Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 01:22

General

  • Target

    82ae530eb29e0c64986dbd019f86cac5eff3daf3c1fb861757a60252eb1e4661.exe

  • Size

    23.9MB

  • MD5

    585d78b9ffc988d345e7a2a0ee119111

  • SHA1

    65b5c6a6c72a845d5610d82ca2aa9a301a907e43

  • SHA256

    82ae530eb29e0c64986dbd019f86cac5eff3daf3c1fb861757a60252eb1e4661

  • SHA512

    574c1f9ecaaeee0cc7afb989e3c3d309beedf3b114fbbb0aa491a285d94e27b4e87626a109805d06edcace458441189cc2dbcd17588c670ce8788c9e8e3a9772

  • SSDEEP

    393216:849/fUrtpuKs+JINSpjQNjqsVsUzpX/Swl6YdecNbLX3IjD4BzB/RLG0jV7ZIfue:cBZs+JIgpjQosVRlKwlOq/X2EtF9IGe

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Detects executables packed with unregistered version of .NET Reactor 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 4 TTPs
  • .NET Reactor proctector 3 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 37 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1020
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:664
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:952
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:748
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:892
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1080
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1088
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1100
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2692
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1156
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1220
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                            • Drops file in System32 directory
                            PID:1276
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1328
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2540
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                1⤵
                                  PID:1412
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1444
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1456
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                      1⤵
                                        PID:1564
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1584
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1628
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            1⤵
                                              PID:1660
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1736
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                1⤵
                                                  PID:1768
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1852
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1860
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1868
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                        1⤵
                                                          PID:1932
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2040
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2104
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2228
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                1⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2308
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2404
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2412
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                    1⤵
                                                                      PID:2572
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      • Modifies registry class
                                                                      PID:2644
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2716
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:2752
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2784
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2792
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                            1⤵
                                                                              PID:3032
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:2248
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                1⤵
                                                                                  PID:3360
                                                                                • C:\Windows\Explorer.EXE
                                                                                  C:\Windows\Explorer.EXE
                                                                                  1⤵
                                                                                  • Suspicious use of UnmapMainImage
                                                                                  PID:3488
                                                                                  • C:\Users\Admin\AppData\Local\Temp\82ae530eb29e0c64986dbd019f86cac5eff3daf3c1fb861757a60252eb1e4661.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\82ae530eb29e0c64986dbd019f86cac5eff3daf3c1fb861757a60252eb1e4661.exe"
                                                                                    2⤵
                                                                                    • Checks computer location settings
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4964
                                                                                    • C:\Users\Admin\AppData\Local\Temp\build.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\build.exe"
                                                                                      3⤵
                                                                                      • Drops file in Drivers directory
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:1536
                                                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                        4⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4188
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                        4⤵
                                                                                          PID:3476
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            5⤵
                                                                                              PID:4392
                                                                                            • C:\Windows\system32\wusa.exe
                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                              5⤵
                                                                                                PID:4768
                                                                                            • C:\Windows\system32\dialer.exe
                                                                                              C:\Windows\system32\dialer.exe
                                                                                              4⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:212
                                                                                            • C:\Windows\system32\sc.exe
                                                                                              C:\Windows\system32\sc.exe delete "WinUpdater"
                                                                                              4⤵
                                                                                              • Launches sc.exe
                                                                                              PID:4488
                                                                                            • C:\Windows\system32\sc.exe
                                                                                              C:\Windows\system32\sc.exe create "WinUpdater" binpath= "C:\ProgramData\WindowsUpdate\WinUpdater.exe" start= "auto"
                                                                                              4⤵
                                                                                              • Launches sc.exe
                                                                                              PID:1840
                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                5⤵
                                                                                                  PID:4596
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                C:\Windows\system32\sc.exe stop eventlog
                                                                                                4⤵
                                                                                                • Launches sc.exe
                                                                                                PID:4816
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:2836
                                                                                                • C:\Windows\system32\sc.exe
                                                                                                  C:\Windows\system32\sc.exe start "WinUpdater"
                                                                                                  4⤵
                                                                                                  • Launches sc.exe
                                                                                                  PID:2136
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    5⤵
                                                                                                      PID:5036
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\build.exe"
                                                                                                    4⤵
                                                                                                      PID:3372
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        5⤵
                                                                                                          PID:3524
                                                                                                        • C:\Windows\system32\choice.exe
                                                                                                          choice /C Y /N /D Y /T 3
                                                                                                          5⤵
                                                                                                            PID:2084
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"
                                                                                                        3⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:5024
                                                                                                        • C:\Windows\SysWOW64\WScript.exe
                                                                                                          "C:\Windows\System32\WScript.exe" "C:\WindowsUpdate\TEUXpnVW2Rogcdt2Uv.vbe"
                                                                                                          4⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:3988
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\WindowsUpdate\2UpMr4oh.bat" "
                                                                                                            5⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:4472
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              6⤵
                                                                                                                PID:4692
                                                                                                              • C:\WindowsUpdate\WindowsUpdate.exe
                                                                                                                "C:\WindowsUpdate\WindowsUpdate.exe"
                                                                                                                6⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:4668
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\323.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\323.exe"
                                                                                                          3⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2380
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\MVPInstaller.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\MVPInstaller.exe"
                                                                                                          3⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Loads dropped DLL
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:2332
                                                                                                          • C:\Users\Admin\AppData\Roaming\MVPInstaller\MVPInstaller.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\MVPInstaller\MVPInstaller.exe"
                                                                                                            4⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:4040
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MVPInstaller.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\RarSFX0\MVPInstaller.exe"
                                                                                                              5⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:4752
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd.exe /c deldll.bat
                                                                                                            4⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:4500
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              5⤵
                                                                                                                PID:3496
                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                ping -n 2 -w 1000 127.0.0.1
                                                                                                                5⤵
                                                                                                                • Runs ping.exe
                                                                                                                PID:1012
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                        1⤵
                                                                                                          PID:3588
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:3796
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                            • Modifies registry class
                                                                                                            • Suspicious use of UnmapMainImage
                                                                                                            PID:3952
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:824
                                                                                                            • C:\Windows\system32\SppExtComObj.exe
                                                                                                              C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:2900
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                1⤵
                                                                                                                  PID:2676
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                  1⤵
                                                                                                                    PID:816
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                    1⤵
                                                                                                                      PID:2772
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                      1⤵
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:5064
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                      1⤵
                                                                                                                        PID:1464
                                                                                                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                        1⤵
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:3536
                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                        1⤵
                                                                                                                          PID:4396
                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:4860
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:4072
                                                                                                                            • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                              1⤵
                                                                                                                                PID:4196
                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                • Modifies registry class
                                                                                                                                PID:4452
                                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                1⤵
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Checks SCSI registry key(s)
                                                                                                                                • Checks processor information in registry
                                                                                                                                • Enumerates system info in registry
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:3996
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                1⤵
                                                                                                                                  PID:4336
                                                                                                                                • C:\ProgramData\WindowsUpdate\WinUpdater.exe
                                                                                                                                  C:\ProgramData\WindowsUpdate\WinUpdater.exe
                                                                                                                                  1⤵
                                                                                                                                  • Drops file in Drivers directory
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:3880
                                                                                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                    2⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    PID:4188
                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      3⤵
                                                                                                                                        PID:4284
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                      2⤵
                                                                                                                                        PID:4500
                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          3⤵
                                                                                                                                            PID:4424
                                                                                                                                          • C:\Windows\system32\wusa.exe
                                                                                                                                            wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                            3⤵
                                                                                                                                              PID:3528
                                                                                                                                          • C:\Windows\system32\dialer.exe
                                                                                                                                            C:\Windows\system32\dialer.exe
                                                                                                                                            2⤵
                                                                                                                                              PID:4812
                                                                                                                                            • C:\Windows\system32\dialer.exe
                                                                                                                                              C:\Windows\system32\dialer.exe
                                                                                                                                              2⤵
                                                                                                                                                PID:1808
                                                                                                                                              • C:\Windows\system32\dialer.exe
                                                                                                                                                dialer.exe
                                                                                                                                                2⤵
                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                PID:676
                                                                                                                                            • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                              "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                                              1⤵
                                                                                                                                                PID:4056
                                                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                1⤵
                                                                                                                                                  PID:912
                                                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2704

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                                    Filesize

                                                                                                                                                    338B

                                                                                                                                                    MD5

                                                                                                                                                    3ce707d7d300fd9eb9fb22e77533e5dd

                                                                                                                                                    SHA1

                                                                                                                                                    c1509156adeabd80313a84f91718fa93b59430fe

                                                                                                                                                    SHA256

                                                                                                                                                    6e23e39f94d71500504e82ef78560d8fd6bd7ebdffd52be98091c0e5246233e4

                                                                                                                                                    SHA512

                                                                                                                                                    988764e6d172abce4bf4af965d30e7b97569a51792351977a794b3d2a5d98d7bf30c515fde66d11b98a9cfb7d88a6e6e733c1478c4c39ebb1d43900c56e852db

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                                    Filesize

                                                                                                                                                    338B

                                                                                                                                                    MD5

                                                                                                                                                    43219d69869eb469bb0239213914a5e0

                                                                                                                                                    SHA1

                                                                                                                                                    55d3cf44beb911f5dae5bc4691d233eafb0fdd8c

                                                                                                                                                    SHA256

                                                                                                                                                    5dbb315f7737140bca7c8ee64f6d65e3959956e8c82e763c1b41b17b258b1e78

                                                                                                                                                    SHA512

                                                                                                                                                    dbab694ed40879a7504b5ca5f64f43130d24d3b39e679fb275709cd2b06b9d53c5ccad66dd0ddb0bae6592a5fa7b5b561564b08de73308c769270f3ff0f4bb64

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\323.exe

                                                                                                                                                    Filesize

                                                                                                                                                    457KB

                                                                                                                                                    MD5

                                                                                                                                                    53c1d38049f4318e577c3ab1bcc6e38f

                                                                                                                                                    SHA1

                                                                                                                                                    0bd051e27c86ef4858c94f2398d64958e130c448

                                                                                                                                                    SHA256

                                                                                                                                                    ad6baed534549a8eb75f44c05807581e0eb5fde56a8b3a64a741853bcb19a863

                                                                                                                                                    SHA512

                                                                                                                                                    938bcdfefc9a28bc9d6918db1df487d78c218e2f15e86cbab69f773eb366b1e822d65c2e82c05ff623f3a69981735badc182d67062cd2f7506ccc017ab7fc42d

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe

                                                                                                                                                    Filesize

                                                                                                                                                    3.0MB

                                                                                                                                                    MD5

                                                                                                                                                    caddb11f9014c4b6bd7f79306211899f

                                                                                                                                                    SHA1

                                                                                                                                                    1cef789bb00aa2bf87ce0b1dc612b577e05f6e7a

                                                                                                                                                    SHA256

                                                                                                                                                    5be33a975fb052c1a4338ed8deca2641f5a9fa52f2cf3c6fd71b420fff462440

                                                                                                                                                    SHA512

                                                                                                                                                    fa5c582eb75c6d8dd03f455f328b9ceb5b509f9d0fd659cd7521771940105e9e108c900edbaf685c0b5090825df46cc8c98fd383ce2f08bf74edcdc3546110ea

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\MVPInstaller.exe

                                                                                                                                                    Filesize

                                                                                                                                                    15.1MB

                                                                                                                                                    MD5

                                                                                                                                                    85059372ceca7eff4ac1642bd631b93e

                                                                                                                                                    SHA1

                                                                                                                                                    f59d24530e896d688792fa022fda50417722ebd8

                                                                                                                                                    SHA256

                                                                                                                                                    6e4c820de03c72d71c43d24885b7e1f2462bcced03114b31eac8bccc9ec924c9

                                                                                                                                                    SHA512

                                                                                                                                                    bfd54c1c39658f97a10b8baf75a83a658e7d7e66afeaf291df6eb77fc0f4b4173850b336d6af1f4992f6918049acf5f747383deecc63b914562bf83cb9f11e5e

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MVPInstaller.exe

                                                                                                                                                    Filesize

                                                                                                                                                    340KB

                                                                                                                                                    MD5

                                                                                                                                                    3fb5bd0f25e277240fbad5b91a73c71b

                                                                                                                                                    SHA1

                                                                                                                                                    28614ac9c8c81e6c86895c834897d9401a7bb14d

                                                                                                                                                    SHA256

                                                                                                                                                    7dee5d5355599fd25903306b4868e5ad9f0c825e4d9589bc3ebf16020ee140f4

                                                                                                                                                    SHA512

                                                                                                                                                    94e1cbd82be09ea4316e5a4eaf7b3c439b811e1b8748dfc93a4165915d6b46fd076d15e641b19f27b6ca2f8fbe9257eec889b202ad367fe21b3086fc4e613031

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\app.so

                                                                                                                                                    Filesize

                                                                                                                                                    4.4MB

                                                                                                                                                    MD5

                                                                                                                                                    14d0a013e4ba7e748c77d14771f01120

                                                                                                                                                    SHA1

                                                                                                                                                    fbda934ba5e9864bd6625786b124df624972676b

                                                                                                                                                    SHA256

                                                                                                                                                    327c7235ddad44cb53f3387948a21a8ada6c776060e512f0d48a704920b1004c

                                                                                                                                                    SHA512

                                                                                                                                                    7e99c55e0210bd855db91883c74329f78c0bb20c55c80b088a03167670ae56258caf24d5373c896d2ca7120a1b8c174da36436b4aef0df14d8e57ca893bf867d

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\flutter_assets\AssetManifest.bin

                                                                                                                                                    Filesize

                                                                                                                                                    751B

                                                                                                                                                    MD5

                                                                                                                                                    f0ab28955a65dda7ec0745733b8d5704

                                                                                                                                                    SHA1

                                                                                                                                                    f1323494b94cea4017b553a78c045c19ffd6606f

                                                                                                                                                    SHA256

                                                                                                                                                    07c3ef8bcee38f84a1e57005a864a4404111fc96195aba4d630c8be969772310

                                                                                                                                                    SHA512

                                                                                                                                                    82b1be0370788065534d642dc43c01a248fa2cfaa97b4a7db60dda9cdf94d8f3c38f614fb54eef0bcbc332714c05ad4002baed903a826f529c2add1847d70a2f

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\flutter_assets\FontManifest.json

                                                                                                                                                    Filesize

                                                                                                                                                    499B

                                                                                                                                                    MD5

                                                                                                                                                    b2f01a90f24be87c4f4ae98e79090bf5

                                                                                                                                                    SHA1

                                                                                                                                                    ae7107f7e0d5fae6288e8a82cb1c0f67efbc0b3d

                                                                                                                                                    SHA256

                                                                                                                                                    eb4549732cd13d6c3874351c182ea15850fbf71f219fe1efe9a1cac19b6c9087

                                                                                                                                                    SHA512

                                                                                                                                                    422af00f1d8835598586687bec6162c52f6eb0234222f855301bceba8dd71a2bc0e720fa4148c360e77a44be97efc587dd3e2bef5c3cdece1a925f7cf93046ba

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\flutter_assets\assets\fonts\Montserrat-Bold.ttf

                                                                                                                                                    Filesize

                                                                                                                                                    255KB

                                                                                                                                                    MD5

                                                                                                                                                    88932dadc42e1bba93b21a76de60ef7a

                                                                                                                                                    SHA1

                                                                                                                                                    3320ff5514b32565b0396de4f2064ce17ec9eea4

                                                                                                                                                    SHA256

                                                                                                                                                    c4c8cb572a5a2c43d78b3701f4b2349684e6ca4d1557e469af6065b1e099c26c

                                                                                                                                                    SHA512

                                                                                                                                                    298e1e171dbbe386e1abe153446b883c40910819099f64f54dc9faa95d739be56839537342bbe8dd8408545cb1f8c98878a3524d91af1f11a112d1bfc202657a

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\flutter_assets\assets\fonts\gothampro_black.ttf

                                                                                                                                                    Filesize

                                                                                                                                                    39KB

                                                                                                                                                    MD5

                                                                                                                                                    efb0c02a5dbe65a7115b477e74c7a661

                                                                                                                                                    SHA1

                                                                                                                                                    e30324f4074bcc522a393cecaa62aa4b0e9205cc

                                                                                                                                                    SHA256

                                                                                                                                                    270d30776b7e5ccf0560b08e0db009f4b1d9753d43689d1e20bb1065e2a3c157

                                                                                                                                                    SHA512

                                                                                                                                                    0095fb9b0cd508c996cfdc11374a040ef064a22f188d7fbeb21f23c5f7f06aa2bce75e9ae22ec1c0e0f1b8e23003f67c8e8b5962c224c1295fb311e63a9b91f4

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\flutter_assets\assets\skeleton.gif

                                                                                                                                                    Filesize

                                                                                                                                                    776KB

                                                                                                                                                    MD5

                                                                                                                                                    a1f94e106f73bd7ff5d3d36d2eef917d

                                                                                                                                                    SHA1

                                                                                                                                                    549aa1d500f3754026c2cfd336351802126907ea

                                                                                                                                                    SHA256

                                                                                                                                                    d400caf56eec5bf44bdbfa754bb7bcb84651293497a59b45b1796df202ab9bfe

                                                                                                                                                    SHA512

                                                                                                                                                    f65e38fdf3a6215b6de29dd284a1dfb19fc1a6a9e5d8f7c7b47deeafe3d1c3d4e83dce6c9cecf0f004d78e04829d46d1451c857adaa47a983c99ec22f55314be

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\flutter_assets\fonts\MaterialIcons-Regular.otf

                                                                                                                                                    Filesize

                                                                                                                                                    1.6MB

                                                                                                                                                    MD5

                                                                                                                                                    e7069dfd19b331be16bed984668fe080

                                                                                                                                                    SHA1

                                                                                                                                                    fc25284ee3d0aaa75ec5fc8e4fd96926157ed8c4

                                                                                                                                                    SHA256

                                                                                                                                                    d9865b671a09d683d13a863089d8825e0f61a37696ce5d7d448bc8023aa62453

                                                                                                                                                    SHA512

                                                                                                                                                    27d9662a22c3e9fe66c261c45bf309e81be7a738ae5dc5b07ad90d207d9901785f3f11dc227c75ca683186b4553b0aa5a621f541c039475b0f032b7688aaa484

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\data\icudtl.dat

                                                                                                                                                    Filesize

                                                                                                                                                    798KB

                                                                                                                                                    MD5

                                                                                                                                                    cf772cf9f6ca67f592fe47da2a15adb1

                                                                                                                                                    SHA1

                                                                                                                                                    9cc4d99249bdba8a030daf00d98252c8aef7a0ff

                                                                                                                                                    SHA256

                                                                                                                                                    ac44ccc3f61bf630bb20fb8043d86cfe4c8995d06b460084400db45d70497b30

                                                                                                                                                    SHA512

                                                                                                                                                    0bec0d3a34a4ac1cc2ed81dba3bc52981c5dd391a68fe21132dfadb70e42ffbe8f3ba798185733d64a900fd2bb2403f9a8558e6666f2c1e2c0e818d8e3f154fc

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\flutter_windows.dll

                                                                                                                                                    Filesize

                                                                                                                                                    17.0MB

                                                                                                                                                    MD5

                                                                                                                                                    2eb35e2372de5fc7fde925c96de61d48

                                                                                                                                                    SHA1

                                                                                                                                                    a9eedd7cf44a6eab4e08df9ab0b33fd95ceb48fd

                                                                                                                                                    SHA256

                                                                                                                                                    80efad451cd0b674b9974ef286d29ef72f219999dd8f993585f9168d97895e6f

                                                                                                                                                    SHA512

                                                                                                                                                    18a03d297770707709fcada8dd0741bd39057d54b49125119ba8b7d21aa67284dece89947dc14721fe3084e69f03e816a2ed9ad79e82ffe279d7fd0a318ff029

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\msvcp140.dll

                                                                                                                                                    Filesize

                                                                                                                                                    558KB

                                                                                                                                                    MD5

                                                                                                                                                    bf78c15068d6671693dfcdfa5770d705

                                                                                                                                                    SHA1

                                                                                                                                                    4418c03c3161706a4349dfe3f97278e7a5d8962a

                                                                                                                                                    SHA256

                                                                                                                                                    a88b8c1c8f27bf90fe960e0e8bd56984ad48167071af92d96ec1051f89f827fb

                                                                                                                                                    SHA512

                                                                                                                                                    5b6b0ab4e82cc979eaa619d387c6995198fd19aa0c455bef44bd37a765685575d57448b3b4accd70d3bd20a6cd408b1f518eda0f6dae5aa106f225bee8291372

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\vcruntime140.dll

                                                                                                                                                    Filesize

                                                                                                                                                    94KB

                                                                                                                                                    MD5

                                                                                                                                                    11d9ac94e8cb17bd23dea89f8e757f18

                                                                                                                                                    SHA1

                                                                                                                                                    d4fb80a512486821ad320c4fd67abcae63005158

                                                                                                                                                    SHA256

                                                                                                                                                    e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e

                                                                                                                                                    SHA512

                                                                                                                                                    aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\vcruntime140_1.dll

                                                                                                                                                    Filesize

                                                                                                                                                    36KB

                                                                                                                                                    MD5

                                                                                                                                                    7667b0883de4667ec87c3b75bed84d84

                                                                                                                                                    SHA1

                                                                                                                                                    e6f6df83e813ed8252614a46a5892c4856df1f58

                                                                                                                                                    SHA256

                                                                                                                                                    04e7ccbdcad7cbaf0ed28692fb08eab832c38aad9071749037ee7a58f45e9d7d

                                                                                                                                                    SHA512

                                                                                                                                                    968cbaafe416a9e398c5bfd8c5825fa813462ae207d17072c035f916742517edc42349a72ab6795199d34ccece259d5f2f63587cfaeb0026c0667632b05c5c74

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ygvh5fg2.pm3.ps1

                                                                                                                                                    Filesize

                                                                                                                                                    60B

                                                                                                                                                    MD5

                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                    SHA1

                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                    SHA256

                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                    SHA512

                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\build.exe

                                                                                                                                                    Filesize

                                                                                                                                                    5.3MB

                                                                                                                                                    MD5

                                                                                                                                                    b069f6439d9d415ed13122529479bfca

                                                                                                                                                    SHA1

                                                                                                                                                    0ed5485647d52ce4160737244d15d1beade0fa87

                                                                                                                                                    SHA256

                                                                                                                                                    c207aec56d9b2369dbf6d6d6d585ac6006937002b4d9791d675a04bb7b4b5af4

                                                                                                                                                    SHA512

                                                                                                                                                    d75bfd3d873f2af8cb80f97a3b9583a7750515a11f31ce6ae477e8a526aa6c9db191ae08a100c16b6c1ab8d01661275c62732df13eb65c4dc5b1700a5110572a

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\deldll.bat

                                                                                                                                                    Filesize

                                                                                                                                                    200B

                                                                                                                                                    MD5

                                                                                                                                                    ea190ef9b139757a890cd48bdd44b0ee

                                                                                                                                                    SHA1

                                                                                                                                                    95c684e41bf7919408816aafab881621fface202

                                                                                                                                                    SHA256

                                                                                                                                                    9131de0fcaaf968896af9d58b6f37b4aa443455bb97c97bc142f295cee577bc4

                                                                                                                                                    SHA512

                                                                                                                                                    22802ffc1965c8e27f799ee88e3fa46debb316c27507a570b0812bc5de0d59a9c2a2105b8cc204851b3c29984ef1dfb7842131819952b185b7e4325a032fb6ad

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\gentee9D\guig.dll

                                                                                                                                                    Filesize

                                                                                                                                                    20KB

                                                                                                                                                    MD5

                                                                                                                                                    d3f8c0334c19198a109e44d074dac5fd

                                                                                                                                                    SHA1

                                                                                                                                                    167716989a62b25e9fcf8e20d78e390a52e12077

                                                                                                                                                    SHA256

                                                                                                                                                    005c251c21d6a5ba1c3281e7b9f3b4f684d007e0c3486b34a545bb370d8420aa

                                                                                                                                                    SHA512

                                                                                                                                                    9c890e0af5b20ce9db4284e726ec0b05b2a9f18b909fb8e595edf3348a8f0d07d5238d85446a09e72e4faa2e2875beb52742d312e5163f48df4072b982801b51

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\genteert.dll

                                                                                                                                                    Filesize

                                                                                                                                                    60KB

                                                                                                                                                    MD5

                                                                                                                                                    6ce814fd1ad7ae07a9e462c26b3a0f69

                                                                                                                                                    SHA1

                                                                                                                                                    15f440c2a8498a4efe2d9ba0c6268fab4fb8e0a7

                                                                                                                                                    SHA256

                                                                                                                                                    54c0da1735bb1cb02b60c321de938488345f8d1d26bf389c8cb2acad5d01b831

                                                                                                                                                    SHA512

                                                                                                                                                    e5cff6bcb063635e5193209b94a9b2f5465f1c82394f23f50bd30bf0a2b117b209f5fca5aa10a7912a94ad88711dcd490aa528a7202f09490acd96cd640a3556

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\MVPInstaller\MVPInstaller.exe

                                                                                                                                                    Filesize

                                                                                                                                                    15.3MB

                                                                                                                                                    MD5

                                                                                                                                                    91a99c76150f66c4d582ce98f3e3b2c3

                                                                                                                                                    SHA1

                                                                                                                                                    983fed8f09fe95fb3ca67e884f2f824f0e3a72be

                                                                                                                                                    SHA256

                                                                                                                                                    61217d7e2be6784784aa6b3b3a23a2777a6eee79be4e6f8d6e3f6b0f10032920

                                                                                                                                                    SHA512

                                                                                                                                                    2562b594ff224d36d6f7c147326cc929e9790bf75632c4f7e3589dbb58498159a4978f5e48751d13ae5d62f354d541a3156d4f901e6f1983fb9b1f3e3638cf8b

                                                                                                                                                  • C:\WindowsUpdate\2UpMr4oh.bat

                                                                                                                                                    Filesize

                                                                                                                                                    36B

                                                                                                                                                    MD5

                                                                                                                                                    ececcb4dab2899a896f6727230ddb26a

                                                                                                                                                    SHA1

                                                                                                                                                    7f629cd32f92dc6a8da7142f7de397b08ced0974

                                                                                                                                                    SHA256

                                                                                                                                                    f7f7150ae59104004cc4bdd36110807333ef0a27c0ce0a08fd0ae2646159f73c

                                                                                                                                                    SHA512

                                                                                                                                                    10f74f3b64ace8002270e27a450cc26a25502d9c98f8dd23cfa22886368be1d7d7c46cd153fbac88b07bcf0ea401549a5927a8583b612a0e5e2b5aa9162ee592

                                                                                                                                                  • C:\WindowsUpdate\TEUXpnVW2Rogcdt2Uv.vbe

                                                                                                                                                    Filesize

                                                                                                                                                    198B

                                                                                                                                                    MD5

                                                                                                                                                    ea0cabd5fc14e86870ef589016ad6400

                                                                                                                                                    SHA1

                                                                                                                                                    ebbb0646d34c4973021d08ad37276f54036d1658

                                                                                                                                                    SHA256

                                                                                                                                                    3f5a8ef3d4412432127feab5637a18b59cb06ec47faefae6f54dfcde27a5cbf7

                                                                                                                                                    SHA512

                                                                                                                                                    200623fc8cdcbb6acbefcb04334f84453162188cc00d846046ea54db3168a470d8263bce12524809864bdad1d1438890783afac6440670931ea59d1a97fc6a57

                                                                                                                                                  • C:\WindowsUpdate\WindowsUpdate.exe

                                                                                                                                                    Filesize

                                                                                                                                                    2.7MB

                                                                                                                                                    MD5

                                                                                                                                                    0b87d00f10456b51ada70c1b7807338a

                                                                                                                                                    SHA1

                                                                                                                                                    f55e241151a8c6c2efc69f4e7632b6c5fadc0029

                                                                                                                                                    SHA256

                                                                                                                                                    4e4816037287d21798d7b3d11a3c32bc6b32db6c07ca9af6d3f603b6e77111fa

                                                                                                                                                    SHA512

                                                                                                                                                    288bb96b3ebfa562cb5907eabb2c3200804286b8b8055a36cfab2f08403e4655125a593455f2d8c13ee486c4ef035ce49b3df8e6c42d52ee98d072a27266c8d8

                                                                                                                                                  • C:\Windows\system32\drivers\etc\hosts

                                                                                                                                                    Filesize

                                                                                                                                                    3KB

                                                                                                                                                    MD5

                                                                                                                                                    2d29fd3ae57f422e2b2121141dc82253

                                                                                                                                                    SHA1

                                                                                                                                                    c2464c857779c0ab4f5e766f5028fcc651a6c6b7

                                                                                                                                                    SHA256

                                                                                                                                                    80a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4

                                                                                                                                                    SHA512

                                                                                                                                                    077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68

                                                                                                                                                  • memory/212-171-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/212-174-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/212-177-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/212-173-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/212-172-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/212-179-0x00007FFFBC790000-0x00007FFFBC985000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.0MB

                                                                                                                                                  • memory/212-180-0x00007FFFBAA50000-0x00007FFFBAB0E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    760KB

                                                                                                                                                  • memory/212-183-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/616-187-0x0000024BE2EE0000-0x0000024BE2F0B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/616-188-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/616-186-0x0000024BE2E50000-0x0000024BE2E74000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    144KB

                                                                                                                                                  • memory/664-192-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/664-191-0x0000021692830000-0x000002169285B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/748-203-0x000001DFAFD40000-0x000001DFAFD6B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/748-204-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/892-211-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/892-210-0x000001DD98390000-0x000001DD983BB000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/952-199-0x0000016ECA7E0000-0x0000016ECA80B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/952-200-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1020-197-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1020-196-0x0000014AE76A0000-0x0000014AE76CB000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/1080-213-0x000002444EAE0000-0x000002444EB0B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/1080-214-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1088-217-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1088-216-0x000002BC29C60000-0x000002BC29C8B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/1100-220-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1100-219-0x000001831B160000-0x000001831B18B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/1156-223-0x00000240FA280000-0x00000240FA2AB000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    172KB

                                                                                                                                                  • memory/1156-224-0x00007FFF7C810000-0x00007FFF7C820000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/2380-45-0x0000000000760000-0x00000000007D8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    480KB

                                                                                                                                                  • memory/2380-33-0x00000000732DE000-0x00000000732DF000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                  • memory/2380-452-0x0000000006740000-0x0000000006790000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    320KB

                                                                                                                                                  • memory/2380-457-0x0000000007D60000-0x000000000828C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.2MB

                                                                                                                                                  • memory/2380-181-0x00000000067C0000-0x0000000006D64000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.6MB

                                                                                                                                                  • memory/2380-65-0x00000000053B0000-0x00000000053FC000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/2380-182-0x0000000006210000-0x000000000622E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/2380-455-0x0000000007660000-0x0000000007822000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.8MB

                                                                                                                                                  • memory/2380-178-0x0000000006170000-0x0000000006202000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    584KB

                                                                                                                                                  • memory/2380-60-0x00000000057B0000-0x0000000005DC8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.1MB

                                                                                                                                                  • memory/2380-175-0x0000000006050000-0x00000000060C6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    472KB

                                                                                                                                                  • memory/2380-61-0x00000000050E0000-0x00000000050F2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    72KB

                                                                                                                                                  • memory/2380-62-0x00000000052A0000-0x00000000053AA000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.0MB

                                                                                                                                                  • memory/2380-130-0x0000000005530000-0x0000000005596000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/2380-63-0x0000000005140000-0x000000000517C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    240KB

                                                                                                                                                  • memory/4188-539-0x0000012B5FF30000-0x0000012B5FF4C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    112KB

                                                                                                                                                  • memory/4188-542-0x0000012B5FF70000-0x0000012B5FF8A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    104KB

                                                                                                                                                  • memory/4188-131-0x0000020023D30000-0x0000020023D52000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/4188-545-0x0000012B5FF60000-0x0000012B5FF6A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    40KB

                                                                                                                                                  • memory/4188-533-0x0000012B5FCF0000-0x0000012B5FD0C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    112KB

                                                                                                                                                  • memory/4188-534-0x0000012B5FD10000-0x0000012B5FDC5000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    724KB

                                                                                                                                                  • memory/4188-538-0x0000012B457F0000-0x0000012B457FA000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    40KB

                                                                                                                                                  • memory/4188-544-0x0000012B5FF50000-0x0000012B5FF56000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    24KB

                                                                                                                                                  • memory/4188-543-0x0000012B5FF20000-0x0000012B5FF28000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    32KB

                                                                                                                                                  • memory/4188-541-0x0000012B5FF10000-0x0000012B5FF1A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    40KB

                                                                                                                                                  • memory/4668-169-0x0000000002CC0000-0x0000000002CCE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    56KB

                                                                                                                                                  • memory/4668-97-0x00000000009E0000-0x0000000000C9E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.7MB

                                                                                                                                                  • memory/4752-165-0x000001A37AD10000-0x000001A37B181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.4MB

                                                                                                                                                  • memory/4752-164-0x000001A37AD10000-0x000001A37B181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.4MB

                                                                                                                                                  • memory/4752-163-0x000001A377DA0000-0x000001A377DA1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                  • memory/4752-166-0x000001A37AD10000-0x000001A37B181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.4MB

                                                                                                                                                  • memory/4752-167-0x000001A377DB0000-0x000001A377DB1000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                  • memory/4964-49-0x0000000000400000-0x0000000001BE6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    23.9MB