Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2022 19:00

General

  • Target

    521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe

  • Size

    12.7MB

  • MD5

    2c5d99dfc22e3c7c13abd40ef29082a6

  • SHA1

    2eae7f57966c4409cfecda611ddb41e3d1da8147

  • SHA256

    521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec

  • SHA512

    21af954bb927cd6548f20333b582c130fa3e4f6a253318b3aec66fe8628dbe50a7ecdc729935f5a215a3ac2027429d87a58fea9a0f2b93e5c477cc5a3fd037fc

  • SSDEEP

    196608:fmQDIJzN0rl/RNfrOzDzRgIurg8dCMZqWlggN2:eQO0rl/RRSgIurgjyGgN2

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Detect Neshta payload 3 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe
    "C:\Users\Admin\AppData\Local\Temp\521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe
      "C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 852
        3⤵
        • Program crash
        PID:2568
    • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1328
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3180
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Czvmmniarhsx.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:784
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4720
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe"
        3⤵
        • Executes dropped EXE
        PID:4924
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe"
        3⤵
        • Executes dropped EXE
        PID:5100
    • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4764
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3144
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Fiswjsizjcjynjqomep.vbs"
        3⤵
        • Checks computer location settings
        PID:4756
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3748
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services" Help.exe
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        PID:1096
        • C:\Windows\SysWOW64\help.exe
          "C:\Windows\System32\help.exe"
          4⤵
            PID:3176
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4588
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3332
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2540
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Pblsxziib.vbs"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4424
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4736
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Pblsxziib.vbs"
          3⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4288
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Rtlieujwqeasnagwindows update.vbs"
            4⤵
            • Adds Run key to start application
            PID:4456
        • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
          "C:\Users\Admin\AppData\Local\Temp\Windows Security Services" Update.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of FindShellTrayWindow
          PID:2028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5036 -ip 5036
      1⤵
        PID:2348

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Windows Security Services.exe.log

        Filesize

        1KB

        MD5

        7ebe314bf617dc3e48b995a6c352740c

        SHA1

        538f643b7b30f9231a3035c448607f767527a870

        SHA256

        48178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8

        SHA512

        0ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        1KB

        MD5

        4280e36a29fa31c01e4d8b2ba726a0d8

        SHA1

        c485c2c9ce0a99747b18d899b71dfa9a64dabe32

        SHA256

        e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

        SHA512

        494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        1KB

        MD5

        4280e36a29fa31c01e4d8b2ba726a0d8

        SHA1

        c485c2c9ce0a99747b18d899b71dfa9a64dabe32

        SHA256

        e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

        SHA512

        494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

        Filesize

        53KB

        MD5

        06ad34f9739c5159b4d92d702545bd49

        SHA1

        9152a0d4f153f3f40f7e606be75f81b582ee0c17

        SHA256

        474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

        SHA512

        c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

        Filesize

        53KB

        MD5

        06ad34f9739c5159b4d92d702545bd49

        SHA1

        9152a0d4f153f3f40f7e606be75f81b582ee0c17

        SHA256

        474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

        SHA512

        c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        16KB

        MD5

        bbaa52676d8ef81ff6ee33d1ff71ea7f

        SHA1

        5d4acf35cf1173a4fea6de1eb71943ab33cd45a4

        SHA256

        85d87a81209aef74bfe81bd1ef7d7cab6c74a085262586f6b12bb12cfeb0a622

        SHA512

        67df52a478ad7f068d8f25e2c0cbd45a8a961878dbd550ef321ebbeff94c5429131761fe007753d0ef17056423d0ab07442fab586a53cc78dc655671abd7df7f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        16KB

        MD5

        bbaa52676d8ef81ff6ee33d1ff71ea7f

        SHA1

        5d4acf35cf1173a4fea6de1eb71943ab33cd45a4

        SHA256

        85d87a81209aef74bfe81bd1ef7d7cab6c74a085262586f6b12bb12cfeb0a622

        SHA512

        67df52a478ad7f068d8f25e2c0cbd45a8a961878dbd550ef321ebbeff94c5429131761fe007753d0ef17056423d0ab07442fab586a53cc78dc655671abd7df7f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        16KB

        MD5

        ab264de1afedddd4b8101c9fffff1c6f

        SHA1

        93ef16d4ef8dbe7e372999f6b387659adc562a8a

        SHA256

        21b1aec540b51fbfe5338100c7b4910bfc78881d4097f817f763bff5c844720f

        SHA512

        91a376ebd0d163d51a4af3c6189aaaae168f06d01e84074563f00c4758f1ab9d2b4c16dd4ac7edd47973f94d6bae2b3c09e7e383ed6a40cd38d490e487332ee6

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        16KB

        MD5

        a8f1b18b9cc840b4f7a336670f9ab9a2

        SHA1

        f329a6b98e19ab98a6019d83bbaf283ba6d4f10f

        SHA256

        660a335f0261aba5f928be618b7d06d494d1188c3b833de5f6a68fb9d403d26a

        SHA512

        cacfa282cea722b64eb7cb9e0f595595163076edea7cdca21acc98c27c51b07d302f5bc33375c247e838efc2422e8f2e45f0d3b9fa78720b43bcb7cff9600a6d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        16KB

        MD5

        a8f1b18b9cc840b4f7a336670f9ab9a2

        SHA1

        f329a6b98e19ab98a6019d83bbaf283ba6d4f10f

        SHA256

        660a335f0261aba5f928be618b7d06d494d1188c3b833de5f6a68fb9d403d26a

        SHA512

        cacfa282cea722b64eb7cb9e0f595595163076edea7cdca21acc98c27c51b07d302f5bc33375c247e838efc2422e8f2e45f0d3b9fa78720b43bcb7cff9600a6d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        18KB

        MD5

        ab73bdc083a39127c228f5a492de8f87

        SHA1

        55bd729fdb85ff8f6d44160dfa45d5fc6c43b0c5

        SHA256

        bd9e20e46a9cc578ed6a7220cf942fe6c609ba3f5013250b8c743a3684be9613

        SHA512

        371f7f8a6505972f3877f11463202b89202f3550594d7f05a955ab6db66bb0ce9006df7ededaef8882eccc66080aff75cc68cc37556ec949ad6cc173639b0550

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        18KB

        MD5

        2ce55d0f4fb19918576365cb01096635

        SHA1

        a6a0e6fdba67ae4d5044bc1eedfcb38f48be0ff8

        SHA256

        41ec97f114b895684ed3f33d7d67c90c253fe86ce7da75a30af7e809a19c0d1b

        SHA512

        f3a7f3f718a1f4166563ab103c1fe99d06bb2b7ee74ce782d3a73841162b35d569192b33d15375ad931b1dbf8d68325c3e5ac4f3d497a4a05ef143719ba6b259

      • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe

        Filesize

        11.2MB

        MD5

        fb40ba1b494af4057ab259bba5f33fe6

        SHA1

        b872393a07d3949947a41871132b736c00c771bb

        SHA256

        40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

        SHA512

        f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

      • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe

        Filesize

        11.2MB

        MD5

        fb40ba1b494af4057ab259bba5f33fe6

        SHA1

        b872393a07d3949947a41871132b736c00c771bb

        SHA256

        40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

        SHA512

        f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

      • C:\Users\Admin\AppData\Local\Temp\Pblsxziib.vbs

        Filesize

        117B

        MD5

        a2bde8651257c1619a01520a092e3871

        SHA1

        0b56111496c724038b00222639658856962c7ab7

        SHA256

        ff5ad6b32f7c48563c4c2686cdd55b5005e729da4b932dc0e7689aa7c182e0df

        SHA512

        dbf9c9141c1d2df2905b8ad8169e33e7d8328dfd7f19119163601b5f7a06b380f7836fe0d276929d0fb40e29337a28f5ae6b1a8bcd115e10dac03ec3317e525b

      • C:\Users\Admin\AppData\Local\Temp\Rtlieujwqeasnagwindows update.vbs

        Filesize

        614KB

        MD5

        b14587cd6b30dea73f73d6138ea9d259

        SHA1

        e289a674f9b1138c1b8f392ec752c912800be0cc

        SHA256

        f5359df2aaa02fbfae540934f3e8f8a2ab362f7ee92dda536846afb67cea1b02

        SHA512

        5ac61b9eb9fbdca73e6ecfdb59e199419de0feb57f77652d8fbfebd543450fde593d375f76b5eb9a9bcd6f6c1dd01298dc1dc55f8e9844333b94ac49a3755f86

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe

        Filesize

        518KB

        MD5

        8a20ca605ca1ce7803ffb9e2219d5206

        SHA1

        88f2d6daf773b62d7913acce676b72b0818c2e08

        SHA256

        2c8aa2ce1b5b818d7a66f24cbb30d664d5618af94248ebf9c55e713c1f97d162

        SHA512

        0e4abf37ed5b528712662bf03bd4afb384fba9448d51a26cce03cb68cce4e018f5b295bea7b137146814fbe891e46348034e07c36b6ad47faf18b79ad198b348

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe

        Filesize

        518KB

        MD5

        8a20ca605ca1ce7803ffb9e2219d5206

        SHA1

        88f2d6daf773b62d7913acce676b72b0818c2e08

        SHA256

        2c8aa2ce1b5b818d7a66f24cbb30d664d5618af94248ebf9c55e713c1f97d162

        SHA512

        0e4abf37ed5b528712662bf03bd4afb384fba9448d51a26cce03cb68cce4e018f5b295bea7b137146814fbe891e46348034e07c36b6ad47faf18b79ad198b348

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe

        Filesize

        489KB

        MD5

        7e805a295cc926c83de5913878219200

        SHA1

        ade9551bcaf138334054c6d16ae928bd107144a3

        SHA256

        afadf913b2d2a4caacc2b893c049b75766596efb4adfedbf217f618d4e4a8eb5

        SHA512

        18115735c618c5d44f1ebdfd2e8d455bc0f611481f3a652510abeca1b3c4829c4189aebe9d570359ab0b1b13574727ae3641db66080e43cb9a6b281bfcc6634f

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe

        Filesize

        489KB

        MD5

        7e805a295cc926c83de5913878219200

        SHA1

        ade9551bcaf138334054c6d16ae928bd107144a3

        SHA256

        afadf913b2d2a4caacc2b893c049b75766596efb4adfedbf217f618d4e4a8eb5

        SHA512

        18115735c618c5d44f1ebdfd2e8d455bc0f611481f3a652510abeca1b3c4829c4189aebe9d570359ab0b1b13574727ae3641db66080e43cb9a6b281bfcc6634f

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

        Filesize

        468KB

        MD5

        b0a2c3ad7d88f8928f7e1fce28223228

        SHA1

        2d53080eedf02ebc1c87f33b2bf51e60071863e0

        SHA256

        4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

        SHA512

        b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

        Filesize

        468KB

        MD5

        b0a2c3ad7d88f8928f7e1fce28223228

        SHA1

        2d53080eedf02ebc1c87f33b2bf51e60071863e0

        SHA256

        4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

        SHA512

        b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

        Filesize

        468KB

        MD5

        b0a2c3ad7d88f8928f7e1fce28223228

        SHA1

        2d53080eedf02ebc1c87f33b2bf51e60071863e0

        SHA256

        4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

        SHA512

        b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

        Filesize

        468KB

        MD5

        b0a2c3ad7d88f8928f7e1fce28223228

        SHA1

        2d53080eedf02ebc1c87f33b2bf51e60071863e0

        SHA256

        4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

        SHA512

        b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

        Filesize

        468KB

        MD5

        b0a2c3ad7d88f8928f7e1fce28223228

        SHA1

        2d53080eedf02ebc1c87f33b2bf51e60071863e0

        SHA256

        4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

        SHA512

        b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

        Filesize

        468KB

        MD5

        b0a2c3ad7d88f8928f7e1fce28223228

        SHA1

        2d53080eedf02ebc1c87f33b2bf51e60071863e0

        SHA256

        4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

        SHA512

        b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

      • C:\Users\Admin\AppData\Local\Temp\_Czvmmniarhsx.vbs

        Filesize

        181B

        MD5

        f1502081d1172131e3d33d384d1adb56

        SHA1

        85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

        SHA256

        e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

        SHA512

        5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

      • C:\Users\Admin\AppData\Local\Temp\_Fiswjsizjcjynjqomep.vbs

        Filesize

        181B

        MD5

        f1502081d1172131e3d33d384d1adb56

        SHA1

        85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

        SHA256

        e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

        SHA512

        5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

      • C:\Users\Admin\AppData\Local\Temp\_Pblsxziib.vbs

        Filesize

        181B

        MD5

        f1502081d1172131e3d33d384d1adb56

        SHA1

        85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

        SHA256

        e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

        SHA512

        5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe

        Filesize

        518KB

        MD5

        8a20ca605ca1ce7803ffb9e2219d5206

        SHA1

        88f2d6daf773b62d7913acce676b72b0818c2e08

        SHA256

        2c8aa2ce1b5b818d7a66f24cbb30d664d5618af94248ebf9c55e713c1f97d162

        SHA512

        0e4abf37ed5b528712662bf03bd4afb384fba9448d51a26cce03cb68cce4e018f5b295bea7b137146814fbe891e46348034e07c36b6ad47faf18b79ad198b348

      • memory/596-135-0x0000000000000000-mapping.dmp

      • memory/596-145-0x0000000000C10000-0x0000000000C8C000-memory.dmp

        Filesize

        496KB

      • memory/784-175-0x0000000000000000-mapping.dmp

      • memory/1096-197-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/1096-192-0x0000000000000000-mapping.dmp

      • memory/1328-160-0x0000000005B50000-0x0000000005BB6000-memory.dmp

        Filesize

        408KB

      • memory/1328-155-0x0000000000000000-mapping.dmp

      • memory/1328-161-0x0000000006390000-0x00000000063AE000-memory.dmp

        Filesize

        120KB

      • memory/1328-163-0x0000000006890000-0x00000000068AA000-memory.dmp

        Filesize

        104KB

      • memory/2028-184-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2028-177-0x0000000000000000-mapping.dmp

      • memory/2256-146-0x0000000000A50000-0x0000000000AD8000-memory.dmp

        Filesize

        544KB

      • memory/2256-150-0x0000000005480000-0x0000000005512000-memory.dmp

        Filesize

        584KB

      • memory/2256-137-0x0000000000000000-mapping.dmp

      • memory/2540-168-0x0000000000000000-mapping.dmp

      • memory/2740-132-0x00007FF87C250000-0x00007FF87CC86000-memory.dmp

        Filesize

        10.2MB

      • memory/3144-166-0x0000000000000000-mapping.dmp

      • memory/3176-201-0x0000000000000000-mapping.dmp

      • memory/3180-167-0x0000000000000000-mapping.dmp

      • memory/3332-153-0x0000000000000000-mapping.dmp

      • memory/3332-162-0x0000000007110000-0x000000000778A000-memory.dmp

        Filesize

        6.5MB

      • memory/3332-156-0x00000000044E0000-0x0000000004516000-memory.dmp

        Filesize

        216KB

      • memory/3332-159-0x0000000005180000-0x00000000051E6000-memory.dmp

        Filesize

        408KB

      • memory/3748-207-0x0000000070BE0000-0x0000000070C2C000-memory.dmp

        Filesize

        304KB

      • memory/3748-211-0x0000000007770000-0x000000000778A000-memory.dmp

        Filesize

        104KB

      • memory/3748-212-0x0000000007750000-0x0000000007758000-memory.dmp

        Filesize

        32KB

      • memory/3748-196-0x0000000000000000-mapping.dmp

      • memory/4288-176-0x0000000000000000-mapping.dmp

      • memory/4424-174-0x0000000000000000-mapping.dmp

      • memory/4456-188-0x0000000000000000-mapping.dmp

      • memory/4588-149-0x0000000005130000-0x00000000056D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4588-147-0x0000000000100000-0x0000000000180000-memory.dmp

        Filesize

        512KB

      • memory/4588-139-0x0000000000000000-mapping.dmp

      • memory/4588-152-0x0000000004B20000-0x0000000004B2A000-memory.dmp

        Filesize

        40KB

      • memory/4720-187-0x0000000000000000-mapping.dmp

      • memory/4720-205-0x0000000006050000-0x000000000606E000-memory.dmp

        Filesize

        120KB

      • memory/4720-208-0x0000000006E10000-0x0000000006E1A000-memory.dmp

        Filesize

        40KB

      • memory/4720-203-0x0000000006070000-0x00000000060A2000-memory.dmp

        Filesize

        200KB

      • memory/4720-204-0x0000000070BE0000-0x0000000070C2C000-memory.dmp

        Filesize

        304KB

      • memory/4736-210-0x0000000005B60000-0x0000000005B6E000-memory.dmp

        Filesize

        56KB

      • memory/4736-190-0x0000000000000000-mapping.dmp

      • memory/4736-209-0x00000000072E0000-0x0000000007376000-memory.dmp

        Filesize

        600KB

      • memory/4736-206-0x0000000070BE0000-0x0000000070C2C000-memory.dmp

        Filesize

        304KB

      • memory/4756-189-0x0000000000000000-mapping.dmp

      • memory/4764-154-0x0000000000000000-mapping.dmp

      • memory/4764-157-0x0000000005290000-0x00000000058B8000-memory.dmp

        Filesize

        6.2MB

      • memory/4764-158-0x0000000004FD0000-0x0000000004FF2000-memory.dmp

        Filesize

        136KB

      • memory/4924-178-0x0000000000000000-mapping.dmp

      • memory/5036-151-0x0000000005870000-0x000000000590C000-memory.dmp

        Filesize

        624KB

      • memory/5036-148-0x00000000006F0000-0x000000000122E000-memory.dmp

        Filesize

        11.2MB

      • memory/5036-133-0x0000000000000000-mapping.dmp

      • memory/5100-183-0x0000000000000000-mapping.dmp

      • memory/5100-194-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB