Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 05:29

General

  • Target

    97da3b940784391248a269926d7a1fc1115f403133f77de2750623e6f7bfc330.dll

  • Size

    159KB

  • MD5

    00b7985b67ce3103a463b27a088db1bd

  • SHA1

    8443f0bfc9be9e92e9500fcb3d09fa87aac411e1

  • SHA256

    97da3b940784391248a269926d7a1fc1115f403133f77de2750623e6f7bfc330

  • SHA512

    8b550bf2c5230fb7afad02e716848c8203739ea2d166f4ff89559a0e1cd776faab0459d628fa52c7c4fb8762a25b408c87a94e9879d04f5d1a3f393368dac1c2

  • SSDEEP

    3072:pDPoADAuj34+sqbSFEmjfv2JxhGtBxUYBN46:psAbj3yEmjfvIxhGtBy4N46

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 12 IoCs
  • Gh0st RAT payload 13 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Downloads MZ/PE file 1 IoCs
  • Modifies Windows Firewall 2 TTPs 9 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 64 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 27 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\97da3b940784391248a269926d7a1fc1115f403133f77de2750623e6f7bfc330.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\97da3b940784391248a269926d7a1fc1115f403133f77de2750623e6f7bfc330.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3376
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
          PID:3420
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
          • Downloads MZ/PE file
          • Unexpected DNS network traffic destination
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\WINDOWS\Temp\MpMgSvc.exe
            "C:\WINDOWS\Temp\MpMgSvc.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2232
            • C:\Windows\Temp\Wmicc.exe
              "C:\Windows\Temp\Wmicc.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:7668
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c C:\Windows\Temp\GetPassword.exe >C:\Windows\Temp\PWD.txt
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5672
                • C:\Windows\Temp\GetPassword.exe
                  C:\Windows\Temp\GetPassword.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:7956
          • C:\WINDOWS\Temp\Hooks.exe
            "C:\WINDOWS\Temp\Hooks.exe"
            4⤵
            • Server Software Component: Terminal Services DLL
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5880
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name=Microsoft_ctfmoon dir=in program=C:\Windows\Microsoft.NET\ctfmoon.exe action=allow
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:7012
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name=Microsoft_ctfmoon dir=out program=C:\Windows\Microsoft.NET\ctfmoon.exe action=allow
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:6032
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall set rule name=Microsoft_ctfmoon new enable=yes
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:1356
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name=Microsoft_Dcom dir=in program=C:\Windows\Microsoft.NET\traffmonetizer\traffmonetizer.exe action=allow
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:5192
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name=Microsoft_Dcom dir=out program=C:\Windows\Microsoft.NET\traffmonetizer\traffmonetizer.exe action=allow
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:6960
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall set rule name=Microsoft_Dcom new enable=yes
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:8144
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name=Microsoft_Store dir=in program=C:\WINDOWS\Microsoft.Net\Framework\v3.0\WmiPrvSER.exe action=allow
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:992
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name=Microsoft_Store dir=out program=C:\WINDOWS\Microsoft.Net\Framework\v3.0\WmiPrvSER.exe action=allow
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:5180
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall set rule name=Microsoft_Store new enable=yes
              5⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:7088
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Sleep -s 2;del "C:\WINDOWS\Temp\Hooks.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3640
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
            PID:2352
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k GraphicsPerfSvcsGroup -s GraphicsPerfSvcs
        1⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        PID:5460
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          2⤵
          • Unexpected DNS network traffic destination
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          PID:5448
        • C:\Windows\Microsoft.NET\ctfmoon.exe
          C:\Windows\Microsoft.NET\ctfmoon.exe [email protected] -password=123456Aa. -device-name=Win32 -accept-tos
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:912
        • C:\Windows\Microsoft.NET\traffmonetizer\traffmonetizer.exe
          C:\Windows\Microsoft.NET\traffmonetizer\traffmonetizer.exe
          2⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:6012

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_adkobudg.bvz.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Windows\Microsoft.NET\ctfmoon.exe

        Filesize

        9.1MB

        MD5

        1de26ef85f7218e1df4ed675fa2b05d4

        SHA1

        e5217fa3b50f625d84d5e5c4b66c031f7a2446ae

        SHA256

        fdd762192d351cea051c0170840f1d8d171f334f06313a17eba97cacb5f1e6e1

        SHA512

        ada80a9f97bec76899eccc40c646387a067a201663d4d0f4537af450ea7c92df877f017862634e32e9e2ba08ca6d41806dc03f0dfd7f811ca303b56b1ac17d92

      • C:\Windows\Microsoft.NET\traffmonetizer\Base.dll

        Filesize

        106KB

        MD5

        c3935313bbf380cd8d3cb336a5e3c8e8

        SHA1

        c09f0b894ee5a6a59dea194e94b42fff29b53f38

        SHA256

        4d0409c6db0b0af97f5fc57ebe2248c1632aeb836a5ea1eeaad64f57a4eb662b

        SHA512

        6525f98811cb277fbae75e278fca7997c6a6993b3f3f163a3c98da85055305d7a61917981625f113c448b8a397d3c5a143db2c8b131e5e4395205e34dc7c48a2

      • C:\Windows\Microsoft.NET\traffmonetizer\Microsoft.Bcl.AsyncInterfaces.dll

        Filesize

        20KB

        MD5

        1ee251645b8a54a116d6d06c83a2bd85

        SHA1

        5dbf1534ffbff016cc45559eb5eff3dc4252a522

        SHA256

        075ce79e84041137c78885b3738c1b5a03547d0ae2a79916e844196a9d0ec1db

        SHA512

        9f67fd0566eac2da4253d08697daab427e4e85780615d940f086a88424dcbb0563abae7e4824088e64ef7024c1bb3bbf324f2d07bc7ba55f79e4af3c9ea88e97

      • C:\Windows\Microsoft.NET\traffmonetizer\Microsoft.Diagnostics.Runtime.dll

        Filesize

        490KB

        MD5

        5dfb71a97b10d00dea71f443fdfd732f

        SHA1

        c7d9b0f37bf40a4677e243a4d16454f3475853a2

        SHA256

        d9ecb8cd1ac822a14e65f7c7f5f3fcb262fa23fb7c721a59321bdb467bcbad14

        SHA512

        8e84b1d442e11a5b6c16efe0cd44bc0f27bfd141a7b812ce2e32b3cc0697d8f9b2155bb60ee48934b4a907c2abd181bdcafa5d7bf4ac4dec91120733428d6eba

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Buffers.dll

        Filesize

        20KB

        MD5

        ecdfe8ede869d2ccc6bf99981ea96400

        SHA1

        2f410a0396bc148ed533ad49b6415fb58dd4d641

        SHA256

        accccfbe45d9f08ffeed9916e37b33e98c65be012cfff6e7fa7b67210ce1fefb

        SHA512

        5fc7fee5c25cb2eee19737068968e00a00961c257271b420f594e5a0da0559502d04ee6ba2d8d2aad77f3769622f6743a5ee8dae23f8f993f33fb09ed8db2741

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Collections.Immutable.dll

        Filesize

        184KB

        MD5

        c598080fa777d6e63dfd0370e97ec8f3

        SHA1

        9d1236dcfb3caa07278a6d4ec751798d67d73cc2

        SHA256

        646d3b52a4898078f46534727bdb06ff23b72523441458b9f49ecc315bf3ef5c

        SHA512

        8a5b4afb4363732008c97d53f13ee430401e4a17677af37123da035f15f9e9409a2aeb74ae238379291fd5de07c3cd4e3de2778da5edf83a42649fa5b281cb32

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Memory.dll

        Filesize

        137KB

        MD5

        6fb95a357a3f7e88ade5c1629e2801f8

        SHA1

        19bf79600b716523b5317b9a7b68760ae5d55741

        SHA256

        8e76318e8b06692abf7dab1169d27d15557f7f0a34d36af6463eff0fe21213c7

        SHA512

        293d8c709bc68d2c980a0df423741ce06d05ff757077e63986d34cb6459f9623a024d12ef35a280f50d3d516d98abe193213b9ca71bfde2a9fe8753b1a6de2f0

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Net.Http.dll

        Filesize

        193KB

        MD5

        665e355cbed5fe5f7bebc3cb23e68649

        SHA1

        1c2cefafba48ba7aaab746f660debd34f2f4b14c

        SHA256

        b5d20736f84f335ef4c918a5ba41c3a0d7189397c71b166ccc6c342427a94ece

        SHA512

        5300d39365e84a67010ae4c282d7e05172563119afb84dc1b0610217683c7d110803aef02945034a939262f6a7ecf629b52c0e93c1cd63d52ca7a3b3e607bb7d

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Numerics.Vectors.dll

        Filesize

        113KB

        MD5

        aaa2cbf14e06e9d3586d8a4ed455db33

        SHA1

        3d216458740ad5cb05bc5f7c3491cde44a1e5df0

        SHA256

        1d3ef8698281e7cf7371d1554afef5872b39f96c26da772210a33da041ba1183

        SHA512

        0b14a039ca67982794a2bb69974ef04a7fbee3686d7364f8f4db70ea6259d29640cbb83d5b544d92fa1d3676c7619cd580ff45671a2bb4753ed8b383597c6da8

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Runtime.CompilerServices.Unsafe.dll

        Filesize

        16KB

        MD5

        9a341540899dcc5630886f2d921be78f

        SHA1

        bab44612721c3dc91ac3d9dfca7c961a3a511508

        SHA256

        3cadcb6b8a7335141c7c357a1d77af1ff49b59b872df494f5025580191d1c0d5

        SHA512

        066984c83de975df03eee1c2b5150c6b9b2e852d9caf90cfd956e9f0f7bd5a956b96ea961b26f7cd14c089bc8a27f868b225167020c5eb6318f66e58113efa37

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Text.Encodings.Web.dll

        Filesize

        66KB

        MD5

        e8cdacfd2ef2f4b3d1a8e6d59b6e3027

        SHA1

        9a85d938d8430a73255a65ea002a7709c81a4cf3

        SHA256

        edf13ebf2d45152e26a16b947cd953aeb7a42602fa48e53fd7673934e5acea30

        SHA512

        ee1005270305b614236d68e427263b4b4528ad3842057670fad061867286815577ec7d3ed8176e6683d723f9f592abcbf28d24935ce8a34571ab7f1720e2ffc5

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Text.Json.dll

        Filesize

        347KB

        MD5

        38470ca21414a8827c24d8fe0438e84b

        SHA1

        1c394a150c5693c69f85403f201caa501594b7ab

        SHA256

        2c7435257690ac95dc03b45a236005124097f08519adf3134b1d1ece4190e64c

        SHA512

        079f7320cc2f3b97a5733725d3b13dff17b595465159daabca5a166d39777100e5a2d9af2a75989dfabdb2f29eac0710e16c3bb2660621344b7a63c5dbb87ef8

      • C:\Windows\Microsoft.NET\traffmonetizer\System.Threading.Tasks.Extensions.dll

        Filesize

        25KB

        MD5

        e1e9d7d46e5cd9525c5927dc98d9ecc7

        SHA1

        2242627282f9e07e37b274ea36fac2d3cd9c9110

        SHA256

        4f81ffd0dc7204db75afc35ea4291769b07c440592f28894260eea76626a23c6

        SHA512

        da7ab8c0100e7d074f0e680b28d241940733860dfbdc5b8c78428b76e807f27e44d1c5ec95ee80c0b5098e8c5d5da4d48bce86800164f9734a05035220c3ff11

      • C:\Windows\Microsoft.NET\traffmonetizer\System.ValueTuple.dll

        Filesize

        77KB

        MD5

        8c9424e37a28db7d70e7d52f0df33cf8

        SHA1

        81cd1acb53d493c54c8d56f379d790a901a355ac

        SHA256

        e4774aead2793f440e0ced6c097048423d118e0b6ed238c6fe5b456acb07817f

        SHA512

        cb6364c136f9d07191cf89ea2d3b89e08db0cd5911bf835c32ae81e4d51e0789ddc92d47e80b7ff7e24985890ed29a00b0a391834b43cf11db303cd980d834f4

      • C:\Windows\Microsoft.NET\traffmonetizer\Traffmonetizer.exe

        Filesize

        680KB

        MD5

        2884fdeaa62f29861ce2645dde0040f6

        SHA1

        01a775a431f6e4da49f5c5da2dab74cc4d770021

        SHA256

        2923eacd0c99a2d385f7c989882b7cca83bff133ecf176fdb411f8d17e7ef265

        SHA512

        470ce2cf25d7ee66f4ceb197e218872ea1b865de7029fadb0d41f3324a213b94c668968f20e228e87a879c1f0c13c9827f3b8881820d02e780d567d791ad159f

      • C:\Windows\Microsoft.NET\traffmonetizer\traffmonetizer.exe.config

        Filesize

        18KB

        MD5

        e3f86e44d1997122912dd19c93b4cc51

        SHA1

        55a2abf767061a27d48fc5eda94ba8156add3e81

        SHA256

        8905f68562e02ca9c686f8bb6edde6643c94b2592240c6ed0d40ca380e69e62d

        SHA512

        314f97d7889d22d1086682c2abfcf0bcb753c2103a29127407392fa05dabb69f1528c7b8028aeac48e5fd7daf0fb1e4a367e6d83f7ca73bcea8e7c6e1d1b54d5

      • C:\Windows\Temp\GetPassword.exe

        Filesize

        494KB

        MD5

        5b6a804db0c5733d331eb126048ca73b

        SHA1

        f18c5acae63457ad26565d663467fa5a7fbfbee4

        SHA256

        5bec6b3bc6f8cbda50a8c5195a488cc82d2e00f18ec75640db31b2376a6db9f9

        SHA512

        ba6424051ab9f650967cc2ba428fd6a02ccda8f99d8b8e3f5f321a5e6bbf79a22bfc9cdd582c44980470ebbb7aea1b811fd69aab6bf51466a803c7c722fcde26

      • C:\Windows\Temp\Hooks.exe

        Filesize

        6.8MB

        MD5

        bac8175b9fce575ef751012c729a1d32

        SHA1

        0ff584ee230838ae8fefffb16009104393ec515c

        SHA256

        a35b7570b7818fb47837073b594b4581049edaa087a9e854b5b395abdc7b6773

        SHA512

        608c5bebfa6f0d99bad5a79af48fabdcc5092c27cd631dda31f3dd27fbd1bf5654244cb89014718437a290177f1d47010ddbb85c3737bec3afc11b9173d54663

      • C:\Windows\Temp\MpMgSvc.exe

        Filesize

        3.2MB

        MD5

        3809c59565787ee7398fe9222d4bd669

        SHA1

        68842768c9ae9deb1d1d7ed2b27846c392b47103

        SHA256

        c751d97251cd67604c0256b779fabac87d4ed2d647ce0d830e2a1670cd3616c6

        SHA512

        2f78ad26acfe15f4682b69090704fa8ebb24938c8a58b8d343ef0993e8234897aed53dfcea4119168f915384fe545d2cbb16bc12339d0600dafae06deefc9098

      • C:\Windows\Temp\PWD.txt

        Filesize

        16B

        MD5

        f4ee302afbce0b94cd33c6b3941d19e2

        SHA1

        75f98857186248ac2f9cbd0c3f07d1118b49ee10

        SHA256

        dfb23411a6872447e75541e6b3067026d10ebc8f76f427a5f69d795498e117f9

        SHA512

        ca202ca2caf8a1e9596f1187a82cd02a650aea316c9a6bf58c59a23b4922098fe3720301dbe3268514e977a5964dc746f38c862ce4cdc63573d0e69254ea0e77

      • C:\Windows\Temp\Wmicc.exe

        Filesize

        1.4MB

        MD5

        4935b75f2a23d38527cf3821c9d9dac3

        SHA1

        f17aa56215ab7b90da00f048fe30d39a2d671b5d

        SHA256

        dd2d7b07e9091590ae60b42022956319bbbbd51b457ea214fb475ecc3e9156f8

        SHA512

        348e041104de20b0850b19db1ebb88ae0b65ecd1695f1ade47e099d62da9cec983a1a73e7fc657509b4fc58496784e0c1681bf46265477b75fdfab440c41acbd

      • C:\Windows\Temp\ip.txt

        Filesize

        180KB

        MD5

        ecf5bdc580167402fb0364c166020534

        SHA1

        f11ef0e2c1adf70f5393f8e8abb672291ee06894

        SHA256

        e87bd0d3cc894e14f55667ef97c539161042135f480792815649d0f5d58ec1af

        SHA512

        29acd9098fd9b2f26c24409fb16785b4a824526ea376088363531dfdfe5e85845a190b105c96cfdf9cd1131724a0aa87bf1a34f1eb5225f98369f69b590d728e

      • C:\Windows\Temp\ip.txt

        Filesize

        3KB

        MD5

        a407f4fb7d20b9084d5057181ab01ddd

        SHA1

        ba65561cdcadf05510ba62a1c994f664a4c50fbd

        SHA256

        3def88acbe8273087369b38c0a5923c63f8d2581b57fc813fb90aa96e21aa63c

        SHA512

        16e134c9e724156d1aa539c9ac17c4b995b5371b7c91f5b8bfe477b58de39b70883c276aaf614b114a703b85a8e9d960141c0b7fb38c97e5e728f6771f8969fc

      • C:\Windows\Temp\ip.txt

        Filesize

        7KB

        MD5

        0a45b323944940708d847651f90ee758

        SHA1

        806670d513a017274743ad46cc62f64c7af51394

        SHA256

        ce9be0c746748b64c5187ee1f24fa3f47fdd453440a71187f6d997ae19fdbb5b

        SHA512

        b1459facf9b0bcb28bb677f644a6fee701c0541cd587437b959d630e7173cafb0fb62eda1b38682cf2a2b78d20753542dcd957f6facfdbce838d417fa1015748

      • C:\Windows\Temp\ip.txt

        Filesize

        3KB

        MD5

        2f1ac28cbf69cefc70afdc17cd2ffa7b

        SHA1

        98e3cf07f2b588b2c7dd7539fbd1f590efe5d318

        SHA256

        a1f7023d9c06ae68c24cfc4d28cb9e8f297add683e342ee2531abe4707b81338

        SHA512

        484991db1d04d3fff54554baf379d61521e448db7797704ee94d05ba6ecb18c07950e46259e13cbd9f996418fa1d60c79bb77e547fb393396f3cd58f7cd82fa2

      • C:\Windows\system32\config\systemprofile\AppData\Roaming\traffmonetizer\settings.json

        Filesize

        98B

        MD5

        2e839b7ab87694f72220658502588c41

        SHA1

        b3996f638b1e00b4bdf5cadeab99d05492313f37

        SHA256

        376a0ca610d4de58de3887a8700d3e0f64fdc2123846a4f88876751847aef519

        SHA512

        050fe964fbdfd1a957ef3e8a1c1ce6ada6d5473be890ea318a9720a7c8e42e9fb8afcc723a03ed9deeb3f2ccbff0fe725eb0b831a24e9e4df39b7249da5688a1

      • \??\c:\users\admin\appdata\roaming\graphicsperfsvcs.dll

        Filesize

        14.7MB

        MD5

        a83318068ed77eef71f9d28e4731c179

        SHA1

        347f97b17ccb4f22a4e201009b6145066b600e1d

        SHA256

        89cd66e51f490dba5a818525bab15810604b895cebb2a5bfb4fb670ca229f972

        SHA512

        e790bd6cde5fc3440560d5267f3a50f3ac04ccb123d3b52608579e76877477aa630d94683e84a6cf69ea6cfc862569cc923d216185f19a934797c81eea712fbe

      • memory/2232-13565-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-13562-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-13709-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-13551-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-23-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-13767-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-13553-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-13765-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2232-50-0x0000000000400000-0x0000000000D25000-memory.dmp

        Filesize

        9.1MB

      • memory/2548-0-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/2548-4-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/2548-13579-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/2548-2-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/2548-8-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/2548-3-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/3640-13726-0x0000000006360000-0x00000000063AC000-memory.dmp

        Filesize

        304KB

      • memory/3640-13724-0x0000000005E00000-0x0000000006154000-memory.dmp

        Filesize

        3.3MB

      • memory/3640-13711-0x0000000005480000-0x0000000005AA8000-memory.dmp

        Filesize

        6.2MB

      • memory/3640-13731-0x0000000008790000-0x0000000008D34000-memory.dmp

        Filesize

        5.6MB

      • memory/3640-13730-0x00000000068F0000-0x0000000006912000-memory.dmp

        Filesize

        136KB

      • memory/3640-13712-0x0000000005290000-0x00000000052B2000-memory.dmp

        Filesize

        136KB

      • memory/3640-13729-0x0000000007580000-0x0000000007616000-memory.dmp

        Filesize

        600KB

      • memory/3640-13713-0x0000000005C20000-0x0000000005C86000-memory.dmp

        Filesize

        408KB

      • memory/3640-13710-0x0000000004D70000-0x0000000004DA6000-memory.dmp

        Filesize

        216KB

      • memory/3640-13714-0x0000000005C90000-0x0000000005CF6000-memory.dmp

        Filesize

        408KB

      • memory/3640-13728-0x0000000006830000-0x000000000684A000-memory.dmp

        Filesize

        104KB

      • memory/3640-13727-0x0000000007B60000-0x00000000081DA000-memory.dmp

        Filesize

        6.5MB

      • memory/3640-13725-0x0000000006320000-0x000000000633E000-memory.dmp

        Filesize

        120KB

      • memory/5448-13592-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/5448-13587-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/5448-13588-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/5448-13589-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/5880-13581-0x0000000000400000-0x00000000012FE000-memory.dmp

        Filesize

        15.0MB

      • memory/5880-13586-0x0000000000400000-0x00000000012FE000-memory.dmp

        Filesize

        15.0MB

      • memory/6012-13748-0x0000026BA6FA0000-0x0000026BA6FAA000-memory.dmp

        Filesize

        40KB

      • memory/6012-13756-0x0000026BA7500000-0x0000026BA751E000-memory.dmp

        Filesize

        120KB

      • memory/6012-13754-0x0000026BA74E0000-0x0000026BA74F4000-memory.dmp

        Filesize

        80KB

      • memory/6012-13760-0x0000026BA7470000-0x0000026BA747A000-memory.dmp

        Filesize

        40KB

      • memory/6012-13752-0x0000026BA73C0000-0x0000026BA73C8000-memory.dmp

        Filesize

        32KB

      • memory/6012-13758-0x0000026BBFED0000-0x0000026BBFF02000-memory.dmp

        Filesize

        200KB

      • memory/6012-13762-0x0000026BBFE50000-0x0000026BBFE5A000-memory.dmp

        Filesize

        40KB

      • memory/6012-13750-0x0000026BA73E0000-0x0000026BA73F6000-memory.dmp

        Filesize

        88KB

      • memory/6012-13746-0x0000026BA7420000-0x0000026BA7446000-memory.dmp

        Filesize

        152KB

      • memory/6012-13743-0x0000026BA7480000-0x0000026BA74DA000-memory.dmp

        Filesize

        360KB

      • memory/6012-13740-0x0000026BA6FC0000-0x0000026BA6FDE000-memory.dmp

        Filesize

        120KB

      • memory/6012-13770-0x0000026BC25A0000-0x0000026BC261E000-memory.dmp

        Filesize

        504KB

      • memory/6012-13772-0x0000026BC2520000-0x0000026BC2552000-memory.dmp

        Filesize

        200KB

      • memory/6012-13738-0x0000026BA6A60000-0x0000026BA6B0C000-memory.dmp

        Filesize

        688KB