Analysis
-
max time kernel
1197s -
max time network
1204s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-09-2022 20:38
Static task
static1
Behavioral task
behavioral1
Sample
RVKAS04KJHWDFV01HGY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RVKAS04KJHWDFV01HGY.exe
Resource
win10-20220812-en
General
-
Target
RVKAS04KJHWDFV01HGY.exe
-
Size
300.0MB
-
MD5
8f229797d75d12c30042cf7ac4816d8e
-
SHA1
789a595bf5f56d93d232a2dfd01480a3447ea75c
-
SHA256
cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
-
SHA512
0f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
SSDEEP
3072:PCz5n5VJ/ZfkTE6FBR0/JGJvnMwBbGe8IsPsBAAAAAAAAAAAAAAAAAASY:QnvL8TFFBtygbGe8XC
Malware Config
Extracted
asyncrat
Venom RAT 5.0.5
Venom Clients
g896696.duckdns.org:7343
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1480-62-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1480-63-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1480-64-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1480-65-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/1480-67-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1480-69-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/672-85-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/1644-104-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/2016-123-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/1768-141-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/1128-160-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/1776-178-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/1036-197-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/956-215-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/956-225-0x0000000000080000-0x0000000000096000-memory.dmp asyncrat behavioral1/memory/1196-241-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/928-259-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/1404-277-0x00000000004109DE-mapping.dmp asyncrat behavioral1/memory/2004-302-0x00000000004109DE-mapping.dmp asyncrat -
Executes dropped EXE 19 IoCs
Processes:
wedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exepid process 1896 wedfojh.exe 472 wedfojh.exe 1160 wedfojh.exe 1444 wedfojh.exe 796 wedfojh.exe 1520 wedfojh.exe 1324 wedfojh.exe 1292 wedfojh.exe 748 wedfojh.exe 1484 wedfojh.exe 1952 wedfojh.exe 1160 wedfojh.exe 1072 wedfojh.exe 1708 wedfojh.exe 1532 wedfojh.exe 1160 wedfojh.exe 1744 wedfojh.exe 560 wedfojh.exe 988 wedfojh.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 20 IoCs
Processes:
RVKAS04KJHWDFV01HGY.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exewedfojh.exedescription pid process target process PID 584 set thread context of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 1896 set thread context of 672 1896 wedfojh.exe vbc.exe PID 472 set thread context of 1644 472 wedfojh.exe vbc.exe PID 1160 set thread context of 2016 1160 wedfojh.exe vbc.exe PID 1444 set thread context of 1768 1444 wedfojh.exe vbc.exe PID 796 set thread context of 1128 796 wedfojh.exe vbc.exe PID 1520 set thread context of 1776 1520 wedfojh.exe vbc.exe PID 1324 set thread context of 1036 1324 wedfojh.exe vbc.exe PID 1292 set thread context of 956 1292 wedfojh.exe vbc.exe PID 748 set thread context of 1196 748 wedfojh.exe vbc.exe PID 1484 set thread context of 928 1484 wedfojh.exe vbc.exe PID 1952 set thread context of 1404 1952 wedfojh.exe vbc.exe PID 1160 set thread context of 2004 1160 wedfojh.exe vbc.exe PID 1072 set thread context of 1324 1072 wedfojh.exe vbc.exe PID 1708 set thread context of 576 1708 wedfojh.exe vbc.exe PID 1532 set thread context of 1492 1532 wedfojh.exe vbc.exe PID 1160 set thread context of 1316 1160 wedfojh.exe vbc.exe PID 1744 set thread context of 1396 1744 wedfojh.exe vbc.exe PID 560 set thread context of 836 560 wedfojh.exe vbc.exe PID 988 set thread context of 1492 988 wedfojh.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 20 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1764 schtasks.exe 956 schtasks.exe 2008 schtasks.exe 908 schtasks.exe 1440 schtasks.exe 688 schtasks.exe 1220 schtasks.exe 1300 schtasks.exe 1088 schtasks.exe 1432 schtasks.exe 2032 schtasks.exe 936 schtasks.exe 1764 schtasks.exe 1140 schtasks.exe 1904 schtasks.exe 1140 schtasks.exe 524 schtasks.exe 1328 schtasks.exe 564 schtasks.exe 1068 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
vbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exedescription pid process Token: SeDebugPrivilege 1480 vbc.exe Token: SeDebugPrivilege 672 vbc.exe Token: SeDebugPrivilege 1644 vbc.exe Token: SeDebugPrivilege 2016 vbc.exe Token: SeDebugPrivilege 1768 vbc.exe Token: SeDebugPrivilege 1128 vbc.exe Token: SeDebugPrivilege 1776 vbc.exe Token: SeDebugPrivilege 1036 vbc.exe Token: SeDebugPrivilege 956 vbc.exe Token: SeDebugPrivilege 1196 vbc.exe Token: SeDebugPrivilege 928 vbc.exe Token: SeDebugPrivilege 1404 vbc.exe Token: SeDebugPrivilege 2004 vbc.exe Token: SeDebugPrivilege 1324 vbc.exe Token: SeDebugPrivilege 576 vbc.exe Token: SeDebugPrivilege 1492 vbc.exe Token: SeDebugPrivilege 1316 vbc.exe Token: SeDebugPrivilege 1396 vbc.exe Token: SeDebugPrivilege 836 vbc.exe Token: SeDebugPrivilege 1492 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
RVKAS04KJHWDFV01HGY.execmd.exetaskeng.exewedfojh.execmd.exewedfojh.exedescription pid process target process PID 584 wrote to memory of 2028 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 584 wrote to memory of 2028 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 584 wrote to memory of 2028 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 584 wrote to memory of 2028 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 584 wrote to memory of 1784 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 584 wrote to memory of 1784 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 584 wrote to memory of 1784 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 584 wrote to memory of 1784 584 RVKAS04KJHWDFV01HGY.exe cmd.exe PID 2028 wrote to memory of 1432 2028 cmd.exe schtasks.exe PID 2028 wrote to memory of 1432 2028 cmd.exe schtasks.exe PID 2028 wrote to memory of 1432 2028 cmd.exe schtasks.exe PID 2028 wrote to memory of 1432 2028 cmd.exe schtasks.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 584 wrote to memory of 1480 584 RVKAS04KJHWDFV01HGY.exe vbc.exe PID 552 wrote to memory of 1896 552 taskeng.exe wedfojh.exe PID 552 wrote to memory of 1896 552 taskeng.exe wedfojh.exe PID 552 wrote to memory of 1896 552 taskeng.exe wedfojh.exe PID 552 wrote to memory of 1896 552 taskeng.exe wedfojh.exe PID 1896 wrote to memory of 1516 1896 wedfojh.exe cmd.exe PID 1896 wrote to memory of 1516 1896 wedfojh.exe cmd.exe PID 1896 wrote to memory of 1516 1896 wedfojh.exe cmd.exe PID 1896 wrote to memory of 1516 1896 wedfojh.exe cmd.exe PID 1896 wrote to memory of 1696 1896 wedfojh.exe cmd.exe PID 1896 wrote to memory of 1696 1896 wedfojh.exe cmd.exe PID 1896 wrote to memory of 1696 1896 wedfojh.exe cmd.exe PID 1896 wrote to memory of 1696 1896 wedfojh.exe cmd.exe PID 1516 wrote to memory of 2008 1516 cmd.exe schtasks.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1516 wrote to memory of 2008 1516 cmd.exe schtasks.exe PID 1516 wrote to memory of 2008 1516 cmd.exe schtasks.exe PID 1516 wrote to memory of 2008 1516 cmd.exe schtasks.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 1896 wrote to memory of 672 1896 wedfojh.exe vbc.exe PID 552 wrote to memory of 472 552 taskeng.exe wedfojh.exe PID 552 wrote to memory of 472 552 taskeng.exe wedfojh.exe PID 552 wrote to memory of 472 552 taskeng.exe wedfojh.exe PID 552 wrote to memory of 472 552 taskeng.exe wedfojh.exe PID 472 wrote to memory of 1848 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1848 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1848 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1848 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1136 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1136 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1136 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1136 472 wedfojh.exe cmd.exe PID 472 wrote to memory of 1644 472 wedfojh.exe vbc.exe PID 472 wrote to memory of 1644 472 wedfojh.exe vbc.exe PID 472 wrote to memory of 1644 472 wedfojh.exe vbc.exe PID 472 wrote to memory of 1644 472 wedfojh.exe vbc.exe PID 472 wrote to memory of 1644 472 wedfojh.exe vbc.exe PID 472 wrote to memory of 1644 472 wedfojh.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RVKAS04KJHWDFV01HGY.exe"C:\Users\Admin\AppData\Local\Temp\RVKAS04KJHWDFV01HGY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\RVKAS04KJHWDFV01HGY.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {5D256F6E-C851-4493-9C97-B0387CD5D63E} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeC:\Users\Admin\AppData\Roaming\wedfojh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Roaming\wedfojh.exe'" /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\wedfojh.exe" "C:\Users\Admin\AppData\Roaming\wedfojh.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
C:\Users\Admin\AppData\Roaming\wedfojh.exeFilesize
300.0MB
MD58f229797d75d12c30042cf7ac4816d8e
SHA1789a595bf5f56d93d232a2dfd01480a3447ea75c
SHA256cd45f75d587dc5aac121abb8bdd48247588ffa545a7ad6bc657f5f0ddf044105
SHA5120f650136a86e8fd1e9fa300446010bf61866b4c2f59d711f2cd3de4ce4f679719c0de4337c8107b650023e0f5094ffc7cf6f707915f6777682642b2940bf4a0c
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/472-93-0x00000000012A0000-0x00000000012C8000-memory.dmpFilesize
160KB
-
memory/472-91-0x0000000000000000-mapping.dmp
-
memory/524-270-0x0000000000000000-mapping.dmp
-
memory/564-170-0x0000000000000000-mapping.dmp
-
memory/564-116-0x0000000000000000-mapping.dmp
-
memory/584-54-0x0000000000F70000-0x0000000000F98000-memory.dmpFilesize
160KB
-
memory/584-55-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/592-294-0x0000000000000000-mapping.dmp
-
memory/592-169-0x0000000000000000-mapping.dmp
-
memory/672-85-0x00000000004109DE-mapping.dmp
-
memory/688-295-0x0000000000000000-mapping.dmp
-
memory/748-228-0x0000000000000000-mapping.dmp
-
memory/748-230-0x00000000013E0000-0x0000000001408000-memory.dmpFilesize
160KB
-
memory/796-148-0x0000000000000000-mapping.dmp
-
memory/848-232-0x0000000000000000-mapping.dmp
-
memory/908-153-0x0000000000000000-mapping.dmp
-
memory/928-188-0x0000000000000000-mapping.dmp
-
memory/928-259-0x00000000004109DE-mapping.dmp
-
memory/956-151-0x0000000000000000-mapping.dmp
-
memory/956-215-0x00000000004109DE-mapping.dmp
-
memory/956-225-0x0000000000080000-0x0000000000096000-memory.dmpFilesize
88KB
-
memory/1036-197-0x00000000004109DE-mapping.dmp
-
memory/1068-190-0x0000000000000000-mapping.dmp
-
memory/1072-133-0x0000000000000000-mapping.dmp
-
memory/1072-309-0x0000000000AA0000-0x0000000000AC8000-memory.dmpFilesize
160KB
-
memory/1076-233-0x0000000000000000-mapping.dmp
-
memory/1128-160-0x00000000004109DE-mapping.dmp
-
memory/1136-96-0x0000000000000000-mapping.dmp
-
memory/1140-234-0x0000000000000000-mapping.dmp
-
memory/1140-176-0x0000000000000000-mapping.dmp
-
memory/1160-361-0x00000000003F0000-0x0000000000418000-memory.dmpFilesize
160KB
-
memory/1160-289-0x0000000000000000-mapping.dmp
-
memory/1160-111-0x0000000000000000-mapping.dmp
-
memory/1160-291-0x0000000000380000-0x00000000003A8000-memory.dmpFilesize
160KB
-
memory/1196-241-0x00000000004109DE-mapping.dmp
-
memory/1216-132-0x0000000000000000-mapping.dmp
-
memory/1292-203-0x0000000000000000-mapping.dmp
-
memory/1300-115-0x0000000000000000-mapping.dmp
-
memory/1316-251-0x0000000000000000-mapping.dmp
-
memory/1324-185-0x0000000000000000-mapping.dmp
-
memory/1404-277-0x00000000004109DE-mapping.dmp
-
memory/1404-206-0x0000000000000000-mapping.dmp
-
memory/1432-58-0x0000000000000000-mapping.dmp
-
memory/1440-257-0x0000000000000000-mapping.dmp
-
memory/1444-129-0x0000000000000000-mapping.dmp
-
memory/1452-152-0x0000000000000000-mapping.dmp
-
memory/1480-60-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1480-67-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1480-59-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1480-65-0x00000000004109DE-mapping.dmp
-
memory/1480-64-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1480-69-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1480-63-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1480-62-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1484-247-0x0000000000000000-mapping.dmp
-
memory/1516-76-0x0000000000000000-mapping.dmp
-
memory/1520-166-0x0000000000000000-mapping.dmp
-
memory/1644-104-0x00000000004109DE-mapping.dmp
-
memory/1692-250-0x0000000000000000-mapping.dmp
-
memory/1696-77-0x0000000000000000-mapping.dmp
-
memory/1744-375-0x0000000000E50000-0x0000000000E78000-memory.dmpFilesize
160KB
-
memory/1764-102-0x0000000000000000-mapping.dmp
-
memory/1768-141-0x00000000004109DE-mapping.dmp
-
memory/1776-178-0x00000000004109DE-mapping.dmp
-
memory/1784-57-0x0000000000000000-mapping.dmp
-
memory/1836-114-0x0000000000000000-mapping.dmp
-
memory/1836-293-0x0000000000000000-mapping.dmp
-
memory/1848-95-0x0000000000000000-mapping.dmp
-
memory/1848-207-0x0000000000000000-mapping.dmp
-
memory/1896-72-0x0000000000000000-mapping.dmp
-
memory/1896-74-0x0000000000810000-0x0000000000838000-memory.dmpFilesize
160KB
-
memory/1904-213-0x0000000000000000-mapping.dmp
-
memory/1908-268-0x0000000000000000-mapping.dmp
-
memory/1928-189-0x0000000000000000-mapping.dmp
-
memory/1952-265-0x0000000000000000-mapping.dmp
-
memory/1972-269-0x0000000000000000-mapping.dmp
-
memory/2004-302-0x00000000004109DE-mapping.dmp
-
memory/2008-78-0x0000000000000000-mapping.dmp
-
memory/2016-123-0x00000000004109DE-mapping.dmp
-
memory/2028-56-0x0000000000000000-mapping.dmp
-
memory/2032-139-0x0000000000000000-mapping.dmp