Analysis Overview
SHA256
52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1
Threat Level: Known bad
The file 52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1 was found to be: Known bad.
Malicious Activity Summary
Amadey
Detect Fabookie payload
Djvu Ransomware
SmokeLoader
RedLine
Fabookie
Detected Djvu ransomware
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Downloads MZ/PE file
Themida packer
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Reads user/profile data of web browsers
Modifies file permissions
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Checks installed software on the system
Looks up external IP address via web service
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Program crash
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Checks SCSI registry key(s)
Suspicious behavior: LoadsDriver
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: EnumeratesProcesses
Creates scheduled task(s)
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-09-13 20:31
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-13 20:31
Reported
2023-09-13 20:33
Platform
win10v2004-20230831-en
Max time kernel
77s
Max time network
151s
Command Line
Signatures
Amadey
Detect Fabookie payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Fabookie
RedLine
SmokeLoader
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\7163.exe | N/A |
Downloads MZ/PE file
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\7163.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\7163.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1980726966-773384374-2129981223-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\886A.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6CA0.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7163.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\754C.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\76D4.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\886A.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\886A.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9A9F.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\8CF0.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9260.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9A9F.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\9D50.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\6CA0.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Themida packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\7163.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7163.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4128 set thread context of 3876 | N/A | C:\Users\Admin\AppData\Local\Temp\754C.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 2172 set thread context of 4156 | N/A | C:\Users\Admin\AppData\Local\Temp\7163.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe |
| PID 4420 set thread context of 4120 | N/A | C:\Users\Admin\AppData\Local\Temp\9A9F.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 4332 set thread context of 4988 | N/A | C:\Users\Admin\AppData\Local\Temp\9D50.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 3864 set thread context of 648 | N/A | C:\Users\Admin\AppData\Local\Temp\6CA0.exe | C:\Users\Admin\AppData\Local\Temp\6CA0.exe |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\6CA0.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\886A.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\9A9F.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\7163.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\76D4.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe
"C:\Users\Admin\AppData\Local\Temp\52d8af024085117c953e51448794db1ce4bc411436df0d7b692381626c84b9e1.exe"
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
C:\Users\Admin\AppData\Local\Temp\7163.exe
C:\Users\Admin\AppData\Local\Temp\7163.exe
C:\Users\Admin\AppData\Local\Temp\754C.exe
C:\Users\Admin\AppData\Local\Temp\754C.exe
C:\Users\Admin\AppData\Local\Temp\76D4.exe
C:\Users\Admin\AppData\Local\Temp\76D4.exe
C:\Users\Admin\AppData\Local\Temp\7FFD.exe
C:\Users\Admin\AppData\Local\Temp\7FFD.exe
C:\Users\Admin\AppData\Local\Temp\886A.exe
C:\Users\Admin\AppData\Local\Temp\886A.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"
C:\Users\Admin\AppData\Local\Temp\8A5F.exe
C:\Users\Admin\AppData\Local\Temp\8A5F.exe
C:\Users\Admin\AppData\Local\Temp\8CF0.exe
C:\Users\Admin\AppData\Local\Temp\8CF0.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit
C:\Users\Admin\AppData\Local\Temp\9260.exe
C:\Users\Admin\AppData\Local\Temp\9260.exe
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
C:\Users\Admin\AppData\Local\Temp\9D50.exe
C:\Users\Admin\AppData\Local\Temp\9D50.exe
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:N"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\713d4124-bb01-40d7-9320-f4cd6cb434d5" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:N"
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
"C:\Users\Admin\AppData\Local\Temp\6CA0.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:R" /E
C:\Users\Admin\AppData\Local\Temp\886A.exe
C:\Users\Admin\AppData\Local\Temp\886A.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\886A.exe
"C:\Users\Admin\AppData\Local\Temp\886A.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
"C:\Users\Admin\AppData\Local\Temp\9A9F.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
"C:\Users\Admin\AppData\Local\Temp\6CA0.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2336 -ip 2336
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 568
C:\Users\Admin\AppData\Local\Temp\886A.exe
"C:\Users\Admin\AppData\Local\Temp\886A.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3888 -ip 3888
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 568
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
"C:\Users\Admin\AppData\Local\Temp\9A9F.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4544 -ip 4544
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 568
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Roaming\usafcue
C:\Users\Admin\AppData\Roaming\usafcue
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.209.218.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.57.101.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.1.248.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.97.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| KW | 37.34.248.24:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 0.97.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.248.34.37.in-addr.arpa | udp |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| US | 8.8.8.8:53 | 232.175.169.194.in-addr.arpa | udp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| KW | 37.34.248.24:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 18.192.137.79.in-addr.arpa | udp |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| BG | 193.42.32.101:80 | 193.42.32.101 | tcp |
| US | 8.8.8.8:53 | 101.32.42.193.in-addr.arpa | udp |
| US | 8.8.8.8:53 | login-sofi.4dq.com | udp |
| DE | 45.79.249.147:443 | login-sofi.4dq.com | tcp |
| US | 8.8.8.8:53 | 147.249.79.45.in-addr.arpa | udp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| MD | 176.123.9.142:14845 | tcp | |
| US | 8.8.8.8:53 | 142.9.123.176.in-addr.arpa | udp |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | z.nnnaajjjgc.com | udp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| NL | 194.169.175.232:45450 | tcp | |
| US | 8.8.8.8:53 | 121.72.236.156.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 142.33.222.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.121.18.2.in-addr.arpa | udp |
| US | 38.181.25.43:3325 | tcp | |
| US | 8.8.8.8:53 | 43.25.181.38.in-addr.arpa | udp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| US | 95.214.27.254:80 | tcp | |
| NL | 194.169.175.232:45450 | tcp | |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 108.26.221.154.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.217.0.162.in-addr.arpa | udp |
| GB | 51.38.95.107:42494 | tcp | |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | 101.14.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.95.38.51.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 95.214.27.254:80 | tcp | |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | transfer.sh | udp |
| DE | 144.76.136.153:443 | transfer.sh | tcp |
| US | 8.8.8.8:53 | 153.136.76.144.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gudintas.at | udp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| US | 95.214.27.254:80 | tcp | |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 19.159.147.186.in-addr.arpa | udp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| CO | 186.147.159.19:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 89.65.42.20.in-addr.arpa | udp |
| US | 95.214.27.254:80 | tcp |
Files
memory/5064-1-0x00000000023A0000-0x00000000024A0000-memory.dmp
memory/5064-2-0x0000000002370000-0x0000000002379000-memory.dmp
memory/5064-3-0x0000000000400000-0x0000000002291000-memory.dmp
memory/5064-4-0x0000000000400000-0x0000000002291000-memory.dmp
memory/3284-5-0x0000000002A80000-0x0000000002A96000-memory.dmp
memory/5064-6-0x0000000000400000-0x0000000002291000-memory.dmp
memory/5064-9-0x0000000002370000-0x0000000002379000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
C:\Users\Admin\AppData\Local\Temp\7163.exe
| MD5 | 1b67e388efc2b48f047e9eeb16edcef2 |
| SHA1 | 2c5ddc2006c38caed1adab80df1e5a370821b47f |
| SHA256 | 46c718a1a788637723d284c0b8da50ff03c39ba214ee735c78b230d4055fa1f1 |
| SHA512 | 21fa1ebbba8a62176813547ee1a61297ab2ea862d36d349b06510819ce6d9d0502a2351ab23949248eb78335482defae86a98bc390e94cb08706219adb017e94 |
C:\Users\Admin\AppData\Local\Temp\7163.exe
| MD5 | 1b67e388efc2b48f047e9eeb16edcef2 |
| SHA1 | 2c5ddc2006c38caed1adab80df1e5a370821b47f |
| SHA256 | 46c718a1a788637723d284c0b8da50ff03c39ba214ee735c78b230d4055fa1f1 |
| SHA512 | 21fa1ebbba8a62176813547ee1a61297ab2ea862d36d349b06510819ce6d9d0502a2351ab23949248eb78335482defae86a98bc390e94cb08706219adb017e94 |
memory/2172-21-0x00000000004E0000-0x0000000000D82000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\754C.exe
| MD5 | f80d0dc2fe6ef74e286f99444bd6fe83 |
| SHA1 | 30d3c3da98bc194650f0709b445863b76edb4fd8 |
| SHA256 | 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa |
| SHA512 | 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b |
memory/2172-26-0x0000000077480000-0x0000000077570000-memory.dmp
memory/2172-24-0x0000000077480000-0x0000000077570000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\76D4.exe
| MD5 | 52e2f416fb09cf8da94bf1a88a8bc31b |
| SHA1 | b368ea2376b00d1439e292952d281c577d26049b |
| SHA256 | cce9583aa5844ea41e7402a170d96eb8d6ab7b2b05363b7dbe81a2e8af655345 |
| SHA512 | a4ad5d6d60e8ee8d881552aba745a30d3ed0cc7021e503063f865f1fb1136b71b37aa6e6dae16ce1895f3d857eb80651bf0d194e9a506e5746ce96dc549d4732 |
memory/2172-30-0x0000000077480000-0x0000000077570000-memory.dmp
memory/2172-31-0x0000000077480000-0x0000000077570000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\754C.exe
| MD5 | f80d0dc2fe6ef74e286f99444bd6fe83 |
| SHA1 | 30d3c3da98bc194650f0709b445863b76edb4fd8 |
| SHA256 | 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa |
| SHA512 | 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b |
memory/2172-33-0x0000000077480000-0x0000000077570000-memory.dmp
memory/2172-34-0x0000000077B34000-0x0000000077B36000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\76D4.exe
| MD5 | 52e2f416fb09cf8da94bf1a88a8bc31b |
| SHA1 | b368ea2376b00d1439e292952d281c577d26049b |
| SHA256 | cce9583aa5844ea41e7402a170d96eb8d6ab7b2b05363b7dbe81a2e8af655345 |
| SHA512 | a4ad5d6d60e8ee8d881552aba745a30d3ed0cc7021e503063f865f1fb1136b71b37aa6e6dae16ce1895f3d857eb80651bf0d194e9a506e5746ce96dc549d4732 |
C:\Users\Admin\AppData\Local\Temp\7FFD.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\7FFD.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/3760-46-0x00000000007F0000-0x0000000000820000-memory.dmp
memory/2172-47-0x00000000004E0000-0x0000000000D82000-memory.dmp
memory/3760-45-0x0000000000400000-0x0000000000445000-memory.dmp
memory/2172-51-0x00000000057E0000-0x000000000587C000-memory.dmp
memory/3760-52-0x0000000075020000-0x00000000757D0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\886A.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
C:\Users\Admin\AppData\Local\Temp\886A.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
C:\Users\Admin\AppData\Local\Temp\8A5F.exe
| MD5 | f80d0dc2fe6ef74e286f99444bd6fe83 |
| SHA1 | 30d3c3da98bc194650f0709b445863b76edb4fd8 |
| SHA256 | 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa |
| SHA512 | 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\8CF0.exe
| MD5 | b7a9dd705bcc0dbfc9cabc69b2953b33 |
| SHA1 | bb0c29b2169c908b8d25637651eeaa32135e0b80 |
| SHA256 | aeb52394baaa77dd4761926e2ae17bdb10423408fac0256159ea61b18c3b5e3d |
| SHA512 | 62140abc3a36ee8593b59389a5b98ebc9baab411c6c5f466d3a4291f7a89c4cff469373a5a1dd530df9decdee165480834cb7323dd78728eadee52acc8f2eadf |
C:\Users\Admin\AppData\Local\Temp\8CF0.exe
| MD5 | b7a9dd705bcc0dbfc9cabc69b2953b33 |
| SHA1 | bb0c29b2169c908b8d25637651eeaa32135e0b80 |
| SHA256 | aeb52394baaa77dd4761926e2ae17bdb10423408fac0256159ea61b18c3b5e3d |
| SHA512 | 62140abc3a36ee8593b59389a5b98ebc9baab411c6c5f466d3a4291f7a89c4cff469373a5a1dd530df9decdee165480834cb7323dd78728eadee52acc8f2eadf |
memory/1424-71-0x000001B8988C0000-0x000001B898980000-memory.dmp
memory/2172-72-0x00000000004E0000-0x0000000000D82000-memory.dmp
memory/3760-73-0x0000000004D20000-0x0000000005338000-memory.dmp
memory/2172-74-0x0000000077480000-0x0000000077570000-memory.dmp
memory/3760-79-0x0000000004C40000-0x0000000004C52000-memory.dmp
memory/3876-78-0x0000000000400000-0x0000000000430000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9260.exe
| MD5 | f5e6eae839c0b6c9d7f1c6141c01cc74 |
| SHA1 | 8845fb5cc5d173f768555f69d8fa97eae0b9dc38 |
| SHA256 | 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9 |
| SHA512 | 28b797f3224540473e868f869129dffe8470eb57706a707df861091730fb849c0039223531ff4c975a94534b895c2bbe91621d726b73884c8a508412c1198e48 |
memory/3760-84-0x0000000004C60000-0x0000000004C9C000-memory.dmp
memory/1424-85-0x00007FF84E0B0000-0x00007FF84EB71000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9260.exe
| MD5 | f5e6eae839c0b6c9d7f1c6141c01cc74 |
| SHA1 | 8845fb5cc5d173f768555f69d8fa97eae0b9dc38 |
| SHA256 | 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9 |
| SHA512 | 28b797f3224540473e868f869129dffe8470eb57706a707df861091730fb849c0039223531ff4c975a94534b895c2bbe91621d726b73884c8a508412c1198e48 |
memory/1424-77-0x000001B898DC0000-0x000001B898DDA000-memory.dmp
memory/3760-76-0x0000000005340000-0x000000000544A000-memory.dmp
memory/3876-87-0x0000000075020000-0x00000000757D0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\8A5F.exe
| MD5 | f80d0dc2fe6ef74e286f99444bd6fe83 |
| SHA1 | 30d3c3da98bc194650f0709b445863b76edb4fd8 |
| SHA256 | 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa |
| SHA512 | 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b |
memory/3876-93-0x00000000055C0000-0x00000000055D0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
| MD5 | 39ad210451d748bf993549920c723a0f |
| SHA1 | 96897d5a8cd21ef0f71c1c40159cff9373855508 |
| SHA256 | b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a |
| SHA512 | d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024 |
C:\Users\Admin\AppData\Local\Temp\9D50.exe
| MD5 | 24f97033c62127b816fe4733b9b8a3f0 |
| SHA1 | bd8a47ad195de6fa694a6b8de214a7d06b516824 |
| SHA256 | f1b1e5919f4add8c22320c69c6e394066de60695a36de7d4227efaadfef3e612 |
| SHA512 | c657278d886d296d2d7192b7a845a3d8accb59c15ea54b0588ebe0d595dbf0a403e674cb446f7c543502b1a9e24d064b0196c85eb3557ca473456aebbdfdf49a |
memory/1424-96-0x000001B89A890000-0x000001B89A8A0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
| MD5 | 39ad210451d748bf993549920c723a0f |
| SHA1 | 96897d5a8cd21ef0f71c1c40159cff9373855508 |
| SHA256 | b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a |
| SHA512 | d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024 |
memory/2172-98-0x0000000077480000-0x0000000077570000-memory.dmp
memory/2172-99-0x0000000077480000-0x0000000077570000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
C:\Users\Admin\AppData\Local\Temp\9D50.exe
| MD5 | 24f97033c62127b816fe4733b9b8a3f0 |
| SHA1 | bd8a47ad195de6fa694a6b8de214a7d06b516824 |
| SHA256 | f1b1e5919f4add8c22320c69c6e394066de60695a36de7d4227efaadfef3e612 |
| SHA512 | c657278d886d296d2d7192b7a845a3d8accb59c15ea54b0588ebe0d595dbf0a403e674cb446f7c543502b1a9e24d064b0196c85eb3557ca473456aebbdfdf49a |
memory/2172-106-0x0000000077480000-0x0000000077570000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
memory/2172-117-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-116-0x0000000077480000-0x0000000077570000-memory.dmp
memory/1344-118-0x00007FF7A91E0000-0x00007FF7A9218000-memory.dmp
memory/2172-120-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-122-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-115-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-124-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-126-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-132-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/3760-131-0x0000000005600000-0x0000000005692000-memory.dmp
memory/3760-129-0x0000000005580000-0x00000000055F6000-memory.dmp
memory/2172-136-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/3760-135-0x00000000056A0000-0x0000000005C44000-memory.dmp
memory/3760-138-0x0000000005F50000-0x0000000005FB6000-memory.dmp
memory/2172-128-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-139-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-141-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/2172-143-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/3760-145-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/2172-146-0x00000000057B0000-0x00000000057C5000-memory.dmp
memory/4156-147-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1424-152-0x00007FF84E0B0000-0x00007FF84EB71000-memory.dmp
memory/2172-154-0x0000000077480000-0x0000000077570000-memory.dmp
memory/4156-155-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/2172-156-0x00000000004E0000-0x0000000000D82000-memory.dmp
memory/3760-157-0x0000000004B30000-0x0000000004B80000-memory.dmp
memory/4156-158-0x0000000005100000-0x0000000005110000-memory.dmp
memory/3876-160-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/3876-161-0x00000000055C0000-0x00000000055D0000-memory.dmp
memory/1424-162-0x000001B89A890000-0x000001B89A8A0000-memory.dmp
memory/3760-163-0x0000000004D10000-0x0000000004D20000-memory.dmp
memory/4120-167-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/3876-168-0x00000000069D0000-0x0000000006B92000-memory.dmp
memory/3876-169-0x0000000008F80000-0x00000000094AC000-memory.dmp
memory/1344-176-0x0000000003790000-0x0000000003901000-memory.dmp
memory/648-180-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
memory/648-181-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1344-178-0x0000000003910000-0x0000000003A41000-memory.dmp
memory/648-177-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3864-173-0x00000000040C0000-0x00000000041DB000-memory.dmp
memory/4988-184-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/648-185-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3864-172-0x0000000004010000-0x00000000040B1000-memory.dmp
memory/4988-171-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4988-186-0x0000000004FE0000-0x0000000004FF0000-memory.dmp
memory/4156-187-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/4156-188-0x0000000005100000-0x0000000005110000-memory.dmp
memory/4120-192-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/3760-198-0x0000000075020000-0x00000000757D0000-memory.dmp
C:\Users\Admin\AppData\Local\713d4124-bb01-40d7-9320-f4cd6cb434d5\6CA0.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
| MD5 | 7f305d024899e4809fb6f4ae00da304c |
| SHA1 | f88a0812d36e0562ede3732ab511f459a09faff8 |
| SHA256 | 8fe1088ad55d05a3c2149648c8c1ce55862e925580308afe4a4ff6cfb089c769 |
| SHA512 | bc40698582400427cd47cf80dcf39202a74148b69ed179483160b4023368d53301fa12fe6d530d9c7cdfe5f78d19ee87a285681f537950334677f8af8dfeb2ae |
C:\Users\Admin\AppData\Local\713d4124-bb01-40d7-9320-f4cd6cb434d5\6CA0.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
memory/3876-203-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/648-204-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1344-205-0x0000000003910000-0x0000000003A41000-memory.dmp
memory/4988-206-0x0000000075020000-0x00000000757D0000-memory.dmp
memory/648-207-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
memory/1436-215-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1436-216-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\886A.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 8cb8f90ec602fd3a3e719cb78d8c7cce |
| SHA1 | cdf764f8683ff175fb19bb0ed9e8765e28033e3b |
| SHA256 | da35784b211cae7f4696f5b33b9b2ba9295bfa1016ad92ed28a3d588c1c84651 |
| SHA512 | 939433b40ad73f85b50268616a1717dc3be47087450d7682b4dab5a657a4279a9a61d706b5e6fc24183995a27ab0803d704e0f2fde6e450d3b05d8b4c0bd6395 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 486a36241338df620627a11be9b9af91 |
| SHA1 | c1354e84db092bb641275e2df19da286df02feff |
| SHA256 | 9467986115244da194c1481a0317b445fffd86f76a4632c645049a6027a72172 |
| SHA512 | 143edd6db838c587c884e51b18fb221448af52706e872ba55f368a1e568d9450fcc41279825b1e47feb49568882f89b69a4804b0507cebb63bb69ff73b275c1e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 9622537e51915638708894cb1125d8df |
| SHA1 | 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd |
| SHA256 | 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c |
| SHA512 | 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | fc5464fdf9176a7b47c4eabbaa8975e2 |
| SHA1 | 9fb878d9542285c58b1581f98d8c9bd594ad85d1 |
| SHA256 | 6338dab0072ed4c6383e0f6547aa9da763a1c5476a7025ea4ff5b1a7d20a870c |
| SHA512 | 04fc37a2ebf9ec27e8890d5bda71c83964cd1054f448bf294f53560e17aa187184f337a73be411f2400be8bccf71ee43cd84c7a5f4de80796703fd9d379d2167 |
memory/1436-223-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\886A.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
memory/3992-228-0x0000000000400000-0x0000000002291000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
| MD5 | 39ad210451d748bf993549920c723a0f |
| SHA1 | 96897d5a8cd21ef0f71c1c40159cff9373855508 |
| SHA256 | b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a |
| SHA512 | d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024 |
memory/2880-235-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/2880-232-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2880-230-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2880-240-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
| MD5 | 39ad210451d748bf993549920c723a0f |
| SHA1 | 96897d5a8cd21ef0f71c1c40159cff9373855508 |
| SHA256 | b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a |
| SHA512 | d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024 |
memory/3284-244-0x0000000002910000-0x0000000002926000-memory.dmp
memory/3992-247-0x0000000000400000-0x0000000002291000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\6CA0.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
memory/2336-252-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2336-253-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2336-255-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\886A.exe
| MD5 | 0a2419fd423d94709ddaeea265a79e38 |
| SHA1 | 8f4c864b9b9aa2614e6b7540a09fb0d1c3c3c518 |
| SHA256 | 296682b25db0cad76365ab45b804cbf16ce7b5d60c450a32291c6ef6caa30cca |
| SHA512 | 275c8da31c470421a1aee0d6cb8810fe3d02aecb73fd53d0cc95fb2f719172fd3ebb5d942c7eef6438954068ca3bd9ee527eda325d83fa07c52fe5dcac0d9989 |
C:\Users\Admin\AppData\Local\Temp\9A9F.exe
| MD5 | 39ad210451d748bf993549920c723a0f |
| SHA1 | 96897d5a8cd21ef0f71c1c40159cff9373855508 |
| SHA256 | b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a |
| SHA512 | d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024 |
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Roaming\jiafcue
| MD5 | f5e6eae839c0b6c9d7f1c6141c01cc74 |
| SHA1 | 8845fb5cc5d173f768555f69d8fa97eae0b9dc38 |
| SHA256 | 17779ddb4bc3962bda0b0461ddf3eaf665c54364b3abe98d209b6f40781a1ab9 |
| SHA512 | 28b797f3224540473e868f869129dffe8470eb57706a707df861091730fb849c0039223531ff4c975a94534b895c2bbe91621d726b73884c8a508412c1198e48 |