Malware Analysis Report

2025-04-14 05:12

Sample ID 250327-wdmknsxqv8
Target f1893996d4f3bb0557b05d946daead381e58321099973579d43e0c00b9692049.zip
SHA256 f1893996d4f3bb0557b05d946daead381e58321099973579d43e0c00b9692049
Tags
discovery persistence masslogger collection spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f1893996d4f3bb0557b05d946daead381e58321099973579d43e0c00b9692049

Threat Level: Known bad

The file f1893996d4f3bb0557b05d946daead381e58321099973579d43e0c00b9692049.zip was found to be: Known bad.

Malicious Activity Summary

discovery persistence masslogger collection spyware stealer

Masslogger family

MassLogger

MassLogger Main payload

Boot or Logon Autostart Execution: Active Setup

Reads user/profile data of web browsers

Executes dropped EXE

Checks computer location settings

Adds Run key to start application

Looks up external IP address via web service

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of SetWindowsHookEx

Uses Task Scheduler COM API

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

outlook_office_path

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

outlook_win_path

Suspicious use of SendNotifyMessage

Modifies registry class

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-03-27 17:48

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-03-27 17:48

Reported

2025-03-27 17:50

Platform

win7-20240903-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

Signatures

Boot or Logon Autostart Execution: Active Setup

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components C:\Windows\explorer.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\VideoLAN\\vlc.exe\"" C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff C:\Windows\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings C:\Windows\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell C:\Windows\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU C:\Windows\explorer.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots C:\Windows\explorer.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\explorer.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\explorer.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2156 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2816 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2816 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2816 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2816 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2776 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2776 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2776 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2776 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 2156 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Windows\explorer.exe

explorer.exe

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

Network

N/A

Files

memory/2156-0-0x000000007497E000-0x000000007497F000-memory.dmp

memory/2156-1-0x0000000000330000-0x000000000048E000-memory.dmp

memory/2156-2-0x0000000074970000-0x000000007505E000-memory.dmp

memory/2156-3-0x000000007497E000-0x000000007497F000-memory.dmp

memory/2156-4-0x0000000074970000-0x000000007505E000-memory.dmp

memory/2156-5-0x0000000004EA0000-0x0000000004F3C000-memory.dmp

memory/2156-7-0x0000000000310000-0x000000000032C000-memory.dmp

memory/2156-8-0x0000000074970000-0x000000007505E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-03-27 17:48

Reported

2025-03-27 17:51

Platform

win10v2004-20250314-en

Max time kernel

106s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main payload

Description Indicator Process Target
N/A N/A N/A N/A

Masslogger family

masslogger

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\VideoLAN\\vlc.exe\"" C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 3528 wrote to memory of 4796 N/A C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe
PID 1724 wrote to memory of 4768 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 1724 wrote to memory of 4768 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 1724 wrote to memory of 4768 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
PID 4768 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"

C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe

"C:\Users\Admin\AppData\Local\Temp\ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 104.26.13.205:80 api.ipify.org tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 104.26.13.205:80 api.ipify.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.179.227:80 c.pki.goog tcp

Files

memory/3528-0-0x000000007467E000-0x000000007467F000-memory.dmp

memory/3528-1-0x00000000004B0000-0x000000000060E000-memory.dmp

memory/3528-2-0x00000000054B0000-0x0000000005A54000-memory.dmp

memory/3528-3-0x0000000004F00000-0x0000000004F92000-memory.dmp

memory/3528-4-0x0000000004EC0000-0x0000000004ECA000-memory.dmp

memory/3528-5-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/3528-6-0x000000007467E000-0x000000007467F000-memory.dmp

memory/3528-7-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/3528-8-0x00000000061A0000-0x000000000623C000-memory.dmp

memory/3528-10-0x0000000005490000-0x00000000054AC000-memory.dmp

memory/4796-11-0x0000000000400000-0x0000000000486000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe

MD5 4c3f4f6690113cb6bfe349a2013eb4da
SHA1 b76c0afa2b28452a5f2dc4c223d8e708268f6959
SHA256 ed88adb1fab6005e7c44cb02346bd417aa47a32b0e14ec5c117156dadd37bc79
SHA512 977939874979cfb90d3d3fd1c014031d4cee24fceb52fceab0868ef773b289c1b3983c70fe9e247b4380514498cf995f763587283f13dbefb3ad5937f097c195

memory/4796-18-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/3528-17-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4796-14-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4768-19-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4768-20-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4796-21-0x0000000005F30000-0x0000000005F96000-memory.dmp

memory/4796-22-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4796-23-0x0000000006890000-0x00000000068E0000-memory.dmp

memory/4796-24-0x0000000006980000-0x0000000006A1C000-memory.dmp

memory/4796-25-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4796-26-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4768-27-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4796-28-0x0000000074670000-0x0000000074E20000-memory.dmp

memory/4768-33-0x0000000074670000-0x0000000074E20000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vlc.exe.log

MD5 7ebe314bf617dc3e48b995a6c352740c
SHA1 538f643b7b30f9231a3035c448607f767527a870
SHA256 48178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8
SHA512 0ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e