Malware Analysis Report

2024-08-06 14:00

Sample ID 240616-w34v9asama
Target 09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b
SHA256 09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b
Tags
upx modiloader persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b

Threat Level: Known bad

The file 09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b was found to be: Known bad.

Malicious Activity Summary

upx modiloader persistence trojan

UPX dump on OEP (original entry point)

ModiLoader, DBatLoader

Detects Windows executables referencing non-Windows User-Agents

ModiLoader Second Stage

UPX dump on OEP (original entry point)

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

UPX packed file

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-16 18:27

Signatures

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 18:27

Reported

2024-06-16 18:30

Platform

win7-20240221-en

Max time kernel

149s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Detects Windows executables referencing non-Windows User-Agents

Description Indicator Process Target
N/A N/A N/A N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2336 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2488 wrote to memory of 2808 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 2488 wrote to memory of 2808 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 2488 wrote to memory of 2808 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 2488 wrote to memory of 2808 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 2808 wrote to memory of 1620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2808 wrote to memory of 1620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2808 wrote to memory of 1620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2808 wrote to memory of 1620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2488 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2488 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2488 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2488 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1540 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\JYXFG.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/2336-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2336-3-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2336-5-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2336-15-0x0000000000250000-0x0000000000251000-memory.dmp

memory/2336-40-0x0000000000350000-0x0000000000351000-memory.dmp

memory/2336-28-0x0000000000330000-0x0000000000331000-memory.dmp

memory/2336-23-0x0000000000404000-0x0000000000405000-memory.dmp

memory/2336-70-0x00000000003B0000-0x00000000003B1000-memory.dmp

memory/2336-88-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2488-99-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2336-105-0x00000000025C0000-0x0000000002613000-memory.dmp

memory/2488-104-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2488-101-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2336-102-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2488-97-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2488-95-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2488-93-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2488-91-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2488-89-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2336-78-0x00000000003D0000-0x00000000003D2000-memory.dmp

memory/2336-60-0x0000000000390000-0x0000000000391000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\JYXFG.bat

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 3f69d8a4491ac4eeb74057c57a450590
SHA1 7aa30c718c0e50311737137c1c21afff6ef2dc14
SHA256 04bac7d084570eb6eeea9a9e9021ed9287bb460fa77a591f30901c0a931d949b
SHA512 55b6d74d18bda2a63a5fd67f4cc8198a7114095f32f1e42db07af3a5cbc626cd4b9694084d4d65707831b0ca9964b3ba65069d02e899b8498fd7e0fb4f1338ce

memory/2488-131-0x0000000003350000-0x00000000033A3000-memory.dmp

memory/2488-146-0x0000000003350000-0x00000000033A3000-memory.dmp

memory/1540-151-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2488-150-0x0000000003350000-0x00000000033A3000-memory.dmp

memory/2488-149-0x0000000003350000-0x00000000033A3000-memory.dmp

memory/1540-154-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1540-164-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1540-175-0x00000000002B0000-0x00000000002B1000-memory.dmp

memory/1540-209-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1860-242-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1496-241-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1540-251-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2488-254-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1860-260-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1496-259-0x0000000000400000-0x000000000040B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 18:27

Reported

2024-06-16 18:30

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Detects Windows executables referencing non-Windows User-Agents

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 3000 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 5096 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 5096 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 5096 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 2692 wrote to memory of 4564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2692 wrote to memory of 4564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2692 wrote to memory of 4564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 5096 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 5096 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 5096 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 3140 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2964 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FKYAY.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/3000-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/3000-4-0x0000000002A30000-0x0000000002A32000-memory.dmp

memory/3000-6-0x0000000002A50000-0x0000000002A52000-memory.dmp

memory/3000-5-0x0000000002A40000-0x0000000002A42000-memory.dmp

memory/3000-3-0x00000000022D0000-0x00000000022D2000-memory.dmp

memory/5096-7-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5096-9-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5096-11-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3000-13-0x0000000000400000-0x0000000000453000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FKYAY.txt

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 a03c573146c1a8cc633ddc346d38f2bc
SHA1 8ad88a63df2e36b45a463091ee22419d79611ed2
SHA256 3cacccdd21a6fb6dbc8fa0ee7f827e0579e1567725dcef7ca7453a3545ad91c8
SHA512 cdd77103e19dd238ea136092722dd74df115722dc8910660f24bae50f5d0285665ce23cfde912e03c58a1712377a4a9616b8b79ece83500e01f2e65262ca9531

memory/2964-36-0x0000000000400000-0x0000000000453000-memory.dmp

memory/5092-51-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5092-50-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5092-52-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5092-48-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2964-49-0x0000000000400000-0x0000000000453000-memory.dmp

memory/5092-42-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5096-57-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3140-58-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5092-59-0x0000000000400000-0x0000000000414000-memory.dmp