Malware Analysis Report

2024-08-06 14:08

Sample ID 240616-x6yn3sxhlj
Target 09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
SHA256 09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b
Tags
upx modiloader persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b

Threat Level: Known bad

The file 09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe was found to be: Known bad.

Malicious Activity Summary

upx modiloader persistence trojan

ModiLoader, DBatLoader

ModiLoader Second Stage

UPX packed file

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-16 19:28

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 19:28

Reported

2024-06-16 19:31

Platform

win7-20240611-en

Max time kernel

150s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 2080 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1508 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 1508 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 1508 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 1508 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 2844 wrote to memory of 748 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2844 wrote to memory of 748 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2844 wrote to memory of 748 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2844 wrote to memory of 748 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1508 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1508 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1508 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1508 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 976 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\BGVWT.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/2080-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2080-5-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2080-15-0x0000000000250000-0x0000000000251000-memory.dmp

memory/2080-3-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2080-89-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2080-82-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1508-101-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1508-99-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1508-97-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2080-103-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1508-95-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1508-93-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2080-92-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2080-81-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2080-79-0x00000000003E0000-0x00000000003E2000-memory.dmp

memory/2080-78-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2080-77-0x0000000000404000-0x0000000000405000-memory.dmp

memory/2080-69-0x0000000000380000-0x0000000000381000-memory.dmp

memory/1508-108-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1508-107-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1508-106-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2080-59-0x0000000000360000-0x0000000000361000-memory.dmp

memory/2080-39-0x00000000002A0000-0x00000000002A1000-memory.dmp

memory/2080-27-0x0000000000280000-0x0000000000281000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\BGVWT.bat

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 6f81fbba8abc31b008ffaf1aeaec2334
SHA1 d174af056e3921703792261ca4404ac3ec102d1c
SHA256 3f614d2003120703dd0616bb1346ea57abc80ac86668f08dbcedea86ca124c4a
SHA512 3df06bd32f4117e1675f9fa2d976d72129c55056691b85d41d2d9130596088d1926676675f81fc31605ee1e39b6f3987191d83a25c383241da845f62683142e2

memory/1508-140-0x0000000002AF0000-0x0000000002B43000-memory.dmp

memory/976-149-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1508-152-0x0000000000400000-0x000000000040B000-memory.dmp

memory/976-155-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2200-244-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1612-249-0x0000000000400000-0x0000000000414000-memory.dmp

memory/976-251-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1508-248-0x0000000002AF0000-0x0000000002B43000-memory.dmp

memory/976-241-0x0000000000400000-0x0000000000453000-memory.dmp

memory/976-176-0x00000000002F0000-0x00000000002F1000-memory.dmp

memory/976-165-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1508-256-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2200-261-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1612-262-0x0000000000400000-0x0000000000414000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 19:28

Reported

2024-06-16 19:31

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 1224 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe
PID 5096 wrote to memory of 4716 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 5096 wrote to memory of 4716 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 5096 wrote to memory of 4716 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Windows\SysWOW64\cmd.exe
PID 4716 wrote to memory of 4808 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4716 wrote to memory of 4808 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4716 wrote to memory of 4808 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 5096 wrote to memory of 532 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 5096 wrote to memory of 532 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 5096 wrote to memory of 532 N/A C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 532 wrote to memory of 5008 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3972,i,3671441404766730751,12082497324212183132,262144 --variations-seed-version --mojo-platform-channel-handle=4136 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe

"C:\Users\Admin\AppData\Local\Temp\09325f005ceb976e3b3a85d4a8722b6a49d85c45847473ea4e8d5db860db079b.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BAYEW.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 37.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 12.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/1224-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1224-3-0x00000000021C0000-0x00000000021C2000-memory.dmp

memory/1224-5-0x00000000021D0000-0x00000000021D2000-memory.dmp

memory/5096-4-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5096-10-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1224-9-0x0000000000400000-0x0000000000453000-memory.dmp

memory/5096-7-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\BAYEW.txt

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 9e4623cc6b5a3360e295eb6c4645e213
SHA1 9ebff98a42dc2d1be4d304700d5ad4b163766c2f
SHA256 fa44cb51263b6ce5ecf19882a2e0daf1161abc016815ef4e0d6deff915f8f0a6
SHA512 952fdb5ee1713cc9e00dc28f9f0258a61c8b729c3b4b537e0228528d08f00fa556d50721412d79a2aba87e3d6a9c75ea54405100990574df751154619e31de7f

memory/532-34-0x0000000000400000-0x0000000000453000-memory.dmp

memory/532-46-0x0000000000400000-0x0000000000453000-memory.dmp

memory/5008-48-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5008-47-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5008-52-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5008-45-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5008-39-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5096-55-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5096-53-0x0000000000410000-0x00000000004D9000-memory.dmp

memory/4988-56-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5008-57-0x0000000000400000-0x0000000000414000-memory.dmp