Malware Analysis Report

2024-08-06 14:19

Sample ID 240619-fgre2athlc
Target ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2
SHA256 ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2
Tags
upx modiloader persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2

Threat Level: Known bad

The file ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2 was found to be: Known bad.

Malicious Activity Summary

upx modiloader persistence trojan

ModiLoader, DBatLoader

UPX dump on OEP (original entry point)

Detects Windows executables referencing non-Windows User-Agents

UPX dump on OEP (original entry point)

ModiLoader Second Stage

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

UPX packed file

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-19 04:50

Signatures

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 04:50

Reported

2024-06-19 04:53

Platform

win7-20240221-en

Max time kernel

149s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Detects Windows executables referencing non-Windows User-Agents

Description Indicator Process Target
N/A N/A N/A N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2152 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 2480 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Windows\SysWOW64\cmd.exe
PID 2480 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Windows\SysWOW64\cmd.exe
PID 2480 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Windows\SysWOW64\cmd.exe
PID 2480 wrote to memory of 3032 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Windows\SysWOW64\cmd.exe
PID 3032 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3032 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3032 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3032 wrote to memory of 2768 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2480 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2480 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2480 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2480 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 324 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1640 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe

"C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe"

C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe

"C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\GLYKS.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/2152-0-0x0000000000400000-0x0000000000454000-memory.dmp

memory/2152-5-0x0000000000240000-0x0000000000241000-memory.dmp

memory/2152-3-0x0000000000240000-0x0000000000241000-memory.dmp

memory/2152-15-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2152-27-0x0000000000290000-0x0000000000291000-memory.dmp

memory/2152-39-0x00000000002F0000-0x00000000002F1000-memory.dmp

memory/2152-59-0x00000000003B0000-0x00000000003B1000-memory.dmp

memory/2152-69-0x00000000003D0000-0x00000000003D1000-memory.dmp

memory/2152-77-0x0000000000540000-0x0000000000542000-memory.dmp

memory/2152-89-0x0000000000400000-0x0000000000454000-memory.dmp

memory/2480-93-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2480-99-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2480-97-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2480-95-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2480-91-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2152-90-0x0000000002750000-0x00000000027A4000-memory.dmp

memory/2152-88-0x0000000000400000-0x0000000000454000-memory.dmp

memory/2152-79-0x0000000000404000-0x0000000000405000-memory.dmp

memory/2480-103-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2480-102-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2480-101-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2152-105-0x0000000000400000-0x0000000000454000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\GLYKS.bat

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 c4d1d7e4b3ebb215e865160dce57a752
SHA1 7c253692401be861466b6a84fcb0d3333ee75470
SHA256 96e6f8372139df74228a8a8d67b26cdbc78429fecf435a00b3df3558772c1a5b
SHA512 d1baccb7e008aeaaffd7fd4f4cc1a4b7f2d71990d8ff1b9c655222dfc0d77d92f494f89e3de51c0150f64ec6cf86b8495e3c9a870c586cf8acd362c295032b49

memory/1640-145-0x0000000000400000-0x0000000000454000-memory.dmp

memory/2480-144-0x00000000026D0000-0x0000000002724000-memory.dmp

memory/1640-150-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1640-179-0x00000000002A0000-0x00000000002A1000-memory.dmp

memory/1640-171-0x0000000000280000-0x0000000000281000-memory.dmp

memory/1640-160-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1640-223-0x0000000000400000-0x0000000000454000-memory.dmp

memory/1196-239-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1640-242-0x0000000000400000-0x0000000000454000-memory.dmp

memory/2480-246-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1196-254-0x0000000000400000-0x0000000000414000-memory.dmp

memory/324-253-0x0000000000400000-0x000000000040B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 04:50

Reported

2024-06-19 04:53

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Detects Windows executables referencing non-Windows User-Agents

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 3692 wrote to memory of 4844 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe
PID 4844 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Windows\SysWOW64\cmd.exe
PID 4844 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Windows\SysWOW64\cmd.exe
PID 4844 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Windows\SysWOW64\cmd.exe
PID 868 wrote to memory of 1712 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 868 wrote to memory of 1712 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 868 wrote to memory of 1712 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4844 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4844 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4844 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 392 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe

"C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe"

C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe

"C:\Users\Admin\AppData\Local\Temp\ee569dd11873b884bb968c36aa23dbc315588020b92348915f1b54a0cb69dfe2.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CHWXU.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 152.107.17.2.in-addr.arpa udp
BE 88.221.83.248:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 248.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 32.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

memory/3692-0-0x0000000000400000-0x0000000000454000-memory.dmp

memory/4844-3-0x0000000000400000-0x000000000040B000-memory.dmp

memory/4844-9-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3692-4-0x0000000002920000-0x0000000002922000-memory.dmp

memory/3692-10-0x0000000000400000-0x0000000000454000-memory.dmp

memory/3692-7-0x0000000002950000-0x0000000002952000-memory.dmp

memory/3692-6-0x0000000002940000-0x0000000002942000-memory.dmp

memory/3692-5-0x0000000002930000-0x0000000002932000-memory.dmp

memory/4844-11-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CHWXU.txt

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 c80a198824a2b96ebcb420f2af8be304
SHA1 e74d2d602eb97bbb0e54aaa506bd448b6c55a2eb
SHA256 71b238872651e4d837573d708b8a9a168e50036a3cea1aec127f140b11eef0db
SHA512 75e09dfc142a67d23ec79c78918b832860f7ba5bd4a50447e8cda308c1068a12cbddb12f0d8ad5e117e4cddb400c7f54100862d6497a76654a2b058bd849c285

memory/4276-35-0x0000000000400000-0x0000000000454000-memory.dmp

memory/4276-40-0x0000000000400000-0x0000000000454000-memory.dmp

memory/2596-49-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2596-48-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2596-52-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2596-47-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2596-44-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4276-53-0x0000000000400000-0x0000000000454000-memory.dmp

memory/4844-56-0x0000000000400000-0x000000000040B000-memory.dmp

memory/392-57-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2596-58-0x0000000000400000-0x0000000000414000-memory.dmp