Malware Analysis Report

2025-04-14 07:55

Sample ID 230913-zavnnaeg6v
Target 52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1
SHA256 52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1
Tags
amadey djvu fabookie redline smokeloader logsdiller cloud (tg: @logsdillabot) lux3 smokiez_build backdoor discovery evasion infostealer ransomware spyware stealer themida trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1

Threat Level: Known bad

The file 52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1 was found to be: Known bad.

Malicious Activity Summary

amadey djvu fabookie redline smokeloader logsdiller cloud (tg: @logsdillabot) lux3 smokiez_build backdoor discovery evasion infostealer ransomware spyware stealer themida trojan

Amadey

Detect Fabookie payload

Djvu Ransomware

SmokeLoader

RedLine

Fabookie

Detected Djvu ransomware

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Themida packer

Checks BIOS information in registry

Checks computer location settings

Executes dropped EXE

Reads user/profile data of web browsers

Modifies file permissions

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks whether UAC is enabled

Checks installed software on the system

Looks up external IP address via web service

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious behavior: MapViewOfSection

Suspicious use of AdjustPrivilegeToken

Checks SCSI registry key(s)

Suspicious behavior: LoadsDriver

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-09-13 20:31

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-13 20:31

Reported

2023-09-13 20:33

Platform

win10v2004-20230831-en

Max time kernel

77s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe"

Signatures

Amadey

trojan amadey

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Fabookie

spyware stealer fabookie

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\7163.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\7163.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\7163.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\886A.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\7163.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7163.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7163.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\76D4.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3284 wrote to memory of 3864 N/A N/A C:\Users\Admin\AppData\Local\Temp\6CA0.exe
PID 3284 wrote to memory of 3864 N/A N/A C:\Users\Admin\AppData\Local\Temp\6CA0.exe
PID 3284 wrote to memory of 3864 N/A N/A C:\Users\Admin\AppData\Local\Temp\6CA0.exe
PID 3284 wrote to memory of 2172 N/A N/A C:\Users\Admin\AppData\Local\Temp\7163.exe
PID 3284 wrote to memory of 2172 N/A N/A C:\Users\Admin\AppData\Local\Temp\7163.exe
PID 3284 wrote to memory of 2172 N/A N/A C:\Users\Admin\AppData\Local\Temp\7163.exe
PID 3284 wrote to memory of 4128 N/A N/A C:\Users\Admin\AppData\Local\Temp\754C.exe
PID 3284 wrote to memory of 4128 N/A N/A C:\Users\Admin\AppData\Local\Temp\754C.exe
PID 3284 wrote to memory of 4128 N/A N/A C:\Users\Admin\AppData\Local\Temp\754C.exe
PID 3284 wrote to memory of 3760 N/A N/A C:\Users\Admin\AppData\Local\Temp\76D4.exe
PID 3284 wrote to memory of 3760 N/A N/A C:\Users\Admin\AppData\Local\Temp\76D4.exe
PID 3284 wrote to memory of 3760 N/A N/A C:\Users\Admin\AppData\Local\Temp\76D4.exe
PID 3284 wrote to memory of 3888 N/A N/A C:\Users\Admin\AppData\Local\Temp\886A.exe
PID 3284 wrote to memory of 3888 N/A N/A C:\Users\Admin\AppData\Local\Temp\886A.exe
PID 3284 wrote to memory of 3888 N/A N/A C:\Users\Admin\AppData\Local\Temp\886A.exe
PID 3284 wrote to memory of 4444 N/A N/A C:\Users\Admin\AppData\Local\Temp\886A.exe
PID 3284 wrote to memory of 4444 N/A N/A C:\Users\Admin\AppData\Local\Temp\886A.exe
PID 3284 wrote to memory of 4444 N/A N/A C:\Users\Admin\AppData\Local\Temp\886A.exe
PID 3888 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\886A.exe C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
PID 3888 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\886A.exe C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
PID 3888 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\886A.exe C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
PID 3284 wrote to memory of 4420 N/A N/A C:\Users\Admin\AppData\Local\Temp\9A9F.exe
PID 3284 wrote to memory of 4420 N/A N/A C:\Users\Admin\AppData\Local\Temp\9A9F.exe
PID 3284 wrote to memory of 4420 N/A N/A C:\Users\Admin\AppData\Local\Temp\9A9F.exe
PID 3284 wrote to memory of 1424 N/A N/A C:\Users\Admin\AppData\Local\Temp\8CF0.exe
PID 3284 wrote to memory of 1424 N/A N/A C:\Users\Admin\AppData\Local\Temp\8CF0.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4128 wrote to memory of 3876 N/A C:\Users\Admin\AppData\Local\Temp\754C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3284 wrote to memory of 3992 N/A N/A C:\Users\Admin\AppData\Local\Temp\9260.exe
PID 3284 wrote to memory of 3992 N/A N/A C:\Users\Admin\AppData\Local\Temp\9260.exe
PID 3284 wrote to memory of 3992 N/A N/A C:\Users\Admin\AppData\Local\Temp\9260.exe
PID 2180 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\schtasks.exe
PID 2180 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\schtasks.exe
PID 2180 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\schtasks.exe
PID 2180 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\cmd.exe
PID 2180 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\cmd.exe
PID 2180 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\cmd.exe
PID 3284 wrote to memory of 4224 N/A N/A C:\Users\Admin\AppData\Local\Temp\9A9F.exe
PID 3284 wrote to memory of 4224 N/A N/A C:\Users\Admin\AppData\Local\Temp\9A9F.exe
PID 3284 wrote to memory of 4224 N/A N/A C:\Users\Admin\AppData\Local\Temp\9A9F.exe
PID 3284 wrote to memory of 4332 N/A N/A C:\Users\Admin\AppData\Local\Temp\9D50.exe
PID 3284 wrote to memory of 4332 N/A N/A C:\Users\Admin\AppData\Local\Temp\9D50.exe
PID 3284 wrote to memory of 4332 N/A N/A C:\Users\Admin\AppData\Local\Temp\9D50.exe
PID 2180 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
PID 2180 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
PID 4264 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 4264 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 4264 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 4264 wrote to memory of 3344 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WerFault.exe
PID 4264 wrote to memory of 3344 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WerFault.exe
PID 4264 wrote to memory of 3344 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WerFault.exe
PID 2172 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\7163.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2172 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\7163.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2172 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\7163.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2172 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\7163.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2172 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\7163.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2172 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\7163.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2172 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\7163.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe

"C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe"

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

C:\Users\Admin\AppData\Local\Temp\7163.exe

C:\Users\Admin\AppData\Local\Temp\7163.exe

C:\Users\Admin\AppData\Local\Temp\754C.exe

C:\Users\Admin\AppData\Local\Temp\754C.exe

C:\Users\Admin\AppData\Local\Temp\76D4.exe

C:\Users\Admin\AppData\Local\Temp\76D4.exe

C:\Users\Admin\AppData\Local\Temp\7FFD.exe

C:\Users\Admin\AppData\Local\Temp\7FFD.exe

C:\Users\Admin\AppData\Local\Temp\886A.exe

C:\Users\Admin\AppData\Local\Temp\886A.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"

C:\Users\Admin\AppData\Local\Temp\8A5F.exe

C:\Users\Admin\AppData\Local\Temp\8A5F.exe

C:\Users\Admin\AppData\Local\Temp\8CF0.exe

C:\Users\Admin\AppData\Local\Temp\8CF0.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit

C:\Users\Admin\AppData\Local\Temp\9260.exe

C:\Users\Admin\AppData\Local\Temp\9260.exe

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

C:\Users\Admin\AppData\Local\Temp\9D50.exe

C:\Users\Admin\AppData\Local\Temp\9D50.exe

C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:N"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\713d4124-bb01-40d7-9320-f4cd6cb434d5" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:N"

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

"C:\Users\Admin\AppData\Local\Temp\6CA0.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\886A.exe

C:\Users\Admin\AppData\Local\Temp\886A.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\886A.exe

"C:\Users\Admin\AppData\Local\Temp\886A.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

"C:\Users\Admin\AppData\Local\Temp\9A9F.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

"C:\Users\Admin\AppData\Local\Temp\6CA0.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2336 -ip 2336

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 568

C:\Users\Admin\AppData\Local\Temp\886A.exe

"C:\Users\Admin\AppData\Local\Temp\886A.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3888 -ip 3888

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 568

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

"C:\Users\Admin\AppData\Local\Temp\9A9F.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4544 -ip 4544

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 568

C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Roaming\usafcue

C:\Users\Admin\AppData\Roaming\usafcue

Network

Country Destination Domain Proto
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 198.209.218.23.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 254.1.248.8.in-addr.arpa udp
US 8.8.8.8:53 potunulit.org udp
US 188.114.97.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
KW 37.34.248.24:80 colisumy.com tcp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 8.8.8.8:53 24.248.34.37.in-addr.arpa udp
NL 194.169.175.232:80 194.169.175.232 tcp
US 8.8.8.8:53 232.175.169.194.in-addr.arpa udp
RU 79.137.192.18:80 79.137.192.18 tcp
KW 37.34.248.24:80 colisumy.com tcp
US 8.8.8.8:53 18.192.137.79.in-addr.arpa udp
NL 194.169.175.232:80 194.169.175.232 tcp
BG 193.42.32.101:80 193.42.32.101 tcp
US 8.8.8.8:53 101.32.42.193.in-addr.arpa udp
US 8.8.8.8:53 login-sofi.4dq.com udp
DE 45.79.249.147:443 login-sofi.4dq.com tcp
US 8.8.8.8:53 147.249.79.45.in-addr.arpa udp
RU 79.137.192.18:80 79.137.192.18 tcp
MD 176.123.9.142:14845 tcp
US 8.8.8.8:53 142.9.123.176.in-addr.arpa udp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 z.nnnaajjjgc.com udp
MU 156.236.72.121:443 z.nnnaajjjgc.com tcp
NL 194.169.175.232:45450 tcp
US 8.8.8.8:53 121.72.236.156.in-addr.arpa udp
US 8.8.8.8:53 142.33.222.23.in-addr.arpa udp
US 8.8.8.8:53 147.121.18.2.in-addr.arpa udp
US 38.181.25.43:3325 tcp
US 8.8.8.8:53 43.25.181.38.in-addr.arpa udp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
US 95.214.27.254:80 tcp
NL 194.169.175.232:45450 tcp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 api.2ip.ua udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
GB 51.38.95.107:42494 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 101.14.18.104.in-addr.arpa udp
US 8.8.8.8:53 107.95.38.51.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 95.214.27.254:80 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 153.136.76.144.in-addr.arpa udp
US 8.8.8.8:53 gudintas.at udp
CO 186.147.159.19:80 gudintas.at tcp
US 95.214.27.254:80 tcp
CO 186.147.159.19:80 gudintas.at tcp
US 8.8.8.8:53 19.159.147.186.in-addr.arpa udp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
CO 186.147.159.19:80 gudintas.at tcp
US 8.8.8.8:53 89.65.42.20.in-addr.arpa udp
US 95.214.27.254:80 tcp

Files

memory/5064-1-0x00000000023A0000-0x00000000024A0000-memory.dmp

memory/5064-2-0x0000000002370000-0x0000000002379000-memory.dmp

memory/5064-3-0x0000000000400000-0x0000000002291000-memory.dmp

memory/5064-4-0x0000000000400000-0x0000000002291000-memory.dmp

memory/3284-5-0x0000000002A80000-0x0000000002A96000-memory.dmp

memory/5064-6-0x0000000000400000-0x0000000002291000-memory.dmp

memory/5064-9-0x0000000002370000-0x0000000002379000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

C:\Users\Admin\AppData\Local\Temp\7163.exe

MD5 1b67e388efc2b48f047e9eeb16edcef2
SHA1 2c5ddc2006c38caed1adab80df1e5a370821b47f
SHA256 46c718a1a788637723d284c0b8da50ff03c39ba214ee735c78b230d4055fa1f1
SHA512 21fa1ebbba8a62176813547ee1a61297ab2ea862d36d349b06510819ce6d9d0502a2351ab23949248eb78335482defae86a98bc390e94cb08706219adb017e94

C:\Users\Admin\AppData\Local\Temp\7163.exe

MD5 1b67e388efc2b48f047e9eeb16edcef2
SHA1 2c5ddc2006c38caed1adab80df1e5a370821b47f
SHA256 46c718a1a788637723d284c0b8da50ff03c39ba214ee735c78b230d4055fa1f1
SHA512 21fa1ebbba8a62176813547ee1a61297ab2ea862d36d349b06510819ce6d9d0502a2351ab23949248eb78335482defae86a98bc390e94cb08706219adb017e94

memory/2172-21-0x00000000004E0000-0x0000000000D82000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\754C.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

memory/2172-26-0x0000000077480000-0x0000000077570000-memory.dmp

memory/2172-24-0x0000000077480000-0x0000000077570000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\76D4.exe

MD5 52e2f416fb09cf8da94bf1a88a8bc31b
SHA1 b368ea2376b00d1439e292952d281c577d26049b
SHA256 cce9583aa5844ea41e7402a170d96eb8d6ab7b2b05363b7dbe81a2e8af655345
SHA512 a4ad5d6d60e8ee8d881552aba745a30d3ed0cc7021e503063f865f1fb1136b71b37aa6e6dae16ce1895f3d857eb80651bf0d194e9a506e5746ce96dc549d4732

memory/2172-30-0x0000000077480000-0x0000000077570000-memory.dmp

memory/2172-31-0x0000000077480000-0x0000000077570000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\754C.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

memory/2172-33-0x0000000077480000-0x0000000077570000-memory.dmp

memory/2172-34-0x0000000077B34000-0x0000000077B36000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\76D4.exe

MD5 52e2f416fb09cf8da94bf1a88a8bc31b
SHA1 b368ea2376b00d1439e292952d281c577d26049b
SHA256 cce9583aa5844ea41e7402a170d96eb8d6ab7b2b05363b7dbe81a2e8af655345
SHA512 a4ad5d6d60e8ee8d881552aba745a30d3ed0cc7021e503063f865f1fb1136b71b37aa6e6dae16ce1895f3d857eb80651bf0d194e9a506e5746ce96dc549d4732

C:\Users\Admin\AppData\Local\Temp\7FFD.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\7FFD.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/3760-46-0x00000000007F0000-0x0000000000820000-memory.dmp

memory/2172-47-0x00000000004E0000-0x0000000000D82000-memory.dmp

memory/3760-45-0x0000000000400000-0x0000000000445000-memory.dmp

memory/2172-51-0x00000000057E0000-0x000000000587C000-memory.dmp

memory/3760-52-0x0000000075020000-0x00000000757D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\886A.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

C:\Users\Admin\AppData\Local\Temp\886A.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

C:\Users\Admin\AppData\Local\Temp\8A5F.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\8CF0.exe

MD5 b7a9dd705bcc0dbfc9cabc69b2953b33
SHA1 bb0c29b2169c908b8d25637651eeaa32135e0b80
SHA256 aeb52394baaa77dd4761926e2ae17bdb10423408fac0256159ea61b18c3b5e3d
SHA512 62140abc3a36ee8593b59389a5b98ebc9baab411c6c5f466d3a4291f7a89c4cff469373a5a1dd530df9decdee165480834cb7323dd78728eadee52acc8f2eadf

C:\Users\Admin\AppData\Local\Temp\8CF0.exe

MD5 b7a9dd705bcc0dbfc9cabc69b2953b33
SHA1 bb0c29b2169c908b8d25637651eeaa32135e0b80
SHA256 aeb52394baaa77dd4761926e2ae17bdb10423408fac0256159ea61b18c3b5e3d
SHA512 62140abc3a36ee8593b59389a5b98ebc9baab411c6c5f466d3a4291f7a89c4cff469373a5a1dd530df9decdee165480834cb7323dd78728eadee52acc8f2eadf

memory/1424-71-0x000001B8988C0000-0x000001B898980000-memory.dmp

memory/2172-72-0x00000000004E0000-0x0000000000D82000-memory.dmp

memory/3760-73-0x0000000004D20000-0x0000000005338000-memory.dmp

memory/2172-74-0x0000000077480000-0x0000000077570000-memory.dmp

memory/3760-79-0x0000000004C40000-0x0000000004C52000-memory.dmp

memory/3876-78-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9260.exe

MD5 f5e6eae839c0b6c9d7f1c6141c01cc74
SHA1 8845fb5cc5d173f768555f69d8fa97eae0b9dc38
SHA256 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9
SHA512 28b797f3224540473e868f869129dffe8470eb57706a707df861091730fb849c0039223531ff4c975a94534b895c2bbe91621d726b73884c8a508412c1198e48

memory/3760-84-0x0000000004C60000-0x0000000004C9C000-memory.dmp

memory/1424-85-0x00007FF84E0B0000-0x00007FF84EB71000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9260.exe

MD5 f5e6eae839c0b6c9d7f1c6141c01cc74
SHA1 8845fb5cc5d173f768555f69d8fa97eae0b9dc38
SHA256 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9
SHA512 28b797f3224540473e868f869129dffe8470eb57706a707df861091730fb849c0039223531ff4c975a94534b895c2bbe91621d726b73884c8a508412c1198e48

memory/1424-77-0x000001B898DC0000-0x000001B898DDA000-memory.dmp

memory/3760-76-0x0000000005340000-0x000000000544A000-memory.dmp

memory/3876-87-0x0000000075020000-0x00000000757D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8A5F.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

memory/3876-93-0x00000000055C0000-0x00000000055D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

C:\Users\Admin\AppData\Local\Temp\9D50.exe

MD5 24f97033c62127b816fe4733b9b8a3f0
SHA1 bd8a47ad195de6fa694a6b8de214a7d06b516824
SHA256 f1b1e5919f4add8c22320c69c6e394066de60695a36de7d4227efaadfef3e612
SHA512 c657278d886d296d2d7192b7a845a3d8accb59c15ea54b0588ebe0d595dbf0a403e674cb446f7c543502b1a9e24d064b0196c85eb3557ca473456aebbdfdf49a

memory/1424-96-0x000001B89A890000-0x000001B89A8A0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

memory/2172-98-0x0000000077480000-0x0000000077570000-memory.dmp

memory/2172-99-0x0000000077480000-0x0000000077570000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

C:\Users\Admin\AppData\Local\Temp\9D50.exe

MD5 24f97033c62127b816fe4733b9b8a3f0
SHA1 bd8a47ad195de6fa694a6b8de214a7d06b516824
SHA256 f1b1e5919f4add8c22320c69c6e394066de60695a36de7d4227efaadfef3e612
SHA512 c657278d886d296d2d7192b7a845a3d8accb59c15ea54b0588ebe0d595dbf0a403e674cb446f7c543502b1a9e24d064b0196c85eb3557ca473456aebbdfdf49a

memory/2172-106-0x0000000077480000-0x0000000077570000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

memory/2172-117-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-116-0x0000000077480000-0x0000000077570000-memory.dmp

memory/1344-118-0x00007FF7A91E0000-0x00007FF7A9218000-memory.dmp

memory/2172-120-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-122-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-115-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-124-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-126-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-132-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/3760-131-0x0000000005600000-0x0000000005692000-memory.dmp

memory/3760-129-0x0000000005580000-0x00000000055F6000-memory.dmp

memory/2172-136-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/3760-135-0x00000000056A0000-0x0000000005C44000-memory.dmp

memory/3760-138-0x0000000005F50000-0x0000000005FB6000-memory.dmp

memory/2172-128-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-139-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-141-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/2172-143-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/3760-145-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/2172-146-0x00000000057B0000-0x00000000057C5000-memory.dmp

memory/4156-147-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1424-152-0x00007FF84E0B0000-0x00007FF84EB71000-memory.dmp

memory/2172-154-0x0000000077480000-0x0000000077570000-memory.dmp

memory/4156-155-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/2172-156-0x00000000004E0000-0x0000000000D82000-memory.dmp

memory/3760-157-0x0000000004B30000-0x0000000004B80000-memory.dmp

memory/4156-158-0x0000000005100000-0x0000000005110000-memory.dmp

memory/3876-160-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/3876-161-0x00000000055C0000-0x00000000055D0000-memory.dmp

memory/1424-162-0x000001B89A890000-0x000001B89A8A0000-memory.dmp

memory/3760-163-0x0000000004D10000-0x0000000004D20000-memory.dmp

memory/4120-167-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/3876-168-0x00000000069D0000-0x0000000006B92000-memory.dmp

memory/3876-169-0x0000000008F80000-0x00000000094AC000-memory.dmp

memory/1344-176-0x0000000003790000-0x0000000003901000-memory.dmp

memory/648-180-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

memory/648-181-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1344-178-0x0000000003910000-0x0000000003A41000-memory.dmp

memory/648-177-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3864-173-0x00000000040C0000-0x00000000041DB000-memory.dmp

memory/4988-184-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/648-185-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3864-172-0x0000000004010000-0x00000000040B1000-memory.dmp

memory/4988-171-0x0000000000400000-0x0000000000430000-memory.dmp

memory/4988-186-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/4156-187-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/4156-188-0x0000000005100000-0x0000000005110000-memory.dmp

memory/4120-192-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/3760-198-0x0000000075020000-0x00000000757D0000-memory.dmp

C:\Users\Admin\AppData\Local\713d4124-bb01-40d7-9320-f4cd6cb434d5\6CA0.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

MD5 7f305d024899e4809fb6f4ae00da304c
SHA1 f88a0812d36e0562ede3732ab511f459a09faff8
SHA256 8fe1088ad55d05a3c2149648c8c1ce55862e925580308afe4a4ff6cfb089c769
SHA512 bc40698582400427cd47cf80dcf39202a74148b69ed179483160b4023368d53301fa12fe6d530d9c7cdfe5f78d19ee87a285681f537950334677f8af8dfeb2ae

C:\Users\Admin\AppData\Local\713d4124-bb01-40d7-9320-f4cd6cb434d5\6CA0.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

memory/3876-203-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/648-204-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1344-205-0x0000000003910000-0x0000000003A41000-memory.dmp

memory/4988-206-0x0000000075020000-0x00000000757D0000-memory.dmp

memory/648-207-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

memory/1436-215-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1436-216-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\886A.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 8cb8f90ec602fd3a3e719cb78d8c7cce
SHA1 cdf764f8683ff175fb19bb0ed9e8765e28033e3b
SHA256 da35784b211cae7f4696f5b33b9b2ba9295bfa1016ad92ed28a3d588c1c84651
SHA512 939433b40ad73f85b50268616a1717dc3be47087450d7682b4dab5a657a4279a9a61d706b5e6fc24183995a27ab0803d704e0f2fde6e450d3b05d8b4c0bd6395

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 486a36241338df620627a11be9b9af91
SHA1 c1354e84db092bb641275e2df19da286df02feff
SHA256 9467986115244da194c1481a0317b445fffd86f76a4632c645049a6027a72172
SHA512 143edd6db838c587c884e51b18fb221448af52706e872ba55f368a1e568d9450fcc41279825b1e47feb49568882f89b69a4804b0507cebb63bb69ff73b275c1e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 9622537e51915638708894cb1125d8df
SHA1 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd
SHA256 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c
SHA512 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 fc5464fdf9176a7b47c4eabbaa8975e2
SHA1 9fb878d9542285c58b1581f98d8c9bd594ad85d1
SHA256 6338dab0072ed4c6383e0f6547aa9da763a1c5476a7025ea4ff5b1a7d20a870c
SHA512 04fc37a2ebf9ec27e8890d5bda71c83964cd1054f448bf294f53560e17aa187184f337a73be411f2400be8bccf71ee43cd84c7a5f4de80796703fd9d379d2167

memory/1436-223-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\886A.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

memory/3992-228-0x0000000000400000-0x0000000002291000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

memory/2880-235-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/2880-232-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2880-230-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2880-240-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

memory/3284-244-0x0000000002910000-0x0000000002926000-memory.dmp

memory/3992-247-0x0000000000400000-0x0000000002291000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6CA0.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

memory/2336-252-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2336-253-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2336-255-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\886A.exe

MD5 0a2419fd423d94709ddaeea265a79e38
SHA1 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518
SHA256 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca
SHA512 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989

C:\Users\Admin\AppData\Local\Temp\9A9F.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

C:\Users\Admin\AppData\Roaming\jiafcue

MD5 f5e6eae839c0b6c9d7f1c6141c01cc74
SHA1 8845fb5cc5d173f768555f69d8fa97eae0b9dc38
SHA256 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9
SHA512 28b797f3224540473e868f869129dffe8470eb57706a707df861091730fb849c0039223531ff4c975a94534b895c2bbe91621d726b73884c8a508412c1198e48