Analysis

  • max time kernel
    1800s
  • max time network
    1799s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    26/06/2024, 14:37

General

  • Target

    Njrat.exe

  • Size

    3.1MB

  • MD5

    7bbb27a3b9ace5f7d403ba8d6ef58d28

  • SHA1

    5effbe830a93770824ee60f65eac790dda1ee807

  • SHA256

    d9dc76fcec48e47d8a10afa9ee40af17b856bff408bbc3eb36f5d362364a8d4c

  • SHA512

    32774b5efc9a4c771ed74cb59d6e4221d4cfb92e05d18cf9d3ad53b957005cce84892ef9e563d2c4c932127dac595394e23d8bc3e2a6ab3a654acef5e24e0327

  • SSDEEP

    49152:VbA3GVZoGDweuD4gWA7evLcjM3wwwZHFXIJ5nDWhVGUwwB3SNZts8zOqhsg:VbZDweuD4rcH9Vl65Dac7ssNj

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 15 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Njrat.exe
    "C:\Users\Admin\AppData\Local\Temp\Njrat.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\containerperf\9nepdzd6Yg.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\containerperf\MJF5L0LGrR45RopQV75MoqBbC.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\containerperf\Hyperblockport.exe
          "C:\containerperf\Hyperblockport.exe"
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2720
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2972
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2408
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/containerperf/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:536
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:688
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:400
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:816
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1012
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1640
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1116
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:576
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1096
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GO75tdUpkG.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1548
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2396
              • C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe
                "C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe"
                6⤵
                • UAC bypass
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2096
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7e5eed7f-f8c5-4873-96b6-1bfd3a68abcd.vbs"
                  7⤵
                    PID:1820
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5c27e7e3-f3fd-4cf1-b691-c0e0afdc5151.vbs"
                    7⤵
                      PID:1556
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Windows\L2Schemas\smss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1736
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\L2Schemas\smss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2812
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\L2Schemas\smss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2816
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3036
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1416
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2664
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1552
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1964
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1856
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\containerperf\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1984
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\containerperf\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1936
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\containerperf\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1616
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Users\Public\wininit.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1776
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Public\wininit.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1080
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Users\Public\wininit.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1652
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2060
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2316
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2092
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1804
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2360
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2828
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
            PID:2784
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {E76F7959-11C7-441B-9246-F819828A01E4} S-1-5-21-2812790648-3157963462-487717889-1000:JAFTUVRJ\Admin:Interactive:[1]
            1⤵
              PID:2780
              • C:\Users\Default User\csrss.exe
                "C:\Users\Default User\csrss.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2640
              • C:\Users\Public\wininit.exe
                C:\Users\Public\wininit.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1096
              • C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe
                "C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1060
              • C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe
                C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1240
              • C:\Windows\L2Schemas\smss.exe
                C:\Windows\L2Schemas\smss.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1752
              • C:\Users\Default User\csrss.exe
                "C:\Users\Default User\csrss.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:672
              • C:\Users\Public\wininit.exe
                C:\Users\Public\wininit.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:872
              • C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe
                "C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2152
              • C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe
                "C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2148
              • C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe
                C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1632
              • C:\Users\Default User\csrss.exe
                "C:\Users\Default User\csrss.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2540
              • C:\Users\Public\wininit.exe
                C:\Users\Public\wininit.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:784
              • C:\Windows\L2Schemas\smss.exe
                C:\Windows\L2Schemas\smss.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2860
              • C:\Users\Default User\csrss.exe
                "C:\Users\Default User\csrss.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:624
              • C:\Users\Public\wininit.exe
                C:\Users\Public\wininit.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2280
              • C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe
                "C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsass.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:552
              • C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe
                "C:\Program Files\VideoLAN\VLC\locale\ca@valencia\LC_MESSAGES\dwm.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1320
              • C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe
                C:\Recovery\fc26e022-289f-11ef-a973-46d84c032646\System.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2524

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\5c27e7e3-f3fd-4cf1-b691-c0e0afdc5151.vbs

              Filesize

              511B

              MD5

              4f59493b5b9db1e284f78e1d47839e24

              SHA1

              e78835bfef1e4c09123a17ec3094a9e1083b9c08

              SHA256

              2f470576ca4c68ac6d4ac98d55c2ddd51372d7585b59b7fb2d722105755f3f82

              SHA512

              0adbaf10e6ab51192a6953ef0d0e32b15b6e592a237ad8e2d81d8cff7cfe06a3c388fee578dff8caa3c8eaff010ef3c8e261effda745ebe58d94afa7c83a3c23

            • C:\Users\Admin\AppData\Local\Temp\7e5eed7f-f8c5-4873-96b6-1bfd3a68abcd.vbs

              Filesize

              735B

              MD5

              0d6bd04c43bb370cf0dddd9f4ee86546

              SHA1

              71247c0e10b0e4d5c9dbb92a1160c84a0dd20d4f

              SHA256

              74ccc724735d1fa72295cdd09a6c471c8644fa61e1b3f9ca802f6414ce817beb

              SHA512

              73bac33bfa40d93663cd357351be25ae5cfeda1d179e9ad5cf312dafeeca6665f8991c648aff506113505f310eb0a861a42fe7f84f4fa182f8249f7a4d33af1a

            • C:\Users\Admin\AppData\Local\Temp\GO75tdUpkG.bat

              Filesize

              224B

              MD5

              b56d35029ca988c42b6fdd6a80643c71

              SHA1

              bbc39369188bae24d0f81c34f9e581e74a36d5f1

              SHA256

              6bf38c667e2fb084aed3224b7c5ff911f9b93bf1ac717df50ce9bc343668d842

              SHA512

              2472969e427122e039164620f686daef7e462225ccdca7973afc0b93cb3c9b2213f1fd63f4cf7f2b613f446a517c631b016c6ef5c6e6121208e97d4bf5bc0c0a

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              9e6b4c6b02d13f2b654a59f66c80768f

              SHA1

              0c4767858506eeffd297a40132e5a1d4fcc3e24e

              SHA256

              656111ea96de1d6c28da5e0dc91b0027286f0d716c1a201c8f6ea72351c95dc9

              SHA512

              c9c9ab5f7a15ad7bf21534d1815f43a7af257bc355002425b2aa016ddf665302886cb90dec734b68d70f936734298f74412f11966536840bd87455e87bc2ecf3

            • C:\containerperf\9nepdzd6Yg.vbe

              Filesize

              226B

              MD5

              fd73bba1ae261c1bde0a83ff425994c4

              SHA1

              7e9e51cef1374547c885b6e8bd62ed2a1dc6902b

              SHA256

              16f04c862e66dbdf8631baaa3c37e771281f59d68d60420d4dac89701c1fb732

              SHA512

              20644ded806f97cdd62b136fa4cd6bff7ed61d8c4f6d533dee3c71d3f12923243551e910f56d4504a0c67a89a3e50064fa8f53cb3b307150cf185c9016e004e4

            • C:\containerperf\MJF5L0LGrR45RopQV75MoqBbC.bat

              Filesize

              48B

              MD5

              7a122e2bf760c3ba657e5ba59337bce2

              SHA1

              e9ac1ad5c6b04628fdea1a0657f0e466a2a06261

              SHA256

              b9469f10268a8e4a44814d71f3eb6530f2a4970933b586f6dc5e3eebb2fe33f8

              SHA512

              89912e65857c9975e0c6ab2b3ea94f07547cba9e875b7db26dc87a6d2ec8ba79b9aa7421a78f8203587ffc70fe39df2c8fc95566c47d4681fa59f933129c6c64

            • \containerperf\Hyperblockport.exe

              Filesize

              2.9MB

              MD5

              a5eb91d9ffb09e43c86d3ac84354107f

              SHA1

              ab225fd443f3c209c4493e1dd823093c87364075

              SHA256

              13da0ed8f7f0cfbf7187ae5d3fe222a0aac5a0fad6e0c1f011f0ef3f8d126906

              SHA512

              3259e901d0347db552f658f89c11c711f328831a5da203b18e8383740a202b87aea4a2c84c33d3ca6d9a8200d1f933f8820379a7b77e094c005a004c9f3c59ee

            • memory/552-189-0x0000000000210000-0x00000000004F2000-memory.dmp

              Filesize

              2.9MB

            • memory/672-172-0x00000000013C0000-0x00000000016A2000-memory.dmp

              Filesize

              2.9MB

            • memory/784-180-0x0000000000D30000-0x0000000001012000-memory.dmp

              Filesize

              2.9MB

            • memory/872-171-0x0000000000950000-0x0000000000C32000-memory.dmp

              Filesize

              2.9MB

            • memory/1060-164-0x0000000000010000-0x00000000002F2000-memory.dmp

              Filesize

              2.9MB

            • memory/1096-161-0x0000000000310000-0x00000000005F2000-memory.dmp

              Filesize

              2.9MB

            • memory/1752-168-0x0000000000FD0000-0x00000000012B2000-memory.dmp

              Filesize

              2.9MB

            • memory/2096-120-0x0000000000530000-0x0000000000542000-memory.dmp

              Filesize

              72KB

            • memory/2096-119-0x0000000000900000-0x0000000000BE2000-memory.dmp

              Filesize

              2.9MB

            • memory/2148-177-0x0000000000F50000-0x0000000001232000-memory.dmp

              Filesize

              2.9MB

            • memory/2152-175-0x00000000012E0000-0x00000000015C2000-memory.dmp

              Filesize

              2.9MB

            • memory/2280-186-0x00000000011B0000-0x0000000001492000-memory.dmp

              Filesize

              2.9MB

            • memory/2640-160-0x0000000000DB0000-0x0000000001092000-memory.dmp

              Filesize

              2.9MB

            • memory/2720-21-0x0000000000B90000-0x0000000000B9C000-memory.dmp

              Filesize

              48KB

            • memory/2720-24-0x0000000000CB0000-0x0000000000CBC000-memory.dmp

              Filesize

              48KB

            • memory/2720-32-0x0000000000EC0000-0x0000000000EC8000-memory.dmp

              Filesize

              32KB

            • memory/2720-33-0x0000000000EF0000-0x0000000000EF8000-memory.dmp

              Filesize

              32KB

            • memory/2720-34-0x0000000000F00000-0x0000000000F0C000-memory.dmp

              Filesize

              48KB

            • memory/2720-13-0x0000000001390000-0x0000000001672000-memory.dmp

              Filesize

              2.9MB

            • memory/2720-31-0x0000000000EB0000-0x0000000000EBE000-memory.dmp

              Filesize

              56KB

            • memory/2720-29-0x0000000000CF0000-0x0000000000CFE000-memory.dmp

              Filesize

              56KB

            • memory/2720-14-0x0000000000440000-0x000000000045C000-memory.dmp

              Filesize

              112KB

            • memory/2720-28-0x0000000000CE0000-0x0000000000CEA000-memory.dmp

              Filesize

              40KB

            • memory/2720-27-0x0000000000EA0000-0x0000000000EA8000-memory.dmp

              Filesize

              32KB

            • memory/2720-26-0x0000000000CD0000-0x0000000000CDC000-memory.dmp

              Filesize

              48KB

            • memory/2720-25-0x0000000000CC0000-0x0000000000CCC000-memory.dmp

              Filesize

              48KB

            • memory/2720-30-0x0000000000D00000-0x0000000000D08000-memory.dmp

              Filesize

              32KB

            • memory/2720-23-0x0000000000C80000-0x0000000000C92000-memory.dmp

              Filesize

              72KB

            • memory/2720-22-0x0000000000C70000-0x0000000000C78000-memory.dmp

              Filesize

              32KB

            • memory/2720-20-0x0000000000B80000-0x0000000000B88000-memory.dmp

              Filesize

              32KB

            • memory/2720-19-0x0000000000B70000-0x0000000000B7C000-memory.dmp

              Filesize

              48KB

            • memory/2720-18-0x0000000000C20000-0x0000000000C76000-memory.dmp

              Filesize

              344KB

            • memory/2720-17-0x0000000000B60000-0x0000000000B6A000-memory.dmp

              Filesize

              40KB

            • memory/2720-16-0x0000000000B50000-0x0000000000B60000-memory.dmp

              Filesize

              64KB

            • memory/2720-15-0x0000000000AF0000-0x0000000000B06000-memory.dmp

              Filesize

              88KB

            • memory/2860-183-0x0000000000120000-0x0000000000402000-memory.dmp

              Filesize

              2.9MB

            • memory/2972-55-0x000000001B7A0000-0x000000001BA82000-memory.dmp

              Filesize

              2.9MB

            • memory/2972-61-0x0000000001E80000-0x0000000001E88000-memory.dmp

              Filesize

              32KB