Analysis Overview
SHA256
a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8
Threat Level: Known bad
The file a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8 was found to be: Known bad.
Malicious Activity Summary
Detected Djvu ransomware
Detect Fabookie payload
Djvu Ransomware
SmokeLoader
RedLine
Fabookie
Amadey
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Downloads MZ/PE file
Loads dropped DLL
Modifies file permissions
Checks computer location settings
Themida packer
Executes dropped EXE
Checks BIOS information in registry
Reads user/profile data of web browsers
Adds Run key to start application
Looks up external IP address via web service
Checks whether UAC is enabled
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Enumerates physical storage devices
Unsigned PE
Program crash
Uses Task Scheduler COM API
Suspicious use of UnmapMainImage
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: LoadsDriver
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-09-14 09:40
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-14 09:40
Reported
2023-09-14 09:43
Platform
win10v2004-20230831-en
Max time kernel
150s
Max time network
154s
Command Line
Signatures
Amadey
Detect Fabookie payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Fabookie
RedLine
SmokeLoader
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\EADE.exe | N/A |
Downloads MZ/PE file
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\EADE.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\EADE.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\5AE.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\E724.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\62C5.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\F801.exe | N/A |
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Themida packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\4cc783ee-35ea-4cc5-9abc-3a48dcf02315\\E724.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\E724.exe | N/A |
Checks installed software on the system
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\EADE.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\EADE.exe | N/A |
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\5AE.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\E724.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\62C5.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\EADE.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\EE4B.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe
"C:\Users\Admin\AppData\Local\Temp\a9890f87b21ea9eb9f36f6d569ce7051c4b44bdc8b6a709ec294d6dc324d82a8.exe"
C:\Users\Admin\AppData\Local\Temp\E724.exe
C:\Users\Admin\AppData\Local\Temp\E724.exe
C:\Users\Admin\AppData\Local\Temp\EADE.exe
C:\Users\Admin\AppData\Local\Temp\EADE.exe
C:\Users\Admin\AppData\Local\Temp\ECB4.exe
C:\Users\Admin\AppData\Local\Temp\ECB4.exe
C:\Users\Admin\AppData\Local\Temp\EE4B.exe
C:\Users\Admin\AppData\Local\Temp\EE4B.exe
C:\Users\Admin\AppData\Local\Temp\EFA4.exe
C:\Users\Admin\AppData\Local\Temp\EFA4.exe
C:\Users\Admin\AppData\Local\Temp\F801.exe
C:\Users\Admin\AppData\Local\Temp\F801.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\5AE.exe
C:\Users\Admin\AppData\Local\Temp\5AE.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit
C:\Users\Admin\AppData\Local\Temp\7F1.exe
C:\Users\Admin\AppData\Local\Temp\7F1.exe
C:\Users\Admin\AppData\Local\Temp\C96.exe
C:\Users\Admin\AppData\Local\Temp\C96.exe
C:\Users\Admin\AppData\Local\Temp\E724.exe
C:\Users\Admin\AppData\Local\Temp\E724.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
"C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe"
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:N"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\4cc783ee-35ea-4cc5-9abc-3a48dcf02315" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
C:\Users\Admin\AppData\Local\Temp\5AE.exe
C:\Users\Admin\AppData\Local\Temp\5AE.exe
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:R" /E
C:\Users\Admin\AppData\Local\Temp\5AE.exe
"C:\Users\Admin\AppData\Local\Temp\5AE.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:R" /E
C:\Users\Admin\AppData\Local\Temp\5AE.exe
"C:\Users\Admin\AppData\Local\Temp\5AE.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1852 -ip 1852
C:\Users\Admin\AppData\Local\Temp\E724.exe
"C:\Users\Admin\AppData\Local\Temp\E724.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 568
C:\Users\Admin\AppData\Local\Temp\62C5.exe
C:\Users\Admin\AppData\Local\Temp\62C5.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6557.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\6557.dll
C:\Users\Admin\AppData\Local\Temp\E724.exe
"C:\Users\Admin\AppData\Local\Temp\E724.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1840 -ip 1840
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 568
C:\Users\Admin\AppData\Local\Temp\62C5.exe
C:\Users\Admin\AppData\Local\Temp\62C5.exe
C:\Users\Admin\AppData\Local\Temp\62C5.exe
"C:\Users\Admin\AppData\Local\Temp\62C5.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\62C5.exe
"C:\Users\Admin\AppData\Local\Temp\62C5.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4760 -ip 4760
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 568
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
"C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe"
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.208.79.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.96.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| KR | 123.140.161.243:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 243.161.140.123.in-addr.arpa | udp |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| US | 8.8.8.8:53 | 232.175.169.194.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.192.137.79.in-addr.arpa | udp |
| KR | 123.140.161.243:80 | colisumy.com | tcp |
| MD | 176.123.9.142:14845 | tcp | |
| US | 8.8.8.8:53 | 142.9.123.176.in-addr.arpa | udp |
| NL | 194.169.175.232:80 | 194.169.175.232 | tcp |
| BG | 193.42.32.101:80 | 193.42.32.101 | tcp |
| NL | 194.169.175.232:45450 | tcp | |
| US | 8.8.8.8:53 | 101.32.42.193.in-addr.arpa | udp |
| GB | 51.38.95.107:42494 | tcp | |
| US | 8.8.8.8:53 | login-sofi.4dq.com | udp |
| DE | 45.79.249.147:443 | login-sofi.4dq.com | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | 107.95.38.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | z.nnnaajjjgc.com | udp |
| US | 8.8.8.8:53 | 254.217.0.162.in-addr.arpa | udp |
| MU | 156.236.72.121:443 | z.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 126.20.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.15.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 121.72.236.156.in-addr.arpa | udp |
| NL | 194.169.175.232:45450 | tcp | |
| US | 8.8.8.8:53 | 142.33.222.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 145.121.18.2.in-addr.arpa | udp |
| US | 38.181.25.43:3325 | tcp | |
| US | 8.8.8.8:53 | 43.25.181.38.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | app.nnnaajjjgc.com | udp |
| HK | 154.221.26.108:80 | app.nnnaajjjgc.com | tcp |
| US | 8.8.8.8:53 | 108.26.221.154.in-addr.arpa | udp |
| US | 8.8.8.8:53 | transfer.sh | udp |
| DE | 144.76.136.153:443 | transfer.sh | tcp |
| US | 8.8.8.8:53 | 153.136.76.144.in-addr.arpa | udp |
| US | 95.214.27.254:80 | tcp | |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 95.214.27.254:80 | tcp | |
| US | 95.214.27.254:80 | tcp | |
| US | 95.214.27.254:80 | tcp | |
| US | 8.8.8.8:53 | host-file-host6.com | udp |
| US | 8.8.8.8:53 | host-host-file8.com | udp |
| NL | 194.169.175.127:80 | host-host-file8.com | tcp |
| US | 8.8.8.8:53 | 127.175.169.194.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.65.42.20.in-addr.arpa | udp |
| US | 95.214.27.254:80 | tcp |
Files
memory/1296-0-0x00000000006E0000-0x00000000006F5000-memory.dmp
memory/1296-1-0x0000000000700000-0x0000000000709000-memory.dmp
memory/1296-2-0x0000000000400000-0x0000000000480000-memory.dmp
memory/1296-4-0x0000000000400000-0x0000000000480000-memory.dmp
memory/1296-6-0x00000000006E0000-0x00000000006F5000-memory.dmp
memory/3148-3-0x0000000003160000-0x0000000003176000-memory.dmp
memory/1296-8-0x0000000000700000-0x0000000000709000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E724.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
C:\Users\Admin\AppData\Local\Temp\E724.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
C:\Users\Admin\AppData\Local\Temp\EADE.exe
| MD5 | 1b67e388efc2b48f047e9eeb16edcef2 |
| SHA1 | 2c5ddc2006c38caed1adab80df1e5a370821b47f |
| SHA256 | 46c718a1a788637723d284c0b8da50ff03c39ba214ee735c78b230d4055fa1f1 |
| SHA512 | 21fa1ebbba8a62176813547ee1a61297ab2ea862d36d349b06510819ce6d9d0502a2351ab23949248eb78335482defae86a98bc390e94cb08706219adb017e94 |
C:\Users\Admin\AppData\Local\Temp\EADE.exe
| MD5 | 1b67e388efc2b48f047e9eeb16edcef2 |
| SHA1 | 2c5ddc2006c38caed1adab80df1e5a370821b47f |
| SHA256 | 46c718a1a788637723d284c0b8da50ff03c39ba214ee735c78b230d4055fa1f1 |
| SHA512 | 21fa1ebbba8a62176813547ee1a61297ab2ea862d36d349b06510819ce6d9d0502a2351ab23949248eb78335482defae86a98bc390e94cb08706219adb017e94 |
memory/368-20-0x0000000000250000-0x0000000000AF2000-memory.dmp
memory/368-21-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
memory/368-22-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ECB4.exe
| MD5 | 47bf72d09074bd98b5022c0c384e3a18 |
| SHA1 | dc0e787ea6f91f8de6f342b052131a2a71682f4a |
| SHA256 | e196fc1201671122a3b8db9d285d367f87e6f14302f28b7362386bccbd09cc9b |
| SHA512 | 3c80a1c971f4424c14b540e665492c08f4fbe87b19ecf1c461f7d91ac5ca1eb5f6940b47de9a358f8fd96447c4ceb9141001189cfed55ec7659a4a34222d5dcd |
memory/368-26-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
memory/368-27-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
memory/368-28-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EE4B.exe
| MD5 | 52e2f416fb09cf8da94bf1a88a8bc31b |
| SHA1 | b368ea2376b00d1439e292952d281c577d26049b |
| SHA256 | cce9583aa5844ea41e7402a170d96eb8d6ab7b2b05363b7dbe81a2e8af655345 |
| SHA512 | a4ad5d6d60e8ee8d881552aba745a30d3ed0cc7021e503063f865f1fb1136b71b37aa6e6dae16ce1895f3d857eb80651bf0d194e9a506e5746ce96dc549d4732 |
memory/368-31-0x0000000077C24000-0x0000000077C26000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EFA4.exe
| MD5 | 24f97033c62127b816fe4733b9b8a3f0 |
| SHA1 | bd8a47ad195de6fa694a6b8de214a7d06b516824 |
| SHA256 | f1b1e5919f4add8c22320c69c6e394066de60695a36de7d4227efaadfef3e612 |
| SHA512 | c657278d886d296d2d7192b7a845a3d8accb59c15ea54b0588ebe0d595dbf0a403e674cb446f7c543502b1a9e24d064b0196c85eb3557ca473456aebbdfdf49a |
C:\Users\Admin\AppData\Local\Temp\ECB4.exe
| MD5 | 47bf72d09074bd98b5022c0c384e3a18 |
| SHA1 | dc0e787ea6f91f8de6f342b052131a2a71682f4a |
| SHA256 | e196fc1201671122a3b8db9d285d367f87e6f14302f28b7362386bccbd09cc9b |
| SHA512 | 3c80a1c971f4424c14b540e665492c08f4fbe87b19ecf1c461f7d91ac5ca1eb5f6940b47de9a358f8fd96447c4ceb9141001189cfed55ec7659a4a34222d5dcd |
C:\Users\Admin\AppData\Local\Temp\EE4B.exe
| MD5 | 52e2f416fb09cf8da94bf1a88a8bc31b |
| SHA1 | b368ea2376b00d1439e292952d281c577d26049b |
| SHA256 | cce9583aa5844ea41e7402a170d96eb8d6ab7b2b05363b7dbe81a2e8af655345 |
| SHA512 | a4ad5d6d60e8ee8d881552aba745a30d3ed0cc7021e503063f865f1fb1136b71b37aa6e6dae16ce1895f3d857eb80651bf0d194e9a506e5746ce96dc549d4732 |
memory/368-42-0x0000000000250000-0x0000000000AF2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EFA4.exe
| MD5 | 24f97033c62127b816fe4733b9b8a3f0 |
| SHA1 | bd8a47ad195de6fa694a6b8de214a7d06b516824 |
| SHA256 | f1b1e5919f4add8c22320c69c6e394066de60695a36de7d4227efaadfef3e612 |
| SHA512 | c657278d886d296d2d7192b7a845a3d8accb59c15ea54b0588ebe0d595dbf0a403e674cb446f7c543502b1a9e24d064b0196c85eb3557ca473456aebbdfdf49a |
memory/368-43-0x0000000005440000-0x00000000054DC000-memory.dmp
memory/1480-45-0x0000000000400000-0x0000000000445000-memory.dmp
memory/1480-44-0x00000000008B0000-0x00000000008E0000-memory.dmp
memory/1480-49-0x0000000075110000-0x00000000758C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F801.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\F801.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/1480-57-0x0000000005180000-0x000000000528A000-memory.dmp
memory/1480-56-0x0000000004B60000-0x0000000005178000-memory.dmp
memory/1480-58-0x0000000004B00000-0x0000000004B12000-memory.dmp
memory/368-59-0x0000000000250000-0x0000000000AF2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/1480-60-0x0000000004B50000-0x0000000004B60000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/1480-65-0x0000000005290000-0x00000000052CC000-memory.dmp
memory/548-69-0x0000000000400000-0x0000000000430000-memory.dmp
memory/368-70-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
memory/368-71-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
memory/548-72-0x0000000075110000-0x00000000758C0000-memory.dmp
memory/2960-73-0x0000000000400000-0x0000000000430000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5AE.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/2960-77-0x0000000075110000-0x00000000758C0000-memory.dmp
memory/368-80-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
memory/548-81-0x00000000050D0000-0x00000000050E0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\7F1.exe
| MD5 | 47bf72d09074bd98b5022c0c384e3a18 |
| SHA1 | dc0e787ea6f91f8de6f342b052131a2a71682f4a |
| SHA256 | e196fc1201671122a3b8db9d285d367f87e6f14302f28b7362386bccbd09cc9b |
| SHA512 | 3c80a1c971f4424c14b540e665492c08f4fbe87b19ecf1c461f7d91ac5ca1eb5f6940b47de9a358f8fd96447c4ceb9141001189cfed55ec7659a4a34222d5dcd |
memory/2960-85-0x0000000005630000-0x0000000005640000-memory.dmp
memory/368-82-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5AE.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/368-74-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\7F1.exe
| MD5 | 47bf72d09074bd98b5022c0c384e3a18 |
| SHA1 | dc0e787ea6f91f8de6f342b052131a2a71682f4a |
| SHA256 | e196fc1201671122a3b8db9d285d367f87e6f14302f28b7362386bccbd09cc9b |
| SHA512 | 3c80a1c971f4424c14b540e665492c08f4fbe87b19ecf1c461f7d91ac5ca1eb5f6940b47de9a358f8fd96447c4ceb9141001189cfed55ec7659a4a34222d5dcd |
C:\Users\Admin\AppData\Local\Temp\C96.exe
| MD5 | c82816b9cae5ab07c38a317572f3453f |
| SHA1 | ce1911787bf09e30932a07308e9f1b04dcf7f3dd |
| SHA256 | 07f738a9553af970e5b75ea53d566ae2a04fcdb19642f6c4fe9b820e46b60695 |
| SHA512 | 0451c99010056aab9349295be93f4c41b1a4c9843c07cbc9f0c2a6e9ce7b69ff6ce0dafa05a6a81aebc952cd7bc20d4b74cfe4cacb14ca3c0fc568ef5593182b |
C:\Users\Admin\AppData\Local\Temp\C96.exe
| MD5 | c82816b9cae5ab07c38a317572f3453f |
| SHA1 | ce1911787bf09e30932a07308e9f1b04dcf7f3dd |
| SHA256 | 07f738a9553af970e5b75ea53d566ae2a04fcdb19642f6c4fe9b820e46b60695 |
| SHA512 | 0451c99010056aab9349295be93f4c41b1a4c9843c07cbc9f0c2a6e9ce7b69ff6ce0dafa05a6a81aebc952cd7bc20d4b74cfe4cacb14ca3c0fc568ef5593182b |
memory/956-92-0x000001C804AD0000-0x000001C804B64000-memory.dmp
memory/956-94-0x00007FFD79DE0000-0x00007FFD7A8A1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E724.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/4508-98-0x0000000002090000-0x0000000002121000-memory.dmp
memory/956-101-0x000001C804F20000-0x000001C804F30000-memory.dmp
memory/4912-100-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4508-99-0x0000000002240000-0x000000000235B000-memory.dmp
memory/4912-97-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4912-93-0x0000000000400000-0x0000000000537000-memory.dmp
memory/956-95-0x000001C8068B0000-0x000001C8068CA000-memory.dmp
memory/1480-102-0x0000000075110000-0x00000000758C0000-memory.dmp
memory/4912-104-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
memory/5032-118-0x00007FF637370000-0x00007FF6373A8000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000073001\aafg31.exe
| MD5 | b236b8e5bab2445e09876a88d83a995a |
| SHA1 | 3278af413aad4772a57a4c33418d504f958465d9 |
| SHA256 | ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2 |
| SHA512 | 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5 |
memory/1480-119-0x0000000005440000-0x00000000054B6000-memory.dmp
memory/1480-122-0x00000000054C0000-0x0000000005552000-memory.dmp
memory/1480-126-0x0000000005D90000-0x0000000005DF6000-memory.dmp
memory/1480-125-0x0000000004B50000-0x0000000004B60000-memory.dmp
memory/1480-123-0x0000000005560000-0x0000000005B04000-memory.dmp
memory/368-128-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/548-131-0x0000000075110000-0x00000000758C0000-memory.dmp
memory/368-132-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/368-129-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/4516-136-0x0000000075110000-0x00000000758C0000-memory.dmp
memory/368-137-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/2960-140-0x0000000075110000-0x00000000758C0000-memory.dmp
memory/4516-142-0x0000000005780000-0x0000000005790000-memory.dmp
memory/368-144-0x00000000054E0000-0x00000000054F5000-memory.dmp
C:\Users\Admin\AppData\Local\4cc783ee-35ea-4cc5-9abc-3a48dcf02315\E724.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/368-147-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/368-139-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/368-149-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/368-153-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/368-155-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/368-159-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/548-158-0x00000000050D0000-0x00000000050E0000-memory.dmp
memory/1480-160-0x0000000006400000-0x00000000065C2000-memory.dmp
memory/368-163-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/1480-165-0x00000000065D0000-0x0000000006AFC000-memory.dmp
memory/2960-167-0x0000000006970000-0x00000000069C0000-memory.dmp
memory/368-166-0x00000000054E0000-0x00000000054F5000-memory.dmp
memory/1460-168-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2960-172-0x0000000005630000-0x0000000005640000-memory.dmp
memory/1460-174-0x0000000075110000-0x00000000758C0000-memory.dmp
memory/368-177-0x0000000075DC0000-0x0000000075EB0000-memory.dmp
memory/368-176-0x0000000000250000-0x0000000000AF2000-memory.dmp
memory/956-178-0x00007FFD79DE0000-0x00007FFD7A8A1000-memory.dmp
memory/1460-179-0x0000000000F10000-0x0000000000F20000-memory.dmp
memory/4912-180-0x0000000000400000-0x0000000000537000-memory.dmp
memory/956-181-0x000001C804F20000-0x000001C804F30000-memory.dmp
memory/4796-184-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4796-185-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5AE.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/5032-189-0x0000000002F20000-0x0000000003091000-memory.dmp
memory/4796-188-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5032-190-0x00000000030A0000-0x00000000031D1000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | bcf9c82a8e06cd4dbc7c6f8166b03d62 |
| SHA1 | aa072fd0adc30bc7d45952443a137972eaea0499 |
| SHA256 | 32b64ccb43add6147056e3f68bd46c762c8b38dea72735355fc422160a0f417d |
| SHA512 | 7a26e9797da034f01a08a1b62e4e7e39de67526257d015a0ef7590968af690fecb1852a0f3ee05f64bbf571344eb74ef4d404d2f145f7e7dd36f6a21816ba4a0 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | 123b70f6aee8b194e298c50810d2ba11 |
| SHA1 | 6e860e86e1b21794f4669f71bdeecb5503b5a782 |
| SHA256 | 307518040496047303b4c35d7722f3bede6285a3a222067f8a6a3ea97841f4f4 |
| SHA512 | 56cde4f45cd0a2b00e250cf18bb7685ea78c16e5d0503cfc8267c9b370076f67dd7c1cb9a0e3117f1efc86eab812405cb698e7f48b3154e696b0ee625b2408c5 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 9622537e51915638708894cb1125d8df |
| SHA1 | 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd |
| SHA256 | 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c |
| SHA512 | 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | c5ecef0ac006f2bd8c2d7207ffe0e178 |
| SHA1 | 0437f1514a45d7e50217329846184a3961060e34 |
| SHA256 | 31eb6907d9085372b352edb4c945d76ff3b09f5fd529c828bfe95349730f5f2c |
| SHA512 | 724b43e154f4d98136a60e06a88f75d4414a9c3b378db6077b68f4a6de227351c97c118262cd1db8430851577b6136ecb2652cea9501af54edfee0c479522dee |
memory/4516-197-0x0000000075110000-0x00000000758C0000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
| MD5 | 9b756bc85e5324eb8f87a69e3f9959ab |
| SHA1 | 1778b2e2d6a00c421578a284db1e743931611d66 |
| SHA256 | e347a39e49ca8c835cc47d3f039230969e7c4156089f2e83e8a0aed1df88016e |
| SHA512 | c897af3307e3c3163762021f49934ac5fbeab27f123e814bc390bdf1f0ed46671afeadcc87a8a4b18ddf13f4abd0d8ef00343af91ff999d7d447c96505d866d8 |
memory/4796-202-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5AE.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
C:\Users\Admin\AppData\Local\4cc783ee-35ea-4cc5-9abc-3a48dcf02315\E724.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
C:\Users\Admin\AppData\Local\Temp\5AE.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/1852-214-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1852-215-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1852-217-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E724.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/4912-218-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\62C5.exe
| MD5 | c2273e3679c0660d8b4cd294ec6f88a7 |
| SHA1 | 1b01c714e54dca1c562ccb77e746a9645eee7cfc |
| SHA256 | d68e18e28f3ba8db95da24be50e918d9254214079f1394eb55ce53f772041664 |
| SHA512 | afd5b5181184449327e77cd116939d5c4c5bb83b4e4e70dc7d7e0579d4b4d66508b238d55a8f05bed9d0df9da6b286ccd2d805140e82db00d943b7fd11e56d4d |
C:\Users\Admin\AppData\Local\Temp\62C5.exe
| MD5 | c2273e3679c0660d8b4cd294ec6f88a7 |
| SHA1 | 1b01c714e54dca1c562ccb77e746a9645eee7cfc |
| SHA256 | d68e18e28f3ba8db95da24be50e918d9254214079f1394eb55ce53f772041664 |
| SHA512 | afd5b5181184449327e77cd116939d5c4c5bb83b4e4e70dc7d7e0579d4b4d66508b238d55a8f05bed9d0df9da6b286ccd2d805140e82db00d943b7fd11e56d4d |
C:\Users\Admin\AppData\Local\Temp\6557.dll
| MD5 | cd473f96a31e502950837fb6ed2fe819 |
| SHA1 | 87bf2e1161ef159b56db4a6350d4dfe219f30683 |
| SHA256 | b862581cd97d94bcd7f955ab75da813d84c182e86722695e3b03f8229c4d6d5c |
| SHA512 | 509881a3eeec7f6bc7fb6973f0df61dfe631f1636f4fb19024915dc5b6a1c51c1882037a76afad897d3ea67c618ac08ae0b318809626ed06dbbd9dd86a731d94 |
C:\Users\Admin\AppData\Local\Temp\6557.dll
| MD5 | cd473f96a31e502950837fb6ed2fe819 |
| SHA1 | 87bf2e1161ef159b56db4a6350d4dfe219f30683 |
| SHA256 | b862581cd97d94bcd7f955ab75da813d84c182e86722695e3b03f8229c4d6d5c |
| SHA512 | 509881a3eeec7f6bc7fb6973f0df61dfe631f1636f4fb19024915dc5b6a1c51c1882037a76afad897d3ea67c618ac08ae0b318809626ed06dbbd9dd86a731d94 |
memory/3428-231-0x0000000010000000-0x00000000102D3000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\E724.exe
| MD5 | 2340b48b4a14c41d93d84ec7974cc8d6 |
| SHA1 | 877c209472761292e20de46711260b87b3c3a2ba |
| SHA256 | 1baed15aceffae50481b74fe4a3952e68541c5cf1f4c2944e72504def29682d5 |
| SHA512 | 87b97ab758fdd34e0047f9cdc5cef3c1224d8f1b118d03eda5afbf1644381f4d21c7f2dab6dbb8c1bc88bc5d348c4994361d0dd79aa837b501e33dd5e3c5e6be |
memory/1840-236-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1840-237-0x0000000000400000-0x0000000000537000-memory.dmp
memory/1840-239-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\62C5.exe
| MD5 | c2273e3679c0660d8b4cd294ec6f88a7 |
| SHA1 | 1b01c714e54dca1c562ccb77e746a9645eee7cfc |
| SHA256 | d68e18e28f3ba8db95da24be50e918d9254214079f1394eb55ce53f772041664 |
| SHA512 | afd5b5181184449327e77cd116939d5c4c5bb83b4e4e70dc7d7e0579d4b4d66508b238d55a8f05bed9d0df9da6b286ccd2d805140e82db00d943b7fd11e56d4d |
C:\Users\Admin\AppData\Local\Temp\62C5.exe
| MD5 | c2273e3679c0660d8b4cd294ec6f88a7 |
| SHA1 | 1b01c714e54dca1c562ccb77e746a9645eee7cfc |
| SHA256 | d68e18e28f3ba8db95da24be50e918d9254214079f1394eb55ce53f772041664 |
| SHA512 | afd5b5181184449327e77cd116939d5c4c5bb83b4e4e70dc7d7e0579d4b4d66508b238d55a8f05bed9d0df9da6b286ccd2d805140e82db00d943b7fd11e56d4d |
C:\Users\Admin\AppData\Local\Temp\62C5.exe
| MD5 | c2273e3679c0660d8b4cd294ec6f88a7 |
| SHA1 | 1b01c714e54dca1c562ccb77e746a9645eee7cfc |
| SHA256 | d68e18e28f3ba8db95da24be50e918d9254214079f1394eb55ce53f772041664 |
| SHA512 | afd5b5181184449327e77cd116939d5c4c5bb83b4e4e70dc7d7e0579d4b4d66508b238d55a8f05bed9d0df9da6b286ccd2d805140e82db00d943b7fd11e56d4d |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\1000074001\toolspub2.exe
| MD5 | a137245d8bc8109c4bc3df6e2b37d327 |
| SHA1 | ed8973e65b2aacb60683787831de37e7c805fa6c |
| SHA256 | f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee |
| SHA512 | 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |