Malware Analysis Report

2025-08-05 16:19

Sample ID 231023-thg5mshh5v
Target NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe
SHA256 0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2
Tags
modiloader trojan formbook n7ak persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2

Threat Level: Known bad

The file NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe was found to be: Known bad.

Malicious Activity Summary

modiloader trojan formbook n7ak persistence rat spyware stealer

ModiLoader, DBatLoader

Formbook

ModiLoader Second Stage

Formbook payload

Reads user/profile data of web browsers

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Program crash

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

Script User-Agent

Suspicious behavior: MapViewOfSection

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-23 16:03

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-23 16:03

Reported

2023-10-23 16:07

Platform

win7-20231020-en

Max time kernel

140s

Max time network

137s

Command Line

"C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe

"C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 712

Network

Country Destination Domain Proto
US 8.8.8.8:53 onedrive.live.com udp
US 13.107.42.13:443 onedrive.live.com tcp
US 13.107.42.13:443 onedrive.live.com tcp

Files

memory/2512-0-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2512-1-0x0000000002E20000-0x0000000003E20000-memory.dmp

memory/2512-2-0x0000000002E20000-0x0000000003E20000-memory.dmp

memory/2512-4-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2512-5-0x0000000000230000-0x0000000000231000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab675D.tmp

MD5 f3441b8572aae8801c04f3060b550443
SHA1 4ef0a35436125d6821831ef36c28ffaf196cda15
SHA256 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA512 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

C:\Users\Admin\AppData\Local\Temp\Tar678E.tmp

MD5 9441737383d21192400eca82fda910ec
SHA1 725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256 bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA512 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-23 16:03

Reported

2023-10-23 16:07

Platform

win10v2004-20231020-en

Max time kernel

148s

Max time network

151s

Command Line

C:\Windows\Explorer.EXE

Signatures

Formbook

trojan spyware stealer formbook

ModiLoader, DBatLoader

trojan modiloader

Formbook payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yhtklqjl = "C:\\Users\\Public\\Yhtklqjl.url" C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3332 set thread context of 3320 N/A C:\Windows\SysWOW64\colorcpl.exe C:\Windows\Explorer.EXE
PID 3648 set thread context of 3320 N/A C:\Windows\SysWOW64\netsh.exe C:\Windows\Explorer.EXE

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \Registry\User\S-1-5-21-1873812795-1433807462-1429862679-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 C:\Windows\SysWOW64\netsh.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
N/A N/A C:\Windows\SysWOW64\colorcpl.exe N/A
N/A N/A C:\Windows\SysWOW64\colorcpl.exe N/A
N/A N/A C:\Windows\SysWOW64\colorcpl.exe N/A
N/A N/A C:\Windows\SysWOW64\colorcpl.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\colorcpl.exe N/A
N/A N/A C:\Windows\SysWOW64\colorcpl.exe N/A
N/A N/A C:\Windows\SysWOW64\colorcpl.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\colorcpl.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\netsh.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A
PID 2088 wrote to memory of 0 N/A C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe N/A

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe

"C:\Users\Admin\AppData\Local\Temp\NEAS.0348b7181e838a339237fade5062e7670e6fdf2ccca4814ae7f97acec60cb8b2exe_JC.exe"

C:\Windows\SysWOW64\colorcpl.exe

C:\Windows\System32\colorcpl.exe

C:\Windows\SysWOW64\netsh.exe

"C:\Windows\SysWOW64\netsh.exe"

C:\Windows\SysWOW64\cmd.exe

/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V

C:\Program Files\Mozilla Firefox\Firefox.exe

"C:\Program Files\Mozilla Firefox\Firefox.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 254.3.248.8.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 29.81.57.23.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 onedrive.live.com udp
US 13.107.42.13:443 onedrive.live.com tcp
US 13.107.42.13:443 onedrive.live.com tcp
US 8.8.8.8:53 h9hbgq.ph.files.1drv.com udp
US 13.107.42.12:443 h9hbgq.ph.files.1drv.com tcp
US 8.8.8.8:53 13.42.107.13.in-addr.arpa udp
US 8.8.8.8:53 12.42.107.13.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 www.maximsboutique.com udp
US 8.8.8.8:53 254.7.248.8.in-addr.arpa udp
US 8.8.8.8:53 www.tuktukwines.com udp
CA 23.227.38.74:80 www.tuktukwines.com tcp
US 8.8.8.8:53 74.38.227.23.in-addr.arpa udp
CA 23.227.38.74:80 www.tuktukwines.com tcp
CA 23.227.38.74:80 www.tuktukwines.com tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 www.budsdesigns.com udp
US 34.149.87.45:80 www.budsdesigns.com tcp
US 8.8.8.8:53 45.87.149.34.in-addr.arpa udp
US 34.149.87.45:80 www.budsdesigns.com tcp
US 34.149.87.45:80 www.budsdesigns.com tcp
US 8.8.8.8:53 www.parquemermoz.store udp
US 8.8.8.8:53 www.coding-bootcamps-16314.com udp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

memory/2088-0-0x0000000002320000-0x0000000002321000-memory.dmp

memory/2088-1-0x0000000002A40000-0x0000000003A40000-memory.dmp

memory/2088-2-0x0000000002A40000-0x0000000003A40000-memory.dmp

memory/2088-4-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2088-5-0x0000000002320000-0x0000000002321000-memory.dmp

memory/3332-8-0x0000000004530000-0x0000000005530000-memory.dmp

memory/3332-10-0x00000000107A0000-0x0000000010AEA000-memory.dmp

memory/3332-12-0x0000000004530000-0x0000000005530000-memory.dmp

memory/3332-13-0x0000000010660000-0x0000000010674000-memory.dmp

memory/3320-14-0x0000000002510000-0x0000000002605000-memory.dmp

memory/3648-15-0x0000000000D10000-0x0000000000D2E000-memory.dmp

memory/3648-18-0x0000000000D10000-0x0000000000D2E000-memory.dmp

memory/3648-19-0x0000000000430000-0x000000000045F000-memory.dmp

memory/3648-20-0x0000000000EF0000-0x000000000123A000-memory.dmp

memory/3648-21-0x0000000000430000-0x000000000045F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\DB1

MD5 02d2c46697e3714e49f46b680b9a6b83
SHA1 84f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256 522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA512 60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

memory/3648-37-0x0000000000B00000-0x0000000000B93000-memory.dmp

memory/3320-38-0x0000000007CF0000-0x0000000007E60000-memory.dmp

memory/3320-39-0x0000000007CF0000-0x0000000007E60000-memory.dmp

memory/3320-41-0x0000000007CF0000-0x0000000007E60000-memory.dmp

C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologri.ini

MD5 d63a82e5d81e02e399090af26db0b9cb
SHA1 91d0014c8f54743bba141fd60c9d963f869d76c9
SHA256 eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA512 38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrv.ini

MD5 bbc41c78bae6c71e63cb544a6a284d94
SHA1 33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a
SHA256 ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb
SHA512 0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrg.ini

MD5 4aadf49fed30e4c9b3fe4a3dd6445ebe
SHA1 1e332822167c6f351b99615eada2c30a538ff037
SHA256 75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56
SHA512 eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrf.ini

MD5 2f245469795b865bdd1b956c23d7893d
SHA1 6ad80b974d3808f5a20ea1e766c7d2f88b9e5895
SHA256 1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361
SHA512 909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologim.jpeg

MD5 c23e8b07817c6a9c469e77646fffca51
SHA1 14ebd30dea59e1f84bee2bd39b0bc8998d6c57f6
SHA256 ae6791f7cd33435d5797cf4d939e8ca538ef7b0f0fad693b6cf12b0e6a9b1cb6
SHA512 cad8a0461dbc1b2f13fc28e9a5d52c8e16725c4d1c39571c2b955c29cfa826b57e99606cb5c116a7f93d471a1fe561949fdb542654028f4107fcf063585b3e99