Malware Analysis Report

2025-01-02 13:36

Sample ID 241202-1gqhystqaw
Target 231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
SHA256 231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631
Tags
hawkeye collection discovery keylogger spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631

Threat Level: Known bad

The file 231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe was found to be: Known bad.

Malicious Activity Summary

hawkeye collection discovery keylogger spyware stealer trojan

HawkEye

Hawkeye family

Loads dropped DLL

Reads local data of messenger clients

Checks computer location settings

Reads user/profile data of web browsers

Uses the VBS compiler for execution

Executes dropped EXE

Accesses Microsoft Outlook accounts

Looks up external IP address via web service

Suspicious use of SetThreadContext

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: SetClipboardViewer

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-02 21:37

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-02 21:37

Reported

2024-12-02 21:39

Platform

win7-20240903-en

Max time kernel

120s

Max time network

54s

Command Line

"C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe"

Signatures

HawkEye

keylogger trojan stealer spyware hawkeye

Hawkeye family

hawkeye

Reads local data of messenger clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Uses the VBS compiler for execution

Accesses Microsoft Outlook accounts

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A whatismyipaddress.com N/A N/A
N/A whatismyipaddress.com N/A N/A
N/A whatismyipaddress.com N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 2316 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2316 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2316 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2316 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2900 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2900 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2900 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2900 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 468 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2572 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2572 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2572 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2572 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe

"C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe"

C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe

"C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 whatismyipaddress.com udp
US 104.19.223.79:80 whatismyipaddress.com tcp
US 104.19.223.79:443 whatismyipaddress.com tcp
US 104.19.223.79:443 whatismyipaddress.com tcp
US 8.8.8.8:53 mail.avesta.co.id udp
ID 180.235.149.138:587 mail.avesta.co.id tcp
ID 180.235.149.138:587 mail.avesta.co.id tcp

Files

memory/2316-0-0x00000000749D1000-0x00000000749D2000-memory.dmp

memory/2316-1-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2316-2-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2316-3-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/468-6-0x0000000000450000-0x0000000000536000-memory.dmp

memory/468-23-0x0000000000450000-0x0000000000536000-memory.dmp

memory/468-16-0x0000000000450000-0x0000000000536000-memory.dmp

memory/468-11-0x0000000000450000-0x0000000000536000-memory.dmp

memory/468-10-0x0000000000450000-0x0000000000536000-memory.dmp

memory/468-8-0x0000000000450000-0x0000000000536000-memory.dmp

memory/468-20-0x0000000000450000-0x0000000000536000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe

MD5 e5cfadb65f5a6b27b6a559cb3c286b95
SHA1 f33ab26def2759aad5248cf1affa413777148584
SHA256 251b78d864900e3a2b6cc168463421e1bc4ca31bfcabe941b595989bda0e5314
SHA512 b833256eb469717036cd81673e6b4d2bfa00093955b3d202fcfade785f530c51ccb9c23d883f3d263b985996560f3e67d5c7df51963974b526c79f3ded043d9b

memory/468-14-0x0000000000450000-0x0000000000536000-memory.dmp

memory/468-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/468-30-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/468-31-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2900-33-0x00000000749D0000-0x0000000074F7B000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe

MD5 fc5828552d2036dc60430b21253b5e44
SHA1 737cf33db7761061bd0774ebbd8976445cb98df1
SHA256 231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631
SHA512 9eb22f7ed932371a8a083399cd4dc48daebbddb6daa5f547d07049ac89261b660c25265586800ac1644d74234712b8b37478d1111b0e34c8092ce65bf2cb008f

memory/952-38-0x0000000000400000-0x000000000046E000-memory.dmp

memory/952-39-0x0000000000400000-0x000000000046E000-memory.dmp

memory/468-40-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/468-41-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2900-43-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/468-42-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/952-47-0x0000000000400000-0x000000000046E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\holdermail.txt

MD5 e62221a3bb549a72fcc4afa60d34e620
SHA1 d60b16b540e0e3ed459a30cce0678d1fc8a1989a
SHA256 587f8f51485b575f30e5e1608f70b31b9d8bb384318802373cc52cbdf2a4aa95
SHA512 5b6f6a3a88961b62870e486b02e41d065b3f054f3ad45f7c7e01aff3ba151893e36fd3c13771ed9e3738aaa525296a8ee72adc05fb32932ec3af259404172aed

memory/1640-51-0x0000000000400000-0x000000000046F000-memory.dmp

memory/1640-52-0x0000000000400000-0x000000000046F000-memory.dmp

memory/1640-61-0x0000000000400000-0x000000000046F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\holdermail.txt

MD5 c3609e29395ccd5fd8407fed36414e75
SHA1 04c0c5dc3fcced0c5581c44af17fa60260fb591a
SHA256 a32df1c247d5738af4241edc4aa520dbb21013d05d47cac5db96ccfb48de7857
SHA512 8bbd7b458f2be6e91c46cad8f682e109c7a7317f9ae89e5ce889ae7d4db5775b83d03016f47b56aa75bd5646a50c06ae7adbf2fc8af6b9f8a976f2ce30de3533

memory/2900-62-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2316-63-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2432-73-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2432-76-0x0000000000400000-0x00000000004E6000-memory.dmp

memory/2432-77-0x0000000000400000-0x00000000004E6000-memory.dmp

C:\Users\Admin\AppData\Roaming\pid.txt

MD5 877a9ba7a98f75b90a9d49f53f15a858
SHA1 3977dced04b7d0c7bc81b01a3f4124e14c683b8e
SHA256 1e5ee5e58c8f490ae68e7e91b1575ebefc2bf6c211f302a553ff0c4925e85321
SHA512 8b952b0566752092c3e52ccba5dd3212b90b53ecf094f339fedb3380bfc94a1466aca388527c47105959ee72ddbfdb83308007b38a9c72d532ca84ac0ae47447

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-02 21:37

Reported

2024-12-02 21:39

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe"

Signatures

HawkEye

keylogger trojan stealer spyware hawkeye

Hawkeye family

hawkeye

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe N/A

Reads local data of messenger clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Uses the VBS compiler for execution

Accesses Microsoft Outlook accounts

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A whatismyipaddress.com N/A N/A
N/A whatismyipaddress.com N/A N/A
N/A whatismyipaddress.com N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe N/A

Suspicious behavior: SetClipboardViewer

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe
PID 3552 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 3552 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 3552 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 4164 wrote to memory of 2808 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 4164 wrote to memory of 2808 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 4164 wrote to memory of 2808 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 3848 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 3916 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 212 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe
PID 2808 wrote to memory of 3176 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2808 wrote to memory of 3176 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 2808 wrote to memory of 3176 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 212 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe

"C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe"

C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe

"C:\Users\Admin\AppData\Local\Temp\231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 whatismyipaddress.com udp
US 104.19.222.79:80 whatismyipaddress.com tcp
US 104.19.222.79:443 whatismyipaddress.com tcp
US 8.8.8.8:53 79.222.19.104.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 mail.avesta.co.id udp
ID 180.235.149.138:587 mail.avesta.co.id tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 138.149.235.180.in-addr.arpa udp
ID 180.235.149.138:587 mail.avesta.co.id tcp
US 104.19.222.79:80 whatismyipaddress.com tcp
US 104.19.222.79:443 whatismyipaddress.com tcp
ID 180.235.149.138:587 mail.avesta.co.id tcp
US 8.8.8.8:53 98.209.201.84.in-addr.arpa udp
ID 180.235.149.138:587 mail.avesta.co.id tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/3552-0-0x0000000074F52000-0x0000000074F53000-memory.dmp

memory/3552-1-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/3552-2-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/3552-3-0x0000000074F52000-0x0000000074F53000-memory.dmp

memory/3552-4-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/3552-5-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/3916-8-0x0000000000400000-0x00000000004E6000-memory.dmp

memory/3916-9-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/3916-10-0x0000000074F50000-0x0000000075501000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CryptSvc.exe

MD5 e5cfadb65f5a6b27b6a559cb3c286b95
SHA1 f33ab26def2759aad5248cf1affa413777148584
SHA256 251b78d864900e3a2b6cc168463421e1bc4ca31bfcabe941b595989bda0e5314
SHA512 b833256eb469717036cd81673e6b4d2bfa00093955b3d202fcfade785f530c51ccb9c23d883f3d263b985996560f3e67d5c7df51963974b526c79f3ded043d9b

memory/3916-12-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/4164-22-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/4164-23-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/4164-24-0x0000000074F50000-0x0000000075501000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\EFS.exe

MD5 fc5828552d2036dc60430b21253b5e44
SHA1 737cf33db7761061bd0774ebbd8976445cb98df1
SHA256 231eb8d1c2f39452977edb07c49276b0dd9886178d16daee32a8a59dac8a8631
SHA512 9eb22f7ed932371a8a083399cd4dc48daebbddb6daa5f547d07049ac89261b660c25265586800ac1644d74234712b8b37478d1111b0e34c8092ce65bf2cb008f

memory/3848-29-0x0000000000400000-0x000000000046E000-memory.dmp

memory/3848-30-0x0000000000400000-0x000000000046E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\holdermail.txt

MD5 e62221a3bb549a72fcc4afa60d34e620
SHA1 d60b16b540e0e3ed459a30cce0678d1fc8a1989a
SHA256 587f8f51485b575f30e5e1608f70b31b9d8bb384318802373cc52cbdf2a4aa95
SHA512 5b6f6a3a88961b62870e486b02e41d065b3f054f3ad45f7c7e01aff3ba151893e36fd3c13771ed9e3738aaa525296a8ee72adc05fb32932ec3af259404172aed

memory/3848-37-0x0000000000400000-0x000000000046E000-memory.dmp

memory/3848-36-0x0000000000470000-0x0000000000539000-memory.dmp

memory/3552-38-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/3916-39-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/4164-40-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/4588-41-0x0000000000400000-0x000000000046F000-memory.dmp

memory/4588-42-0x0000000000400000-0x000000000046F000-memory.dmp

memory/4588-52-0x0000000000400000-0x000000000046F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\holdermail.txt

MD5 c3609e29395ccd5fd8407fed36414e75
SHA1 04c0c5dc3fcced0c5581c44af17fa60260fb591a
SHA256 a32df1c247d5738af4241edc4aa520dbb21013d05d47cac5db96ccfb48de7857
SHA512 8bbd7b458f2be6e91c46cad8f682e109c7a7317f9ae89e5ce889ae7d4db5775b83d03016f47b56aa75bd5646a50c06ae7adbf2fc8af6b9f8a976f2ce30de3533

memory/3552-54-0x0000000074F50000-0x0000000075501000-memory.dmp

memory/4164-56-0x0000000074F50000-0x0000000075501000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\CryptSvc.exe.log

MD5 a5dcc7c9c08af7dddd82be5b036a4416
SHA1 4f998ca1526d199e355ffb435bae111a2779b994
SHA256 e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA512 56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

C:\Users\Admin\AppData\Roaming\pid.txt

MD5 49cbb75927723efba3b4c108ed4a12f3
SHA1 b8913a5f23d9d6250275ed873d6e45d28d80cb48
SHA256 c260c3bbf884e315f715f00bc052c8f78f1e00fc5c961d039da3d0766711e596
SHA512 c18cb88233cf1f83f58c4757507f6c883ef4c774763a8e772416de82821f74386a0c677ef86d01b6a20282dd45cb2338d94bf38adaeff0942710ec860280855b

C:\Users\Admin\AppData\Roaming\pidloc.txt

MD5 7fbf191ac91dbbb90d3a9372d743c9f0
SHA1 60f07ad84fe3fa6eb30b67fb3269ccccaf300573
SHA256 bebe525a16a20ee8b3867297d45cc6d8703c731080b169d2b4e7f18a06afcdf3
SHA512 47e23e98dedf679399342a06e06a9731e1bf911b1232405ab74f74fa9dd681376acbde3980fdca3771f807f6d92d1a10c39a85fd4eb47c941e4f7a6618d3b11c

memory/4048-76-0x0000000000400000-0x000000000046E000-memory.dmp

memory/4048-83-0x0000000000400000-0x000000000046E000-memory.dmp

memory/4904-85-0x0000000000400000-0x000000000046F000-memory.dmp

memory/4904-95-0x0000000000400000-0x000000000046F000-memory.dmp