Analysis Overview
SHA256
cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b
Threat Level: Known bad
The file cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b was found to be: Known bad.
Malicious Activity Summary
Detected Djvu ransomware
RedLine
Amadey
Vidar
SmokeLoader
Djvu Ransomware
Downloads MZ/PE file
Modifies file permissions
Checks computer location settings
Reads user/profile data of web browsers
Loads dropped DLL
Executes dropped EXE
Adds Run key to start application
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Checks installed software on the system
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
Unsigned PE
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Delays execution with timeout.exe
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Checks processor information in registry
Creates scheduled task(s)
Uses Task Scheduler COM API
Suspicious use of WriteProcessMemory
Suspicious use of UnmapMainImage
Checks SCSI registry key(s)
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-09-15 20:23
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-09-15 20:23
Reported
2023-09-15 20:26
Platform
win10v2004-20230915-en
Max time kernel
151s
Max time network
148s
Command Line
Signatures
Amadey
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
RedLine
SmokeLoader
Vidar
Downloads MZ/PE file
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\D11.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\F242.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\EB98.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\771.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\EB98.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe | N/A |
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\regsvr32.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\dbb40005-5bfd-4672-8253-2aa4b2933410\\EB98.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\EB98.exe | N/A |
Checks installed software on the system
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2888 set thread context of 5000 | N/A | C:\Users\Admin\AppData\Local\Temp\EB98.exe | C:\Users\Admin\AppData\Local\Temp\EB98.exe |
| PID 1764 set thread context of 2620 | N/A | C:\Users\Admin\AppData\Local\Temp\F242.exe | C:\Users\Admin\AppData\Local\Temp\F242.exe |
| PID 388 set thread context of 384 | N/A | C:\Users\Admin\AppData\Local\Temp\771.exe | C:\Users\Admin\AppData\Local\Temp\771.exe |
| PID 4776 set thread context of 4916 | N/A | C:\Users\Admin\AppData\Local\Temp\F242.exe | C:\Users\Admin\AppData\Local\Temp\F242.exe |
| PID 3148 set thread context of 2924 | N/A | C:\Users\Admin\AppData\Local\Temp\771.exe | C:\Users\Admin\AppData\Local\Temp\771.exe |
| PID 5008 set thread context of 5084 | N/A | C:\Users\Admin\AppData\Local\Temp\11F5.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 5036 set thread context of 1332 | N/A | C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe | C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\F242.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\771.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\107D.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\107D.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Users\Admin\AppData\Local\Temp\107D.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\107D.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\ED9D.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2A2C.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe
"C:\Users\Admin\AppData\Local\Temp\cef9cc6e7c70377b97e83af51f6c7bfc1590d6109c12fcfbcddf9b879c574d9b.exe"
C:\Users\Admin\AppData\Local\Temp\EB98.exe
C:\Users\Admin\AppData\Local\Temp\EB98.exe
C:\Users\Admin\AppData\Local\Temp\ED9D.exe
C:\Users\Admin\AppData\Local\Temp\ED9D.exe
C:\Users\Admin\AppData\Local\Temp\EB98.exe
C:\Users\Admin\AppData\Local\Temp\EB98.exe
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\F109.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\F109.dll
C:\Users\Admin\AppData\Local\Temp\F242.exe
C:\Users\Admin\AppData\Local\Temp\F242.exe
C:\Users\Admin\AppData\Local\Temp\F242.exe
C:\Users\Admin\AppData\Local\Temp\F242.exe
C:\Users\Admin\AppData\Local\Temp\771.exe
C:\Users\Admin\AppData\Local\Temp\771.exe
C:\Users\Admin\AppData\Local\Temp\9B4.exe
C:\Users\Admin\AppData\Local\Temp\9B4.exe
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\dbb40005-5bfd-4672-8253-2aa4b2933410" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\771.exe
C:\Users\Admin\AppData\Local\Temp\771.exe
C:\Users\Admin\AppData\Local\Temp\D11.exe
C:\Users\Admin\AppData\Local\Temp\D11.exe
C:\Users\Admin\AppData\Local\Temp\107D.exe
C:\Users\Admin\AppData\Local\Temp\107D.exe
C:\Users\Admin\AppData\Local\Temp\11F5.exe
C:\Users\Admin\AppData\Local\Temp\11F5.exe
C:\Users\Admin\AppData\Local\Temp\EB98.exe
"C:\Users\Admin\AppData\Local\Temp\EB98.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\F242.exe
"C:\Users\Admin\AppData\Local\Temp\F242.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"
C:\Users\Admin\AppData\Local\Temp\EB98.exe
"C:\Users\Admin\AppData\Local\Temp\EB98.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\771.exe
"C:\Users\Admin\AppData\Local\Temp\771.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\F242.exe
"C:\Users\Admin\AppData\Local\Temp\F242.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F
C:\Users\Admin\AppData\Local\Temp\771.exe
"C:\Users\Admin\AppData\Local\Temp\771.exe" --Admin IsNotAutoStart IsNotTask
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4916 -ip 4916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2924 -ip 2924
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 568
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 568
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:N"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe
"C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe"
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe
"C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe"
C:\Windows\SysWOW64\cacls.exe
CACLS "yiueea.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:N"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\577f58beff" /P "Admin:R" /E
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build3.exe
"C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build3.exe"
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe" & exit
C:\Windows\SysWOW64\timeout.exe
timeout /t 6
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
C:\Users\Admin\AppData\Local\Temp\2A2C.exe
C:\Users\Admin\AppData\Local\Temp\2A2C.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 25.63.96.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 20.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 54.120.234.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | potunulit.org | udp |
| US | 188.114.97.0:80 | potunulit.org | tcp |
| US | 8.8.8.8:53 | colisumy.com | udp |
| MO | 180.94.156.61:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | 0.97.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 61.156.94.180.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 254.217.0.162.in-addr.arpa | udp |
| MO | 180.94.156.61:80 | colisumy.com | tcp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| MD | 176.123.9.142:14845 | tcp | |
| US | 8.8.8.8:53 | 142.9.123.176.in-addr.arpa | udp |
| BG | 193.42.32.101:80 | 193.42.32.101 | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| US | 8.8.8.8:53 | 101.15.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.32.42.193.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.192.137.79.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | api-alajman.com | udp |
| GB | 193.32.208.75:443 | api-alajman.com | tcp |
| US | 8.8.8.8:53 | 75.208.32.193.in-addr.arpa | udp |
| NL | 162.0.217.254:443 | api.2ip.ua | tcp |
| RU | 79.137.192.18:80 | 79.137.192.18 | tcp |
| MO | 180.94.156.61:80 | colisumy.com | tcp |
| US | 8.8.8.8:53 | zexeq.com | udp |
| MX | 187.156.104.180:80 | zexeq.com | tcp |
| US | 8.8.8.8:53 | 180.104.156.187.in-addr.arpa | udp |
| MX | 187.156.104.180:80 | zexeq.com | tcp |
| GB | 51.38.95.107:42494 | tcp | |
| US | 8.8.8.8:53 | 107.95.38.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | 99.167.154.149.in-addr.arpa | udp |
| DE | 5.75.212.216:27015 | 5.75.212.216 | tcp |
| US | 8.8.8.8:53 | 36.249.124.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 216.212.75.5.in-addr.arpa | udp |
| US | 8.8.8.8:53 | transfer.sh | udp |
| DE | 144.76.136.153:443 | transfer.sh | tcp |
| US | 8.8.8.8:53 | 153.136.76.144.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gudintas.at | udp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 70.29.182.210.in-addr.arpa | udp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | h170703.srv22.test-hf.su | udp |
| RU | 91.227.16.22:80 | h170703.srv22.test-hf.su | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 22.16.227.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.logpasta.com | udp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| NL | 188.166.57.133:443 | www.logpasta.com | tcp |
| US | 8.8.8.8:53 | 133.57.166.188.in-addr.arpa | udp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| KR | 210.182.29.70:80 | gudintas.at | tcp |
| US | 8.8.8.8:53 | 123.10.44.20.in-addr.arpa | udp |
Files
memory/4604-1-0x0000000000780000-0x0000000000880000-memory.dmp
memory/4604-2-0x0000000000400000-0x0000000000711000-memory.dmp
memory/4604-3-0x00000000008A0000-0x00000000008A9000-memory.dmp
memory/3172-4-0x0000000001470000-0x0000000001486000-memory.dmp
memory/4604-5-0x0000000000400000-0x0000000000711000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EB98.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
C:\Users\Admin\AppData\Local\Temp\EB98.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
memory/2888-16-0x00000000024F0000-0x000000000258D000-memory.dmp
memory/2888-17-0x0000000002590000-0x00000000026AB000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ED9D.exe
| MD5 | ed6778e6fe0c07587f4892c807d7f883 |
| SHA1 | 3a94caa9336934ca2b12173b24fa815ea963edcb |
| SHA256 | a9f19ec6eec891e21b885a04030995a5c996f0b673c6425ee28b0ef6c70d2898 |
| SHA512 | b3fffd8485429cbe7c87a6eda24af95d2f497d3d3b47656ea3930c2ced6344f9b13099d419503f0c3dc40661111dac8df1d91eed66f448d58e0880c766859544 |
memory/5000-21-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5000-24-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EB98.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
C:\Users\Admin\AppData\Local\Temp\ED9D.exe
| MD5 | ed6778e6fe0c07587f4892c807d7f883 |
| SHA1 | 3a94caa9336934ca2b12173b24fa815ea963edcb |
| SHA256 | a9f19ec6eec891e21b885a04030995a5c996f0b673c6425ee28b0ef6c70d2898 |
| SHA512 | b3fffd8485429cbe7c87a6eda24af95d2f497d3d3b47656ea3930c2ced6344f9b13099d419503f0c3dc40661111dac8df1d91eed66f448d58e0880c766859544 |
memory/5000-26-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5000-27-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3868-29-0x0000000000400000-0x0000000000445000-memory.dmp
memory/3868-28-0x00000000006B0000-0x00000000006E0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F109.dll
| MD5 | e0286fab4e36e2523d461e6294395e22 |
| SHA1 | f0a6ac98bb771e720ac3683a75f7ec3af7ad75cd |
| SHA256 | a03129d4c88ef87b55f37dcc126c02ffb9231800655eb0885936b2764577d919 |
| SHA512 | 7d637411a7566053b2bf37b75e907052af66b8a404499afa9b23477bfc318952bb94837b8aa9c14e16156afa080cba0ca91663e068a482953b3576daf8c4f467 |
C:\Users\Admin\AppData\Local\Temp\F109.dll
| MD5 | e0286fab4e36e2523d461e6294395e22 |
| SHA1 | f0a6ac98bb771e720ac3683a75f7ec3af7ad75cd |
| SHA256 | a03129d4c88ef87b55f37dcc126c02ffb9231800655eb0885936b2764577d919 |
| SHA512 | 7d637411a7566053b2bf37b75e907052af66b8a404499afa9b23477bfc318952bb94837b8aa9c14e16156afa080cba0ca91663e068a482953b3576daf8c4f467 |
C:\Users\Admin\AppData\Local\Temp\F242.exe
| MD5 | d27125ae65af3a6ce086eeae8fa41521 |
| SHA1 | 70209d54e90908fc10f99af3cb38620bd744f93b |
| SHA256 | 4745aee336bf0a92efae4475d6a541fbd9cc91b65532a26a1810b49ad5f8dbea |
| SHA512 | 93f941a68d8eaea98d146520f786773e688bf5673ab37110efe065e05f9af6f81c43e050e90b20348b92888abc519e2094bcce37e22ab9a4a0e439c8dd88b68e |
C:\Users\Admin\AppData\Local\Temp\F242.exe
| MD5 | d27125ae65af3a6ce086eeae8fa41521 |
| SHA1 | 70209d54e90908fc10f99af3cb38620bd744f93b |
| SHA256 | 4745aee336bf0a92efae4475d6a541fbd9cc91b65532a26a1810b49ad5f8dbea |
| SHA512 | 93f941a68d8eaea98d146520f786773e688bf5673ab37110efe065e05f9af6f81c43e050e90b20348b92888abc519e2094bcce37e22ab9a4a0e439c8dd88b68e |
memory/4188-41-0x0000000010000000-0x0000000010243000-memory.dmp
memory/3868-43-0x0000000002290000-0x0000000002296000-memory.dmp
memory/3868-40-0x0000000073890000-0x0000000074040000-memory.dmp
memory/4188-42-0x0000000000450000-0x0000000000456000-memory.dmp
memory/1764-46-0x0000000002420000-0x00000000024B4000-memory.dmp
memory/1764-47-0x0000000002510000-0x000000000262B000-memory.dmp
memory/2620-50-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F242.exe
| MD5 | d27125ae65af3a6ce086eeae8fa41521 |
| SHA1 | 70209d54e90908fc10f99af3cb38620bd744f93b |
| SHA256 | 4745aee336bf0a92efae4475d6a541fbd9cc91b65532a26a1810b49ad5f8dbea |
| SHA512 | 93f941a68d8eaea98d146520f786773e688bf5673ab37110efe065e05f9af6f81c43e050e90b20348b92888abc519e2094bcce37e22ab9a4a0e439c8dd88b68e |
memory/2620-51-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2620-52-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2620-48-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3868-53-0x0000000004C70000-0x0000000005288000-memory.dmp
memory/3868-54-0x0000000005290000-0x000000000539A000-memory.dmp
memory/3868-56-0x0000000004C60000-0x0000000004C70000-memory.dmp
memory/3868-55-0x00000000024B0000-0x00000000024C2000-memory.dmp
memory/3868-57-0x00000000024D0000-0x000000000250C000-memory.dmp
memory/3868-58-0x0000000004BC0000-0x0000000004C0C000-memory.dmp
memory/4188-59-0x00000000022A0000-0x00000000023BA000-memory.dmp
memory/4188-60-0x00000000023C0000-0x00000000024BF000-memory.dmp
memory/4188-61-0x00000000023C0000-0x00000000024BF000-memory.dmp
memory/4188-63-0x00000000023C0000-0x00000000024BF000-memory.dmp
memory/4188-64-0x00000000023C0000-0x00000000024BF000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\771.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
C:\Users\Admin\AppData\Local\Temp\771.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
memory/3868-72-0x0000000073890000-0x0000000074040000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\9B4.exe
| MD5 | 2f212322c6b6d7db7250d0c282271925 |
| SHA1 | 01676375932ea61ffb5128c244c0ecc7cb335a01 |
| SHA256 | 3073eaf746e904b1e653992e78f7c5f95b3f9ad0989e4611412b038348c1afa1 |
| SHA512 | 2dc544c11d9fb985b915d4af5ec2025468c6ca112c2301f161fd81577b24bdc28b2bf0e81979a7e4048e70ed8216fcac35cb055fd81b5b341e48c5ef8f2e446f |
C:\Users\Admin\AppData\Local\Temp\9B4.exe
| MD5 | 2f212322c6b6d7db7250d0c282271925 |
| SHA1 | 01676375932ea61ffb5128c244c0ecc7cb335a01 |
| SHA256 | 3073eaf746e904b1e653992e78f7c5f95b3f9ad0989e4611412b038348c1afa1 |
| SHA512 | 2dc544c11d9fb985b915d4af5ec2025468c6ca112c2301f161fd81577b24bdc28b2bf0e81979a7e4048e70ed8216fcac35cb055fd81b5b341e48c5ef8f2e446f |
memory/3568-82-0x000001C734FD0000-0x000001C735080000-memory.dmp
C:\Users\Admin\AppData\Local\dbb40005-5bfd-4672-8253-2aa4b2933410\EB98.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
memory/3568-85-0x000001C74F470000-0x000001C74F48A000-memory.dmp
memory/384-87-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3568-91-0x000001C74F540000-0x000001C74F550000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | bcf9c82a8e06cd4dbc7c6f8166b03d62 |
| SHA1 | aa072fd0adc30bc7d45952443a137972eaea0499 |
| SHA256 | 32b64ccb43add6147056e3f68bd46c762c8b38dea72735355fc422160a0f417d |
| SHA512 | 7a26e9797da034f01a08a1b62e4e7e39de67526257d015a0ef7590968af690fecb1852a0f3ee05f64bbf571344eb74ef4d404d2f145f7e7dd36f6a21816ba4a0 |
memory/3568-97-0x000001C74F490000-0x000001C74F518000-memory.dmp
memory/384-98-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
| MD5 | a2fe68064ca4ef3b4e912a9d178fca9f |
| SHA1 | 46c9750e8da30961e8c79e65003a4931acb03796 |
| SHA256 | 8cc90fb0d055ed71e3e649971d586f5adb1e6b65acc8b081e82e638569106361 |
| SHA512 | 4247e74f20179614e9103549e4365d8589316c56b393a015c063e84b59b695329284a5c248582187196bc18ab3bb64880e8fd7682575f90cd918497dbecf9919 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | fa4ae5fcb44bfaf845b845961180d250 |
| SHA1 | 8257ee68bdd2bc3ea2723eda7aeba404195d46bf |
| SHA256 | 574c66c19561773196a88f115168cf5d73b71fd26f9034606fe38a5535d4df96 |
| SHA512 | ad1de0c1d0f5a4a7e3615b48537f75250779368b388520b001d96367d5aa19fa88a9f471d1212e679ab9eaae854374445807877891bf1b803fa6c7886877d253 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
| MD5 | 988893536e088203a66456d22b93cc80 |
| SHA1 | 03c1d5870aef114e4421e9c68b5a03aa21e9464f |
| SHA256 | 911063cec0d0f5c9678c49afb6f11959f4fa9c91fa89a3b06a29df96ed5f205e |
| SHA512 | d948d5caf0a714464e225ac86b70639742958a5503170ccfe52658ec1631a55879b29437cc94fe3f479136d52ecc348a16f790750321cc2236d26cb1e729bd32 |
C:\Users\Admin\AppData\Local\Temp\D11.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\D11.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/384-92-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3568-90-0x000001C736D70000-0x000001C736D76000-memory.dmp
memory/388-89-0x00000000022AB000-0x000000000233C000-memory.dmp
memory/3568-88-0x00007FFD9CB80000-0x00007FFD9D641000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\771.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\dbb40005-5bfd-4672-8253-2aa4b2933410\EB98.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
memory/3568-84-0x000001C736D60000-0x000001C736D68000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\107D.exe
| MD5 | 6cf01c815d1489b617c05fcd4640fffd |
| SHA1 | 2ad52ebfc86e11c71cc901f18e6c4f80eac55079 |
| SHA256 | 56be912ce754d75f3385dab925ee34d9a0a1e07fe841c6a2e9adafa8021c99bc |
| SHA512 | 33f2dab46769d6d88b953b7b3972f2561fde10998c1aebbb88bc5366d035b5c706ab4c5209868919b3f01f4e4501da5e06cfe468168dd1be0edea398dd5d28f6 |
C:\Users\Admin\AppData\Local\Temp\107D.exe
| MD5 | 6cf01c815d1489b617c05fcd4640fffd |
| SHA1 | 2ad52ebfc86e11c71cc901f18e6c4f80eac55079 |
| SHA256 | 56be912ce754d75f3385dab925ee34d9a0a1e07fe841c6a2e9adafa8021c99bc |
| SHA512 | 33f2dab46769d6d88b953b7b3972f2561fde10998c1aebbb88bc5366d035b5c706ab4c5209868919b3f01f4e4501da5e06cfe468168dd1be0edea398dd5d28f6 |
C:\Users\Admin\AppData\Local\Temp\11F5.exe
| MD5 | ddb85fbefc3b3c2f08feb3c57b957a00 |
| SHA1 | 32a2da8be76b5f00af94d4d9ef3a3d58d785afd4 |
| SHA256 | 66a7a7dc9c8d7b2b01bc4332d62ca1fd83f907db9b1c157dcfe9feca0e00562d |
| SHA512 | a41b9b360f35c00b58213dc69ab6ea4b29f108682102202a176842c6484dc03ec9ab51830c847f3f2ecb6df4398cc5b070b9f79381b6553d445229844cc76b57 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
memory/2620-120-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5000-121-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F242.exe
| MD5 | d27125ae65af3a6ce086eeae8fa41521 |
| SHA1 | 70209d54e90908fc10f99af3cb38620bd744f93b |
| SHA256 | 4745aee336bf0a92efae4475d6a541fbd9cc91b65532a26a1810b49ad5f8dbea |
| SHA512 | 93f941a68d8eaea98d146520f786773e688bf5673ab37110efe065e05f9af6f81c43e050e90b20348b92888abc519e2094bcce37e22ab9a4a0e439c8dd88b68e |
memory/3868-128-0x0000000005440000-0x00000000054B6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EB98.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
memory/3868-130-0x0000000004A70000-0x0000000004B02000-memory.dmp
memory/5032-131-0x0000000000400000-0x0000000000711000-memory.dmp
memory/384-129-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5032-136-0x0000000000770000-0x0000000000870000-memory.dmp
memory/3868-134-0x00000000054C0000-0x0000000005A64000-memory.dmp
memory/3392-133-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\EB98.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
memory/3868-141-0x0000000005DE0000-0x0000000005E46000-memory.dmp
memory/3392-143-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\771.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
C:\Users\Admin\AppData\Local\Temp\11F5.exe
| MD5 | ddb85fbefc3b3c2f08feb3c57b957a00 |
| SHA1 | 32a2da8be76b5f00af94d4d9ef3a3d58d785afd4 |
| SHA256 | 66a7a7dc9c8d7b2b01bc4332d62ca1fd83f907db9b1c157dcfe9feca0e00562d |
| SHA512 | a41b9b360f35c00b58213dc69ab6ea4b29f108682102202a176842c6484dc03ec9ab51830c847f3f2ecb6df4398cc5b070b9f79381b6553d445229844cc76b57 |
memory/384-138-0x0000000000400000-0x0000000000537000-memory.dmp
memory/5032-146-0x0000000000760000-0x0000000000769000-memory.dmp
memory/4916-150-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\F242.exe
| MD5 | d27125ae65af3a6ce086eeae8fa41521 |
| SHA1 | 70209d54e90908fc10f99af3cb38620bd744f93b |
| SHA256 | 4745aee336bf0a92efae4475d6a541fbd9cc91b65532a26a1810b49ad5f8dbea |
| SHA512 | 93f941a68d8eaea98d146520f786773e688bf5673ab37110efe065e05f9af6f81c43e050e90b20348b92888abc519e2094bcce37e22ab9a4a0e439c8dd88b68e |
memory/3868-152-0x0000000004C60000-0x0000000004C70000-memory.dmp
memory/4776-148-0x0000000002440000-0x00000000024DB000-memory.dmp
memory/4916-153-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4916-158-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2924-159-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2924-160-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2924-162-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\771.exe
| MD5 | 0b9ccbc1aa5f1bb99e66d2e5557a486e |
| SHA1 | 1095f7132d3b7ebfe1fc2499e4df9423d9f8532b |
| SHA256 | 07adcefd483a8c67b9fa78f448d6f10b9d2ebef4f2a3d84cd492ffc30a094943 |
| SHA512 | b0ebd77a572dc8b01645a93fd4ded8e3644147c69c24204ab4e39f8e5ea28abfc6a1d9f6087a147a68c6f22d3b0bc2c26ffae39b73fc85d978d4d8f22f313bd2 |
memory/3148-154-0x0000000002440000-0x00000000024D6000-memory.dmp
memory/3392-163-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3392-164-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3172-170-0x0000000003370000-0x0000000003386000-memory.dmp
memory/5032-172-0x0000000000400000-0x0000000000711000-memory.dmp
memory/3392-177-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3868-180-0x0000000006220000-0x0000000006270000-memory.dmp
memory/3392-179-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3392-181-0x0000000000400000-0x0000000000537000-memory.dmp
memory/3568-182-0x00007FFD9CB80000-0x00007FFD9D641000-memory.dmp
memory/3568-183-0x000001C74F540000-0x000001C74F550000-memory.dmp
memory/5084-184-0x0000000000400000-0x0000000000430000-memory.dmp
memory/5084-185-0x0000000073890000-0x0000000074040000-memory.dmp
memory/5084-186-0x00000000051D0000-0x00000000051D6000-memory.dmp
memory/5084-187-0x00000000051E0000-0x00000000051F0000-memory.dmp
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build2.exe
| MD5 | d249cebde9fcfcddb47af02d6c10f268 |
| SHA1 | 0c6a6a81326d9634b55e973cc4b0364693e9df53 |
| SHA256 | 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40 |
| SHA512 | dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246 |
memory/5036-201-0x0000000003E20000-0x0000000003E71000-memory.dmp
memory/1332-200-0x0000000000400000-0x0000000000465000-memory.dmp
memory/5036-199-0x00000000023B0000-0x00000000024B0000-memory.dmp
memory/1332-205-0x0000000000400000-0x0000000000465000-memory.dmp
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\489fe191-9c88-4b8f-aea7-f8f84c6519ed\build3.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
memory/3868-227-0x00000000062F0000-0x00000000064B2000-memory.dmp
memory/3868-228-0x00000000064C0000-0x00000000069EC000-memory.dmp
memory/3868-231-0x0000000073890000-0x0000000074040000-memory.dmp
C:\ProgramData\nss3.dll
| MD5 | 1cc453cdf74f31e4d913ff9c10acdde2 |
| SHA1 | 6e85eae544d6e965f15fa5c39700fa7202f3aafe |
| SHA256 | ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5 |
| SHA512 | dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571 |
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
memory/1332-280-0x0000000000400000-0x0000000000465000-memory.dmp
memory/5084-281-0x0000000073890000-0x0000000074040000-memory.dmp
memory/5084-282-0x00000000051E0000-0x00000000051F0000-memory.dmp
memory/5084-284-0x0000000073890000-0x0000000074040000-memory.dmp
C:\Users\Admin\AppData\Roaming\ajcjfvd
| MD5 | 6cf01c815d1489b617c05fcd4640fffd |
| SHA1 | 2ad52ebfc86e11c71cc901f18e6c4f80eac55079 |
| SHA256 | 56be912ce754d75f3385dab925ee34d9a0a1e07fe841c6a2e9adafa8021c99bc |
| SHA512 | 33f2dab46769d6d88b953b7b3972f2561fde10998c1aebbb88bc5366d035b5c706ab4c5209868919b3f01f4e4501da5e06cfe468168dd1be0edea398dd5d28f6 |
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
| MD5 | 9ead10c08e72ae41921191f8db39bc16 |
| SHA1 | abe3bce01cd34afc88e2c838173f8c2bd0090ae1 |
| SHA256 | 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 |
| SHA512 | aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a |
C:\Users\Admin\AppData\Local\Temp\2A2C.exe
| MD5 | 3082e7832f7a31397990d4d3ae4c75c9 |
| SHA1 | 769b150e219c7e8d7221f7a0f0ba6ef617fd036d |
| SHA256 | 716f6379cc32afb03ef2639b14e32b4df5538b99b84dafe355b39f8934e7c740 |
| SHA512 | 8e371f4b075070daf8efb449ab87d923eb4d3cad74d7c9c3d3cef76f43f268c0e4aabe6fa1f801e20ac49e25f9bac70338044fbe9bd408883429ca34fb98ade4 |
C:\Users\Admin\AppData\Local\Temp\2A2C.exe
| MD5 | 3082e7832f7a31397990d4d3ae4c75c9 |
| SHA1 | 769b150e219c7e8d7221f7a0f0ba6ef617fd036d |
| SHA256 | 716f6379cc32afb03ef2639b14e32b4df5538b99b84dafe355b39f8934e7c740 |
| SHA512 | 8e371f4b075070daf8efb449ab87d923eb4d3cad74d7c9c3d3cef76f43f268c0e4aabe6fa1f801e20ac49e25f9bac70338044fbe9bd408883429ca34fb98ade4 |
memory/4116-299-0x00000000007E0000-0x0000000000862000-memory.dmp
memory/4116-301-0x0000000073890000-0x0000000074040000-memory.dmp
memory/4116-302-0x00000000059B0000-0x00000000059C0000-memory.dmp
memory/4116-303-0x00000000058A0000-0x00000000058AA000-memory.dmp
memory/4116-304-0x00000000083A0000-0x000000000843C000-memory.dmp
memory/4116-305-0x0000000008D50000-0x0000000008D90000-memory.dmp
memory/4116-306-0x00000000059B0000-0x00000000059C0000-memory.dmp
memory/4116-307-0x000000000C2B0000-0x000000000C2CA000-memory.dmp
memory/4116-308-0x000000000F2E0000-0x000000000F2E6000-memory.dmp
memory/4116-309-0x0000000073890000-0x0000000074040000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
| MD5 | 55f845c433e637594aaf872e41fda207 |
| SHA1 | 1188348ca7e52f075e7d1d0031918c2cea93362e |
| SHA256 | f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39 |
| SHA512 | 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4 |