analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

201863026.exe

Full analysis: https://app.any.run/tasks/cb831f76-43ed-4033-a4b7-a4f15198cc75
Verdict: Malicious activity
Analysis date: October 05, 2022, 04:06:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

DD7AB429877B349C7904762AA554253C

SHA1:

12E0B742ED53A55FDF4DB984789EEAF5F6A271F5

SHA256:

44CE7D0EF048BDF80D7751B9F28234FB4CD4AD68A04DB60F430DB08315858596

SSDEEP:

3072:IfY/TU9fE9PEtuk/mDT9WvM2qy1KXlpnfyGWooQsBru+:+Ya6Cw9WPCniusdu+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE to view/add/change user profiles

      • cmd.exe (PID: 3400)
      • cmd.exe (PID: 2628)
    • Starts NET.EXE to view/change users localgroup

      • cmd.exe (PID: 3852)
    • Starts CertUtil for decode files

      • cmd.exe (PID: 388)
  • SUSPICIOUS

    • Reads the computer name

      • 201863026.exe (PID: 2848)
      • msiexec.exe (PID: 3192)
    • Checks supported languages

      • cmd.exe (PID: 1936)
      • 201863026.exe (PID: 2848)
      • msiexec.exe (PID: 3192)
      • cmd.exe (PID: 3852)
      • cmd.exe (PID: 3400)
      • cmd.exe (PID: 2628)
      • cmd.exe (PID: 688)
      • cmd.exe (PID: 1708)
      • cmd.exe (PID: 3324)
      • mode.com (PID: 2452)
      • cmd.exe (PID: 388)
      • cmd.exe (PID: 2644)
      • cmd.exe (PID: 1292)
      • cmd.exe (PID: 768)
      • cmd.exe (PID: 188)
      • cmd.exe (PID: 2300)
      • cmd.exe (PID: 2380)
    • Uses WMIC.EXE to obtain a system information

      • cmd.exe (PID: 1936)
    • Starts CMD.EXE for commands execution

      • 201863026.exe (PID: 2848)
      • cmd.exe (PID: 1708)
      • cmd.exe (PID: 388)
      • cmd.exe (PID: 188)
    • Reads the time zone

      • net1.exe (PID: 3332)
    • Application launched itself

      • cmd.exe (PID: 1708)
      • cmd.exe (PID: 388)
      • cmd.exe (PID: 188)
    • Removes files from Windows directory

      • certutil.exe (PID: 1300)
      • certutil.exe (PID: 2268)
      • certutil.exe (PID: 120)
      • certutil.exe (PID: 1936)
      • certutil.exe (PID: 3224)
      • certutil.exe (PID: 3524)
      • certutil.exe (PID: 2444)
      • certutil.exe (PID: 3888)
      • certutil.exe (PID: 3264)
      • certutil.exe (PID: 1176)
      • certutil.exe (PID: 972)
      • certutil.exe (PID: 1988)
      • certutil.exe (PID: 3176)
      • certutil.exe (PID: 2388)
      • certutil.exe (PID: 3496)
      • certutil.exe (PID: 124)
      • certutil.exe (PID: 480)
      • certutil.exe (PID: 2132)
      • certutil.exe (PID: 3728)
      • certutil.exe (PID: 2548)
      • certutil.exe (PID: 2692)
      • certutil.exe (PID: 2044)
      • certutil.exe (PID: 2504)
      • certutil.exe (PID: 904)
      • certutil.exe (PID: 1436)
      • certutil.exe (PID: 3220)
      • certutil.exe (PID: 4044)
    • Creates files in the Windows directory

      • certutil.exe (PID: 1300)
      • certutil.exe (PID: 120)
      • certutil.exe (PID: 2268)
      • certutil.exe (PID: 1936)
      • certutil.exe (PID: 3224)
      • certutil.exe (PID: 2444)
      • certutil.exe (PID: 3524)
      • certutil.exe (PID: 3888)
      • certutil.exe (PID: 1176)
      • certutil.exe (PID: 3264)
      • certutil.exe (PID: 1988)
      • certutil.exe (PID: 972)
      • certutil.exe (PID: 3176)
      • certutil.exe (PID: 2388)
      • certutil.exe (PID: 124)
      • certutil.exe (PID: 3496)
      • certutil.exe (PID: 2132)
      • certutil.exe (PID: 3728)
      • certutil.exe (PID: 480)
      • certutil.exe (PID: 2548)
      • certutil.exe (PID: 2692)
      • certutil.exe (PID: 2044)
      • certutil.exe (PID: 1436)
      • certutil.exe (PID: 904)
      • certutil.exe (PID: 2504)
      • certutil.exe (PID: 3220)
      • certutil.exe (PID: 4044)
    • Starts CertUtil for decode files

      • cmd.exe (PID: 188)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 2300)
    • Changes the desktop background image

      • 201863026.exe (PID: 2848)
  • INFO

    • Checks supported languages

      • WMIC.exe (PID: 1616)
      • WMIC.exe (PID: 3364)
      • WMIC.exe (PID: 1600)
      • WMIC.exe (PID: 3088)
      • WMIC.exe (PID: 2600)
      • WMIC.exe (PID: 2400)
      • WMIC.exe (PID: 2540)
      • WMIC.exe (PID: 3876)
      • WMIC.exe (PID: 3784)
      • WMIC.exe (PID: 2772)
      • WMIC.exe (PID: 2300)
      • net1.exe (PID: 3332)
      • net1.exe (PID: 3412)
      • net.exe (PID: 3076)
      • net.exe (PID: 3200)
      • net1.exe (PID: 1156)
      • net.exe (PID: 3096)
      • cacls.exe (PID: 1596)
      • xcopy.exe (PID: 3604)
      • cacls.exe (PID: 660)
      • certutil.exe (PID: 1300)
      • findstr.exe (PID: 2676)
      • timeout.exe (PID: 3072)
      • certutil.exe (PID: 120)
      • certutil.exe (PID: 1936)
      • findstr.exe (PID: 3076)
      • certutil.exe (PID: 2268)
      • findstr.exe (PID: 1932)
      • findstr.exe (PID: 2220)
      • findstr.exe (PID: 2416)
      • certutil.exe (PID: 3224)
      • certutil.exe (PID: 3524)
      • certutil.exe (PID: 2444)
      • findstr.exe (PID: 3308)
      • findstr.exe (PID: 2044)
      • certutil.exe (PID: 1176)
      • findstr.exe (PID: 468)
      • certutil.exe (PID: 3264)
      • findstr.exe (PID: 1060)
      • certutil.exe (PID: 3888)
      • findstr.exe (PID: 2736)
      • certutil.exe (PID: 1988)
      • certutil.exe (PID: 972)
      • findstr.exe (PID: 3288)
      • certutil.exe (PID: 3176)
      • findstr.exe (PID: 3032)
      • findstr.exe (PID: 3524)
      • certutil.exe (PID: 2388)
      • certutil.exe (PID: 124)
      • certutil.exe (PID: 3496)
      • certutil.exe (PID: 480)
      • certutil.exe (PID: 2132)
      • certutil.exe (PID: 3728)
      • certutil.exe (PID: 2548)
      • certutil.exe (PID: 2044)
      • certutil.exe (PID: 2504)
      • certutil.exe (PID: 1436)
      • certutil.exe (PID: 904)
      • certutil.exe (PID: 2692)
      • certutil.exe (PID: 3220)
      • certutil.exe (PID: 4044)
      • rundll32.exe (PID: 3592)
    • Reads the computer name

      • WMIC.exe (PID: 1616)
      • WMIC.exe (PID: 1600)
      • WMIC.exe (PID: 3364)
      • WMIC.exe (PID: 3088)
      • WMIC.exe (PID: 2600)
      • WMIC.exe (PID: 2400)
      • WMIC.exe (PID: 3876)
      • WMIC.exe (PID: 2300)
      • WMIC.exe (PID: 2540)
      • WMIC.exe (PID: 3784)
      • WMIC.exe (PID: 2772)
      • net1.exe (PID: 3412)
      • net1.exe (PID: 3332)
      • net1.exe (PID: 1156)
      • cacls.exe (PID: 1596)
      • cacls.exe (PID: 660)
      • certutil.exe (PID: 1300)
      • certutil.exe (PID: 120)
      • certutil.exe (PID: 2268)
      • certutil.exe (PID: 1936)
      • certutil.exe (PID: 3224)
      • certutil.exe (PID: 2444)
      • certutil.exe (PID: 3888)
      • certutil.exe (PID: 1176)
      • certutil.exe (PID: 3524)
      • certutil.exe (PID: 1988)
      • certutil.exe (PID: 3264)
      • certutil.exe (PID: 3176)
      • certutil.exe (PID: 972)
      • certutil.exe (PID: 2388)
      • certutil.exe (PID: 124)
      • certutil.exe (PID: 3728)
      • certutil.exe (PID: 480)
      • certutil.exe (PID: 2132)
      • certutil.exe (PID: 2548)
      • certutil.exe (PID: 3496)
      • certutil.exe (PID: 2044)
      • certutil.exe (PID: 2504)
      • certutil.exe (PID: 904)
      • certutil.exe (PID: 2692)
      • certutil.exe (PID: 1436)
      • certutil.exe (PID: 3220)
      • certutil.exe (PID: 4044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2021-Sep-25 21:56:47
Detected languages:
  • English - United States

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 216

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 5
TimeDateStamp: 2021-Sep-25 21:56:47
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
26230
26624
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.41746
.rdata
32768
5018
5120
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.14107
.data
40960
131960
1536
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.11058
.ndata
176128
65536
0
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc
241664
43416
43520
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.75354

Resources

Title
Entropy
Size
Codepage
Language
Type
1
7.81232
41501
UNKNOWN
English - United States
RT_ICON
103
1.51664
20
UNKNOWN
English - United States
RT_GROUP_ICON
105
2.66174
256
UNKNOWN
English - United States
RT_DIALOG
106
2.88094
284
UNKNOWN
English - United States
RT_DIALOG
111
2.48825
96
UNKNOWN
English - United States
RT_DIALOG
1 (#2)
5.28747
841
UNKNOWN
English - United States
RT_MANIFEST

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
80
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 201863026.exe no specs 201863026.exe cmd.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs wmic.exe no specs msiexec.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs net.exe no specs net.exe no specs net.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs cacls.exe no specs xcopy.exe no specs cmd.exe no specs cacls.exe no specs cmd.exe no specs cmd.exe no specs certutil.exe no specs timeout.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs findstr.exe no specs certutil.exe no specs cmd.exe no specs cmd.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs certutil.exe no specs cmd.exe no specs rundll32.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1376"C:\Users\admin\Desktop\201863026.exe" C:\Users\admin\Desktop\201863026.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\201863026.exe
c:\windows\system32\ntdll.dll
2848"C:\Users\admin\Desktop\201863026.exe" C:\Users\admin\Desktop\201863026.exe
Explorer.EXE
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\201863026.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
1936C:\Windows\system32\cmd.exe /c information.batC:\Windows\system32\cmd.exe201863026.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
3221225547
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3364wmic OS get /format:hform C:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1616wmic computersystem get /format:hform C:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1600wmic service where state="running" get caption,name,pathname,state,status,acceptpause,acceptstop,processid,systemname,startname /format:htable C:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2600wmic service where state="stopped" get caption,name,pathname,state,status,acceptpause,acceptstop,processid,systemname,startname /format:htable C:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
3088wmic csproduct list brief /format:htable C:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2400wmic cpu list brief /format:htable C:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2540wmic diskdrive list brief /format:htable C:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ole32.dll
Total events
2 121
Read events
2 111
Write events
10
Delete events
0

Modification events

(PID) Process:(2848) 201863026.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2848) 201863026.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2848) 201863026.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2848) 201863026.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2848) 201863026.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:wallpaper
Value:
C:\Temp\rand.JPG
(PID) Process:(2848) 201863026.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:wallpaperstyle
Value:
6
Executable files
0
Suspicious files
0
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
1936cmd.exeC:\Users\admin\Desktop\USER-PC.htmlhtml
MD5:60282F00674BBF2463E1E54EC642918E
SHA256:F1AC2EE7E237EF9212FC99E8A753F58EE723F7314A462CB20E8596C33BAE54D3
2848201863026.exeC:\Temp\matrix.battext
MD5:0293000D86A840CCC8B3D975C5B3F1F0
SHA256:5FE0ACE5B36EAD6C3FC76C67C4751CC8AD568B4C8C86C1E01869E51AB46001E6
2848201863026.exeC:\Temp\winapply.battext
MD5:A9EDD79D0509E10A12F780A2064D7EEC
SHA256:0C9F0D0194FCDD44C9C11EC9F41F945B34D79F2BC9D605DA49493254B9829B8F
388cmd.exeC:\Users\admin\AppData\Local\Temp\b6rtext
MD5:336D4725B313A8150768A600E2CA9638
SHA256:C1ADC71383A86BBAB2303AD6FB914BC63EA176EE5A43CF0C77D992A1784E8E4F
2848201863026.exeC:\Users\admin\Desktop\loopfile.battext
MD5:62933B06A3D49DB78F36DFFDEBFBE48C
SHA256:D2F97B09462CC4863FA9D6CB8A0B0DCE035B45B7A1E2AE0F04DB63983EA383C2
2644cmd.exeC:\Users\admin\Desktop\b6 ransomware.battext
MD5:77CBC6B6A2865CF4C477DEB058E19936
SHA256:AB7E431B53A62CD2E01200160C37BD888AC0755FAB1DADE4ACCA72B229D1E2B7
2848201863026.exeC:\Temp\rand.JPGimage
MD5:41192B03351DE6DEA01FA56A4AE0D00B
SHA256:49EDD8FA85FB8A6B227B718EDF245CD8E6527457D4773206938F0C9C51562AB0
2848201863026.exeC:\Users\admin\Desktop\information.battext
MD5:F3C20C9F6364A4356B80552657404953
SHA256:0BDB529F76A8E829F9080C39B4707E89F95F935C7126CB8614E3D16032B3C26F
2848201863026.exeC:\Users\admin\Desktop\b6 ransomware.battext
MD5:77CBC6B6A2865CF4C477DEB058E19936
SHA256:AB7E431B53A62CD2E01200160C37BD888AC0755FAB1DADE4ACCA72B229D1E2B7
2628cmd.exeC:\Users\admin\AppData\Local\Temp\info.txttext
MD5:12B47862DDAF9E0B1751A51A63C05887
SHA256:CD4E03ACB3F078230ADBEB8228058F8E12A3E768C0B83BEF9A6DBA00F6677DE3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info