Malware Analysis Report

2025-01-03 04:59

Sample ID 241123-3rynesyqfq
Target 67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
SHA256 67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988
Tags
azorult oski raccoon b76017a227a0d879dec7c76613918569d03892fb discovery infostealer spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988

Threat Level: Known bad

The file 67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe was found to be: Known bad.

Malicious Activity Summary

azorult oski raccoon b76017a227a0d879dec7c76613918569d03892fb discovery infostealer spyware stealer trojan

Azorult family

Azorult

Raccoon

Raccoon Stealer V1 payload

Raccoon family

Oski family

Oski

Reads user/profile data of web browsers

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Suspicious use of SetThreadContext

Enumerates physical storage devices

Program crash

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: MapViewOfSection

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-23 23:45

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-23 23:45

Reported

2024-11-23 23:47

Platform

win7-20240903-en

Max time kernel

118s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"

Signatures

Azorult

trojan infostealer azorult

Azorult family

azorult

Oski

infostealer oski

Oski family

oski

Raccoon

stealer raccoon

Raccoon Stealer V1 payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Raccoon family

raccoon

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Vereransa.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Vereransa.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2888 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2888 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2888 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2888 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2888 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2888 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2888 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2888 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2340 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2340 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2340 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2340 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2340 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2888 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2888 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2888 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2888 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2888 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2288 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2288 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2288 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2288 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2288 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2768 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Windows\SysWOW64\WerFault.exe
PID 2768 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Windows\SysWOW64\WerFault.exe
PID 2768 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Windows\SysWOW64\WerFault.exe
PID 2768 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe

"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"

C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe

"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"

C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"

C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe

"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"

C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe

"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"

C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 848

Network

Country Destination Domain Proto
US 8.8.8.8:53 telegka.top udp
US 107.178.223.183:80 telegka.top tcp
US 8.8.8.8:53 scarsa.ac.ug udp
US 8.8.8.8:53 milsom.ac.ug udp
US 107.178.223.183:80 telegka.top tcp
US 8.8.8.8:53 milsom.ac.ug udp
US 107.178.223.183:80 telegka.top tcp
US 107.178.223.183:80 telegka.top tcp
US 107.178.223.183:80 telegka.top tcp
US 104.155.138.21:80 telegka.top tcp
US 107.178.223.183:80 telegka.top tcp
US 104.155.138.21:80 telegka.top tcp
US 8.8.8.8:53 telegin.top udp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp

Files

memory/2888-2-0x0000000000230000-0x0000000000231000-memory.dmp

\Users\Admin\AppData\Local\Temp\Vtergfds.exe

MD5 0a8854ddd119e42c62bf2904efb29c1c
SHA1 986ab504ca3cc36fc0418516f26aabc4168224d6
SHA256 69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb
SHA512 905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

MD5 bbc3d625038de2cc64cbfdb76e888528
SHA1 75b19ab88f8c23d0088252e8c725d4ceea56895a
SHA256 3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601
SHA512 9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

memory/2340-22-0x0000000000240000-0x0000000000241000-memory.dmp

memory/2340-24-0x0000000000440000-0x0000000000447000-memory.dmp

memory/2288-36-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2768-47-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2888-39-0x0000000000400000-0x00000000004FE000-memory.dmp

memory/1868-33-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2288-46-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2172-44-0x0000000000400000-0x0000000000495000-memory.dmp

memory/2768-42-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2172-38-0x0000000000400000-0x0000000000495000-memory.dmp

memory/1868-37-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1868-31-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1868-28-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2888-27-0x0000000000400000-0x00000000004FE000-memory.dmp

memory/1868-49-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1868-51-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2172-52-0x0000000000400000-0x0000000000491000-memory.dmp

memory/2768-53-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2768-60-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2768-61-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2172-71-0x0000000000400000-0x0000000000491000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-23 23:45

Reported

2024-11-23 23:47

Platform

win10v2004-20241007-en

Max time kernel

114s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"

Signatures

Azorult

trojan infostealer azorult

Azorult family

azorult

Oski

infostealer oski

Oski family

oski

Raccoon

stealer raccoon

Raccoon Stealer V1 payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Raccoon family

raccoon

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Vereransa.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2472 wrote to memory of 3224 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2472 wrote to memory of 3224 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2472 wrote to memory of 3224 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 2472 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2472 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2472 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 3224 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 3224 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 3224 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 3224 wrote to memory of 4724 N/A C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe
PID 4880 wrote to memory of 1032 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 4880 wrote to memory of 1032 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 4880 wrote to memory of 1032 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 4880 wrote to memory of 1032 N/A C:\Users\Admin\AppData\Local\Temp\Vereransa.exe C:\Users\Admin\AppData\Local\Temp\Vereransa.exe
PID 2472 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2472 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2472 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe
PID 2472 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe

Processes

C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe

"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"

C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe

"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"

C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"

C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe

"C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe"

C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

"C:\Users\Admin\AppData\Local\Temp\Vereransa.exe"

C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe

"C:\Users\Admin\AppData\Local\Temp\67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1032 -ip 1032

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 1324

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 milsom.ac.ug udp
US 8.8.8.8:53 scarsa.ac.ug udp
US 8.8.8.8:53 telegka.top udp
US 8.8.8.8:53 milsom.ac.ug udp
US 104.155.138.21:80 telegka.top tcp
US 8.8.8.8:53 21.138.155.104.in-addr.arpa udp
US 104.155.138.21:80 telegka.top tcp
US 104.155.138.21:80 telegka.top tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 104.155.138.21:80 telegka.top tcp
US 104.155.138.21:80 telegka.top tcp
US 8.8.8.8:53 98.208.201.84.in-addr.arpa udp
US 107.178.223.183:80 telegka.top tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 104.155.138.21:80 telegka.top tcp

Files

memory/2472-2-0x00000000777C2000-0x00000000777C3000-memory.dmp

memory/2472-3-0x00000000006F0000-0x00000000006F1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Vtergfds.exe

MD5 0a8854ddd119e42c62bf2904efb29c1c
SHA1 986ab504ca3cc36fc0418516f26aabc4168224d6
SHA256 69f64ca4b22180560648691c2d52cfe11b253bb403663f8e92f25e0f76308dbb
SHA512 905e1ee950617ede45baf4f356c379f7c05876ac457ac36a556937c4d4ac55aa991902e1df069c92c654cf2260c4ac6cb21595e2f3fcce916fcf92d4f39aeec7

C:\Users\Admin\AppData\Local\Temp\Vereransa.exe

MD5 bbc3d625038de2cc64cbfdb76e888528
SHA1 75b19ab88f8c23d0088252e8c725d4ceea56895a
SHA256 3b8b57a0fa99b4d29b259e3641e967cbc84a314891273b56ce5bdeba30e49601
SHA512 9014f5d15f4e5311650e2b5357e72655c28cc64cb0dc7f1a37636270985a411a8baa26433f330d735850fe6a3dfe7479f70a9a52aa45c708879036ab1a1d3465

memory/3224-28-0x00000000005E0000-0x00000000005E1000-memory.dmp

memory/4880-31-0x0000000000600000-0x0000000000601000-memory.dmp

memory/4724-33-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4724-36-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4724-38-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4724-39-0x0000000000400000-0x0000000000420000-memory.dmp

memory/3224-32-0x00000000005F0000-0x00000000005F7000-memory.dmp

memory/1032-44-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1032-46-0x0000000000400000-0x0000000000434000-memory.dmp

memory/1032-43-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1032-41-0x0000000000400000-0x0000000000438000-memory.dmp

memory/4880-40-0x0000000000400000-0x0000000000443000-memory.dmp

memory/4880-47-0x0000000000400000-0x0000000000443000-memory.dmp

memory/2868-49-0x0000000000400000-0x0000000000495000-memory.dmp

memory/2472-50-0x0000000000400000-0x00000000004FE000-memory.dmp

memory/2868-48-0x0000000000400000-0x0000000000495000-memory.dmp

memory/2472-52-0x0000000000400000-0x00000000004FE000-memory.dmp

memory/4724-53-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4724-55-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1032-58-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1032-60-0x0000000000400000-0x0000000000434000-memory.dmp

memory/2868-61-0x0000000000400000-0x0000000000491000-memory.dmp