Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2023 06:31

General

  • Target

    02357599.exe

  • Size

    3.5MB

  • MD5

    a29004d57b0582196965b9344e0eb7b4

  • SHA1

    6e0ab8638b3559750dc40e4c23623552d84b5d8c

  • SHA256

    1a659b2d6922bd1ea186c53148094c26733368e9099ea037a83912c02a59d410

  • SHA512

    b097b10dcf833740b4bbd922a035c3658e51d8aeb6dd4f27ff1e8661da8c2ea47593e53b6400af5096943e6eebb27407c1c92b3ea2c10913150edad2f593b5b1

  • SSDEEP

    98304:XFXg7GTzJBVeXbdAWTUjpI5q05tzpMpKcvA0T:XFw7CzgXRAh9O4K5m

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 30 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 13 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 30 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\02357599.exe
    "C:\Users\Admin\AppData\Local\Temp\02357599.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\DCRE.exe
      "C:\Users\Admin\AppData\Local\Temp\DCRE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msMonitorDll\OD39V0ZVybL6mpt7I8.vbe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\msMonitorDll\150EIi8HhNIkntcrdLIIm.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Users\Admin\AppData\Roaming\msMonitorDll\containerSvc.exe
            "C:\Users\Admin\AppData\Roaming\msMonitorDll\containerSvc.exe"
            5⤵
            • UAC bypass
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1252
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6YTAlEh9Xt.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1544
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:700
                • C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\dwm.exe
                  "C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\dwm.exe"
                  7⤵
                  • UAC bypass
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:692
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1714a88d-4d30-4fb5-92ca-b2df03d3d32b.vbs"
                    8⤵
                      PID:1252
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d320d104-e9aa-4ffa-a339-ce35707fc55a.vbs"
                      8⤵
                        PID:1900
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msMonitorDll\file.vbs"
              3⤵
                PID:1396
            • C:\Users\Admin\AppData\Local\Temp\SLIPWARE.exe
              "C:\Users\Admin\AppData\Local\Temp\SLIPWARE.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:568
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\cmd.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1172
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\cmd.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:928
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\cmd.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1348
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Windows\Logs\DPX\lsm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:528
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\Logs\DPX\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1112
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Windows\Logs\DPX\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Default\NetHood\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:848
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\NetHood\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:316
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Default\NetHood\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:692
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\dwm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1632
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\dwm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1544
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\dwm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1892
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1676
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1520
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:924
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\conhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1304
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:596
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\conhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1876
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office\Office14\1033\wininit.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1524
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\1033\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1984
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office\Office14\1033\wininit.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:840
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1548
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1636
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1028
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\services.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1720
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:860
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1900
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\csrss.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:928
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:980
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\csrss.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Creates scheduled task(s)
            PID:1212
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1008

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Bypass User Account Control

          1
          T1088

          Scheduled Task

          1
          T1053

          Defense Evasion

          Bypass User Account Control

          1
          T1088

          Disabling Security Tools

          1
          T1089

          Modify Registry

          2
          T1112

          Credential Access

          Credentials in Files

          2
          T1081

          Discovery

          System Information Discovery

          2
          T1082

          Query Registry

          1
          T1012

          Collection

          Data from Local System

          2
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\dwm.exe
            Filesize

            3.0MB

            MD5

            bc8ab70d4bf5934131878ca8bf79e792

            SHA1

            48cac83b05468b0061e3a9d7e7f44ce638216b8a

            SHA256

            29ce99327ec8f7141924a58bfde49c3875226ee606b32426fca613e4003e27aa

            SHA512

            31dc3b6fd4e88c365d9885914542598d47152a5155ebe529351ff51362a51363e5d318fee2e6e40021662db7ef591c58ad1ba42805cd1152268221f6b08f0d66

          • C:\Recovery\d2ce1482-b192-11ed-8622-cee1c2fbb193\dwm.exe
            Filesize

            3.0MB

            MD5

            bc8ab70d4bf5934131878ca8bf79e792

            SHA1

            48cac83b05468b0061e3a9d7e7f44ce638216b8a

            SHA256

            29ce99327ec8f7141924a58bfde49c3875226ee606b32426fca613e4003e27aa

            SHA512

            31dc3b6fd4e88c365d9885914542598d47152a5155ebe529351ff51362a51363e5d318fee2e6e40021662db7ef591c58ad1ba42805cd1152268221f6b08f0d66

          • C:\Users\Admin\AppData\Local\Temp\1714a88d-4d30-4fb5-92ca-b2df03d3d32b.vbs
            Filesize

            731B

            MD5

            86ce23854635842931cf5a5b908839f0

            SHA1

            6ed00f79e575bfd749db8f5cfe4b9d413da0dbdf

            SHA256

            b532c10fe8288eb658c1c121aa2217aa761d2dffac5e0d173d9b361c2044f081

            SHA512

            e0ddfd224b7c4519b9d2335c3e4da03c4d19a83e88c632d39fd66f82c18c9140258a3292923042d2e4733847e752ff055b31fd7f1a1f32d94bf741504f8ba44c

          • C:\Users\Admin\AppData\Local\Temp\6YTAlEh9Xt.bat
            Filesize

            221B

            MD5

            db170950e408dd8afd24d32569268192

            SHA1

            c435207977ca0c12906639aa2c7f2ecd6585acf9

            SHA256

            ada317f484e1da450c9bd615212846eb5bf59289e578e3c38a2de08cee5f7b7d

            SHA512

            4b18b177ee19c381a1729b8094ccbfaf7afb47804aa36f997e11550af8481af18830522c8ae513745b1794faa0c2b126ee02db3cbd02f93f5dc368fa7f1e54a6

          • C:\Users\Admin\AppData\Local\Temp\DCRE.exe
            Filesize

            3.3MB

            MD5

            13146f7d739a36053c50fbd0aa3e9d8d

            SHA1

            de10c9ff567a2413f3fc2ffbd3c9e95c8ce4160c

            SHA256

            f0aaba469aeda1a6dd59f9c235179e4e826ecbcf7ef02978984c99286d05aff6

            SHA512

            c1560fd025cb5278067540bf8b2a8bb419046e2c6998346946944f77816bc260f6f9bfc9716e9a91a606ed3b65b4ed605cd53e136e6201c9669f894b2738829d

          • C:\Users\Admin\AppData\Local\Temp\DCRE.exe
            Filesize

            3.3MB

            MD5

            13146f7d739a36053c50fbd0aa3e9d8d

            SHA1

            de10c9ff567a2413f3fc2ffbd3c9e95c8ce4160c

            SHA256

            f0aaba469aeda1a6dd59f9c235179e4e826ecbcf7ef02978984c99286d05aff6

            SHA512

            c1560fd025cb5278067540bf8b2a8bb419046e2c6998346946944f77816bc260f6f9bfc9716e9a91a606ed3b65b4ed605cd53e136e6201c9669f894b2738829d

          • C:\Users\Admin\AppData\Local\Temp\DCRE.exe
            Filesize

            3.3MB

            MD5

            13146f7d739a36053c50fbd0aa3e9d8d

            SHA1

            de10c9ff567a2413f3fc2ffbd3c9e95c8ce4160c

            SHA256

            f0aaba469aeda1a6dd59f9c235179e4e826ecbcf7ef02978984c99286d05aff6

            SHA512

            c1560fd025cb5278067540bf8b2a8bb419046e2c6998346946944f77816bc260f6f9bfc9716e9a91a606ed3b65b4ed605cd53e136e6201c9669f894b2738829d

          • C:\Users\Admin\AppData\Local\Temp\SLIPWARE.exe
            Filesize

            563KB

            MD5

            6a0aa70c2ae786f560c7261c5c5f34b0

            SHA1

            42cf55d6070e88f12870aa78c0bf19d72c68fa5d

            SHA256

            0df25151605d6aaa9be8b371af6edc0f36d6620243a0c94495d21d4fe6951bf9

            SHA512

            58369aee426de92eafa2607eb05665134991850e2727c185f0b20654e513e3ea27dc38c0af5c967ce14a9c79dd6b31c68794496f75f7d4a74beb177162b92cb4

          • C:\Users\Admin\AppData\Local\Temp\SLIPWARE.exe
            Filesize

            563KB

            MD5

            6a0aa70c2ae786f560c7261c5c5f34b0

            SHA1

            42cf55d6070e88f12870aa78c0bf19d72c68fa5d

            SHA256

            0df25151605d6aaa9be8b371af6edc0f36d6620243a0c94495d21d4fe6951bf9

            SHA512

            58369aee426de92eafa2607eb05665134991850e2727c185f0b20654e513e3ea27dc38c0af5c967ce14a9c79dd6b31c68794496f75f7d4a74beb177162b92cb4

          • C:\Users\Admin\AppData\Local\Temp\d320d104-e9aa-4ffa-a339-ce35707fc55a.vbs
            Filesize

            508B

            MD5

            aa2398ba875cd8a70629e42ba5bdad5b

            SHA1

            c08687badf69a98aa7d842bf407a282ee89fbc29

            SHA256

            a6bea157d8de2d030953746cfbcf1ade9881a2bf4ff7e888428881172676101a

            SHA512

            a46f37d63b5d7abfaaa28a140cf6b0171d7e29f32ea0116e8fba3273bb02f98124d9e8493d45c06af5cc8552877ca0e49965c956bc110c9c806c12be0637cd1b

          • C:\Users\Admin\AppData\Roaming\msMonitorDll\150EIi8HhNIkntcrdLIIm.bat
            Filesize

            41B

            MD5

            6daccbefb453cde7378d378574cc9c7b

            SHA1

            92b2145db1421878ffbdad18ba046247b2a4b159

            SHA256

            6a770c19c51d3806aedcff4d99c12b2e74e979050d68ea84c17adf5f10684041

            SHA512

            7cbbed8110e59c03aedbac23c8a85c4afac7c1671b36bb1a0947b3bcb1e35305cc8dd75104993d07de18c385a73840caa3a7ca2d2e5e8d444dcf56f420104308

          • C:\Users\Admin\AppData\Roaming\msMonitorDll\OD39V0ZVybL6mpt7I8.vbe
            Filesize

            217B

            MD5

            e176c5bbb3e43b082a130d9b7af304c8

            SHA1

            cde44f62e6a436279028c7009833b8daf5171476

            SHA256

            f188560cf6c0b289e72f5d142d22f7b52b856928769a09acae5464671b54e84a

            SHA512

            95ec5a92acbbf337ff2519ac511fba3fe1cc56c8baa4c283e130ea2550b275b8b42c65f773d3fbe5f900f08fb788117b1d3e22574cf09210ada4224077455dbe

          • C:\Users\Admin\AppData\Roaming\msMonitorDll\containerSvc.exe
            Filesize

            3.0MB

            MD5

            bc8ab70d4bf5934131878ca8bf79e792

            SHA1

            48cac83b05468b0061e3a9d7e7f44ce638216b8a

            SHA256

            29ce99327ec8f7141924a58bfde49c3875226ee606b32426fca613e4003e27aa

            SHA512

            31dc3b6fd4e88c365d9885914542598d47152a5155ebe529351ff51362a51363e5d318fee2e6e40021662db7ef591c58ad1ba42805cd1152268221f6b08f0d66

          • C:\Users\Admin\AppData\Roaming\msMonitorDll\containerSvc.exe
            Filesize

            3.0MB

            MD5

            bc8ab70d4bf5934131878ca8bf79e792

            SHA1

            48cac83b05468b0061e3a9d7e7f44ce638216b8a

            SHA256

            29ce99327ec8f7141924a58bfde49c3875226ee606b32426fca613e4003e27aa

            SHA512

            31dc3b6fd4e88c365d9885914542598d47152a5155ebe529351ff51362a51363e5d318fee2e6e40021662db7ef591c58ad1ba42805cd1152268221f6b08f0d66

          • C:\Users\Admin\AppData\Roaming\msMonitorDll\file.vbs
            Filesize

            34B

            MD5

            677cc4360477c72cb0ce00406a949c61

            SHA1

            b679e8c3427f6c5fc47c8ac46cd0e56c9424de05

            SHA256

            f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b

            SHA512

            7cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a

          • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Network Shortcuts\csrss.exe
            Filesize

            3.0MB

            MD5

            bc8ab70d4bf5934131878ca8bf79e792

            SHA1

            48cac83b05468b0061e3a9d7e7f44ce638216b8a

            SHA256

            29ce99327ec8f7141924a58bfde49c3875226ee606b32426fca613e4003e27aa

            SHA512

            31dc3b6fd4e88c365d9885914542598d47152a5155ebe529351ff51362a51363e5d318fee2e6e40021662db7ef591c58ad1ba42805cd1152268221f6b08f0d66

          • \Users\Admin\AppData\Local\Temp\DCRE.exe
            Filesize

            3.3MB

            MD5

            13146f7d739a36053c50fbd0aa3e9d8d

            SHA1

            de10c9ff567a2413f3fc2ffbd3c9e95c8ce4160c

            SHA256

            f0aaba469aeda1a6dd59f9c235179e4e826ecbcf7ef02978984c99286d05aff6

            SHA512

            c1560fd025cb5278067540bf8b2a8bb419046e2c6998346946944f77816bc260f6f9bfc9716e9a91a606ed3b65b4ed605cd53e136e6201c9669f894b2738829d

          • \Users\Admin\AppData\Local\Temp\SLIPWARE.exe
            Filesize

            563KB

            MD5

            6a0aa70c2ae786f560c7261c5c5f34b0

            SHA1

            42cf55d6070e88f12870aa78c0bf19d72c68fa5d

            SHA256

            0df25151605d6aaa9be8b371af6edc0f36d6620243a0c94495d21d4fe6951bf9

            SHA512

            58369aee426de92eafa2607eb05665134991850e2727c185f0b20654e513e3ea27dc38c0af5c967ce14a9c79dd6b31c68794496f75f7d4a74beb177162b92cb4

          • \Users\Admin\AppData\Local\Temp\SLIPWARE.exe
            Filesize

            563KB

            MD5

            6a0aa70c2ae786f560c7261c5c5f34b0

            SHA1

            42cf55d6070e88f12870aa78c0bf19d72c68fa5d

            SHA256

            0df25151605d6aaa9be8b371af6edc0f36d6620243a0c94495d21d4fe6951bf9

            SHA512

            58369aee426de92eafa2607eb05665134991850e2727c185f0b20654e513e3ea27dc38c0af5c967ce14a9c79dd6b31c68794496f75f7d4a74beb177162b92cb4

          • \Users\Admin\AppData\Local\Temp\SLIPWARE.exe
            Filesize

            563KB

            MD5

            6a0aa70c2ae786f560c7261c5c5f34b0

            SHA1

            42cf55d6070e88f12870aa78c0bf19d72c68fa5d

            SHA256

            0df25151605d6aaa9be8b371af6edc0f36d6620243a0c94495d21d4fe6951bf9

            SHA512

            58369aee426de92eafa2607eb05665134991850e2727c185f0b20654e513e3ea27dc38c0af5c967ce14a9c79dd6b31c68794496f75f7d4a74beb177162b92cb4

          • \Users\Admin\AppData\Roaming\msMonitorDll\containerSvc.exe
            Filesize

            3.0MB

            MD5

            bc8ab70d4bf5934131878ca8bf79e792

            SHA1

            48cac83b05468b0061e3a9d7e7f44ce638216b8a

            SHA256

            29ce99327ec8f7141924a58bfde49c3875226ee606b32426fca613e4003e27aa

            SHA512

            31dc3b6fd4e88c365d9885914542598d47152a5155ebe529351ff51362a51363e5d318fee2e6e40021662db7ef591c58ad1ba42805cd1152268221f6b08f0d66

          • \Users\Admin\AppData\Roaming\msMonitorDll\containerSvc.exe
            Filesize

            3.0MB

            MD5

            bc8ab70d4bf5934131878ca8bf79e792

            SHA1

            48cac83b05468b0061e3a9d7e7f44ce638216b8a

            SHA256

            29ce99327ec8f7141924a58bfde49c3875226ee606b32426fca613e4003e27aa

            SHA512

            31dc3b6fd4e88c365d9885914542598d47152a5155ebe529351ff51362a51363e5d318fee2e6e40021662db7ef591c58ad1ba42805cd1152268221f6b08f0d66

          • memory/568-82-0x0000000000130000-0x00000000001C2000-memory.dmp
            Filesize

            584KB

          • memory/568-170-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/568-169-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/568-116-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/568-87-0x0000000000220000-0x000000000022A000-memory.dmp
            Filesize

            40KB

          • memory/568-168-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/568-86-0x0000000000220000-0x000000000022A000-memory.dmp
            Filesize

            40KB

          • memory/568-102-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/568-85-0x0000000000200000-0x000000000021A000-memory.dmp
            Filesize

            104KB

          • memory/568-157-0x0000000000220000-0x000000000022A000-memory.dmp
            Filesize

            40KB

          • memory/568-158-0x0000000000220000-0x000000000022A000-memory.dmp
            Filesize

            40KB

          • memory/568-115-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/568-84-0x00000000001F0000-0x00000000001FE000-memory.dmp
            Filesize

            56KB

          • memory/568-114-0x000000001C190000-0x000000001C191000-memory.dmp
            Filesize

            4KB

          • memory/568-83-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/568-153-0x000000001BC10000-0x000000001BC90000-memory.dmp
            Filesize

            512KB

          • memory/692-171-0x000000001B390000-0x000000001B410000-memory.dmp
            Filesize

            512KB

          • memory/692-152-0x0000000001290000-0x00000000015A0000-memory.dmp
            Filesize

            3.1MB

          • memory/692-154-0x000000001B390000-0x000000001B410000-memory.dmp
            Filesize

            512KB

          • memory/692-155-0x0000000000980000-0x0000000000992000-memory.dmp
            Filesize

            72KB

          • memory/692-156-0x0000000000990000-0x00000000009E6000-memory.dmp
            Filesize

            344KB

          • memory/692-177-0x000000001B390000-0x000000001B410000-memory.dmp
            Filesize

            512KB

          • memory/692-196-0x000000001B390000-0x000000001B410000-memory.dmp
            Filesize

            512KB

          • memory/1252-107-0x000000001A9E0000-0x000000001AA36000-memory.dmp
            Filesize

            344KB

          • memory/1252-119-0x000000001AE60000-0x000000001AE6E000-memory.dmp
            Filesize

            56KB

          • memory/1252-120-0x000000001AE70000-0x000000001AE78000-memory.dmp
            Filesize

            32KB

          • memory/1252-121-0x000000001AE80000-0x000000001AE8E000-memory.dmp
            Filesize

            56KB

          • memory/1252-122-0x000000001AE90000-0x000000001AE98000-memory.dmp
            Filesize

            32KB

          • memory/1252-123-0x000000001AEA0000-0x000000001AEAC000-memory.dmp
            Filesize

            48KB

          • memory/1252-124-0x000000001AEB0000-0x000000001AEBC000-memory.dmp
            Filesize

            48KB

          • memory/1252-118-0x000000001AE50000-0x000000001AE5A000-memory.dmp
            Filesize

            40KB

          • memory/1252-117-0x000000001AE40000-0x000000001AE4C000-memory.dmp
            Filesize

            48KB

          • memory/1252-113-0x000000001AE30000-0x000000001AE38000-memory.dmp
            Filesize

            32KB

          • memory/1252-112-0x000000001AE20000-0x000000001AE2C000-memory.dmp
            Filesize

            48KB

          • memory/1252-111-0x000000001A950000-0x000000001A958000-memory.dmp
            Filesize

            32KB

          • memory/1252-110-0x000000001A940000-0x000000001A952000-memory.dmp
            Filesize

            72KB

          • memory/1252-109-0x000000001A930000-0x000000001A938000-memory.dmp
            Filesize

            32KB

          • memory/1252-108-0x0000000002410000-0x000000000241C000-memory.dmp
            Filesize

            48KB

          • memory/1252-106-0x0000000002120000-0x000000000212A000-memory.dmp
            Filesize

            40KB

          • memory/1252-105-0x0000000002430000-0x0000000002440000-memory.dmp
            Filesize

            64KB

          • memory/1252-104-0x0000000002420000-0x0000000002432000-memory.dmp
            Filesize

            72KB

          • memory/1252-100-0x000000001B260000-0x000000001B2E0000-memory.dmp
            Filesize

            512KB

          • memory/1252-103-0x00000000008B0000-0x00000000008B8000-memory.dmp
            Filesize

            32KB

          • memory/1252-101-0x0000000002100000-0x0000000002116000-memory.dmp
            Filesize

            88KB

          • memory/1252-97-0x0000000000700000-0x0000000000710000-memory.dmp
            Filesize

            64KB

          • memory/1252-96-0x0000000000890000-0x00000000008AC000-memory.dmp
            Filesize

            112KB

          • memory/1252-95-0x00000000006F0000-0x00000000006F8000-memory.dmp
            Filesize

            32KB

          • memory/1252-94-0x00000000006E0000-0x00000000006EE000-memory.dmp
            Filesize

            56KB

          • memory/1252-93-0x0000000000050000-0x0000000000360000-memory.dmp
            Filesize

            3.1MB