Malware Analysis Report

2024-08-06 19:29

Sample ID 240515-xpj5cseh7v
Target 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a
SHA256 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a
Tags
darkcomet 1 persistence rat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a

Threat Level: Known bad

The file 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a was found to be: Known bad.

Malicious Activity Summary

darkcomet 1 persistence rat trojan upx

UPX dump on OEP (original entry point)

Darkcomet

UPX dump on OEP (original entry point)

Loads dropped DLL

UPX packed file

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-15 19:01

Signatures

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-15 19:01

Reported

2024-05-15 19:04

Platform

win10v2004-20240508-en

Max time kernel

139s

Max time network

110s

Command Line

"C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe

"C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2024 -ip 2024

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 464

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/2024-0-0x0000000000400000-0x000000000054B000-memory.dmp

memory/2024-4-0x0000000000840000-0x0000000000841000-memory.dmp

memory/2024-3-0x00000000007F0000-0x00000000007F1000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-15 19:01

Reported

2024-05-15 19:04

Platform

win7-20240221-en

Max time kernel

150s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"

Signatures

Darkcomet

trojan rat darkcomet

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\test\\test.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\test\test.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 2868 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
PID 1148 wrote to memory of 1820 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Windows\SysWOW64\cmd.exe
PID 1148 wrote to memory of 1820 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Windows\SysWOW64\cmd.exe
PID 1148 wrote to memory of 1820 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Windows\SysWOW64\cmd.exe
PID 1148 wrote to memory of 1820 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Windows\SysWOW64\cmd.exe
PID 1820 wrote to memory of 1032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1820 wrote to memory of 1032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1820 wrote to memory of 1032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1820 wrote to memory of 1032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1148 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1148 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1148 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1148 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe
PID 1496 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Roaming\test\test.exe C:\Users\Admin\AppData\Roaming\test\test.exe

Processes

C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe

"C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"

C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe

"C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\LULAV.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f

C:\Users\Admin\AppData\Roaming\test\test.exe

"C:\Users\Admin\AppData\Roaming\test\test.exe"

C:\Users\Admin\AppData\Roaming\test\test.exe

"C:\Users\Admin\AppData\Roaming\test\test.exe"

C:\Users\Admin\AppData\Roaming\test\test.exe

"C:\Users\Admin\AppData\Roaming\test\test.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 anthraxgold.no-ip.info udp

Files

memory/2868-0-0x0000000000400000-0x000000000054B000-memory.dmp

memory/2868-45-0x00000000029F0000-0x00000000029F1000-memory.dmp

memory/2868-9-0x0000000000250000-0x0000000000251000-memory.dmp

memory/2868-35-0x0000000002A10000-0x0000000002A11000-memory.dmp

memory/2868-100-0x0000000000240000-0x0000000000241000-memory.dmp

memory/2868-99-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2868-91-0x0000000002E10000-0x0000000002E11000-memory.dmp

memory/2868-81-0x0000000002E90000-0x0000000002E91000-memory.dmp

memory/2868-73-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

memory/2868-63-0x0000000000690000-0x0000000000691000-memory.dmp

memory/2868-61-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2868-53-0x0000000002920000-0x0000000002921000-memory.dmp

memory/2868-41-0x00000000006C0000-0x00000000007C0000-memory.dmp

memory/2868-37-0x0000000002A10000-0x0000000002A11000-memory.dmp

memory/2868-33-0x0000000000820000-0x0000000000821000-memory.dmp

memory/2868-31-0x0000000000820000-0x0000000000821000-memory.dmp

memory/2868-29-0x00000000003D0000-0x00000000003D1000-memory.dmp

memory/2868-27-0x00000000003D0000-0x00000000003D1000-memory.dmp

memory/2868-25-0x0000000002A20000-0x0000000002A21000-memory.dmp

memory/2868-23-0x0000000002A20000-0x0000000002A21000-memory.dmp

memory/2868-21-0x0000000002C90000-0x0000000002C91000-memory.dmp

memory/2868-19-0x0000000002C90000-0x0000000002C91000-memory.dmp

memory/2868-15-0x0000000002A90000-0x0000000002A91000-memory.dmp

memory/2868-13-0x0000000002A90000-0x0000000002A91000-memory.dmp

memory/2868-7-0x0000000000250000-0x0000000000251000-memory.dmp

memory/2868-5-0x0000000000880000-0x0000000000881000-memory.dmp

memory/2868-3-0x0000000000880000-0x0000000000881000-memory.dmp

memory/2868-101-0x0000000000810000-0x0000000000811000-memory.dmp

memory/2868-109-0x0000000003660000-0x0000000003661000-memory.dmp

memory/2868-119-0x0000000003640000-0x0000000003641000-memory.dmp

memory/2868-127-0x00000000002C0000-0x00000000002C1000-memory.dmp

memory/2868-135-0x0000000002910000-0x0000000002911000-memory.dmp

memory/2868-143-0x00000000029E0000-0x00000000029E1000-memory.dmp

memory/1148-211-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\LULAV.bat

MD5 527683c48cc4c7190219814c77b72fe0
SHA1 d995878a8f4b9824a0508039eeada5376be9a52d
SHA256 bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b
SHA512 408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6

\Users\Admin\AppData\Roaming\test\test.exe

MD5 67af6afbfcb1321674769e589da9f475
SHA1 b86310ebaa664e7fdb82681b33327f21df6c54ef
SHA256 808ba5ee4ef3233b0d55248cd447da72968644f30d3a831bdf723da150e9d47b
SHA512 c16ba72fc2a0a846e1cdf29c7ad743d19aee65abe64fed92518572b4c494de6da5a364f14f130383c08583cb662736ac0798d11b84ec771010d749f74d084609

memory/2472-448-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1148-451-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2980-461-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2472-462-0x0000000000400000-0x00000000004B7000-memory.dmp