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks installed software on the system

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Program crash

Enumerates physical storage devices

Suspicious use of UnmapMainImage

Creates scheduled task(s)

Suspicious behavior: MapViewOfSection

Delays execution with timeout.exe

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Checks processor information in registry

Checks SCSI registry key(s)

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-09-13 01:07

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-13 01:07

Reported

2023-09-13 01:10

Platform

win7-20230831-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe"

Signatures

Amadey

trojan amadey

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Fabookie

spyware stealer fabookie

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Vidar

stealer vidar

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\cc.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\cc.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A777.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ADE0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\CE5F.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\E395.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\aratuwu N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\E395.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses 2FA software files, possible credential harvesting

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c8aa42d3-4c59-4c01-812b-757f7b3a2082\\A592.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\A592.exe N/A

Checks installed software on the system

discovery

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\cc.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2520 set thread context of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 set thread context of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1204 set thread context of 1336 N/A C:\Users\Admin\AppData\Local\Temp\CE5F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1796 set thread context of 1160 N/A C:\Users\Admin\AppData\Local\Temp\A592.exe C:\Users\Admin\AppData\Local\Temp\A592.exe
PID 2524 set thread context of 2076 N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe C:\Users\Admin\AppData\Local\Temp\AFF3.exe
PID 780 set thread context of 1300 N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe C:\Users\Admin\AppData\Local\Temp\BD6D.exe
PID 1100 set thread context of 1520 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2876 set thread context of 2512 N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe C:\Users\Admin\AppData\Local\Temp\BD6D.exe
PID 580 set thread context of 2632 N/A C:\Users\Admin\AppData\Local\Temp\A592.exe C:\Users\Admin\AppData\Local\Temp\A592.exe
PID 2892 set thread context of 1548 N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe C:\Users\Admin\AppData\Local\Temp\AFF3.exe
PID 976 set thread context of 1616 N/A C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe
PID 1624 set thread context of 704 N/A C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe
PID 2440 set thread context of 1668 N/A C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Roaming\aratuwu N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Roaming\aratuwu N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Roaming\aratuwu N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e C:\Users\Admin\AppData\Local\Temp\AFF3.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\aratuwu N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ADE0.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\A777.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1192 wrote to memory of 1796 N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe
PID 1192 wrote to memory of 1796 N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe
PID 1192 wrote to memory of 1796 N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe
PID 1192 wrote to memory of 1796 N/A N/A C:\Users\Admin\AppData\Local\Temp\A592.exe
PID 1192 wrote to memory of 2644 N/A N/A C:\Users\Admin\AppData\Local\Temp\A777.exe
PID 1192 wrote to memory of 2644 N/A N/A C:\Users\Admin\AppData\Local\Temp\A777.exe
PID 1192 wrote to memory of 2644 N/A N/A C:\Users\Admin\AppData\Local\Temp\A777.exe
PID 1192 wrote to memory of 2644 N/A N/A C:\Users\Admin\AppData\Local\Temp\A777.exe
PID 1192 wrote to memory of 2748 N/A N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe
PID 1192 wrote to memory of 2748 N/A N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe
PID 1192 wrote to memory of 2748 N/A N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe
PID 1192 wrote to memory of 2748 N/A N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe
PID 1192 wrote to memory of 2520 N/A N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe
PID 1192 wrote to memory of 2520 N/A N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe
PID 1192 wrote to memory of 2520 N/A N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe
PID 1192 wrote to memory of 2520 N/A N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe
PID 1192 wrote to memory of 2660 N/A N/A C:\Users\Admin\AppData\Local\Temp\ADE0.exe
PID 1192 wrote to memory of 2660 N/A N/A C:\Users\Admin\AppData\Local\Temp\ADE0.exe
PID 1192 wrote to memory of 2660 N/A N/A C:\Users\Admin\AppData\Local\Temp\ADE0.exe
PID 1192 wrote to memory of 2660 N/A N/A C:\Users\Admin\AppData\Local\Temp\ADE0.exe
PID 1192 wrote to memory of 2524 N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe
PID 1192 wrote to memory of 2524 N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe
PID 1192 wrote to memory of 2524 N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe
PID 1192 wrote to memory of 2524 N/A N/A C:\Users\Admin\AppData\Local\Temp\AFF3.exe
PID 1192 wrote to memory of 2984 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1192 wrote to memory of 2984 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1192 wrote to memory of 2984 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1192 wrote to memory of 2984 N/A N/A C:\Windows\system32\regsvr32.exe
PID 1192 wrote to memory of 2984 N/A N/A C:\Windows\system32\regsvr32.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2984 wrote to memory of 1108 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2984 wrote to memory of 1108 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2984 wrote to memory of 1108 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2984 wrote to memory of 1108 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2984 wrote to memory of 1108 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2984 wrote to memory of 1108 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2984 wrote to memory of 1108 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2748 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\A91D.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1192 wrote to memory of 780 N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe
PID 1192 wrote to memory of 780 N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe
PID 1192 wrote to memory of 780 N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe
PID 1192 wrote to memory of 780 N/A N/A C:\Users\Admin\AppData\Local\Temp\BD6D.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2520 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\AC68.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1192 wrote to memory of 1204 N/A N/A C:\Users\Admin\AppData\Local\Temp\CE5F.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe

"C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe"

C:\Users\Admin\AppData\Local\Temp\A592.exe

C:\Users\Admin\AppData\Local\Temp\A592.exe

C:\Users\Admin\AppData\Local\Temp\A777.exe

C:\Users\Admin\AppData\Local\Temp\A777.exe

C:\Users\Admin\AppData\Local\Temp\A91D.exe

C:\Users\Admin\AppData\Local\Temp\A91D.exe

C:\Users\Admin\AppData\Local\Temp\AC68.exe

C:\Users\Admin\AppData\Local\Temp\AC68.exe

C:\Users\Admin\AppData\Local\Temp\ADE0.exe

C:\Users\Admin\AppData\Local\Temp\ADE0.exe

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B409.dll

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\B409.dll

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Users\Admin\AppData\Local\Temp\CE5F.exe

C:\Users\Admin\AppData\Local\Temp\CE5F.exe

C:\Users\Admin\AppData\Local\Temp\E395.exe

C:\Users\Admin\AppData\Local\Temp\E395.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\A592.exe

C:\Users\Admin\AppData\Local\Temp\A592.exe

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\c8aa42d3-4c59-4c01-812b-757f7b3a2082" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\cc.exe

"C:\Users\Admin\AppData\Local\Temp\cc.exe"

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

C:\Users\Admin\AppData\Local\Temp\A592.exe

"C:\Users\Admin\AppData\Local\Temp\A592.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

"C:\Users\Admin\AppData\Local\Temp\BD6D.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

"C:\Users\Admin\AppData\Local\Temp\AFF3.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\system32\taskeng.exe

taskeng.exe {447CC46B-24D9-4F7B-B1DA-CC880D269AF0} S-1-5-21-607259312-1573743425-2763420908-1000:NGTQGRML\Admin:Interactive:[1]

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 196

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

"C:\Users\Admin\AppData\Local\Temp\BD6D.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\A592.exe

"C:\Users\Admin\AppData\Local\Temp\A592.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

"C:\Users\Admin\AppData\Local\Temp\AFF3.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe

"C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe"

C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe

"C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe"

C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe

"C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe"

C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe

"C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build2.exe"

C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe

"C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe"

C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe

"C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build2.exe"

C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build3.exe

"C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build3.exe"

C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build3.exe

"C:\Users\Admin\AppData\Local\e4b07f47-c4f2-44e6-bbf9-ae61cc061a97\build3.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build3.exe

"C:\Users\Admin\AppData\Local\9f6cc9b3-dd8c-46ee-9a06-f066bd3e8d5c\build3.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Roaming\aratuwu

C:\Users\Admin\AppData\Roaming\aratuwu

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 potunulit.org udp
US 188.114.97.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
MX 189.194.9.27:80 colisumy.com tcp
NL 194.169.175.232:80 194.169.175.232 tcp
US 38.181.25.43:3325 tcp
MX 189.194.9.27:80 colisumy.com tcp
MD 176.123.9.142:14845 tcp
NL 194.169.175.232:80 194.169.175.232 tcp
GB 51.38.95.107:42494 tcp
US 8.8.8.8:53 login-sofi.4dq.com udp
DE 45.79.249.147:443 login-sofi.4dq.com tcp
DE 45.79.249.147:443 login-sofi.4dq.com tcp
RU 79.137.192.18:80 79.137.192.18 tcp
NL 194.169.175.232:45450 tcp
NL 194.169.175.232:45450 tcp
RU 79.137.192.18:80 79.137.192.18 tcp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 apps.identrust.com udp
US 2.18.121.80:80 apps.identrust.com tcp
US 8.8.8.8:53 api.2ip.ua udp
US 95.214.27.254:80 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 z.nnnaajjjgc.com udp
MU 156.236.72.121:443 z.nnnaajjjgc.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 colisumy.com udp
US 8.8.8.8:53 zexeq.com udp
KR 211.53.230.67:80 zexeq.com tcp
MX 187.212.185.70:80 colisumy.com tcp
KR 211.53.230.67:80 zexeq.com tcp
MX 187.212.185.70:80 colisumy.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MX 187.212.185.70:80 colisumy.com tcp
KR 211.53.230.67:80 zexeq.com tcp
KR 211.53.230.67:80 zexeq.com tcp
KR 211.53.230.67:80 zexeq.com tcp
KR 211.53.230.67:80 zexeq.com tcp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
US 95.214.27.254:80 tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 steamcommunity.com udp
JP 23.207.106.113:443 steamcommunity.com tcp
DE 195.201.250.198:80 195.201.250.198 tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
JP 23.207.106.113:443 steamcommunity.com tcp
DE 195.201.250.198:80 195.201.250.198 tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
JP 23.207.106.113:443 steamcommunity.com tcp
DE 195.201.250.198:80 195.201.250.198 tcp
US 95.214.27.254:80 tcp
US 95.214.27.254:80 tcp

Files

memory/1276-1-0x0000000000290000-0x0000000000390000-memory.dmp

memory/1276-2-0x0000000000400000-0x00000000022F2000-memory.dmp

memory/1276-3-0x00000000001C0000-0x00000000001C9000-memory.dmp

memory/1192-4-0x0000000002A70000-0x0000000002A86000-memory.dmp

memory/1276-5-0x0000000000400000-0x00000000022F2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\A777.exe

MD5 22daa19ff6bdee095131c478f8e642eb
SHA1 1c2ddf7319dc5806e18f9098e423016c054655d7
SHA256 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861
SHA512 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde

C:\Users\Admin\AppData\Local\Temp\A777.exe

MD5 22daa19ff6bdee095131c478f8e642eb
SHA1 1c2ddf7319dc5806e18f9098e423016c054655d7
SHA256 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861
SHA512 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde

memory/2644-23-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2644-24-0x0000000000230000-0x0000000000260000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A91D.exe

MD5 3b49ab3a64388ef5be9ecb6c1bfd7bfc
SHA1 05a45d6c7733aaadff2556a0116fda034649c8ad
SHA256 b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c
SHA512 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d

C:\Users\Admin\AppData\Local\Temp\A777.exe

MD5 22daa19ff6bdee095131c478f8e642eb
SHA1 1c2ddf7319dc5806e18f9098e423016c054655d7
SHA256 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861
SHA512 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde

memory/2644-37-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AC68.exe

MD5 7980cd6aa2f009db138977c965cd2c1e
SHA1 dbd57e3756c356abd5723ed000503a38518722d8
SHA256 b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4
SHA512 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5

memory/2644-38-0x0000000000550000-0x0000000000556000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ADE0.exe

MD5 8e80f352faa21ac6bd996e86cd71640a
SHA1 347e8c111508d0095a05328175c0be5b86677730
SHA256 eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3
SHA512 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038

C:\Users\Admin\AppData\Local\Temp\ADE0.exe

MD5 8e80f352faa21ac6bd996e86cd71640a
SHA1 347e8c111508d0095a05328175c0be5b86677730
SHA256 eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3
SHA512 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/2644-51-0x0000000004870000-0x00000000048B0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B409.dll

MD5 ec58238fb3adab49461bce7d58730eca
SHA1 c71c577fb65a59f58d61d4cc05232431e020ed6d
SHA256 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf
SHA512 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9

memory/2660-54-0x0000000000230000-0x0000000000260000-memory.dmp

memory/2660-58-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2304-59-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2304-60-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2304-61-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2304-62-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2304-63-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2660-65-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ADE0.exe

MD5 8e80f352faa21ac6bd996e86cd71640a
SHA1 347e8c111508d0095a05328175c0be5b86677730
SHA256 eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3
SHA512 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038

memory/2660-66-0x0000000001E80000-0x0000000001E86000-memory.dmp

memory/2660-67-0x0000000004740000-0x0000000004780000-memory.dmp

\Users\Admin\AppData\Local\Temp\B409.dll

MD5 ec58238fb3adab49461bce7d58730eca
SHA1 c71c577fb65a59f58d61d4cc05232431e020ed6d
SHA256 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf
SHA512 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9

memory/1108-70-0x0000000010000000-0x000000001021E000-memory.dmp

memory/1108-69-0x0000000000130000-0x0000000000136000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/1488-80-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1488-81-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1488-82-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1488-84-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1488-86-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1488-88-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2644-89-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CE5F.exe

MD5 3b49ab3a64388ef5be9ecb6c1bfd7bfc
SHA1 05a45d6c7733aaadff2556a0116fda034649c8ad
SHA256 b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c
SHA512 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d

memory/1488-93-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CE5F.exe

MD5 3b49ab3a64388ef5be9ecb6c1bfd7bfc
SHA1 05a45d6c7733aaadff2556a0116fda034649c8ad
SHA256 b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c
SHA512 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d

memory/1488-95-0x00000000001D0000-0x00000000001D6000-memory.dmp

memory/2644-96-0x0000000004870000-0x00000000048B0000-memory.dmp

memory/2660-97-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E395.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\E395.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/1108-106-0x0000000002410000-0x0000000002512000-memory.dmp

memory/1108-107-0x0000000002520000-0x000000000260A000-memory.dmp

memory/1108-108-0x0000000002520000-0x000000000260A000-memory.dmp

memory/1108-110-0x0000000002520000-0x000000000260A000-memory.dmp

memory/1108-111-0x0000000002520000-0x000000000260A000-memory.dmp

memory/2304-112-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2304-114-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2304-116-0x0000000000400000-0x0000000000430000-memory.dmp

\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/2304-120-0x0000000000260000-0x0000000000266000-memory.dmp

memory/2304-121-0x0000000073EA0000-0x000000007458E000-memory.dmp

memory/1488-122-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/2304-126-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

memory/1488-125-0x0000000000CE0000-0x0000000000D20000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/1336-138-0x0000000073EA0000-0x000000007458E000-memory.dmp

memory/1336-139-0x0000000000AA0000-0x0000000000AE0000-memory.dmp

memory/1796-140-0x0000000000240000-0x00000000002D2000-memory.dmp

memory/1796-141-0x0000000002100000-0x000000000221B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/1160-144-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1160-147-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

memory/1160-155-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1160-156-0x0000000000400000-0x0000000000537000-memory.dmp

\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

memory/2660-177-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabF5E.tmp

MD5 f3441b8572aae8801c04f3060b550443
SHA1 4ef0a35436125d6821831ef36c28ffaf196cda15
SHA256 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA512 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

memory/3028-184-0x00000000FFF20000-0x00000000FFF58000-memory.dmp

memory/2304-185-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4c1ee272cb4210b0050978d94714b895
SHA1 bd8f311d7340721f626f646c55d1f171cc7406ab
SHA256 365e705b15493bdb66fadf0097d7c9c7b1da88651ea80aaf38945117b31f651a
SHA512 d60c19f0b19da23bf049a15ce5a3ccdcfefd3f84e352380f84482030b3fa82a3c445602fc79c10a4f9e4229364f430629d7d0e818ca41f7874d2ec3ac1d2d51d

C:\Users\Admin\AppData\Local\Temp\Tar1089.tmp

MD5 9441737383d21192400eca82fda910ec
SHA1 725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256 bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA512 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f76f3c6b3edbf31d771cfc4d05d894ed
SHA1 6547c7ca9cc1605a376cd223c9e5fcd5bd00dfc5
SHA256 b927d565825082f6d8ca37a73d3c8d3d23d20648db7c3c5d8331aa1420f14f08
SHA512 2e46a755565c628c54a3477579a2a09cbefa7e0a93cdbe4b628be457ed2afde7606ed651066d68da4aeec83d00c18c111a9a1ed6a89af33c0f12cb4e844e5897

memory/2304-257-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9e4cdbdb3b88df2c040d35a2aa070c64
SHA1 a31d6951f3a85f445876f065445fcd9cff5c093c
SHA256 4d2c323d6cda0941ecc696019967ff0ed0b8d1fcfd8451c4eb4eb684ab810847
SHA512 68b9e47c379083d606d7927c33fdc73ea49b2f35da0ef03054d3e3c170b91c2eba4be9bc855b0f035d53a8234fd0d62bfe6879bba8c72dc017a5d5bd1f779afa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9d454791f2b4efe235d4d76daa18fa34
SHA1 ef0dd48bb304d2801d193de40b8fb3a39981f249
SHA256 d1d9b5f5b0928fb31704e10b29b75a9a3a071c661dad1b072dcd2174c6551e8a
SHA512 6f522bf2a3f6a4070c25161c9287603361d3dfadecc4ee7421b4f26173a4d54d3093817663515653c3d0b7ad648794b14e53691a00956615efe7be2fe22a0259

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5fad87cdbd38258418a3e179ff8001c3
SHA1 987a5f0e5213b2627fed8f217fdbd12d79c6b9d2
SHA256 68852d5eaba2588f4c22c4c886608b72a1873d0e40b9fcd703f25ff4cea9878b
SHA512 b815d9246e6596beced8fe18ac635386db794d90b09acce3c0105f3d9bfb811d494e2ea6e7db32a44045f0faee0a8748a94a0d65b131d2e90f9e760752c13d47

\Users\Admin\AppData\Local\Temp\cc.exe

MD5 b8e2c906c844e0b56ace3307f0434c85
SHA1 f41315f4741d0b910297586edf7b864d55b62cae
SHA256 abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318
SHA512 b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2

C:\Users\Admin\AppData\Local\Temp\cc.exe

MD5 b8e2c906c844e0b56ace3307f0434c85
SHA1 f41315f4741d0b910297586edf7b864d55b62cae
SHA256 abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318
SHA512 b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2

memory/1488-312-0x000000000B9C0000-0x000000000BF2D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cc.exe

MD5 b8e2c906c844e0b56ace3307f0434c85
SHA1 f41315f4741d0b910297586edf7b864d55b62cae
SHA256 abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318
SHA512 b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2

\Users\Admin\AppData\Local\Temp\cc.exe

MD5 b8e2c906c844e0b56ace3307f0434c85
SHA1 f41315f4741d0b910297586edf7b864d55b62cae
SHA256 abb998959f0c49173d73878b8db3cf1da9d594f7a19f89a0162428e8fc521318
SHA512 b0927d3a0d4277acad891464f3b182174f8d946d7a92189e08ad5909adcc3540e24441fb5b3158406620c59a9ee4ffa86f68ece926dcf8132d0388af171882a2

memory/1100-320-0x0000000001070000-0x00000000015DD000-memory.dmp

memory/1336-321-0x0000000073EA0000-0x000000007458E000-memory.dmp

memory/1100-323-0x0000000001070000-0x00000000015DD000-memory.dmp

memory/1100-326-0x0000000001070000-0x00000000015DD000-memory.dmp

memory/1100-325-0x0000000001070000-0x00000000015DD000-memory.dmp

memory/1100-324-0x00000000770B0000-0x00000000770B2000-memory.dmp

memory/1488-322-0x000000000B9C0000-0x000000000BF2D000-memory.dmp

memory/1336-327-0x0000000000AA0000-0x0000000000AE0000-memory.dmp

memory/1488-328-0x0000000073EA0000-0x000000007458E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/2524-332-0x0000000003D90000-0x0000000003EAB000-memory.dmp

\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/1160-334-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2524-329-0x0000000003C40000-0x0000000003CD2000-memory.dmp

memory/2076-337-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/2076-344-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1100-345-0x0000000001070000-0x00000000015DD000-memory.dmp

\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/1300-354-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\c8aa42d3-4c59-4c01-812b-757f7b3a2082\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 9622537e51915638708894cb1125d8df
SHA1 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd
SHA256 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c
SHA512 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 6296b4fca340e953da8daf496a8b8a40
SHA1 1320a7b0fe0e01193b8feb3226b314cfd4ba7e9b
SHA256 a91a4247ee71c934be8310722ce8012f55669fd9fdebb48da736fc1aa393fb25
SHA512 fe56459b79fdf2726711334d179f0a9ac8fe51c598a599354e8a496fd65f0a3575a2baf6a97cc1b498f9dd79085c8d63c136e463dfdf3ead1fa74ed48368904b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cc9ed7948b2c85db174a9eeac471a107
SHA1 8f51c863c692ee6a1cd2be4e35aedbfac6c3e3ab
SHA256 8fc70b493f01fef4d89c45b81237101e7a564349115de177f8be92a7c823adba
SHA512 cd3431ad0ddce31625ef80e9886998274d793b3b00a7ccb3f0222037e4704da6619d6d4ff625eb29112b4517fd4316ddb1ca8616de523e962864fae32ce78156

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 8cb8f90ec602fd3a3e719cb78d8c7cce
SHA1 cdf764f8683ff175fb19bb0ed9e8765e28033e3b
SHA256 da35784b211cae7f4696f5b33b9b2ba9295bfa1016ad92ed28a3d588c1c84651
SHA512 939433b40ad73f85b50268616a1717dc3be47087450d7682b4dab5a657a4279a9a61d706b5e6fc24183995a27ab0803d704e0f2fde6e450d3b05d8b4c0bd6395

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 44d8252ef33adba27909d6cae7571289
SHA1 897bbd9d952cff69633af8aee780fdd77b5f5de8
SHA256 b4386bac4712460451b97ebdc3318fc70a3c1d1351f8b5a2882ee65fc7190a00
SHA512 8194fb54ffdc0ccc85ad9f56efb1ba8be23ec3a53fce1557ce8eceffdb9b87e40cb3b690405088b74af57b3c7374bae46bbffbbc96a9a4084d3570f71b05516a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3a729d92e9fa9fd2603773e96b17f764
SHA1 1cab3e578dbacbd505a10bb47e695b5e480f193d
SHA256 513519cc5543014172d51962e78cda39a4cdccab9b88b3651366842367a7c8e7
SHA512 6ce17b188e6087795622e950ce0cbbfaef48d673a04dacc88f8c3004a6b11580e11697cc3dc20d574e25f8de45654c16d57d50bec822a587b7987c4e1b834000

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 30ae0b324db4b19dc3d31641182268c8
SHA1 ba0d44de81d935134c0fb98a33e78ee849b1c69b
SHA256 b89b735aac918e46db26bbd3fa2a3c82a9613bf043a8564efc90ff740233c96f
SHA512 5ff3c7085bc4223762cf0be81b0887e3c0ca44ec0538b23813caa0571a316d99a665509e055a7b5940664b27b6ef50878f84806736973fb388a4d2a1e0f15fb9

\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/1160-396-0x0000000000400000-0x0000000000537000-memory.dmp

\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/1300-406-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2076-410-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3028-497-0x0000000002C50000-0x0000000002DC1000-memory.dmp

memory/3028-499-0x00000000030B0000-0x00000000031E1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/1336-501-0x0000000073EA0000-0x000000007458E000-memory.dmp

memory/2304-502-0x0000000073EA0000-0x000000007458E000-memory.dmp

memory/2644-506-0x0000000073EA0000-0x000000007458E000-memory.dmp

memory/1100-528-0x0000000001070000-0x00000000015DD000-memory.dmp

memory/3028-529-0x00000000030B0000-0x00000000031E1000-memory.dmp

\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\BD6D.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\A592.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/2512-544-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2632-545-0x0000000000400000-0x0000000000537000-memory.dmp

\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

C:\Users\Admin\AppData\Local\Temp\AFF3.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/1548-571-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\bowsakkdestx.txt

MD5 e3c640eced72a28f10eac99da233d9fd
SHA1 1d7678afc24a59de1da0bf74126baf3b8540b5b0
SHA256 87de9c0701eab8d410954dc4d3e7e6013ca6a0c8a514969418a12c21135f133e
SHA512 bcb94b7ba487784d343961b24107ea17a82f200961505927ef385caeb0684fbbe1a3482b7d0af7f3766b9ec2c4d6236341b50541cf7b1217acdc0a8b5b37e3d7

C:\SystemID\PersonalID.txt

MD5 324770a7653f940b6e66d90455f6e1a8
SHA1 5b9edb85029710a458f7a77f474721307d2fb738
SHA256 9dda9cd8e2b81a8d0d46e39f4495130246582b673b7ddddef4ebecfeeb6bbc30
SHA512 48ae3a8b8a45881285ff6117edd0ca42fe2b06b0d868b2d535f82a9c26157d3c434535d91b7a9f33cf3c627bc49e469bf997077edcfff6b83e4d7e30cf9dea23

C:\Users\Admin\AppData\Local\bowsakkdestx.txt

MD5 6ab37c6fd8c563197ef79d09241843f1
SHA1 cb9bd05e2fc8cc06999a66b7b2d396ff4b5157e5
SHA256 d4849ec7852d9467f06fde6f25823331dad6bc76e7838d530e990b62286a754f
SHA512 dd1fae67d0f45ba1ec7e56347fdfc2a53f619650892c8a55e7fba80811b6c66d56544b1946a409eaaca06fa9503de20e160360445d959122e5ba3aa85b751cde

C:\Users\Admin\AppData\Local\aeeb28ac-b06c-4257-bdbf-d709f41ed67d\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

memory/1624-623-0x0000000002410000-0x0000000002510000-memory.dmp

memory/976-626-0x00000000024E0000-0x00000000025E0000-memory.dmp

memory/1624-629-0x0000000000320000-0x0000000000371000-memory.dmp

memory/2512-643-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1616-644-0x0000000000400000-0x0000000000465000-memory.dmp

memory/704-646-0x0000000000400000-0x0000000000465000-memory.dmp

memory/2440-648-0x0000000002430000-0x0000000002530000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1YQ38W2\build3[2].exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\ProgramData\93911260841008643178854163

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\88855566828935727583054867

MD5 d367ddfda80fdcf578726bc3b0bc3e3c
SHA1 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA256 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA512 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

Analysis: behavioral2

Detonation Overview

Submitted

2023-09-13 01:07

Reported

2023-09-13 01:10

Platform

win10v2004-20230831-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe"

Signatures

Amadey

trojan amadey

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Fabookie

spyware stealer fabookie

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Vidar

stealer vidar

Downloads MZ/PE file

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\5B44.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\346E.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\4E41.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2AF3.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\346E.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2C7B.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3036.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\32D7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\346E.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4E41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\516F.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\55D5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5B44.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\346E.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\346E.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4E41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4E41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\346E.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4E41.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses 2FA software files, possible credential harvesting

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\aa95f932-b633-4d6e-aab9-833d1a1184a6\\2AF3.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\2AF3.exe N/A

Checks installed software on the system

discovery

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\55D5.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\55D5.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\55D5.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\32D7.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2C7B.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2536 wrote to memory of 3400 N/A N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 2536 wrote to memory of 3400 N/A N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 2536 wrote to memory of 3400 N/A N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 2536 wrote to memory of 2212 N/A N/A C:\Users\Admin\AppData\Local\Temp\2C7B.exe
PID 2536 wrote to memory of 2212 N/A N/A C:\Users\Admin\AppData\Local\Temp\2C7B.exe
PID 2536 wrote to memory of 2212 N/A N/A C:\Users\Admin\AppData\Local\Temp\2C7B.exe
PID 2536 wrote to memory of 4388 N/A N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe
PID 2536 wrote to memory of 4388 N/A N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe
PID 2536 wrote to memory of 4388 N/A N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe
PID 2536 wrote to memory of 4804 N/A N/A C:\Users\Admin\AppData\Local\Temp\3036.exe
PID 2536 wrote to memory of 4804 N/A N/A C:\Users\Admin\AppData\Local\Temp\3036.exe
PID 2536 wrote to memory of 4804 N/A N/A C:\Users\Admin\AppData\Local\Temp\3036.exe
PID 2536 wrote to memory of 452 N/A N/A C:\Users\Admin\AppData\Local\Temp\32D7.exe
PID 2536 wrote to memory of 452 N/A N/A C:\Users\Admin\AppData\Local\Temp\32D7.exe
PID 2536 wrote to memory of 452 N/A N/A C:\Users\Admin\AppData\Local\Temp\32D7.exe
PID 2536 wrote to memory of 3360 N/A N/A C:\Users\Admin\AppData\Local\Temp\346E.exe
PID 2536 wrote to memory of 3360 N/A N/A C:\Users\Admin\AppData\Local\Temp\346E.exe
PID 2536 wrote to memory of 3360 N/A N/A C:\Users\Admin\AppData\Local\Temp\346E.exe
PID 2536 wrote to memory of 4984 N/A N/A C:\Windows\system32\regsvr32.exe
PID 2536 wrote to memory of 4984 N/A N/A C:\Windows\system32\regsvr32.exe
PID 4984 wrote to memory of 3996 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4984 wrote to memory of 3996 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4984 wrote to memory of 3996 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4388 wrote to memory of 4748 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4748 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4748 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4388 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\2E8F.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4804 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\3036.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2536 wrote to memory of 4716 N/A N/A C:\Users\Admin\AppData\Local\Temp\4E41.exe
PID 2536 wrote to memory of 4716 N/A N/A C:\Users\Admin\AppData\Local\Temp\4E41.exe
PID 2536 wrote to memory of 4716 N/A N/A C:\Users\Admin\AppData\Local\Temp\4E41.exe
PID 2536 wrote to memory of 1096 N/A N/A C:\Users\Admin\AppData\Local\Temp\516F.exe
PID 2536 wrote to memory of 1096 N/A N/A C:\Users\Admin\AppData\Local\Temp\516F.exe
PID 2536 wrote to memory of 1096 N/A N/A C:\Users\Admin\AppData\Local\Temp\516F.exe
PID 2536 wrote to memory of 4564 N/A N/A C:\Users\Admin\AppData\Local\Temp\55D5.exe
PID 2536 wrote to memory of 4564 N/A N/A C:\Users\Admin\AppData\Local\Temp\55D5.exe
PID 2536 wrote to memory of 4564 N/A N/A C:\Users\Admin\AppData\Local\Temp\55D5.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 3400 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\2AF3.exe C:\Users\Admin\AppData\Local\Temp\2AF3.exe
PID 2536 wrote to memory of 2656 N/A N/A C:\Users\Admin\AppData\Local\Temp\5B44.exe
PID 2536 wrote to memory of 2656 N/A N/A C:\Users\Admin\AppData\Local\Temp\5B44.exe
PID 2536 wrote to memory of 2656 N/A N/A C:\Users\Admin\AppData\Local\Temp\5B44.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe

"C:\Users\Admin\AppData\Local\Temp\f279e23308e3d5f1a8b40722f199b6fb4deb543b3f6774d47ca3cd3b39653c1b.exe"

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

C:\Users\Admin\AppData\Local\Temp\2C7B.exe

C:\Users\Admin\AppData\Local\Temp\2C7B.exe

C:\Users\Admin\AppData\Local\Temp\2E8F.exe

C:\Users\Admin\AppData\Local\Temp\2E8F.exe

C:\Users\Admin\AppData\Local\Temp\3036.exe

C:\Users\Admin\AppData\Local\Temp\3036.exe

C:\Users\Admin\AppData\Local\Temp\32D7.exe

C:\Users\Admin\AppData\Local\Temp\32D7.exe

C:\Users\Admin\AppData\Local\Temp\346E.exe

C:\Users\Admin\AppData\Local\Temp\346E.exe

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\399F.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\399F.dll

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Users\Admin\AppData\Local\Temp\4E41.exe

C:\Users\Admin\AppData\Local\Temp\4E41.exe

C:\Users\Admin\AppData\Local\Temp\516F.exe

C:\Users\Admin\AppData\Local\Temp\516F.exe

C:\Users\Admin\AppData\Local\Temp\55D5.exe

C:\Users\Admin\AppData\Local\Temp\55D5.exe

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

C:\Users\Admin\AppData\Local\Temp\5B44.exe

C:\Users\Admin\AppData\Local\Temp\5B44.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F

C:\Users\Admin\AppData\Local\Temp\346E.exe

C:\Users\Admin\AppData\Local\Temp\346E.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\aa95f932-b633-4d6e-aab9-833d1a1184a6" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\346E.exe

"C:\Users\Admin\AppData\Local\Temp\346E.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\4E41.exe

C:\Users\Admin\AppData\Local\Temp\4E41.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:N"

C:\Users\Admin\AppData\Local\Temp\4E41.exe

"C:\Users\Admin\AppData\Local\Temp\4E41.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

"C:\Users\Admin\AppData\Local\Temp\2AF3.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\346E.exe

"C:\Users\Admin\AppData\Local\Temp\346E.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\4E41.exe

"C:\Users\Admin\AppData\Local\Temp\4E41.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

"C:\Users\Admin\AppData\Local\Temp\2AF3.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe

"C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3208 -ip 3208

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4588 -ip 4588

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 568

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe

"C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 568

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe

"C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 54.120.234.20.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 potunulit.org udp
US 188.114.97.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
KR 211.181.24.132:80 colisumy.com tcp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 8.8.8.8:53 132.24.181.211.in-addr.arpa udp
NL 194.169.175.232:80 194.169.175.232 tcp
US 8.8.8.8:53 232.175.169.194.in-addr.arpa udp
US 38.181.25.43:3325 tcp
US 8.8.8.8:53 colisumy.com udp
MX 187.212.185.70:80 colisumy.com tcp
US 8.8.8.8:53 43.25.181.38.in-addr.arpa udp
MD 176.123.9.142:14845 tcp
US 8.8.8.8:53 70.185.212.187.in-addr.arpa udp
US 8.8.8.8:53 142.9.123.176.in-addr.arpa udp
NL 194.169.175.232:45450 tcp
GB 51.38.95.107:42494 tcp
NL 194.169.175.232:80 194.169.175.232 tcp
US 8.8.8.8:53 107.95.38.51.in-addr.arpa udp
US 8.8.8.8:53 login-sofi.4dq.com udp
DE 45.79.249.147:443 login-sofi.4dq.com tcp
RU 79.137.192.18:80 79.137.192.18 tcp
US 8.8.8.8:53 147.249.79.45.in-addr.arpa udp
US 8.8.8.8:53 18.192.137.79.in-addr.arpa udp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
US 8.8.8.8:53 101.15.18.104.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
RU 79.137.192.18:80 79.137.192.18 tcp
NL 194.169.175.232:45450 tcp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 z.nnnaajjjgc.com udp
MU 156.236.72.121:443 z.nnnaajjjgc.com tcp
US 8.8.8.8:53 254.211.247.8.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 121.72.236.156.in-addr.arpa udp
US 8.8.8.8:53 142.33.222.23.in-addr.arpa udp
US 8.8.8.8:53 79.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 153.136.76.144.in-addr.arpa udp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
MX 187.212.185.70:80 colisumy.com tcp
US 8.8.8.8:53 zexeq.com udp
KR 211.53.230.67:80 zexeq.com tcp
US 8.8.8.8:53 233.141.123.20.in-addr.arpa udp
US 8.8.8.8:53 67.230.53.211.in-addr.arpa udp
KR 211.53.230.67:80 zexeq.com tcp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 99.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 36.249.124.192.in-addr.arpa udp
DE 5.75.211.218:27015 5.75.211.218 tcp
US 8.8.8.8:53 218.211.75.5.in-addr.arpa udp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 gudintas.at udp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
US 8.8.8.8:53 3.30.86.95.in-addr.arpa udp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
MK 95.86.30.3:80 gudintas.at tcp
US 95.214.27.254:80 tcp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 169.117.168.52.in-addr.arpa udp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 host-file-host6.com udp
US 8.8.8.8:53 host-host-file8.com udp
NL 194.169.175.127:80 host-host-file8.com tcp
US 8.8.8.8:53 127.175.169.194.in-addr.arpa udp

Files

memory/1032-1-0x0000000002480000-0x0000000002580000-memory.dmp

memory/1032-2-0x0000000000400000-0x00000000022F2000-memory.dmp

memory/1032-3-0x0000000004040000-0x0000000004049000-memory.dmp

memory/2536-4-0x0000000003490000-0x00000000034A6000-memory.dmp

memory/1032-5-0x0000000000400000-0x00000000022F2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\2C7B.exe

MD5 22daa19ff6bdee095131c478f8e642eb
SHA1 1c2ddf7319dc5806e18f9098e423016c054655d7
SHA256 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861
SHA512 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde

C:\Users\Admin\AppData\Local\Temp\2C7B.exe

MD5 22daa19ff6bdee095131c478f8e642eb
SHA1 1c2ddf7319dc5806e18f9098e423016c054655d7
SHA256 9e2c8234bff4a270c621958b88f926df9267fb399f5d2385f785eea44215a861
SHA512 703087487fb7e24666893898a42fb86dea142700998275ba80983b8352c082883a9fdf873ae19e3f55a456c69bc891cb1f53c54e90a16596f10069a6c23d2bde

memory/2212-19-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2212-20-0x00000000005E0000-0x0000000000610000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2E8F.exe

MD5 3b49ab3a64388ef5be9ecb6c1bfd7bfc
SHA1 05a45d6c7733aaadff2556a0116fda034649c8ad
SHA256 b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c
SHA512 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d

C:\Users\Admin\AppData\Local\Temp\2E8F.exe

MD5 3b49ab3a64388ef5be9ecb6c1bfd7bfc
SHA1 05a45d6c7733aaadff2556a0116fda034649c8ad
SHA256 b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c
SHA512 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d

C:\Users\Admin\AppData\Local\Temp\3036.exe

MD5 7980cd6aa2f009db138977c965cd2c1e
SHA1 dbd57e3756c356abd5723ed000503a38518722d8
SHA256 b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4
SHA512 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5

memory/2212-29-0x0000000074B90000-0x0000000075340000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3036.exe

MD5 7980cd6aa2f009db138977c965cd2c1e
SHA1 dbd57e3756c356abd5723ed000503a38518722d8
SHA256 b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4
SHA512 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5

C:\Users\Admin\AppData\Local\Temp\32D7.exe

MD5 8e80f352faa21ac6bd996e86cd71640a
SHA1 347e8c111508d0095a05328175c0be5b86677730
SHA256 eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3
SHA512 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038

memory/2212-36-0x0000000004C20000-0x0000000005238000-memory.dmp

memory/2212-39-0x00000000025A0000-0x00000000025B2000-memory.dmp

memory/2212-41-0x0000000004C10000-0x0000000004C20000-memory.dmp

memory/2212-37-0x0000000005240000-0x000000000534A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\346E.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

C:\Users\Admin\AppData\Local\Temp\346E.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/2212-44-0x00000000026D0000-0x000000000270C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\32D7.exe

MD5 8e80f352faa21ac6bd996e86cd71640a
SHA1 347e8c111508d0095a05328175c0be5b86677730
SHA256 eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3
SHA512 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038

memory/452-48-0x0000000000400000-0x0000000000443000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\399F.dll

MD5 ec58238fb3adab49461bce7d58730eca
SHA1 c71c577fb65a59f58d61d4cc05232431e020ed6d
SHA256 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf
SHA512 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9

memory/452-47-0x00000000005F0000-0x0000000000620000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\399F.dll

MD5 ec58238fb3adab49461bce7d58730eca
SHA1 c71c577fb65a59f58d61d4cc05232431e020ed6d
SHA256 7c9cd13b71abb01a18ed7b77f602a23c91d1d9b5892888b794d4f43ba1ba37bf
SHA512 991ee2d5b05d728a6e8029e3b6723b4a974158f279d142a59a81a7972af6727b9ad22cc600ee33d65dd83685626a36021f7876ea5ec5cf528acd09d1e3fd3de9

memory/3996-55-0x0000000010000000-0x000000001021E000-memory.dmp

memory/452-54-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/3996-56-0x00000000011C0000-0x00000000011C6000-memory.dmp

memory/452-58-0x0000000004980000-0x0000000004990000-memory.dmp

memory/4756-59-0x0000000000400000-0x0000000000430000-memory.dmp

memory/4756-60-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/1732-61-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1732-62-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/4756-63-0x0000000005570000-0x0000000005580000-memory.dmp

memory/2212-64-0x0000000074B90000-0x0000000075340000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\4E41.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/2212-69-0x0000000004C10000-0x0000000004C20000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\4E41.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\516F.exe

MD5 3b49ab3a64388ef5be9ecb6c1bfd7bfc
SHA1 05a45d6c7733aaadff2556a0116fda034649c8ad
SHA256 b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c
SHA512 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d

C:\Users\Admin\AppData\Local\Temp\516F.exe

MD5 3b49ab3a64388ef5be9ecb6c1bfd7bfc
SHA1 05a45d6c7733aaadff2556a0116fda034649c8ad
SHA256 b31615e595e902a652c76983fe382837e067e0bceb709e2afd92af743bf4984c
SHA512 85da7ff6946135936c929ad33f46942cc604cb338c1cba299563df3d002dee73bd6d647a9af7325664c7496ec03fc6ef12b03ea43163e4a7746316d55df1e51d

memory/2212-75-0x00000000054C0000-0x0000000005552000-memory.dmp

memory/2212-73-0x0000000005440000-0x00000000054B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\55D5.exe

MD5 94552b061160d163451a975066161383
SHA1 22f28f33e1f7d4574e1961170b1cb0211c6a8fc8
SHA256 e5c0fee1dc9bc3b97fc9f620bf8ea1c6f23cf7d7129fd19e88bf9de662991523
SHA512 3293b4ef5cb5a17f732a762630e6a5f686ccab4bc9c693ba7e0d93c19a8efad769759cb92323f2ebfc0821d6cf9269fca84633dce974469b0b9853c02ac2b48e

memory/2212-80-0x0000000005560000-0x0000000005B04000-memory.dmp

memory/2212-81-0x0000000005B50000-0x0000000005BB6000-memory.dmp

memory/3400-83-0x0000000003BE0000-0x0000000003C72000-memory.dmp

memory/452-82-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/4604-87-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/4604-85-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3400-84-0x0000000003E00000-0x0000000003F1B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\55D5.exe

MD5 94552b061160d163451a975066161383
SHA1 22f28f33e1f7d4574e1961170b1cb0211c6a8fc8
SHA256 e5c0fee1dc9bc3b97fc9f620bf8ea1c6f23cf7d7129fd19e88bf9de662991523
SHA512 3293b4ef5cb5a17f732a762630e6a5f686ccab4bc9c693ba7e0d93c19a8efad769759cb92323f2ebfc0821d6cf9269fca84633dce974469b0b9853c02ac2b48e

C:\Users\Admin\AppData\Local\Temp\5B44.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/4604-88-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5B44.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/4604-95-0x0000000000400000-0x0000000000537000-memory.dmp

memory/452-96-0x0000000004980000-0x0000000004990000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/4756-105-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/3360-107-0x0000000004200000-0x000000000431B000-memory.dmp

memory/3360-108-0x0000000004020000-0x00000000040B2000-memory.dmp

memory/1732-106-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/5076-114-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4756-117-0x0000000005570000-0x0000000005580000-memory.dmp

memory/5076-115-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\346E.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/5076-109-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3996-116-0x0000000002EC0000-0x0000000002FC2000-memory.dmp

memory/1732-120-0x0000000002D10000-0x0000000002D20000-memory.dmp

memory/2212-119-0x00000000063E0000-0x0000000006430000-memory.dmp

memory/5076-118-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4224-122-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/3996-126-0x0000000002FD0000-0x00000000030BA000-memory.dmp

C:\Users\Admin\AppData\Local\aa95f932-b633-4d6e-aab9-833d1a1184a6\2AF3.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 9622537e51915638708894cb1125d8df
SHA1 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd
SHA256 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c
SHA512 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7

memory/3996-132-0x0000000002FD0000-0x00000000030BA000-memory.dmp

memory/3996-135-0x0000000002FD0000-0x00000000030BA000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 8cb8f90ec602fd3a3e719cb78d8c7cce
SHA1 cdf764f8683ff175fb19bb0ed9e8765e28033e3b
SHA256 da35784b211cae7f4696f5b33b9b2ba9295bfa1016ad92ed28a3d588c1c84651
SHA512 939433b40ad73f85b50268616a1717dc3be47087450d7682b4dab5a657a4279a9a61d706b5e6fc24183995a27ab0803d704e0f2fde6e450d3b05d8b4c0bd6395

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 85b85bcb14c6940802359d0f79e00d2d
SHA1 96915fa7f242ec94da2228ec67d81b7720d0afe6
SHA256 b4e688453ec7a745d180588f4a956f33481e9b63fd230e396fbc09e3589e05f9
SHA512 b640ad1a53870121eeadee4c8d336d19773ce9db648d4fefcee9a251aa6e4dca1d254aa697adcdfbac374cbb7e685745e01f86761f9460a6006952cee550d0a9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 d634d274e5ceee547ec11762692850c5
SHA1 143f28e6ec0e4aca74ccea48c643d66dca98823d
SHA256 2af2bfadfebf0308866e7705ecc26074511399fa57a9446cfec83623995ac6c7
SHA512 edd468b6bd5c1f8f72386623bb04163fab9a6bf38795a634d70950e373e602d600544ad6baad938af0d4a6f614c4c81b2018c233447fe6edc978973ccce49dd6

memory/4224-133-0x00000000053A0000-0x00000000053B0000-memory.dmp

memory/1732-136-0x0000000008F60000-0x0000000009122000-memory.dmp

memory/1732-137-0x0000000009660000-0x0000000009B8C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

memory/4604-152-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4216-151-0x00007FF691490000-0x00007FF6914C8000-memory.dmp

memory/3996-156-0x0000000002FD0000-0x00000000030BA000-memory.dmp

memory/5076-153-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\346E.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

C:\Users\Admin\AppData\Local\Temp\4E41.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/3928-159-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3928-160-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3928-161-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4564-162-0x0000000003B60000-0x0000000003B75000-memory.dmp

memory/4564-163-0x00000000020E0000-0x00000000020E9000-memory.dmp

memory/4564-164-0x0000000000400000-0x0000000002081000-memory.dmp

C:\Users\Admin\AppData\Local\aa95f932-b633-4d6e-aab9-833d1a1184a6\2AF3.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

C:\Users\Admin\AppData\Local\Temp\4E41.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/3928-174-0x0000000000400000-0x0000000000537000-memory.dmp

memory/452-177-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/4604-178-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/4756-184-0x0000000074B90000-0x0000000075340000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

MD5 9b756bc85e5324eb8f87a69e3f9959ab
SHA1 1778b2e2d6a00c421578a284db1e743931611d66
SHA256 e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e
SHA512 c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8

memory/4224-185-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/4216-186-0x00000000034B0000-0x0000000003621000-memory.dmp

memory/4216-187-0x0000000003630000-0x0000000003761000-memory.dmp

memory/4224-188-0x00000000053A0000-0x00000000053B0000-memory.dmp

memory/1732-191-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/2536-192-0x0000000003510000-0x0000000003526000-memory.dmp

memory/4564-194-0x0000000000400000-0x0000000002081000-memory.dmp

memory/4300-200-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2212-199-0x0000000074B90000-0x0000000075340000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\346E.exe

MD5 75747bfd55fe1ae1d3cfef6264ec582b
SHA1 783e5538edcca02d061dd21085097f2d104ea098
SHA256 abc29462bf6643a78fd8ebce22af6423456be4a1f7982cacddf0d05769b3847f
SHA512 4688779c6a1efb1b379b1af15533179a30cef5ee1b13d69878dcfb44b647f728dd86bdbabd0e1674c6552c2fae6aa7d18673d9119706b5e67d93aed93549316e

memory/4300-201-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4300-202-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4224-203-0x0000000074B90000-0x0000000075340000-memory.dmp

memory/4216-204-0x0000000003630000-0x0000000003761000-memory.dmp

memory/4588-213-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4588-215-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4300-214-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\4E41.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/4300-211-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4300-208-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4588-220-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2AF3.exe

MD5 49b904e73ee16058ca948bf728febd94
SHA1 71e10ccc1f1c5a0d3feeadfb60cdfa1b52981c0b
SHA256 bc87c048051cf764f5607f2e2999f042131fcd8a92ce0e229402eb96dcbdd8ed
SHA512 89c72986ddc8b9d37aa54549bd4ddf923c6f0b98d03a84b6139afc7628ad3b55b9062832ee26d44149d8a9c4dbe1782429c637b4b42a8732ad7ebe54a35d2c0f

memory/3208-231-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

memory/3208-233-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

memory/3208-227-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3424-235-0x0000000002500000-0x0000000002600000-memory.dmp

memory/3424-236-0x0000000002480000-0x00000000024D1000-memory.dmp

memory/4412-237-0x0000000000400000-0x0000000000465000-memory.dmp

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

memory/4412-239-0x0000000000400000-0x0000000000465000-memory.dmp

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

memory/4412-241-0x0000000000400000-0x0000000000465000-memory.dmp

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\bf8cff79-8892-44a8-a2ed-6dc59437b531\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

memory/4412-314-0x0000000000400000-0x0000000000465000-memory.dmp

C:\Users\Admin\AppData\Roaming\vbshfbi

MD5 94552b061160d163451a975066161383
SHA1 22f28f33e1f7d4574e1961170b1cb0211c6a8fc8
SHA256 e5c0fee1dc9bc3b97fc9f620bf8ea1c6f23cf7d7129fd19e88bf9de662991523
SHA512 3293b4ef5cb5a17f732a762630e6a5f686ccab4bc9c693ba7e0d93c19a8efad769759cb92323f2ebfc0821d6cf9269fca84633dce974469b0b9853c02ac2b48e

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

memory/3352-340-0x0000000002400000-0x0000000002409000-memory.dmp

memory/428-343-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

memory/3352-339-0x00000000023E0000-0x00000000023F5000-memory.dmp

memory/428-344-0x0000000000400000-0x0000000000409000-memory.dmp

memory/428-352-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4