Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2022 19:00

General

  • Target

    521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe

  • Size

    12.7MB

  • MD5

    2c5d99dfc22e3c7c13abd40ef29082a6

  • SHA1

    2eae7f57966c4409cfecda611ddb41e3d1da8147

  • SHA256

    521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec

  • SHA512

    21af954bb927cd6548f20333b582c130fa3e4f6a253318b3aec66fe8628dbe50a7ecdc729935f5a215a3ac2027429d87a58fea9a0f2b93e5c477cc5a3fd037fc

  • SSDEEP

    196608:fmQDIJzN0rl/RNfrOzDzRgIurg8dCMZqWlggN2:eQO0rl/RRSgIurgjyGgN2

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Detect Neshta payload 8 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe
    "C:\Users\Admin\AppData\Local\Temp\521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe
      "C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 564
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:268
    • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:960
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe"
        3⤵
        • Executes dropped EXE
        PID:836
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Czvmmniarhsx.vbs"
        3⤵
          PID:1364
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:556
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1108
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Fiswjsizjcjynjqomep.vbs"
          3⤵
            PID:1708
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1704
          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
            "C:\Users\Admin\AppData\Local\Temp\Windows Security Services" Help.exe
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of FindShellTrayWindow
            PID:1184
            • C:\Windows\SysWOW64\help.exe
              "C:\Windows\System32\help.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1708
        • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe
          "C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1936
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1136
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Pblsxziib.vbs"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1040
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1620
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Pblsxziib.vbs"
            3⤵
              PID:288
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Rtlieujwqeasnagwindows update.vbs"
                4⤵
                  PID:1244
              • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
                "C:\Users\Admin\AppData\Local\Temp\Windows Security Services" Update.exe
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of FindShellTrayWindow
                PID:2000
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
            1⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1916

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe

            Filesize

            11.2MB

            MD5

            fb40ba1b494af4057ab259bba5f33fe6

            SHA1

            b872393a07d3949947a41871132b736c00c771bb

            SHA256

            40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

            SHA512

            f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

          • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe

            Filesize

            11.2MB

            MD5

            fb40ba1b494af4057ab259bba5f33fe6

            SHA1

            b872393a07d3949947a41871132b736c00c771bb

            SHA256

            40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

            SHA512

            f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

          • C:\Users\Admin\AppData\Local\Temp\Pblsxziib.vbs

            Filesize

            117B

            MD5

            a2bde8651257c1619a01520a092e3871

            SHA1

            0b56111496c724038b00222639658856962c7ab7

            SHA256

            ff5ad6b32f7c48563c4c2686cdd55b5005e729da4b932dc0e7689aa7c182e0df

            SHA512

            dbf9c9141c1d2df2905b8ad8169e33e7d8328dfd7f19119163601b5f7a06b380f7836fe0d276929d0fb40e29337a28f5ae6b1a8bcd115e10dac03ec3317e525b

          • C:\Users\Admin\AppData\Local\Temp\Rtlieujwqeasnagwindows update.vbs

            Filesize

            614KB

            MD5

            b14587cd6b30dea73f73d6138ea9d259

            SHA1

            e289a674f9b1138c1b8f392ec752c912800be0cc

            SHA256

            f5359df2aaa02fbfae540934f3e8f8a2ab362f7ee92dda536846afb67cea1b02

            SHA512

            5ac61b9eb9fbdca73e6ecfdb59e199419de0feb57f77652d8fbfebd543450fde593d375f76b5eb9a9bcd6f6c1dd01298dc1dc55f8e9844333b94ac49a3755f86

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe

            Filesize

            518KB

            MD5

            8a20ca605ca1ce7803ffb9e2219d5206

            SHA1

            88f2d6daf773b62d7913acce676b72b0818c2e08

            SHA256

            2c8aa2ce1b5b818d7a66f24cbb30d664d5618af94248ebf9c55e713c1f97d162

            SHA512

            0e4abf37ed5b528712662bf03bd4afb384fba9448d51a26cce03cb68cce4e018f5b295bea7b137146814fbe891e46348034e07c36b6ad47faf18b79ad198b348

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe

            Filesize

            518KB

            MD5

            8a20ca605ca1ce7803ffb9e2219d5206

            SHA1

            88f2d6daf773b62d7913acce676b72b0818c2e08

            SHA256

            2c8aa2ce1b5b818d7a66f24cbb30d664d5618af94248ebf9c55e713c1f97d162

            SHA512

            0e4abf37ed5b528712662bf03bd4afb384fba9448d51a26cce03cb68cce4e018f5b295bea7b137146814fbe891e46348034e07c36b6ad47faf18b79ad198b348

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe

            Filesize

            489KB

            MD5

            7e805a295cc926c83de5913878219200

            SHA1

            ade9551bcaf138334054c6d16ae928bd107144a3

            SHA256

            afadf913b2d2a4caacc2b893c049b75766596efb4adfedbf217f618d4e4a8eb5

            SHA512

            18115735c618c5d44f1ebdfd2e8d455bc0f611481f3a652510abeca1b3c4829c4189aebe9d570359ab0b1b13574727ae3641db66080e43cb9a6b281bfcc6634f

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe

            Filesize

            489KB

            MD5

            7e805a295cc926c83de5913878219200

            SHA1

            ade9551bcaf138334054c6d16ae928bd107144a3

            SHA256

            afadf913b2d2a4caacc2b893c049b75766596efb4adfedbf217f618d4e4a8eb5

            SHA512

            18115735c618c5d44f1ebdfd2e8d455bc0f611481f3a652510abeca1b3c4829c4189aebe9d570359ab0b1b13574727ae3641db66080e43cb9a6b281bfcc6634f

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • C:\Users\Admin\AppData\Local\Temp\_Czvmmniarhsx.vbs

            Filesize

            181B

            MD5

            f1502081d1172131e3d33d384d1adb56

            SHA1

            85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

            SHA256

            e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

            SHA512

            5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

          • C:\Users\Admin\AppData\Local\Temp\_Fiswjsizjcjynjqomep.vbs

            Filesize

            181B

            MD5

            f1502081d1172131e3d33d384d1adb56

            SHA1

            85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

            SHA256

            e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

            SHA512

            5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

          • C:\Users\Admin\AppData\Local\Temp\_Pblsxziib.vbs

            Filesize

            181B

            MD5

            f1502081d1172131e3d33d384d1adb56

            SHA1

            85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

            SHA256

            e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

            SHA512

            5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            53695b8ad30b18be2f850291b44d9d43

            SHA1

            d4cde997530a25b80078f572f19eb97c3ea662f0

            SHA256

            78fa0b9d7ada86e62c327f44e29851049ada91e634e3b27f24cb2eddf9bf80e0

            SHA512

            e30e3167f586ba6d1b6eaf138b1aa5fd3f32b91703294ad1750419d4b68c798cf7e4284b577c3313ed863c62ad6989bf05e4a7950dc33727df520195f953fb7b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            53695b8ad30b18be2f850291b44d9d43

            SHA1

            d4cde997530a25b80078f572f19eb97c3ea662f0

            SHA256

            78fa0b9d7ada86e62c327f44e29851049ada91e634e3b27f24cb2eddf9bf80e0

            SHA512

            e30e3167f586ba6d1b6eaf138b1aa5fd3f32b91703294ad1750419d4b68c798cf7e4284b577c3313ed863c62ad6989bf05e4a7950dc33727df520195f953fb7b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            53695b8ad30b18be2f850291b44d9d43

            SHA1

            d4cde997530a25b80078f572f19eb97c3ea662f0

            SHA256

            78fa0b9d7ada86e62c327f44e29851049ada91e634e3b27f24cb2eddf9bf80e0

            SHA512

            e30e3167f586ba6d1b6eaf138b1aa5fd3f32b91703294ad1750419d4b68c798cf7e4284b577c3313ed863c62ad6989bf05e4a7950dc33727df520195f953fb7b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            53695b8ad30b18be2f850291b44d9d43

            SHA1

            d4cde997530a25b80078f572f19eb97c3ea662f0

            SHA256

            78fa0b9d7ada86e62c327f44e29851049ada91e634e3b27f24cb2eddf9bf80e0

            SHA512

            e30e3167f586ba6d1b6eaf138b1aa5fd3f32b91703294ad1750419d4b68c798cf7e4284b577c3313ed863c62ad6989bf05e4a7950dc33727df520195f953fb7b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            53695b8ad30b18be2f850291b44d9d43

            SHA1

            d4cde997530a25b80078f572f19eb97c3ea662f0

            SHA256

            78fa0b9d7ada86e62c327f44e29851049ada91e634e3b27f24cb2eddf9bf80e0

            SHA512

            e30e3167f586ba6d1b6eaf138b1aa5fd3f32b91703294ad1750419d4b68c798cf7e4284b577c3313ed863c62ad6989bf05e4a7950dc33727df520195f953fb7b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            53695b8ad30b18be2f850291b44d9d43

            SHA1

            d4cde997530a25b80078f572f19eb97c3ea662f0

            SHA256

            78fa0b9d7ada86e62c327f44e29851049ada91e634e3b27f24cb2eddf9bf80e0

            SHA512

            e30e3167f586ba6d1b6eaf138b1aa5fd3f32b91703294ad1750419d4b68c798cf7e4284b577c3313ed863c62ad6989bf05e4a7950dc33727df520195f953fb7b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            53695b8ad30b18be2f850291b44d9d43

            SHA1

            d4cde997530a25b80078f572f19eb97c3ea662f0

            SHA256

            78fa0b9d7ada86e62c327f44e29851049ada91e634e3b27f24cb2eddf9bf80e0

            SHA512

            e30e3167f586ba6d1b6eaf138b1aa5fd3f32b91703294ad1750419d4b68c798cf7e4284b577c3313ed863c62ad6989bf05e4a7950dc33727df520195f953fb7b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe

            Filesize

            518KB

            MD5

            8a20ca605ca1ce7803ffb9e2219d5206

            SHA1

            88f2d6daf773b62d7913acce676b72b0818c2e08

            SHA256

            2c8aa2ce1b5b818d7a66f24cbb30d664d5618af94248ebf9c55e713c1f97d162

            SHA512

            0e4abf37ed5b528712662bf03bd4afb384fba9448d51a26cce03cb68cce4e018f5b295bea7b137146814fbe891e46348034e07c36b6ad47faf18b79ad198b348

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • \??\PIPE\srvsvc

            MD5

            d41d8cd98f00b204e9800998ecf8427e

            SHA1

            da39a3ee5e6b4b0d3255bfef95601890afd80709

            SHA256

            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

            SHA512

            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

          • \Users\Admin\AppData\Local\Temp\DangerousRAT.exe

            Filesize

            11.2MB

            MD5

            fb40ba1b494af4057ab259bba5f33fe6

            SHA1

            b872393a07d3949947a41871132b736c00c771bb

            SHA256

            40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

            SHA512

            f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

          • \Users\Admin\AppData\Local\Temp\DangerousRAT.exe

            Filesize

            11.2MB

            MD5

            fb40ba1b494af4057ab259bba5f33fe6

            SHA1

            b872393a07d3949947a41871132b736c00c771bb

            SHA256

            40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

            SHA512

            f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

          • \Users\Admin\AppData\Local\Temp\DangerousRAT.exe

            Filesize

            11.2MB

            MD5

            fb40ba1b494af4057ab259bba5f33fe6

            SHA1

            b872393a07d3949947a41871132b736c00c771bb

            SHA256

            40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

            SHA512

            f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

          • \Users\Admin\AppData\Local\Temp\DangerousRAT.exe

            Filesize

            11.2MB

            MD5

            fb40ba1b494af4057ab259bba5f33fe6

            SHA1

            b872393a07d3949947a41871132b736c00c771bb

            SHA256

            40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

            SHA512

            f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

          • \Users\Admin\AppData\Local\Temp\DangerousRAT.exe

            Filesize

            11.2MB

            MD5

            fb40ba1b494af4057ab259bba5f33fe6

            SHA1

            b872393a07d3949947a41871132b736c00c771bb

            SHA256

            40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

            SHA512

            f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

          • \Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • \Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • \Users\Admin\AppData\Local\Temp\Windows Security Services.exe

            Filesize

            468KB

            MD5

            b0a2c3ad7d88f8928f7e1fce28223228

            SHA1

            2d53080eedf02ebc1c87f33b2bf51e60071863e0

            SHA256

            4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

            SHA512

            b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

          • memory/268-75-0x0000000000000000-mapping.dmp

          • memory/288-116-0x0000000000000000-mapping.dmp

          • memory/556-83-0x0000000000000000-mapping.dmp

          • memory/556-89-0x000000006E760000-0x000000006ED0B000-memory.dmp

            Filesize

            5.7MB

          • memory/556-92-0x000000006E760000-0x000000006ED0B000-memory.dmp

            Filesize

            5.7MB

          • memory/556-88-0x000000006E760000-0x000000006ED0B000-memory.dmp

            Filesize

            5.7MB

          • memory/836-151-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/836-154-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/836-176-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/836-178-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/836-166-0x0000000000425F9E-mapping.dmp

          • memory/836-162-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/836-157-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/836-152-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/956-59-0x0000000000000000-mapping.dmp

          • memory/956-112-0x0000000000D30000-0x0000000000D74000-memory.dmp

            Filesize

            272KB

          • memory/956-148-0x0000000000AE0000-0x0000000000B04000-memory.dmp

            Filesize

            144KB

          • memory/956-72-0x0000000075771000-0x0000000075773000-memory.dmp

            Filesize

            8KB

          • memory/956-68-0x0000000001190000-0x000000000120C000-memory.dmp

            Filesize

            496KB

          • memory/960-106-0x000000006E0C0000-0x000000006E66B000-memory.dmp

            Filesize

            5.7MB

          • memory/960-113-0x000000006E0C0000-0x000000006E66B000-memory.dmp

            Filesize

            5.7MB

          • memory/960-95-0x0000000000000000-mapping.dmp

          • memory/1040-114-0x0000000000000000-mapping.dmp

          • memory/1108-110-0x000000006E0C0000-0x000000006E66B000-memory.dmp

            Filesize

            5.7MB

          • memory/1108-107-0x000000006E0C0000-0x000000006E66B000-memory.dmp

            Filesize

            5.7MB

          • memory/1108-97-0x0000000000000000-mapping.dmp

          • memory/1136-96-0x0000000000000000-mapping.dmp

          • memory/1136-108-0x000000006E0C0000-0x000000006E66B000-memory.dmp

            Filesize

            5.7MB

          • memory/1136-105-0x000000006E0C0000-0x000000006E66B000-memory.dmp

            Filesize

            5.7MB

          • memory/1184-165-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1184-158-0x000000000043064E-mapping.dmp

          • memory/1184-155-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1184-140-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1184-134-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1184-135-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1184-174-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1184-145-0x0000000000400000-0x0000000000436000-memory.dmp

            Filesize

            216KB

          • memory/1244-129-0x0000000000000000-mapping.dmp

          • memory/1248-111-0x0000000000E30000-0x0000000000E7A000-memory.dmp

            Filesize

            296KB

          • memory/1248-61-0x0000000000000000-mapping.dmp

          • memory/1248-121-0x0000000000A50000-0x0000000000A78000-memory.dmp

            Filesize

            160KB

          • memory/1248-69-0x0000000000F50000-0x0000000000FD8000-memory.dmp

            Filesize

            544KB

          • memory/1364-144-0x0000000000000000-mapping.dmp

          • memory/1368-71-0x0000000000B80000-0x00000000016BE000-memory.dmp

            Filesize

            11.2MB

          • memory/1368-56-0x0000000000000000-mapping.dmp

          • memory/1620-127-0x0000000000000000-mapping.dmp

          • memory/1620-186-0x000000006EB90000-0x000000006F13B000-memory.dmp

            Filesize

            5.7MB

          • memory/1620-180-0x000000006EB90000-0x000000006F13B000-memory.dmp

            Filesize

            5.7MB

          • memory/1704-181-0x000000006EB90000-0x000000006F13B000-memory.dmp

            Filesize

            5.7MB

          • memory/1704-126-0x0000000000000000-mapping.dmp

          • memory/1704-188-0x000000006EB90000-0x000000006F13B000-memory.dmp

            Filesize

            5.7MB

          • memory/1708-119-0x0000000000000000-mapping.dmp

          • memory/1708-183-0x0000000000000000-mapping.dmp

          • memory/1764-82-0x0000000000000000-mapping.dmp

          • memory/1764-93-0x000000006E760000-0x000000006ED0B000-memory.dmp

            Filesize

            5.7MB

          • memory/1764-91-0x000000006E760000-0x000000006ED0B000-memory.dmp

            Filesize

            5.7MB

          • memory/1836-55-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

            Filesize

            8KB

          • memory/1836-54-0x000007FEF3BB0000-0x000007FEF45D3000-memory.dmp

            Filesize

            10.1MB

          • memory/1916-190-0x000000006EB90000-0x000000006F13B000-memory.dmp

            Filesize

            5.7MB

          • memory/1916-189-0x000000006EB90000-0x000000006F13B000-memory.dmp

            Filesize

            5.7MB

          • memory/1916-179-0x0000000000000000-mapping.dmp

          • memory/1936-94-0x000000006E760000-0x000000006ED0B000-memory.dmp

            Filesize

            5.7MB

          • memory/1936-90-0x000000006E760000-0x000000006ED0B000-memory.dmp

            Filesize

            5.7MB

          • memory/1936-81-0x0000000000000000-mapping.dmp

          • memory/2000-139-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2000-137-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2000-159-0x000000000042FDCE-mapping.dmp

          • memory/2000-146-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2000-149-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2000-167-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2000-156-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2000-175-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2016-70-0x0000000000E80000-0x0000000000F00000-memory.dmp

            Filesize

            512KB

          • memory/2016-109-0x0000000000C60000-0x0000000000CA4000-memory.dmp

            Filesize

            272KB

          • memory/2016-65-0x0000000000000000-mapping.dmp

          • memory/2016-118-0x00000000046B0000-0x00000000046D8000-memory.dmp

            Filesize

            160KB