Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 12:29

General

  • Target

    tmp.exe

  • Size

    7.1MB

  • MD5

    9a82e4f9ba1881fa411b6473d792f1a3

  • SHA1

    24c48768340c61376d3d5ef99091b456ad1f89fb

  • SHA256

    d823740cca44676c9fa128c25ca53cc16fbf8a1ad23c10d08f997e9e3fcd6655

  • SHA512

    a0819af9c420b188c9f326459ffd23f10d3d038dae0b48a98df34f1ad87d0d08323e184c3cda41ab794b8857f4a3f2c2f1b8c2f42dbc88f375ad87feccba17ec

  • SSDEEP

    98304:biPxK2EIDpN+bKXY/TMTRQOEThYBCvSx/Q1t1rakS9f4X/3mTiVRn:Sx3rQDTj9SCvl4F4uTiVRn

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Signatures

  • DcRat 4 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Fabookie payload 2 IoCs
  • Detect ZGRat V1 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 15 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 46 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • DcRat
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
        C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4004
          • C:\Windows\SysWOW64\chcp.com
            chcp 1251
            5⤵
              PID:1740
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
              5⤵
              • DcRat
              • Creates scheduled task(s)
              PID:4788
        • C:\Users\Admin\AppData\Local\Temp\nsb7D6F.tmp
          C:\Users\Admin\AppData\Local\Temp\nsb7D6F.tmp
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2300
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 2364
            4⤵
            • Program crash
            PID:2164
      • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
        "C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2600
      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 372
          3⤵
          • Program crash
          PID:1192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 396
          3⤵
          • Program crash
          PID:4800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 416
          3⤵
          • Program crash
          PID:1844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 680
          3⤵
          • Program crash
          PID:1272
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 692
          3⤵
          • Program crash
          PID:1264
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 692
          3⤵
          • Program crash
          PID:4652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 748
          3⤵
          • Program crash
          PID:8
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 756
          3⤵
          • Program crash
          PID:1632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 768
          3⤵
          • Program crash
          PID:1384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 768
          3⤵
          • Program crash
          PID:1452
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 728
          3⤵
          • Program crash
          PID:2792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 796
          3⤵
          • Program crash
          PID:4620
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 764
          3⤵
          • Program crash
          PID:1336
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 768
          3⤵
          • Program crash
          PID:1164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 644
          3⤵
          • Program crash
          PID:3128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 856
          3⤵
          • Program crash
          PID:4032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 876
          3⤵
          • Program crash
          PID:2188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 816
          3⤵
          • Program crash
          PID:4080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 764
          3⤵
          • Program crash
          PID:4168
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2136
        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
          "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:1336
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 340
            4⤵
            • Program crash
            PID:2892
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 356
            4⤵
            • Program crash
            PID:2980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 356
            4⤵
            • Program crash
            PID:1776
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 644
            4⤵
            • Program crash
            PID:3368
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 692
            4⤵
            • Program crash
            PID:2188
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 692
            4⤵
            • Program crash
            PID:4000
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 692
            4⤵
            • Program crash
            PID:1540
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 732
            4⤵
            • Program crash
            PID:1572
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 744
            4⤵
            • Program crash
            PID:1768
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:1832
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3396
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              5⤵
              • Modifies Windows Firewall
              PID:2732
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:3888
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:4084
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Manipulates WinMonFS driver.
            • Drops file in Windows directory
            • Suspicious use of WriteProcessMemory
            PID:1572
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 372
              5⤵
              • Program crash
              PID:3980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 388
              5⤵
              • Program crash
              PID:4136
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 392
              5⤵
              • Program crash
              PID:4784
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 680
              5⤵
              • Program crash
              PID:3952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 692
              5⤵
              • Program crash
              PID:4172
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 692
              5⤵
              • Program crash
              PID:5060
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 756
              5⤵
              • Program crash
              PID:3792
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 768
              5⤵
              • Program crash
              PID:5052
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 800
              5⤵
              • Program crash
              PID:2848
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:344
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • DcRat
              • Creates scheduled task(s)
              PID:3700
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              5⤵
                PID:1344
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:1764
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 800
                5⤵
                • Program crash
                PID:2936
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 616
                5⤵
                • Program crash
                PID:3888
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 904
                5⤵
                • Program crash
                PID:4808
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:2876
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 964
                5⤵
                • Program crash
                PID:3972
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 980
                5⤵
                • Program crash
                PID:4140
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                PID:3520
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 616
                5⤵
                • Program crash
                PID:1520
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • DcRat
                • Creates scheduled task(s)
                PID:3516
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 1004
                5⤵
                • Program crash
                PID:960
              • C:\Windows\windefender.exe
                "C:\Windows\windefender.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1688
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5104
                  • C:\Windows\SysWOW64\sc.exe
                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    7⤵
                    • Launches sc.exe
                    PID:2936
        • C:\Users\Admin\AppData\Local\Temp\rty25.exe
          "C:\Users\Admin\AppData\Local\Temp\rty25.exe"
          2⤵
          • Executes dropped EXE
          PID:4648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4656 -ip 4656
        1⤵
          PID:1336
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4656 -ip 4656
          1⤵
            PID:2980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4656 -ip 4656
            1⤵
              PID:4160
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4656 -ip 4656
              1⤵
                PID:4992
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4656 -ip 4656
                1⤵
                  PID:4928
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4656 -ip 4656
                  1⤵
                    PID:3928
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4656 -ip 4656
                    1⤵
                      PID:2180
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4656 -ip 4656
                      1⤵
                        PID:2376
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4656 -ip 4656
                        1⤵
                          PID:3972
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4656 -ip 4656
                          1⤵
                            PID:2000
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4656 -ip 4656
                            1⤵
                              PID:1476
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4656 -ip 4656
                              1⤵
                                PID:64
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4656 -ip 4656
                                1⤵
                                  PID:3700
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4656 -ip 4656
                                  1⤵
                                    PID:4944
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4656 -ip 4656
                                    1⤵
                                      PID:4348
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4656 -ip 4656
                                      1⤵
                                        PID:4984
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4656 -ip 4656
                                        1⤵
                                          PID:1212
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4656 -ip 4656
                                          1⤵
                                            PID:4000
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4656 -ip 4656
                                            1⤵
                                              PID:948
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2300 -ip 2300
                                              1⤵
                                                PID:8
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1336 -ip 1336
                                                1⤵
                                                  PID:2960
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1336 -ip 1336
                                                  1⤵
                                                    PID:2992
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1336 -ip 1336
                                                    1⤵
                                                      PID:4160
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1336 -ip 1336
                                                      1⤵
                                                        PID:3264
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1336 -ip 1336
                                                        1⤵
                                                          PID:3136
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1336 -ip 1336
                                                          1⤵
                                                            PID:1792
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1336 -ip 1336
                                                            1⤵
                                                              PID:736
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1336 -ip 1336
                                                              1⤵
                                                                PID:4004
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1336 -ip 1336
                                                                1⤵
                                                                  PID:228
                                                                • C:\Users\Admin\AppData\Local\Temp\1289.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\1289.exe
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Checks SCSI registry key(s)
                                                                  • Suspicious behavior: MapViewOfSection
                                                                  PID:376
                                                                • C:\Users\Admin\AppData\Roaming\utawgib
                                                                  C:\Users\Admin\AppData\Roaming\utawgib
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  PID:4108
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 340
                                                                    2⤵
                                                                    • Program crash
                                                                    PID:3836
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4108 -ip 4108
                                                                  1⤵
                                                                    PID:1616
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1572 -ip 1572
                                                                    1⤵
                                                                      PID:4616
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1572 -ip 1572
                                                                      1⤵
                                                                        PID:1636
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1572 -ip 1572
                                                                        1⤵
                                                                          PID:368
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1572 -ip 1572
                                                                          1⤵
                                                                            PID:664
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1572 -ip 1572
                                                                            1⤵
                                                                              PID:3916
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1572 -ip 1572
                                                                              1⤵
                                                                                PID:4624
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1572 -ip 1572
                                                                                1⤵
                                                                                  PID:3180
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1572 -ip 1572
                                                                                  1⤵
                                                                                    PID:2628
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1572 -ip 1572
                                                                                    1⤵
                                                                                      PID:4540
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1572 -ip 1572
                                                                                      1⤵
                                                                                        PID:4376
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1572 -ip 1572
                                                                                        1⤵
                                                                                          PID:2056
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1572 -ip 1572
                                                                                          1⤵
                                                                                            PID:4788
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1572 -ip 1572
                                                                                            1⤵
                                                                                              PID:3132
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1572 -ip 1572
                                                                                              1⤵
                                                                                                PID:4756
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1572 -ip 1572
                                                                                                1⤵
                                                                                                  PID:3220
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1572 -ip 1572
                                                                                                  1⤵
                                                                                                    PID:4520
                                                                                                  • C:\Windows\windefender.exe
                                                                                                    C:\Windows\windefender.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:5024
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E116.bat" "
                                                                                                    1⤵
                                                                                                      PID:1212
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
                                                                                                        2⤵
                                                                                                          PID:948
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\E7BE.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\E7BE.exe
                                                                                                        1⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        PID:4984
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                          2⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Drops startup file
                                                                                                          PID:4084
                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"
                                                                                                            3⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:4956
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\F6C3.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\F6C3.exe
                                                                                                        1⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        PID:3380
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                                                                                          2⤵
                                                                                                            PID:5036

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\ProgramData\Are.docx

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          a33e5b189842c5867f46566bdbf7a095

                                                                                                          SHA1

                                                                                                          e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                                                                          SHA256

                                                                                                          5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                                                                          SHA512

                                                                                                          f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                                                                        • C:\ProgramData\mozglue.dll

                                                                                                          Filesize

                                                                                                          593KB

                                                                                                          MD5

                                                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                                                          SHA1

                                                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                          SHA256

                                                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                          SHA512

                                                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                        • C:\ProgramData\nss3.dll

                                                                                                          Filesize

                                                                                                          2.0MB

                                                                                                          MD5

                                                                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                          SHA1

                                                                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                          SHA256

                                                                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                          SHA512

                                                                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1289.exe

                                                                                                          Filesize

                                                                                                          287KB

                                                                                                          MD5

                                                                                                          263d29d8b5135fc48c8e955dfcd12e29

                                                                                                          SHA1

                                                                                                          6b8a4a62c7aa5ee676620f2c8877cac42abc3621

                                                                                                          SHA256

                                                                                                          44cbb62968b251236aef9a8ebd7e3ab8feee62e7f70b7c0de5bdee8f41a21db5

                                                                                                          SHA512

                                                                                                          0c1725a6f822460200d76a8fd85850436480246e193b776348f6bb2ab78baab7660a2130af40c77dcf8f20eff6e62e0cc969297658758aa5ac5e2b880b0381c6

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                                                                          Filesize

                                                                                                          3.2MB

                                                                                                          MD5

                                                                                                          00b04081f0e4e76e8ce00bea302d091f

                                                                                                          SHA1

                                                                                                          5d9ec439c4957d7a3b1253c3efe7fa7f546ea23e

                                                                                                          SHA256

                                                                                                          c850a152643b2a9802f5509cf3240f03d13366e28327c3aa0e92964d411b764e

                                                                                                          SHA512

                                                                                                          e0c9b477dc994f6962a911a46f17430e6405dea997a87a9d2d853c85d1a04e8efeed07b8c70afee9541b95bb5251b0426357f75a374f704e266f09d31d0bf1c3

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                                                                          Filesize

                                                                                                          4.2MB

                                                                                                          MD5

                                                                                                          a81139f25bcb6daca5d21f7c112342bb

                                                                                                          SHA1

                                                                                                          c749bbad487af9e54dca3c232bae628b1ee4e01a

                                                                                                          SHA256

                                                                                                          5fac6b8c422f2b2d6c3e7ae10a2271ad911eb7c45a6ec838a1050a744ff786be

                                                                                                          SHA512

                                                                                                          b963409735ece02eee1f721f34627cd0776ecc7966740bcc3cf9909bfb397154010829223f8918ebfe4a13e3cb1404d38a79e08b895c2665d95d669de7a6fdbb

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                                                                          Filesize

                                                                                                          3.4MB

                                                                                                          MD5

                                                                                                          a696f5e54a23149832d0fc223b255260

                                                                                                          SHA1

                                                                                                          cecadfe7ce14bb82859414a06b6c7f05c1e41e94

                                                                                                          SHA256

                                                                                                          3d116115f8d891cdfbc7b206e9edff4906161169c9354d350795b05fb7bcd8da

                                                                                                          SHA512

                                                                                                          30e2556abc80efde45c6b06bbdadf3d4fc843612fa3c806a0f5a2f50a010e96aa45b32ffc4e78c0fd9883e0c430c139f0109cbcd87209bd9816a7af923ee0ef9

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                          MD5

                                                                                                          f7f7cf6660d4978b5153d49ac2152431

                                                                                                          SHA1

                                                                                                          bb32096394fa90cefce692720589551880f88f96

                                                                                                          SHA256

                                                                                                          4ffc362bccf692fb78b941742f621672697a41a4e885b05e084cd592eee62ad3

                                                                                                          SHA512

                                                                                                          902b8c354521a5f2e5030b6b797a36c48d78f8586e9b6b133bc484dfab2f88e8319b4371899aa7077705f3bf78603f19c668a5403f114d00b5d82f4c6a2bd4be

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E116.bat

                                                                                                          Filesize

                                                                                                          77B

                                                                                                          MD5

                                                                                                          55cc761bf3429324e5a0095cab002113

                                                                                                          SHA1

                                                                                                          2cc1ef4542a4e92d4158ab3978425d517fafd16d

                                                                                                          SHA256

                                                                                                          d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                                                                                                          SHA512

                                                                                                          33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E7BE.exe

                                                                                                          Filesize

                                                                                                          535KB

                                                                                                          MD5

                                                                                                          c85359e6fcc2b3aad2407a8769d8d1f1

                                                                                                          SHA1

                                                                                                          77adb2c84465aeef9ef0f8ddb12b0165610b57da

                                                                                                          SHA256

                                                                                                          8934e11fa9c967fe8e67d9fc1c1f518f18c107b6abc91b143e03e5b18f892782

                                                                                                          SHA512

                                                                                                          2f3c97978972293ca5a17838d173ad4554731edcc12e848bc27063a13ed5ca9bf0b8483f247891cf97be83e531ddab011d3c2b8156c92da8ec56a1a0b4c033a3

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\F6C3.exe

                                                                                                          Filesize

                                                                                                          896KB

                                                                                                          MD5

                                                                                                          dca99284fc9f5d1a1c5a413e3a4856a7

                                                                                                          SHA1

                                                                                                          4916225a7e93271f884115de0ac40c6a67bd1d25

                                                                                                          SHA256

                                                                                                          b943c2ecf00c5ba3ce4e094eb459546f0ff21e74e3dd64ae9f6e988a14ad8ebd

                                                                                                          SHA512

                                                                                                          5482f81439f904f22e4b21b95caed82fca83fbcdbb7e415e210f5ee440b49898cb08ed47f7506daf288f4f60db059de2894ee562ff1823a6944884819b889f55

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\F6C3.exe

                                                                                                          Filesize

                                                                                                          2.4MB

                                                                                                          MD5

                                                                                                          2efd96720e653416a85f1160dba75e05

                                                                                                          SHA1

                                                                                                          a58360dd9c1151f43df5952a1d989f77f945f559

                                                                                                          SHA256

                                                                                                          158858ca8fd7ec50c9a8502221740b83cea3bf4453b245966e1abfc65de2e702

                                                                                                          SHA512

                                                                                                          3b4841f04f6074cd461a9898fa07cb6863afe771ed6935399d0ba20be523ffaf7754481db4d8ac76c0cf1f40f7e998aea0d7224e93a431acf703898688811b4c

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

                                                                                                          Filesize

                                                                                                          1.2MB

                                                                                                          MD5

                                                                                                          2b61140c4e131b691d726acdc209eafb

                                                                                                          SHA1

                                                                                                          000043a7b74bd6cec46ab97c671694637a54b026

                                                                                                          SHA256

                                                                                                          e584ec5401cc6ab5e0d1de2bcf8350657b80f9fd17ad9fcf8d73ecff1325d420

                                                                                                          SHA512

                                                                                                          477f74d3c99587f4e74c9db9590de918d8cb467e0a07267d3473f228bc146bf66ddccecf00d055bf17f38d7b4b63170a733b00321fd65f06a2b3f6790a0d3db5

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

                                                                                                          Filesize

                                                                                                          2.0MB

                                                                                                          MD5

                                                                                                          1bf708425e397e8cd7784d14322f0435

                                                                                                          SHA1

                                                                                                          77e4209e868eb1115dda3ebb64e37ddddd2a825c

                                                                                                          SHA256

                                                                                                          8a94354407a01f31848af8bea6aa9fc300a852e66c096e78015585fa3eea546a

                                                                                                          SHA512

                                                                                                          93b58cea1c32f9b76b91b8e1f3422a4e8a9e95f30ddca2fee0a309640f6137b8f52a82d6d05ba33dd3aa3bb91208762edf12f0d26c4c38771e23297ab0d3a29a

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

                                                                                                          Filesize

                                                                                                          742KB

                                                                                                          MD5

                                                                                                          544cd51a596619b78e9b54b70088307d

                                                                                                          SHA1

                                                                                                          4769ddd2dbc1dc44b758964ed0bd231b85880b65

                                                                                                          SHA256

                                                                                                          dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

                                                                                                          SHA512

                                                                                                          f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fk3qggzi.rhh.ps1

                                                                                                          Filesize

                                                                                                          60B

                                                                                                          MD5

                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                          SHA1

                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                          SHA256

                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                          SHA512

                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                                                                          Filesize

                                                                                                          281KB

                                                                                                          MD5

                                                                                                          d98e33b66343e7c96158444127a117f6

                                                                                                          SHA1

                                                                                                          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                                                                          SHA256

                                                                                                          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                                                                          SHA512

                                                                                                          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsb7D6F.tmp

                                                                                                          Filesize

                                                                                                          328KB

                                                                                                          MD5

                                                                                                          38fd35b8131d42f467b1992d2e066733

                                                                                                          SHA1

                                                                                                          90bc2a4ff3760f1a17ca61fe7c8c8458f203b4d7

                                                                                                          SHA256

                                                                                                          dea886ee959d041eeecc1f0ed9e015d9e24879dd6dda919810609d84832a228f

                                                                                                          SHA512

                                                                                                          a4437978f153e6d842b67c41df1e5446b79f44bcdd59cd245762a0a488f76fe284322e10bb2242d186b1e60e9412ada8120be8699a2c76ce143375628562f544

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nsh734C.tmp\INetC.dll

                                                                                                          Filesize

                                                                                                          25KB

                                                                                                          MD5

                                                                                                          40d7eca32b2f4d29db98715dd45bfac5

                                                                                                          SHA1

                                                                                                          124df3f617f562e46095776454e1c0c7bb791cc7

                                                                                                          SHA256

                                                                                                          85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                                                                                                          SHA512

                                                                                                          5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\rty25.exe

                                                                                                          Filesize

                                                                                                          715KB

                                                                                                          MD5

                                                                                                          0b374be36fee0eae8b1e305f1e4073f5

                                                                                                          SHA1

                                                                                                          3e5f24441b9f00c3e5beb7ef2438d1868259d852

                                                                                                          SHA256

                                                                                                          bbd48c58bc41696a56c317d9650057c725642e5c1dee71a8b4f0b9cbd9095ad4

                                                                                                          SHA512

                                                                                                          f8abf77020dfe9cba6c8afb6535a86338a8923dac7d3a81ce78110302708611109c3b80104178ec6dcd95ce7d9e60829fa8b88c7411aa726699aec04eaaccb9c

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe

                                                                                                          Filesize

                                                                                                          175KB

                                                                                                          MD5

                                                                                                          01fb175d82c6078ebfe27f5de4d8d2aa

                                                                                                          SHA1

                                                                                                          ff655d5908a109af47a62670ff45008cc9e430c4

                                                                                                          SHA256

                                                                                                          a07112e236e0136b43294b31a43fb4456072941a135853e761680d04315841c3

                                                                                                          SHA512

                                                                                                          c388d632c5274aa47d605f3c49a6754d4ad581eb375c54ce82424cffa2ad86410a2ad646867a571dcf153e494b4e7ca7a7cf6952b99ddcf5940a443f7039f2fe

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                          MD5

                                                                                                          a5ce3aba68bdb438e98b1d0c70a3d95c

                                                                                                          SHA1

                                                                                                          013f5aa9057bf0b3c0c24824de9d075434501354

                                                                                                          SHA256

                                                                                                          9b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a

                                                                                                          SHA512

                                                                                                          7446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79

                                                                                                        • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                                                                          Filesize

                                                                                                          128B

                                                                                                          MD5

                                                                                                          11bb3db51f701d4e42d3287f71a6a43e

                                                                                                          SHA1

                                                                                                          63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                                                                          SHA256

                                                                                                          6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                                                                          SHA512

                                                                                                          907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          3d086a433708053f9bf9523e1d87a4e8

                                                                                                          SHA1

                                                                                                          b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                                                                                                          SHA256

                                                                                                          6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                                                                                                          SHA512

                                                                                                          931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                          Filesize

                                                                                                          19KB

                                                                                                          MD5

                                                                                                          2a8b7b21a991ff9abc007808068ea214

                                                                                                          SHA1

                                                                                                          e631cb5ff81c0b8aa737b98e9f5113f78f9cc167

                                                                                                          SHA256

                                                                                                          5e9551b84683dd18074e7eda3e4617929e866ea8873903c362da68a216c56942

                                                                                                          SHA512

                                                                                                          4b00f12daa142fc4b46dbbefc1ad5600dd3fa4a123e90051de1a2975319e929e0725a58b4e08c2adce4a6fb92c8f59d27ceb28a7b9713cbce06409fef386f462

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                          Filesize

                                                                                                          19KB

                                                                                                          MD5

                                                                                                          a17544195d0ac8ee9d012d9f936fac61

                                                                                                          SHA1

                                                                                                          76c57be009da0490f7851fc31bf8693be491a576

                                                                                                          SHA256

                                                                                                          46bd436505a52a5538a7e49392a8e8a70b300f799282b2beb998a8e21af08c6b

                                                                                                          SHA512

                                                                                                          0ae80b25685232eecb033d0a99f9941637ee15ed46807af078232eb536451b38cd25c4a414dfed0b77b9760d21b217d74202a1242a48c236b39c5685a7794cd8

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                          Filesize

                                                                                                          19KB

                                                                                                          MD5

                                                                                                          84f9caaa71d0108e05e098606bcb3c83

                                                                                                          SHA1

                                                                                                          334c2ee0724c79dc8fc738298473e2c9fa293476

                                                                                                          SHA256

                                                                                                          4d8d9cb3a1381b301f8a234a7d83c0e10c0391c1c31b63b7634daa829a9dc712

                                                                                                          SHA512

                                                                                                          589dd26954eec892bcd907461c35adbbf398462f94f0d11489171c559419c1ba08eb50f52143f35590eb2432916d8ef15d1644f73d636339c92c0826f1e39ac5

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                          Filesize

                                                                                                          19KB

                                                                                                          MD5

                                                                                                          2cc2b2becb8f1a18eb81ae6ae81b3300

                                                                                                          SHA1

                                                                                                          c47374b46d3ca18deaa15c4b455cf4aaee9eaf5f

                                                                                                          SHA256

                                                                                                          c9d60de514afecbf3bb54c1b064b05bd87ca505e914812b45fc60ad816b270ff

                                                                                                          SHA512

                                                                                                          7b5d0a0f78dfe0f7ce3f31f087e2bd1acfb18b0d40c32cea37c0b6cc88665f1ffb00c7791a537e94190e691517978b1f79e9c9d8873d967793e30d37ec79c420

                                                                                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                          Filesize

                                                                                                          19KB

                                                                                                          MD5

                                                                                                          44ac8bebe63f3eebb33eaa5f4acaa72c

                                                                                                          SHA1

                                                                                                          ffa7b6eb767cd873a8af8d55d83dda54412d747e

                                                                                                          SHA256

                                                                                                          c3ab1f67f053164b9fc017525ef5eca6652700c85ce12ee096f59a664ee27fa0

                                                                                                          SHA512

                                                                                                          ab51de48be86986f26c4eaf979d0cb4e4e91f67f2cfef7cd7f2dd7d7a3200cdbfa31c1cde5b90c0b65b76a33578a45d6dc7a5c1fea6110a156657f81a800b092

                                                                                                        • C:\Windows\windefender.exe

                                                                                                          Filesize

                                                                                                          2.0MB

                                                                                                          MD5

                                                                                                          8e67f58837092385dcf01e8a2b4f5783

                                                                                                          SHA1

                                                                                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                                                                          SHA256

                                                                                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                                                                          SHA512

                                                                                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                                                                        • C:\Windows\windefender.exe

                                                                                                          Filesize

                                                                                                          1.3MB

                                                                                                          MD5

                                                                                                          3a74965dcc7dedffb5b90d2669bc9f75

                                                                                                          SHA1

                                                                                                          98dd6683882c99e2c6b5ceece54923aab669f738

                                                                                                          SHA256

                                                                                                          b5c6e718d4bd7c57e9a8ebffdef77fc888271918d1b1fc7a77a7e314f5c6f553

                                                                                                          SHA512

                                                                                                          03e4a5223fc8c0ee3db3234c4292c2609727dc13bfe6a7954a26ecf48c8bd3783c8858edf4a8b8f34d6f9eda5810d0abae76c5b58fda78a16aeb5adff015e640

                                                                                                        • memory/376-282-0x0000000000400000-0x0000000002BF4000-memory.dmp

                                                                                                          Filesize

                                                                                                          40.0MB

                                                                                                        • memory/376-271-0x0000000002ED0000-0x0000000002FD0000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/376-288-0x0000000000400000-0x0000000002BF4000-memory.dmp

                                                                                                          Filesize

                                                                                                          40.0MB

                                                                                                        • memory/1336-240-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1336-366-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1336-335-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1336-269-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1336-236-0x00000000010A0000-0x00000000014A8000-memory.dmp

                                                                                                          Filesize

                                                                                                          4.0MB

                                                                                                        • memory/1484-0-0x00000000745F0000-0x0000000074DA0000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.7MB

                                                                                                        • memory/1484-1-0x00000000009F0000-0x000000000111C000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.2MB

                                                                                                        • memory/1484-51-0x00000000745F0000-0x0000000074DA0000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.7MB

                                                                                                        • memory/1572-525-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1572-480-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1572-551-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1572-472-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1572-404-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/1688-487-0x0000000000400000-0x00000000008DF000-memory.dmp

                                                                                                          Filesize

                                                                                                          4.9MB

                                                                                                        • memory/1832-266-0x000000007F9C0000-0x000000007F9D0000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/1832-281-0x0000000007350000-0x00000000073F3000-memory.dmp

                                                                                                          Filesize

                                                                                                          652KB

                                                                                                        • memory/1832-261-0x0000000004C40000-0x0000000004C50000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/1832-258-0x00000000063D0000-0x000000000641C000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/1832-254-0x0000000005D40000-0x0000000006094000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/1832-243-0x0000000004C40000-0x0000000004C50000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/1832-244-0x0000000004C40000-0x0000000004C50000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/1832-242-0x00000000737C0000-0x0000000073F70000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.7MB

                                                                                                        • memory/1832-268-0x00000000745D0000-0x000000007461C000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/1832-270-0x00000000705A0000-0x00000000708F4000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/2136-209-0x0000000071180000-0x00000000711CC000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/2136-179-0x0000000004F90000-0x0000000004FB2000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/2136-221-0x0000000007510000-0x00000000075B3000-memory.dmp

                                                                                                          Filesize

                                                                                                          652KB

                                                                                                        • memory/2136-222-0x0000000007600000-0x000000000760A000-memory.dmp

                                                                                                          Filesize

                                                                                                          40KB

                                                                                                        • memory/2136-223-0x00000000076C0000-0x0000000007756000-memory.dmp

                                                                                                          Filesize

                                                                                                          600KB

                                                                                                        • memory/2136-224-0x0000000007620000-0x0000000007631000-memory.dmp

                                                                                                          Filesize

                                                                                                          68KB

                                                                                                        • memory/2136-225-0x0000000007680000-0x000000000768E000-memory.dmp

                                                                                                          Filesize

                                                                                                          56KB

                                                                                                        • memory/2136-226-0x0000000007690000-0x00000000076A4000-memory.dmp

                                                                                                          Filesize

                                                                                                          80KB

                                                                                                        • memory/2136-227-0x0000000007780000-0x000000000779A000-memory.dmp

                                                                                                          Filesize

                                                                                                          104KB

                                                                                                        • memory/2136-228-0x0000000007770000-0x0000000007778000-memory.dmp

                                                                                                          Filesize

                                                                                                          32KB

                                                                                                        • memory/2136-231-0x0000000073430000-0x0000000073BE0000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.7MB

                                                                                                        • memory/2136-174-0x0000000002980000-0x00000000029B6000-memory.dmp

                                                                                                          Filesize

                                                                                                          216KB

                                                                                                        • memory/2136-210-0x000000006E470000-0x000000006E7C4000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/2136-175-0x0000000005050000-0x0000000005678000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.2MB

                                                                                                        • memory/2136-178-0x0000000002970000-0x0000000002980000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/2136-220-0x00000000074B0000-0x00000000074CE000-memory.dmp

                                                                                                          Filesize

                                                                                                          120KB

                                                                                                        • memory/2136-208-0x00000000074D0000-0x0000000007502000-memory.dmp

                                                                                                          Filesize

                                                                                                          200KB

                                                                                                        • memory/2136-177-0x0000000002970000-0x0000000002980000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/2136-207-0x000000007F370000-0x000000007F380000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/2136-206-0x0000000007320000-0x000000000733A000-memory.dmp

                                                                                                          Filesize

                                                                                                          104KB

                                                                                                        • memory/2136-205-0x0000000007980000-0x0000000007FFA000-memory.dmp

                                                                                                          Filesize

                                                                                                          6.5MB

                                                                                                        • memory/2136-204-0x0000000007280000-0x00000000072F6000-memory.dmp

                                                                                                          Filesize

                                                                                                          472KB

                                                                                                        • memory/2136-203-0x0000000002970000-0x0000000002980000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB

                                                                                                        • memory/2136-176-0x0000000073430000-0x0000000073BE0000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.7MB

                                                                                                        • memory/2136-195-0x00000000064A0000-0x00000000064E4000-memory.dmp

                                                                                                          Filesize

                                                                                                          272KB

                                                                                                        • memory/2136-180-0x0000000005870000-0x00000000058D6000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/2136-193-0x0000000006000000-0x000000000604C000-memory.dmp

                                                                                                          Filesize

                                                                                                          304KB

                                                                                                        • memory/2136-192-0x0000000004CB0000-0x0000000004CCE000-memory.dmp

                                                                                                          Filesize

                                                                                                          120KB

                                                                                                        • memory/2136-191-0x0000000005A60000-0x0000000005DB4000-memory.dmp

                                                                                                          Filesize

                                                                                                          3.3MB

                                                                                                        • memory/2136-181-0x00000000058E0000-0x0000000005946000-memory.dmp

                                                                                                          Filesize

                                                                                                          408KB

                                                                                                        • memory/2300-194-0x0000000000400000-0x0000000002BFF000-memory.dmp

                                                                                                          Filesize

                                                                                                          40.0MB

                                                                                                        • memory/2300-79-0x0000000002E70000-0x0000000002EA4000-memory.dmp

                                                                                                          Filesize

                                                                                                          208KB

                                                                                                        • memory/2300-78-0x0000000002F20000-0x0000000003020000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/2300-173-0x0000000000400000-0x0000000002BFF000-memory.dmp

                                                                                                          Filesize

                                                                                                          40.0MB

                                                                                                        • memory/2300-85-0x0000000000400000-0x0000000002BFF000-memory.dmp

                                                                                                          Filesize

                                                                                                          40.0MB

                                                                                                        • memory/2300-95-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                          Filesize

                                                                                                          972KB

                                                                                                        • memory/2600-83-0x0000000000400000-0x0000000002B04000-memory.dmp

                                                                                                          Filesize

                                                                                                          39.0MB

                                                                                                        • memory/2600-59-0x0000000002B50000-0x0000000002B5B000-memory.dmp

                                                                                                          Filesize

                                                                                                          44KB

                                                                                                        • memory/2600-52-0x0000000000400000-0x0000000002B04000-memory.dmp

                                                                                                          Filesize

                                                                                                          39.0MB

                                                                                                        • memory/2600-31-0x0000000002C40000-0x0000000002D40000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3172-287-0x0000000007100000-0x0000000007116000-memory.dmp

                                                                                                          Filesize

                                                                                                          88KB

                                                                                                        • memory/3172-80-0x00000000028B0000-0x00000000028C6000-memory.dmp

                                                                                                          Filesize

                                                                                                          88KB

                                                                                                        • memory/4060-239-0x0000000000990000-0x0000000000991000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/4060-549-0x0000000000400000-0x00000000008E2000-memory.dmp

                                                                                                          Filesize

                                                                                                          4.9MB

                                                                                                        • memory/4060-147-0x0000000000400000-0x00000000008E2000-memory.dmp

                                                                                                          Filesize

                                                                                                          4.9MB

                                                                                                        • memory/4060-65-0x0000000000990000-0x0000000000991000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/4084-507-0x0000000000400000-0x0000000000462000-memory.dmp

                                                                                                          Filesize

                                                                                                          392KB

                                                                                                        • memory/4648-89-0x0000000002D80000-0x0000000002E8A000-memory.dmp

                                                                                                          Filesize

                                                                                                          1.0MB

                                                                                                        • memory/4648-88-0x0000000002FC0000-0x00000000030EC000-memory.dmp

                                                                                                          Filesize

                                                                                                          1.2MB

                                                                                                        • memory/4648-241-0x0000000002FC0000-0x00000000030EC000-memory.dmp

                                                                                                          Filesize

                                                                                                          1.2MB

                                                                                                        • memory/4648-64-0x00007FF7998A0000-0x00007FF799957000-memory.dmp

                                                                                                          Filesize

                                                                                                          732KB

                                                                                                        • memory/4656-201-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/4656-58-0x0000000001090000-0x0000000001498000-memory.dmp

                                                                                                          Filesize

                                                                                                          4.0MB

                                                                                                        • memory/4656-238-0x0000000001090000-0x0000000001498000-memory.dmp

                                                                                                          Filesize

                                                                                                          4.0MB

                                                                                                        • memory/4656-57-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/4656-53-0x0000000002D40000-0x000000000362B000-memory.dmp

                                                                                                          Filesize

                                                                                                          8.9MB

                                                                                                        • memory/4656-146-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/4656-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/4656-233-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                                                                          Filesize

                                                                                                          9.1MB

                                                                                                        • memory/5024-528-0x0000000000400000-0x00000000008DF000-memory.dmp

                                                                                                          Filesize

                                                                                                          4.9MB