Malware Analysis Report

2025-01-23 08:55

Sample ID 231010-zkn9maca67
Target ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22
SHA256 ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22
Tags
healer mystic dropper evasion persistence stealer trojan amadey redline gruha infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22

Threat Level: Known bad

The file ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22 was found to be: Known bad.

Malicious Activity Summary

healer mystic dropper evasion persistence stealer trojan amadey redline gruha infostealer

Detect Mystic stealer payload

Mystic

Modifies Windows Defender Real-time Protection settings

Amadey

Detects Healer an antivirus disabler dropper

Healer

RedLine

Checks computer location settings

Executes dropped EXE

Windows security modification

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-10 20:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-10 20:46

Reported

2023-10-10 21:16

Platform

win7-20230831-en

Max time kernel

117s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe"

Signatures

Detect Mystic stealer payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects Healer an antivirus disabler dropper

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Healer

dropper healer

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Mystic

stealer mystic

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1176 set thread context of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1712 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 1712 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 1712 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 1712 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 1712 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 1712 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 1712 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 2000 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 2000 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 2000 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 2000 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 2000 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 2000 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 2000 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 2560 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 2560 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 2560 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 2560 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 2560 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 2560 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 2560 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 2680 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 2680 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 2680 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 2680 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 2680 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 2680 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 2680 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 2692 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 2692 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 2692 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 2692 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 2692 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 2692 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 2692 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 2692 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 2692 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 2692 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 2692 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 2692 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 2692 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 2692 wrote to memory of 1176 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1176 wrote to memory of 1200 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1200 wrote to memory of 1044 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\SysWOW64\WerFault.exe
PID 1200 wrote to memory of 1044 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\SysWOW64\WerFault.exe
PID 1200 wrote to memory of 1044 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\SysWOW64\WerFault.exe
PID 1200 wrote to memory of 1044 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\SysWOW64\WerFault.exe
PID 1200 wrote to memory of 1044 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\SysWOW64\WerFault.exe
PID 1200 wrote to memory of 1044 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\SysWOW64\WerFault.exe
PID 1200 wrote to memory of 1044 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\SysWOW64\WerFault.exe
PID 1176 wrote to memory of 2224 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe

"C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 36

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 268

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

MD5 cd66853383948e7893667dc85f735d41
SHA1 0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad
SHA256 8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02
SHA512 4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

MD5 cd66853383948e7893667dc85f735d41
SHA1 0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad
SHA256 8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02
SHA512 4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

MD5 cd66853383948e7893667dc85f735d41
SHA1 0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad
SHA256 8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02
SHA512 4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

MD5 cd66853383948e7893667dc85f735d41
SHA1 0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad
SHA256 8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02
SHA512 4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

MD5 171dd67ac919b1720b075e1d4cdde7f5
SHA1 5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88
SHA256 2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65
SHA512 36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

MD5 171dd67ac919b1720b075e1d4cdde7f5
SHA1 5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88
SHA256 2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65
SHA512 36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

MD5 171dd67ac919b1720b075e1d4cdde7f5
SHA1 5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88
SHA256 2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65
SHA512 36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

MD5 171dd67ac919b1720b075e1d4cdde7f5
SHA1 5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88
SHA256 2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65
SHA512 36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

MD5 28aaa203a07144d930148c5623704cea
SHA1 f91734db60eae32ee22b5d8a6bd6f65e4c304cf9
SHA256 7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2
SHA512 532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

MD5 28aaa203a07144d930148c5623704cea
SHA1 f91734db60eae32ee22b5d8a6bd6f65e4c304cf9
SHA256 7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2
SHA512 532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

MD5 28aaa203a07144d930148c5623704cea
SHA1 f91734db60eae32ee22b5d8a6bd6f65e4c304cf9
SHA256 7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2
SHA512 532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

MD5 28aaa203a07144d930148c5623704cea
SHA1 f91734db60eae32ee22b5d8a6bd6f65e4c304cf9
SHA256 7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2
SHA512 532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

MD5 0a5d6d994534807bb5143511258c6c17
SHA1 da056fc7801b80ba994100052b6f764aca0700fd
SHA256 058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714
SHA512 63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

MD5 0a5d6d994534807bb5143511258c6c17
SHA1 da056fc7801b80ba994100052b6f764aca0700fd
SHA256 058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714
SHA512 63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

MD5 0a5d6d994534807bb5143511258c6c17
SHA1 da056fc7801b80ba994100052b6f764aca0700fd
SHA256 058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714
SHA512 63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

MD5 0a5d6d994534807bb5143511258c6c17
SHA1 da056fc7801b80ba994100052b6f764aca0700fd
SHA256 058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714
SHA512 63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

MD5 f6d0b8f359744b55258659dd2b3e3bad
SHA1 aed13b92a575889d502c87c7989b6fd00ab27580
SHA256 6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86
SHA512 c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

MD5 f6d0b8f359744b55258659dd2b3e3bad
SHA1 aed13b92a575889d502c87c7989b6fd00ab27580
SHA256 6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86
SHA512 c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

MD5 f6d0b8f359744b55258659dd2b3e3bad
SHA1 aed13b92a575889d502c87c7989b6fd00ab27580
SHA256 6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86
SHA512 c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

memory/2688-48-0x0000000001220000-0x000000000122A000-memory.dmp

memory/2688-49-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

memory/2688-57-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

memory/1200-60-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-62-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-61-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-63-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-64-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-65-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-66-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/1200-67-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-69-0x0000000000400000-0x0000000000428000-memory.dmp

memory/1200-71-0x0000000000400000-0x0000000000428000-memory.dmp

\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-10 20:46

Reported

2023-10-10 21:15

Platform

win10v2004-20230915-en

Max time kernel

153s

Max time network

163s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe"

Signatures

Amadey

trojan amadey

Detect Mystic stealer payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects Healer an antivirus disabler dropper

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Healer

dropper healer

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Mystic

stealer mystic

RedLine

infostealer redline

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4400 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 4400 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 4400 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
PID 4148 wrote to memory of 3460 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 4148 wrote to memory of 3460 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 4148 wrote to memory of 3460 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
PID 3460 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 3460 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 3460 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
PID 1356 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 1356 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 1356 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
PID 3532 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 3532 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
PID 3532 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 3532 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 3532 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
PID 5016 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3856 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 5016 wrote to memory of 3612 N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1356 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe
PID 1356 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe
PID 1356 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2596 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3460 wrote to memory of 1464 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe
PID 3460 wrote to memory of 1464 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe
PID 3460 wrote to memory of 1464 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe
PID 1464 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
PID 1464 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
PID 1464 wrote to memory of 4564 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
PID 4148 wrote to memory of 1332 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe
PID 4148 wrote to memory of 1332 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe
PID 4148 wrote to memory of 1332 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe
PID 4564 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\schtasks.exe
PID 4564 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\schtasks.exe
PID 4564 wrote to memory of 4756 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\schtasks.exe
PID 4564 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\cmd.exe
PID 4564 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\cmd.exe
PID 4564 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\cmd.exe
PID 1332 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
PID 1332 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
PID 1332 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe
PID 4400 wrote to memory of 3776 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8931480.exe
PID 4400 wrote to memory of 3776 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8931480.exe
PID 4400 wrote to memory of 3776 N/A C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8931480.exe
PID 3020 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3020 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe

"C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5016 -ip 5016

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3612 -ip 3612

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 152

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 540

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2596 -ip 2596

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 152

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8931480.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8931480.exe

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cacls.exe

CACLS "legota.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cacls.exe

CACLS "..\cb378487cf" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\cb378487cf" /P "Admin:R" /E

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:R" /E

C:\Windows\SysWOW64\cacls.exe

CACLS "legota.exe" /P "Admin:N"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:N"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:N"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 195.233.44.23.in-addr.arpa udp
FI 77.91.124.1:80 77.91.124.1 tcp
FI 77.91.68.78:80 77.91.68.78 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 78.68.91.77.in-addr.arpa udp
US 8.8.8.8:53 1.124.91.77.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
FI 77.91.124.55:19071 tcp
FI 77.91.124.1:80 77.91.124.1 tcp
FI 77.91.68.78:80 77.91.68.78 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 88.16.208.104.in-addr.arpa udp
FI 77.91.124.55:19071 tcp

Files

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

MD5 cd66853383948e7893667dc85f735d41
SHA1 0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad
SHA256 8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02
SHA512 4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

MD5 cd66853383948e7893667dc85f735d41
SHA1 0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad
SHA256 8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02
SHA512 4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

MD5 171dd67ac919b1720b075e1d4cdde7f5
SHA1 5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88
SHA256 2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65
SHA512 36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

MD5 171dd67ac919b1720b075e1d4cdde7f5
SHA1 5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88
SHA256 2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65
SHA512 36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

MD5 28aaa203a07144d930148c5623704cea
SHA1 f91734db60eae32ee22b5d8a6bd6f65e4c304cf9
SHA256 7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2
SHA512 532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

MD5 28aaa203a07144d930148c5623704cea
SHA1 f91734db60eae32ee22b5d8a6bd6f65e4c304cf9
SHA256 7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2
SHA512 532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

MD5 0a5d6d994534807bb5143511258c6c17
SHA1 da056fc7801b80ba994100052b6f764aca0700fd
SHA256 058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714
SHA512 63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

MD5 0a5d6d994534807bb5143511258c6c17
SHA1 da056fc7801b80ba994100052b6f764aca0700fd
SHA256 058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714
SHA512 63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

MD5 f6d0b8f359744b55258659dd2b3e3bad
SHA1 aed13b92a575889d502c87c7989b6fd00ab27580
SHA256 6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86
SHA512 c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

MD5 f6d0b8f359744b55258659dd2b3e3bad
SHA1 aed13b92a575889d502c87c7989b6fd00ab27580
SHA256 6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86
SHA512 c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

memory/4804-35-0x0000000000F50000-0x0000000000F5A000-memory.dmp

memory/4804-36-0x00007FFF22EC0000-0x00007FFF23981000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

MD5 a8cffc155ab471df997633c2a5459a4b
SHA1 a053e6838aff74151c24502536dfd975bbb9c5de
SHA256 8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00
SHA512 076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

memory/4804-38-0x00007FFF22EC0000-0x00007FFF23981000-memory.dmp

memory/3612-42-0x0000000000400000-0x0000000000428000-memory.dmp

memory/3612-46-0x0000000000400000-0x0000000000428000-memory.dmp

memory/3612-44-0x0000000000400000-0x0000000000428000-memory.dmp

memory/3612-43-0x0000000000400000-0x0000000000428000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe

MD5 852705513a59846bd6f123af99221149
SHA1 140837bed607c8b9ccefddd2ab7c51b789ae7f1e
SHA256 e09ef95748148c6fd8340265390ce3f10dcd99af170701d348cf1a9f40fa27aa
SHA512 e6318e51a68c1e563d83b6474893e67b31c427df33dcb1c325958c3c0c9cd302980f5f077b63c59588efa6ef261b8fcf4bc27b8e7d4bdeaddb72084fa79b8be6

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2836600.exe

MD5 852705513a59846bd6f123af99221149
SHA1 140837bed607c8b9ccefddd2ab7c51b789ae7f1e
SHA256 e09ef95748148c6fd8340265390ce3f10dcd99af170701d348cf1a9f40fa27aa
SHA512 e6318e51a68c1e563d83b6474893e67b31c427df33dcb1c325958c3c0c9cd302980f5f077b63c59588efa6ef261b8fcf4bc27b8e7d4bdeaddb72084fa79b8be6

memory/1344-50-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1344-51-0x0000000074280000-0x0000000074A30000-memory.dmp

memory/1344-52-0x00000000079F0000-0x00000000079F6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6963046.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

memory/1344-59-0x0000000005D90000-0x00000000063A8000-memory.dmp

memory/1344-63-0x00000000058C0000-0x00000000059CA000-memory.dmp

memory/1344-65-0x00000000057F0000-0x0000000005802000-memory.dmp

memory/1344-64-0x0000000005660000-0x0000000005670000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe

MD5 a427281ec99595c2a977a70e0009a30c
SHA1 c937c5d14127921f068a081bb3e8f450c9966852
SHA256 40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA512 2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

MD5 a427281ec99595c2a977a70e0009a30c
SHA1 c937c5d14127921f068a081bb3e8f450c9966852
SHA256 40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA512 2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

memory/1344-74-0x0000000005850000-0x000000000588C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

MD5 a427281ec99595c2a977a70e0009a30c
SHA1 c937c5d14127921f068a081bb3e8f450c9966852
SHA256 40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA512 2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

memory/1344-84-0x00000000059D0000-0x0000000005A1C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8931480.exe

MD5 ad5e42163c9518f8614e988d235591e6
SHA1 f7acf5d14ec3c7bd1d6fe3b7c507da0036f31530
SHA256 f6a2c66a2b419f3f9af7e9e88449a020ff11554326dbbf85041d0413951659dd
SHA512 5042211d16e975920932ae463754e3afc47f2980447fcb40268a6a11ca39f6fe59a868b99a9bf209e64fdc94eda1a0ef7c4bf833c644edd1ef0c134801f307fa

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8931480.exe

MD5 ad5e42163c9518f8614e988d235591e6
SHA1 f7acf5d14ec3c7bd1d6fe3b7c507da0036f31530
SHA256 f6a2c66a2b419f3f9af7e9e88449a020ff11554326dbbf85041d0413951659dd
SHA512 5042211d16e975920932ae463754e3afc47f2980447fcb40268a6a11ca39f6fe59a868b99a9bf209e64fdc94eda1a0ef7c4bf833c644edd1ef0c134801f307fa

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

MD5 a427281ec99595c2a977a70e0009a30c
SHA1 c937c5d14127921f068a081bb3e8f450c9966852
SHA256 40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA512 2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8625887.exe

MD5 a427281ec99595c2a977a70e0009a30c
SHA1 c937c5d14127921f068a081bb3e8f450c9966852
SHA256 40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA512 2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

memory/1344-86-0x0000000074280000-0x0000000074A30000-memory.dmp

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

MD5 6d5040418450624fef735b49ec6bffe9
SHA1 5fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256 dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512 bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

MD5 a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA1 5aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA256 5f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA512 3cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 ec41f740797d2253dc1902e71941bbdb
SHA1 407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA256 47425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512 e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

MD5 e913b0d252d36f7c9b71268df4f634fb
SHA1 5ac70d8793712bcd8ede477071146bbb42d3f018
SHA256 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA512 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 ec41f740797d2253dc1902e71941bbdb
SHA1 407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA256 47425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512 e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33

C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

MD5 ec41f740797d2253dc1902e71941bbdb
SHA1 407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA256 47425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512 e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

MD5 e913b0d252d36f7c9b71268df4f634fb
SHA1 5ac70d8793712bcd8ede477071146bbb42d3f018
SHA256 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA512 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

MD5 e913b0d252d36f7c9b71268df4f634fb
SHA1 5ac70d8793712bcd8ede477071146bbb42d3f018
SHA256 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA512 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

MD5 a427281ec99595c2a977a70e0009a30c
SHA1 c937c5d14127921f068a081bb3e8f450c9966852
SHA256 40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA512 2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe

MD5 a427281ec99595c2a977a70e0009a30c
SHA1 c937c5d14127921f068a081bb3e8f450c9966852
SHA256 40ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA512 2a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324