Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 17:25

General

  • Target

    303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe

  • Size

    213KB

  • MD5

    303775c9adc3380f20ce1e6ebf6d3a1e

  • SHA1

    cdc095814bb120f51be73728f78dbe29e82eea9d

  • SHA256

    f8cce268eecf24bebe0d96991f7013921fd9eb34570a09acfd6ad8fb6ff198f9

  • SHA512

    94bd19ef4703790b819a211eb348186d7002eb8d9f96eef1253a447dd2e1df9eb8462b9fa1173ee6f49787083c49f4ee095c0693f85962575ae804e8bd349625

  • SSDEEP

    6144:/+8ZepOGuDnw9tOJavXhe9Tedm/8b1tnawa:/jZepgDj44IyctnE

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\303775c9adc3380f20ce1e6ebf6d3a1e_JaffaCakes118.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:2592
    • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
      "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2572
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\YRAUwh2A5Ugn.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • Runs ping.exe
          PID:2900
        • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
          "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1252
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\rH6RAO8uYxGa.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:804
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              6⤵
              • Runs ping.exe
              PID:2280
            • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
              "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                7⤵
                • Creates scheduled task(s)
                PID:2880
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\48fKTRKcIoC4.bat" "
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3040
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  8⤵
                  • Runs ping.exe
                  PID:1988
                • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                  "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2052
                  • C:\Windows\SysWOW64\schtasks.exe
                    "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:896
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\CN6TTFAsdopZ.bat" "
                    9⤵
                      PID:1708
                      • C:\Windows\SysWOW64\PING.EXE
                        ping -n 10 localhost
                        10⤵
                        • Runs ping.exe
                        PID:1140
                      • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                        "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                        10⤵
                        • Executes dropped EXE
                        PID:384
                        • C:\Windows\SysWOW64\schtasks.exe
                          "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                          11⤵
                          • Creates scheduled task(s)
                          PID:292
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\hJi2h1AAxiFZ.bat" "
                          11⤵
                            PID:1900
                            • C:\Windows\SysWOW64\PING.EXE
                              ping -n 10 localhost
                              12⤵
                              • Runs ping.exe
                              PID:2084
                            • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                              "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                              12⤵
                              • Executes dropped EXE
                              PID:1728
                              • C:\Windows\SysWOW64\schtasks.exe
                                "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                13⤵
                                • Creates scheduled task(s)
                                PID:1532
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\t72WMEwGPZRZ.bat" "
                                13⤵
                                  PID:2316
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping -n 10 localhost
                                    14⤵
                                    • Runs ping.exe
                                    PID:2820
                                  • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                    "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                    14⤵
                                    • Executes dropped EXE
                                    PID:2704
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                      15⤵
                                      • Creates scheduled task(s)
                                      PID:2392
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\K3pLoGmFCfAf.bat" "
                                      15⤵
                                        PID:2688
                                        • C:\Windows\SysWOW64\PING.EXE
                                          ping -n 10 localhost
                                          16⤵
                                          • Runs ping.exe
                                          PID:2324
                                        • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                          "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                          16⤵
                                          • Executes dropped EXE
                                          PID:1228
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                            17⤵
                                            • Creates scheduled task(s)
                                            PID:2328
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\DdhYAZm7aNOT.bat" "
                                            17⤵
                                              PID:1360
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping -n 10 localhost
                                                18⤵
                                                • Runs ping.exe
                                                PID:356
                                              • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                                "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                                18⤵
                                                • Executes dropped EXE
                                                PID:2124
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                                  19⤵
                                                  • Creates scheduled task(s)
                                                  PID:1880
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\XynJBSUvlorB.bat" "
                                                  19⤵
                                                    PID:3064
                                                    • C:\Windows\SysWOW64\PING.EXE
                                                      ping -n 10 localhost
                                                      20⤵
                                                      • Runs ping.exe
                                                      PID:2864
                                                    • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                                      "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                                      20⤵
                                                      • Executes dropped EXE
                                                      PID:2992
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                                        21⤵
                                                        • Creates scheduled task(s)
                                                        PID:2220
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\gDDSBGKB6oVh.bat" "
                                                        21⤵
                                                          PID:1768
                                                          • C:\Windows\SysWOW64\PING.EXE
                                                            ping -n 10 localhost
                                                            22⤵
                                                            • Runs ping.exe
                                                            PID:768
                                                          • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                                            "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                                            22⤵
                                                            • Executes dropped EXE
                                                            PID:1124
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                                              23⤵
                                                              • Creates scheduled task(s)
                                                              PID:1680
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\Xq1Rd1UVObiB.bat" "
                                                              23⤵
                                                                PID:292
                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                  ping -n 10 localhost
                                                                  24⤵
                                                                  • Runs ping.exe
                                                                  PID:800
                                                                • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                                                  24⤵
                                                                  • Executes dropped EXE
                                                                  PID:1928
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                                                    25⤵
                                                                    • Creates scheduled task(s)
                                                                    PID:2084
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\kbP8Cm6AwNvV.bat" "
                                                                    25⤵
                                                                      PID:1956
                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                        ping -n 10 localhost
                                                                        26⤵
                                                                        • Runs ping.exe
                                                                        PID:1936
                                                                      • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                                                        "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                                                        26⤵
                                                                        • Executes dropped EXE
                                                                        PID:1696
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                                                          27⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:924
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\trpIDZvQHNY0.bat" "
                                                                          27⤵
                                                                            PID:2588
                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                              ping -n 10 localhost
                                                                              28⤵
                                                                              • Runs ping.exe
                                                                              PID:2520
                                                                            • C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe
                                                                              "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"
                                                                              28⤵
                                                                                PID:2420
                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                  "schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f
                                                                                  29⤵
                                                                                  • Creates scheduled task(s)
                                                                                  PID:2452
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\FiayE0CTGeqi.bat" "
                                                                                  29⤵
                                                                                    PID:2924
                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                      ping -n 10 localhost
                                                                                      30⤵
                                                                                      • Runs ping.exe
                                                                                      PID:1944

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\48fKTRKcIoC4.bat

                                  Filesize

                                  172B

                                  MD5

                                  27123c736347ba5406002bde06f12bae

                                  SHA1

                                  6b1daa7e991ca9e76771104832d8e0a2a6b8b8cd

                                  SHA256

                                  a723f283cc694b3efeb42eeae90b141d03554b210f17339f82f36a7b52dbf4be

                                  SHA512

                                  4bcba657ec3a27c8351120eff059e4c26a8d7c9144ee3cb4050f5de39d8c45a243fce5189780db5b8fdd24113d7aa2a13f0ac38a92c9e44fe16dcbae9326a234

                                • C:\Users\Admin\AppData\Local\Temp\CN6TTFAsdopZ.bat

                                  Filesize

                                  172B

                                  MD5

                                  33c1b8065af09cf6fce85b255de15f25

                                  SHA1

                                  adb4a999bd39adb8516996858e1f1451152bdbef

                                  SHA256

                                  0c829f71ec65f3dd9b9dc161cc62689c969018e7a41d424b66b6b6d13c76f3fc

                                  SHA512

                                  75560d065a113ebeed736652bbb383cfed1f76ad7702713f28fe51141e054934de55c406791a2ab221bd6d191fbe72f1a220f72c3dae5ba042d4430a83eb5db5

                                • C:\Users\Admin\AppData\Local\Temp\DdhYAZm7aNOT.bat

                                  Filesize

                                  172B

                                  MD5

                                  596fc6499c35ea4235bc86c9b1a33bdb

                                  SHA1

                                  60a526a039f3b4ff7d8632471aeb808a79778250

                                  SHA256

                                  cb41495236c51b0a8e446081dad248858b5ad99535f168214b92bd6c5929d12a

                                  SHA512

                                  a221b7c6364e07dfbc36121fbe0a7e260c6a3ad5433d90873cc6a92efb87a4c463e1ce9484ace996b6f6cc08af3c86c80b7e45a27ea22d45d18c559bfa48519a

                                • C:\Users\Admin\AppData\Local\Temp\FiayE0CTGeqi.bat

                                  Filesize

                                  172B

                                  MD5

                                  7c1782ad0209de27fde5081babad92f1

                                  SHA1

                                  e31cb7ca551afe00a582e295971d306a1e063f3b

                                  SHA256

                                  188e1afa43ccd2a734730c87616664a9b8e8a1338b470f7a9ade967ffce6f67e

                                  SHA512

                                  0f1eff30a41d286801e32f603acad876d1edc43d0c0003f403292bfeb212d676bd3930240c9689355f3b724a51b143c8e226743ba2d35c30edf4eae6e788bd8f

                                • C:\Users\Admin\AppData\Local\Temp\K3pLoGmFCfAf.bat

                                  Filesize

                                  172B

                                  MD5

                                  2631500ae2966721b673302cbccc6f23

                                  SHA1

                                  6e46204431e417c733ac8454f719c7c8eb327ebc

                                  SHA256

                                  063e2352ec765b1a130ff072b1ad3b109a754a3ee363e796788ec7c516a9d5fd

                                  SHA512

                                  d608588d1a418c7137c1b7734326b87a180331795d9654abfe352e893437126b782bc1839f49e3777031ee8ecaf8aa7cc6bee7932680b7da086752474e5ec99f

                                • C:\Users\Admin\AppData\Local\Temp\Xq1Rd1UVObiB.bat

                                  Filesize

                                  172B

                                  MD5

                                  7b38201bd31c4fdd4b3e41ee8973efcb

                                  SHA1

                                  f0656bfef166453fe87d5b1573d1db49b1d7fbe6

                                  SHA256

                                  4d13e31f7c9b39a2993eb3e5999c6bb58d167fa024d36127faea852fdc3b8a6a

                                  SHA512

                                  ab430adf238a2d5d44491c2dbfe9daad5c38d1bfd5da159e37b4c90673252cf1741a774b067a88187f0d78babf4bbbcd676521105e62f062e6bca02b5c6e162f

                                • C:\Users\Admin\AppData\Local\Temp\XynJBSUvlorB.bat

                                  Filesize

                                  172B

                                  MD5

                                  aa2159e7b0c19c242a1a3090ab06e474

                                  SHA1

                                  dad90aa321fa6b8eeb752798928c68d0d43f9175

                                  SHA256

                                  b97a33cc1334c5ff0dac331c4ba00bfc99af21bfb525521e98a01f935200c703

                                  SHA512

                                  fd77246decbae3137ad2e30559bdd647bbebfe49cbd62beed44d74732de603a95e3adab0cfbe69924d49a42c7ce5968f2a7ffed4e6bc2c95cd61b4a104d3271b

                                • C:\Users\Admin\AppData\Local\Temp\YRAUwh2A5Ugn.bat

                                  Filesize

                                  172B

                                  MD5

                                  e8146f24064ad7a832b2976d44d1337a

                                  SHA1

                                  36ee8ae59807c89c54435b0945a2ea3e6523f19a

                                  SHA256

                                  89f52091f72a5513069e94c043ea20c80827cef5bcf1b5ce41cc30d6ec8e2662

                                  SHA512

                                  0f762238d909dfc176edc0a4a1f571a1604d99a6b5b7e58f55de5ff4d8df472af2d1daf061bfcc71f5e80dc40fd5711dcac42733f8fbded84e447ce2a10d1afc

                                • C:\Users\Admin\AppData\Local\Temp\gDDSBGKB6oVh.bat

                                  Filesize

                                  172B

                                  MD5

                                  86772c8fdf96c21c99a13e2ace0a900f

                                  SHA1

                                  20e69e7b7103a8b11b0396d321ce3dc765252592

                                  SHA256

                                  784eebbfcc1b445a091c48baebf111c65745ab1fcb973c99bfb3a4634011fd22

                                  SHA512

                                  0cf3bf213c929fe5ec323ad3fad54adf5aa8e29ecf1e6636d5294929b2210adcb5510e0ca2df23dbc77f3b880c676df1b6ecb807fa64e476334c672a7101e72e

                                • C:\Users\Admin\AppData\Local\Temp\hJi2h1AAxiFZ.bat

                                  Filesize

                                  172B

                                  MD5

                                  535cbef6bd949c8447b49a7e8ffaec35

                                  SHA1

                                  42f44b34ecc84b31b1f160dddf2fee5cb3c693f0

                                  SHA256

                                  d3e0d856c13cc488a167d0a92f90080077f791f29a3fc5c613013a19cb42414a

                                  SHA512

                                  9a566ff4b0c31afacce36687f1e85ce361b7864ee9f5b9a09120fd326ccf15b42d3c403dfc698d5658f2c946cfbaf9fef4e4641910650dc304cbe7a20b46b6e3

                                • C:\Users\Admin\AppData\Local\Temp\kbP8Cm6AwNvV.bat

                                  Filesize

                                  172B

                                  MD5

                                  a786289f62d7e8866f1a53f74530f8bd

                                  SHA1

                                  52d4d8d8c62905a5a595d38914efa3a68e31a402

                                  SHA256

                                  f89cf606acf8357b237ebb6699c89c56aefbbada3356fe8ded85799259189bb5

                                  SHA512

                                  25851bf818d58409f70a978ae4c3f5178eea1632fb683ab8d8c2e4ab957ecc6bce12d8f64bc9c3d80d6e86d18739c78e3be381ae434ec7be5dd811995daff772

                                • C:\Users\Admin\AppData\Local\Temp\rH6RAO8uYxGa.bat

                                  Filesize

                                  172B

                                  MD5

                                  4a61860579e76a577f22293d0895463d

                                  SHA1

                                  ee2c79f4084ea66664f3d83a85af6b443b10a8da

                                  SHA256

                                  ca3bacaf6eb5206663c70261252cf560e4fc7c365c8343d2a21c5d51471e0de5

                                  SHA512

                                  f045435401727964d79e89d04bd9b5c96c44145b101190540cd0fd1cda7a736ef7a8ba374abd84bf3a7b68d734366a84ef34c33e5fb32e0cd4ac83d54a91bd53

                                • C:\Users\Admin\AppData\Local\Temp\t72WMEwGPZRZ.bat

                                  Filesize

                                  172B

                                  MD5

                                  2a81337f5ed93bc8211da5f2fdd79578

                                  SHA1

                                  e46026d9cef08559d591ed844434f1d8cd7f9a98

                                  SHA256

                                  627916bdaf2d6990ba6df1a2fd1fa50fa4b874e438197f222b4541093fdf3225

                                  SHA512

                                  684ff543c32536e40da475466ff467e96b5ca2052178eaaa4e2e588ebe993f3c6e9c7599f1e82fb123b2ae2ea466b56fdf6a24121d50730cad4a2cc3bcb630f5

                                • C:\Users\Admin\AppData\Local\Temp\trpIDZvQHNY0.bat

                                  Filesize

                                  172B

                                  MD5

                                  d8ce7a006e481859aab96f2689c9da16

                                  SHA1

                                  cb081657c946eb2168e17851625cfcf20d46ec86

                                  SHA256

                                  a35d1d58aa2e75fe8bbb5443939b45cabc4415c059021bfabc72008d389f1c34

                                  SHA512

                                  c760f48d9436785f64074e0af51b8035f961e9bd78dad6a973082a00a3feb76252b5ca564228bc92511266f9f51b0bc53a1584121d822892a479279c67dd1537

                                • \Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe

                                  Filesize

                                  213KB

                                  MD5

                                  303775c9adc3380f20ce1e6ebf6d3a1e

                                  SHA1

                                  cdc095814bb120f51be73728f78dbe29e82eea9d

                                  SHA256

                                  f8cce268eecf24bebe0d96991f7013921fd9eb34570a09acfd6ad8fb6ff198f9

                                  SHA512

                                  94bd19ef4703790b819a211eb348186d7002eb8d9f96eef1253a447dd2e1df9eb8462b9fa1173ee6f49787083c49f4ee095c0693f85962575ae804e8bd349625

                                • memory/1948-22-0x0000000074750000-0x0000000074CFB000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/1948-11-0x0000000074750000-0x0000000074CFB000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/1948-12-0x0000000074750000-0x0000000074CFB000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/1948-10-0x0000000074750000-0x0000000074CFB000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2916-0-0x0000000074751000-0x0000000074752000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2916-9-0x0000000074750000-0x0000000074CFB000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2916-2-0x0000000074750000-0x0000000074CFB000-memory.dmp

                                  Filesize

                                  5.7MB

                                • memory/2916-1-0x0000000074750000-0x0000000074CFB000-memory.dmp

                                  Filesize

                                  5.7MB