General Info

File name

142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f

Full analysis
https://app.any.run/tasks/7fa2f052-0fce-4275-a24f-3ac46d63dc65
Verdict
Malicious activity
Analysis date
3/14/2019, 16:22:57
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:

trojan

loader

rat

azorult

stop

djvu

ransomware

Indicators:

MIME:
application/x-dosexec
File info:
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5

da39c203e777cb787efc6ad1f1fc52a8

SHA1

27daab576b1d353a4f00cc63d32ad100e1bc288d

SHA256

142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f

SSDEEP

6144:JV2kCJwG+JdOWUYrxy/ThxrrmXiRPs408JFcBf2cjDre6+uMXnm8MZIoEDyrv3yq:fowG2dOYrxy/ThsgPlbKmuM3mFqbhq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
240 seconds
Additional time used
180 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Connects to CnC server
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1892)
  • 5.exe (PID: 2580)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)
Application was dropped or rewritten from another process
  • updatewin.exe (PID: 3396)
  • updatewin2.exe (PID: 2904)
  • 5.exe (PID: 2580)
  • 4.exe (PID: 3824)
Loads the Task Scheduler COM API
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 4052)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 2984)
Downloads executable files from the Internet
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)
AZORULT was detected
  • 5.exe (PID: 2580)
Changes the autorun value in the registry
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 2984)
Application launched itself
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 4052)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1892)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 2984)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 3728)
Executable content was dropped or overwritten
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 2984)
Uses ICACLS.EXE to modify access control list
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 2984)
Creates files in the user directory
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 2984)
Creates files in the program directory
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)
Changes tracing settings of the file or console
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 2984)
Application was crashed
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1892)
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)
Dropped object may contain Bitcoin addresses
  • 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe (PID: 1028)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Static information

TRiD
.exe
|   UPX compressed Win32 Executable (64.2%)
.dll
|   Win32 Dynamic Link Library (generic) (15.6%)
.exe
|   Win32 Executable (generic) (10.6%)
.exe
|   Generic Win/DOS Executable (4.7%)
.exe
|   DOS Executable Generic (4.7%)
EXIF
EXE
MachineType:
Intel 386 or later, and compatibles
TimeStamp:
2018:02:14 16:40:06+01:00
PEType:
PE32
LinkerVersion:
9
CodeSize:
311296
InitializedDataSize:
28672
UninitializedDataSize:
180224
EntryPoint:
0x77fa0
OSVersion:
5
ImageVersion:
null
SubsystemVersion:
5
Subsystem:
Windows GUI
Summary
Architecture:
IMAGE_FILE_MACHINE_I386
Subsystem:
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date:
14-Feb-2018 15:40:06
DOS Header
Magic number:
MZ
Bytes on last page of file:
0x0090
Pages in file:
0x0003
Relocations:
0x0000
Size of header:
0x0004
Min extra paragraphs:
0x0000
Max extra paragraphs:
0xFFFF
Initial SS value:
0x0000
Initial SP value:
0x00B8
Checksum:
0x0000
Initial IP value:
0x0000
Initial CS value:
0x0000
Overlay number:
0x0000
OEM identifier:
0x0000
OEM information:
0x0000
Address of NE header:
0x000000F0
PE Headers
Signature:
PE
Machine:
IMAGE_FILE_MACHINE_I386
Number of sections:
3
Time date stamp:
14-Feb-2018 15:40:06
Pointer to Symbol Table:
0x00000000
Number of symbols:
0
Size of Optional Header:
0x00E0
Characteristics
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_RELOCS_STRIPPED
Sections
Name Virtual Address Virtual Size Raw Size Charateristics Entropy
UPX0 0x00001000 0x0002C000 0x00000000 IMAGE_SCN_CNT_UNINITIALIZED_DATA,IMAGE_SCN_MEM_EXECUTE,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 0
UPX1 0x0002D000 0x0004C000 0x0004B200 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_EXECUTE,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 7.69819
.rsrc 0x00079000 0x00007000 0x00006E00 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 5.60784
Resources

No resources.

Imports
    ADVAPI32.dll

    GDI32.dll

    KERNEL32.DLL

    MSIMG32.dll

    USER32.dll

    WINSPOOL.DRV

Exports

    No exports.

Screenshots

Processes

Total processes
52
Monitored processes
14
Malicious processes
4
Suspicious processes
0

Behavior graph

+
drop and start start download and start download and start download and start download and start 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe icacls.exe no specs 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe updatewin2.exe no specs updatewin.exe no specs 4.exe no specs #AZORULT 5.exe 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2984
CMD
"C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe"
Path
C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\icacls.exe
c:\windows\system32\clbcatq.dll
c:\windows\system32\taskschd.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\propsys.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\devrtl.dll

PID
2868
CMD
icacls "C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd" /deny *S-1-1-0:(OI)(CI)(DE,DC)
Path
C:\Windows\system32\icacls.exe
Indicators
No indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\icacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll

PID
1028
CMD
"C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --Admin IsNotAutoStart IsNotTask
Path
C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\taskschd.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\propsys.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\shdocvw.dll
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin2.exe
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin.exe
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\4.exe
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\5.exe

PID
4052
CMD
"C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --ForNetRes "RDAFNeO8PH6NVwY4kJoTYFdbELuBUFNbBzaaeAt2" upOacGl1yOz9XbrhjX9UR2M0j8i03YwVB0pXr1t1 IsNotAutoStart IsNotTask
Path
C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\taskschd.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\drprov.dll
c:\windows\system32\winsta.dll
c:\windows\system32\ntlanman.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll

PID
676
CMD
"C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --Service 1028 "RDAFNeO8PH6NVwY4kJoTYFdbELuBUFNbBzaaeAt2" upOacGl1yOz9XbrhjX9UR2M0j8i03YwVB0pXr1t1
Path
C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll

PID
2904
CMD
"C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin2.exe"
Path
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin2.exe
Indicators
No indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\msvcr100.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll

PID
3396
CMD
"C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin.exe"
Path
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin.exe
Indicators
No indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcr100.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll

PID
3824
CMD
"C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\4.exe"
Path
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\4.exe
Indicators
No indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\4.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll

PID
2580
CMD
"C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\5.exe"
Path
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\5.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\295468c7-4fa7-4f8f-81a3-87c91a457abe\5.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcr100.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\crtdll.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\iertutil.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll

PID
3540
CMD
"C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --Service 4052 "RDAFNeO8PH6NVwY4kJoTYFdbELuBUFNbBzaaeAt2" upOacGl1yOz9XbrhjX9UR2M0j8i03YwVB0pXr1t1
Path
C:\Users\admin\AppData\Local\Temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\temp\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll

PID
1892
CMD
C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe --Task
Path
C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\apphelp.dll

PID
3728
CMD
"C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --ForNetRes "RDAFNeO8PH6NVwY4kJoTYFdbELuBUFNbBzaaeAt2" upOacGl1yOz9XbrhjX9UR2M0j8i03YwVB0pXr1t1 IsNotAutoStart IsTask
Path
C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\drprov.dll
c:\windows\system32\winsta.dll
c:\windows\system32\ntlanman.dll
c:\windows\system32\davclnt.dll
c:\windows\system32\davhlpr.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
c:\windows\system32\srvcli.dll

PID
3852
CMD
"C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --Service 1892 "RDAFNeO8PH6NVwY4kJoTYFdbELuBUFNbBzaaeAt2" upOacGl1yOz9XbrhjX9UR2M0j8i03YwVB0pXr1t1
Path
C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll

PID
3360
CMD
"C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --Service 3728 "RDAFNeO8PH6NVwY4kJoTYFdbELuBUFNbBzaaeAt2" upOacGl1yOz9XbrhjX9UR2M0j8i03YwVB0pXr1t1
Path
C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
Indicators
Parent process
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\mpr.dll
c:\windows\system32\wininet.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\winmm.dll
c:\windows\system32\shell32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\msvcr100.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\version.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\psapi.dll

Registry activity

Total events
1209
Read events
1034
Write events
175
Delete events
0

Modification events

PID
Process
Operation
Key
Name
Value
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
EnableFileTracing
0
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
EnableConsoleTracing
0
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
FileTracingMask
4294901760
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
ConsoleTracingMask
4294901760
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
MaxFileSize
1048576
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
FileDirectory
%windir%\tracing
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
EnableFileTracing
0
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
EnableConsoleTracing
0
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
FileTracingMask
4294901760
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
ConsoleTracingMask
4294901760
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
MaxFileSize
1048576
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
FileDirectory
%windir%\tracing
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
4600000069000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
SysHelper
"C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe" --AutoStart
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
4052
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
4052
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
4052
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
4052
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
4052
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
676
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
676
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
460000006C000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
676
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
676
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
676
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASAPI32
EnableFileTracing
0
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASAPI32
EnableConsoleTracing
0
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASAPI32
FileTracingMask
4294901760
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASAPI32
ConsoleTracingMask
4294901760
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASAPI32
MaxFileSize
1048576
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASAPI32
FileDirectory
%windir%\tracing
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASMANCS
EnableFileTracing
0
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASMANCS
EnableConsoleTracing
0
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASMANCS
FileTracingMask
4294901760
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASMANCS
ConsoleTracingMask
4294901760
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASMANCS
MaxFileSize
1048576
2580
5.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\5_RASMANCS
FileDirectory
%windir%\tracing
2580
5.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2580
5.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2580
5.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2580
5.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3540
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
3540
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
3540
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3540
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3540
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
1892
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
1892
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
460000006F000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
1892
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
1892
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
1892
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
3728
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
3728
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
3728
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3728
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3728
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
3852
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
3852
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
4600000071000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
3852
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3852
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3852
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
3360
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
3360
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
4600000072000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
3360
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3360
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3360
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US

Files activity

Executable files
5
Suspicious files
1
Text files
20
Unknown types
1

Dropped files

PID
Process
Filename
Type
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\5.exe
executable
MD5: d0e483e60acd942f4c398678cbb36b0c
SHA256: 4321c83a3271d38f170094c2abfc4db4fa60a83f417805f9c4139fdb8fcd1483
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin.exe
executable
MD5: e3083483121cd288264f8c5624fb2cd1
SHA256: 114ccacb7ca57c01f3540611fdf49e68416544da8d8077f5896434a4b71b01dd
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\updatewin2.exe
executable
MD5: 996ba35165bb62473d2a6743a5200d45
SHA256: 5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\3ce599bf-91d7-4b36-bb0a-31341e5936fd\142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
executable
MD5: da39c203e777cb787efc6ad1f1fc52a8
SHA256: 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\295468c7-4fa7-4f8f-81a3-87c91a457abe\4.exe
executable
MD5: 76d9c9d7a779005f6caeaa72dbdde445
SHA256: b61991e6b19229de40323d7e15e1b710a9e7f5fafe5d0ebdfc08918e373967d3
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\Public\Documents\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\config.sys
––
MD5:  ––
SHA256:  ––
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\autoexec.bat
––
MD5:  ––
SHA256:  ––
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\Default\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\Administrator\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Recovery\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\Oracle\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\Public\Favorites\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\Skype\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\Microsoft\Windows\Start Menu\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\qemu-ga\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\Microsoft\Windows\Templates\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\Microsoft Help\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Config.Msi\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\ProgramData\Adobe\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\_readme.txt
text
MD5: c104ba5f6a79bd739b6b3ce99e02f5a1
SHA256: 5220f3330ce3eecaada0d22495a037f6d019937a88adcbf69ef6dcd1103c698a
3540
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
676
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
4052
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
3360
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\5[1].exe
––
MD5:  ––
SHA256:  ––
3852
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\4[1].exe
––
MD5:  ––
SHA256:  ––
1892
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\updatewin[1].exe
––
MD5:  ––
SHA256:  ––
2904
updatewin2.exe
C:\Windows\System32\drivers\etc\hosts
text
MD5: 360d265eddea8679c434a205f7ade7ad
SHA256: 5a1597c0d29dd475e33cd8889d7d848037a8c17bad0f3daa022fb889e0db7ead
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\config.sys.kroput1
text
MD5: 625a222199c3820da5f14f19ae86807f
SHA256: 1f6443c924ad2f6054ab81d86722b2b3702e9ceaf2e4dec875a55099f3b3c820
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\updatewin2[1].exe
––
MD5:  ––
SHA256:  ––
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––
2984
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.dat
dat
MD5: d7a950fefd60dbaa01df2d85fefb3862
SHA256: 75d0b1743f61b76a35b1fedd32378837805de58d79fa950cb6e8164bfa72073a
1028
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\autoexec.bat.kroput1
binary
MD5: f43a60abd086e58016b53f20dbd3014e
SHA256: ef49765c5c3609d45fc8d2d2992410023b2e865e63dda739ee140031ca4b0835
3728
142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\geo[1].json
––
MD5:  ––
SHA256:  ––

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
14
TCP/UDP connections
14
DNS requests
7
Threats
32

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 62.173.139.203:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D RU
html
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 62.173.139.203:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D RU
html
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 62.173.139.203:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D RU
html
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 62.173.139.203:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D RU
html
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 200 84.54.37.105:80 http://ymad.ug/tesptc/ruletka/updatewin2.exe unknown
executable
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 200 84.54.37.105:80 http://ymad.ug/tesptc/ruletka/updatewin.exe unknown
executable
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 84.54.37.105:80 http://ymad.ug/tesptc/ruletka/3.exe unknown
html
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 200 84.54.37.105:80 http://ymad.ug/tesptc/ruletka/4.exe unknown
executable
malicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 200 84.54.37.105:80 http://ymad.ug/tesptc/ruletka/5.exe unknown
executable
malicious
2580 5.exe POST 200 84.54.37.105:80 http://ymad.ug/1/index.php unknown
binary
text
malicious
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 84.54.37.105:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D unknown
html
malicious
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 84.54.37.105:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D unknown
html
malicious
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 84.54.37.105:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D unknown
html
malicious
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe GET 404 84.54.37.105:80 http://loot.ug/SdhhwuudjHsdywYUgaksd83462ASdhiu3ASdhyruletkaold/get.php?pid=2485E9F082250E269EA0EF635E0D382D unknown
html
malicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2984 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 62.173.139.203:80 JSC Internet-Cosmos RU suspicious
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 84.54.37.105:80 –– malicious
4052 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
676 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
2580 5.exe 84.54.37.105:80 –– malicious
3540 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 84.54.37.105:80 –– malicious
3728 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
3852 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown
3360 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe 77.123.139.189:443 Volia UA unknown

DNS requests

Domain IP Reputation
api.2ip.ua 77.123.139.189
unknown
ymad.ug 84.54.37.105
malicious
loot.ug 62.173.139.203
malicious

Threats

PID Process Class Message
–– –– A Network Trojan was detected ET POLICY External IP Address Lookup DNS Query
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET CURRENT_EVENTS Potential Dridex.Maldoc Minimal Executable Request
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET CURRENT_EVENTS Potential Dridex.Maldoc Minimal Executable Request
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET TROJAN Single char EXE direct download likely trojan (multiple families)
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET CURRENT_EVENTS Potential Dridex.Maldoc Minimal Executable Request
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET TROJAN Single char EXE direct download likely trojan (multiple families)
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET CURRENT_EVENTS Potential Dridex.Maldoc Minimal Executable Request
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET TROJAN Single char EXE direct download likely trojan (multiple families)
1028 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected ET CURRENT_EVENTS Potential Dridex.Maldoc Minimal Executable Request
–– –– A Network Trojan was detected ET POLICY External IP Address Lookup DNS Query
2580 5.exe A Network Trojan was detected MALWARE [PTsecurity] AZORult.Stealer HTTP Header
2580 5.exe A Network Trojan was detected MALWARE [PTsecurity] AZORult Request
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc
1892 142f94621ae4caded5ac5a6ce21f9a1cafc4937e5596128849c8f96ea3b7c93f.exe A Network Trojan was detected MALWARE [PTsecurity] Trojan-PSW.Win32.Coins.nrc

9 ETPRO signatures available at the full report

Debug output strings

No debug info.