Malware Analysis Report

2025-05-28 18:17

Sample ID 241109-y2ewva1fqa
Target 6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790
SHA256 6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790
Tags
discovery spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790

Threat Level: Likely malicious

The file 6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790 was found to be: Likely malicious.

Malicious Activity Summary

discovery spyware stealer

Drops file in Drivers directory

Loads dropped DLL

Drops startup file

Reads user/profile data of web browsers

Deletes itself

Executes dropped EXE

Enumerates connected drives

Drops file in Program Files directory

Drops file in Windows directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Runs net.exe

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 20:16

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 20:16

Reported

2024-11-09 20:19

Platform

win7-20240903-en

Max time kernel

150s

Max time network

129s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\DVD Maker\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Windows Defender\MSASCui.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Logo1_.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2068 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\net.exe
PID 2068 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\net.exe
PID 2068 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\net.exe
PID 2068 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\net.exe
PID 2532 wrote to memory of 3052 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2532 wrote to memory of 3052 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2532 wrote to memory of 3052 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2532 wrote to memory of 3052 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2068 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\cmd.exe
PID 2068 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\cmd.exe
PID 2068 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\cmd.exe
PID 2068 wrote to memory of 2304 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\cmd.exe
PID 2068 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\Logo1_.exe
PID 2068 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\Logo1_.exe
PID 2068 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\Logo1_.exe
PID 2068 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\Logo1_.exe
PID 2116 wrote to memory of 2764 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2116 wrote to memory of 2764 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2116 wrote to memory of 2764 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2116 wrote to memory of 2764 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2764 wrote to memory of 2836 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2764 wrote to memory of 2836 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2764 wrote to memory of 2836 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2764 wrote to memory of 2836 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2304 wrote to memory of 2884 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 2304 wrote to memory of 2884 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 2304 wrote to memory of 2884 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 2304 wrote to memory of 2884 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 2116 wrote to memory of 2500 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2116 wrote to memory of 2500 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2116 wrote to memory of 2500 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2116 wrote to memory of 2500 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2500 wrote to memory of 2656 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2500 wrote to memory of 2656 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2500 wrote to memory of 2656 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2500 wrote to memory of 2656 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2116 wrote to memory of 1212 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2116 wrote to memory of 1212 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe

"C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\$$aA969.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe

"C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

N/A

Files

memory/2068-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$$aA969.bat

MD5 395b7ddbba9eda839e71eea9bf36a35f
SHA1 6929ee22a4fb3a76fd6123da3171ae2f0db3919d
SHA256 24c4a8c8798d366bf53bb408ea7d59eb8c85ee1257d28c0021f0d2a315037cab
SHA512 ea5ee3718252558ea1ea5a2b5eb711f02034af8b327577883365901156bbd4885ecbdb8f587aa54c69f91d2d490a7ae2b326b7c2330cf08fd3744de3e6dcc995

C:\Windows\Logo1_.exe

MD5 dfc4e131e84f5b4aa301491d0d5c735f
SHA1 f4efee0061dee53da9d73f70648ae8ad2eeb6473
SHA256 f9508caee8e59955142464761783f89d580b4ac080f2d8256d6bf547e1958ba9
SHA512 62652d0c21a71e52777c3e929013f838e0907a21259e2947bf46e698fb90597309cdbce5f1c656022e98bf14588386d1c9c5559658392e29c1da2b86ba0221c0

C:\Windows\system32\drivers\etc\hosts

MD5 7e3a0edd0c6cd8316f4b6c159d5167a1
SHA1 753428b4736ffb2c9e3eb50f89255b212768c55a
SHA256 1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA512 9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

memory/2068-18-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2068-17-0x0000000000230000-0x000000000026E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe.exe

MD5 b45b7bd6eb92c5b65378d8d0a0964747
SHA1 5ca6f198ac83c90496110259b57ff4a5f47b64bb
SHA256 5f1d9218f9735a763ffecc47c7b6f0c342b7f1a5da835733e0b3b73903f864a0
SHA512 bde39c4b6d04caae8280bdd53e6036c53ed394a72f0d4d1273c149175570e8a87f87c8963869c96834fef7e82893da38c49ce4aaa1851e65c055dbbcac7c1708

memory/1212-29-0x0000000002D80000-0x0000000002D81000-memory.dmp

memory/2068-32-0x0000000000230000-0x000000000026E000-memory.dmp

memory/2116-33-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-2872745919-2748461613-2989606286-1000\_desktop.ini

MD5 577b020fd4f1c33364f7dc1b6a15b5e0
SHA1 0a39afa020279d2ae46b302efe9dfd550e822709
SHA256 e22c9759bcf5bc35063c6c048e109883f070723446b9ed5d16e70c48ca526bb9
SHA512 c7b8e4478ddc648c13acd21b16fa7397fad334d7710e3d91f4069fcd7d5a4f3d8c542c46eb3843c4dbc8d862bf03a50d1ad641e725f53382a73a9ac4ec035f48

C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe

MD5 1012baacf238028b5b3571597eafb677
SHA1 2828da20e2d8eab5c6cbe26acdf69d511774a329
SHA256 453165e0ee705f5960702b7621316cdfc9e66b7b11a40050bd4983339579c96c
SHA512 ebe0346fb4c06e6ccd0ccb1d535d41e638bc95311c659490be8d1d88c74c3079b87724e189218bb27b3dfd3c91d61e9ab1543f5907f63cd3955b7dff01af436f

memory/2116-2962-0x0000000000400000-0x000000000043E000-memory.dmp

C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

MD5 70cb7c4cc1ca5f96aa18c5d09c77915d
SHA1 3248385072ed80b1437bae96c5a9b3d55efaefac
SHA256 07a519caf26b0d9761c1c7a0f9b67ef4b53d046ba58a5cc9bf3332ede942734c
SHA512 fec323695ae348d9beccd890a9f52ec94188823cede88b52ebcdd7585ff2acfc9e4690403fdd7878e8f5fd2926a5f30a6b20815d9182e2afff3f226671536183

memory/2116-4151-0x0000000000400000-0x000000000043E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 20:16

Reported

2024-11-09 20:19

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

154s

Command Line

C:\Windows\Explorer.EXE

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Windows\Logo1_.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini C:\Windows\Logo1_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Y: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\X: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\W: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\N: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\L: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\V: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\R: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\K: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\H: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\G: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Z: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\T: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\S: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\P: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\O: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\J: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\I: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\U: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\Q: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\M: C:\Windows\Logo1_.exe N/A
File opened (read-only) \??\E: C:\Windows\Logo1_.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ca-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\en-US\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\zh-cn\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Crashpad\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pl-pl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\pt-br\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\nb-no\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\de-de\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-sl\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\Windows Defender\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-gb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ar-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\sv-se\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hu-hu\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\cs-cz\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-gb\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ar-ae\_desktop.ini C:\Windows\Logo1_.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini C:\Windows\Logo1_.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe C:\Windows\Logo1_.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nl-nl\_desktop.ini C:\Windows\Logo1_.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rundl132.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
File created C:\Windows\Logo1_.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
File opened for modification C:\Windows\rundl132.exe C:\Windows\Logo1_.exe N/A
File created C:\Windows\Dll.dll C:\Windows\Logo1_.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Logo1_.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A
N/A N/A C:\Windows\Logo1_.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4360 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\net.exe
PID 4360 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\net.exe
PID 4360 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\net.exe
PID 4544 wrote to memory of 1592 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4544 wrote to memory of 1592 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4544 wrote to memory of 1592 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4360 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\cmd.exe
PID 4360 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\cmd.exe
PID 4360 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\SysWOW64\cmd.exe
PID 4360 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\Logo1_.exe
PID 4360 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\Logo1_.exe
PID 4360 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Windows\Logo1_.exe
PID 2940 wrote to memory of 4864 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2940 wrote to memory of 4864 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2940 wrote to memory of 4864 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 1564 wrote to memory of 4700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 1564 wrote to memory of 4700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 4864 wrote to memory of 1736 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4864 wrote to memory of 1736 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4864 wrote to memory of 1736 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 4700 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 4700 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe
PID 2940 wrote to memory of 2488 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2940 wrote to memory of 2488 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2940 wrote to memory of 2488 N/A C:\Windows\Logo1_.exe C:\Windows\SysWOW64\net.exe
PID 2488 wrote to memory of 2344 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2488 wrote to memory of 2344 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2488 wrote to memory of 2344 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2940 wrote to memory of 3392 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE
PID 2940 wrote to memory of 3392 N/A C:\Windows\Logo1_.exe C:\Windows\Explorer.EXE

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe

"C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a77FF.bat

C:\Windows\Logo1_.exe

C:\Windows\Logo1_.exe

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe

"C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe"

C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe

"C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe" --type=collab-renderer --proc=4700

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net.exe

net stop "Kingsoft AntiVirus Service"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 103.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 28.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 99.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 24.73.42.20.in-addr.arpa udp

Files

memory/4360-0-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\Logo1_.exe

MD5 dfc4e131e84f5b4aa301491d0d5c735f
SHA1 f4efee0061dee53da9d73f70648ae8ad2eeb6473
SHA256 f9508caee8e59955142464761783f89d580b4ac080f2d8256d6bf547e1958ba9
SHA512 62652d0c21a71e52777c3e929013f838e0907a21259e2947bf46e698fb90597309cdbce5f1c656022e98bf14588386d1c9c5559658392e29c1da2b86ba0221c0

memory/4360-10-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2940-9-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 6f4adf207ef402d9ef40c6aa52ffd245
SHA1 4b05b495619c643f02e278dede8f5b1392555a57
SHA256 d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512 a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

C:\Users\Admin\AppData\Local\Temp\$$a77FF.bat

MD5 3e56fca475ed310ec9ebe6ca928c3d7e
SHA1 e150c60d3229c75cf14f099a10b8b4fb26140f5a
SHA256 d69f7da8e8e6e0c9f265960bb94a561979eba0458153178686ff7d150e10c204
SHA512 77a23b1185159bad09f9c4878d893a9e0f34bdedebbb855fbda967e691f53aeb95859a47922f43f4d96c88e3f4580aaeac552c65c5bec1440a87638a14208a2b

C:\Users\Admin\AppData\Local\Temp\6d797d3d0c3a58bf8edfdc6decb692cd4e0a42062e1a93e721fdc35c98a1f790.exe.exe

MD5 b45b7bd6eb92c5b65378d8d0a0964747
SHA1 5ca6f198ac83c90496110259b57ff4a5f47b64bb
SHA256 5f1d9218f9735a763ffecc47c7b6f0c342b7f1a5da835733e0b3b73903f864a0
SHA512 bde39c4b6d04caae8280bdd53e6036c53ed394a72f0d4d1273c149175570e8a87f87c8963869c96834fef7e82893da38c49ce4aaa1851e65c055dbbcac7c1708

memory/2940-20-0x0000000000400000-0x000000000043E000-memory.dmp

F:\$RECYCLE.BIN\S-1-5-21-3442511616-637977696-3186306149-1000\_desktop.ini

MD5 577b020fd4f1c33364f7dc1b6a15b5e0
SHA1 0a39afa020279d2ae46b302efe9dfd550e822709
SHA256 e22c9759bcf5bc35063c6c048e109883f070723446b9ed5d16e70c48ca526bb9
SHA512 c7b8e4478ddc648c13acd21b16fa7397fad334d7710e3d91f4069fcd7d5a4f3d8c542c46eb3843c4dbc8d862bf03a50d1ad641e725f53382a73a9ac4ec035f48

C:\Program Files\7-Zip\7z.exe

MD5 3c8d51cfb63666d0a80fb0722b89754a
SHA1 588f67f35d30a79e7b809302882a32ab4cf6a943
SHA256 c1ae61c35f0286c94dd114441b63eb82fdfd7d322ef46aab92eb73902b17c283
SHA512 3c9a60d536c4a9e6b1db3f01167bfdca11d2a5238c1e177578acf4b5b07bb92ad0a15ece46bc7040dbe2a34709777b5a8e4e74fefa24739a8e1df4e243b08f8e

memory/2940-2626-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe

MD5 d1c85aed7ccbf5c8b6b82a6039973bcb
SHA1 8172aa11225d987b394c5a9668866948d6743e51
SHA256 3d6fd770ff32c36c96c617e34adac45614b12daae11da48246c216a5b1d2bef8
SHA512 4589b2cc748305a2c28eeaf913c603068af524b61265f52c6b5c1369129f322c8d9f514b6292cff6bc368515d71cafaf644ab360d74a672b205e106b77fa8c19

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe

MD5 805ba9e4bcfdde2cd41c62cdfa500003
SHA1 561ac3c3eea04a2823e08fa73ef4856b2113c164
SHA256 ded84e71610908af1b33c0ef1e6b08fd1c84411eb3f7c704267fdf91d0dbe128
SHA512 d84c52b4d586632bde823dd0ee73afa0e6cbabca47ed60d2690c7be1befc693b62b5ca5c1e16a57d719cd64d948160870c844c6c8805789a3ce34c1ee3f0c4ab

memory/2940-8768-0x0000000000400000-0x000000000043E000-memory.dmp