Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 08:54

General

  • Target

    32de90b90981bb082a047551b4c393c0N.exe

  • Size

    4.9MB

  • MD5

    32de90b90981bb082a047551b4c393c0

  • SHA1

    757888a42212bc2be39b5107b540d0811457c897

  • SHA256

    d612212bad7a5ebda6756ef7c1b37b4d5062e042887c43235c10f28941e73573

  • SHA512

    304b8676740c00bfdcc8fd277917da1adc8270abaefe7e3a0eec03d0c082cb12461f760942c7100165ad6e719409e49fae61123c2ad5dede7728ff35b1605345

  • SSDEEP

    49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 30 IoCs
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 9 IoCs
  • Checks whether UAC is enabled 1 TTPs 20 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32de90b90981bb082a047551b4c393c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\32de90b90981bb082a047551b4c393c0N.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2092
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1528
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1352
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2688
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1736
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:788
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1884
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2016
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2004
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1900
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1840
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JIHYs3bAOw.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:1040
        • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
          "C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3032
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\48e36187-5238-4324-8a02-ed2bdfef91cd.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
              C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
              5⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1544
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1a8c1a1b-1e19-481d-a157-9057b27b370f.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2936
                • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                  C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                  7⤵
                  • UAC bypass
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:1552
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6c979172-1cfb-4eef-b9fd-d00d5f42afc9.vbs"
                    8⤵
                      PID:2324
                      • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                        C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                        9⤵
                        • UAC bypass
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • System policy modification
                        PID:912
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8c1d36ee-27de-4222-85a5-4240c8238bf3.vbs"
                          10⤵
                            PID:2532
                            • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                              C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                              11⤵
                              • UAC bypass
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • System policy modification
                              PID:2524
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3665c3ab-e186-445e-9228-a4fbaca9dc5a.vbs"
                                12⤵
                                  PID:3036
                                  • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                    C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                    13⤵
                                    • UAC bypass
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • System policy modification
                                    PID:2780
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5976ce13-94ef-4f0c-bdd3-1ce003fe2026.vbs"
                                      14⤵
                                        PID:2940
                                        • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                          C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                          15⤵
                                          • UAC bypass
                                          • Executes dropped EXE
                                          • Checks whether UAC is enabled
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • System policy modification
                                          PID:2084
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\48042a89-05d5-4774-8e4f-9c730d72be2c.vbs"
                                            16⤵
                                              PID:1224
                                              • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                                C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                                17⤵
                                                • UAC bypass
                                                • Executes dropped EXE
                                                • Checks whether UAC is enabled
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • System policy modification
                                                PID:3060
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\58aec2c8-ba68-4999-a808-048d610a7b2b.vbs"
                                                  18⤵
                                                    PID:2412
                                                    • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                                      C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                                      19⤵
                                                      • UAC bypass
                                                      • Executes dropped EXE
                                                      • Checks whether UAC is enabled
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • System policy modification
                                                      PID:2876
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f04fce3f-3389-4550-88bf-c257b764574e.vbs"
                                                        20⤵
                                                          PID:2732
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9b724ca5-d0d5-410c-8db7-acfa44e54f63.vbs"
                                                          20⤵
                                                            PID:1064
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d9d0230e-9877-4dd3-b486-e0da497e689f.vbs"
                                                        18⤵
                                                          PID:1672
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\031b16c4-308a-4400-9c9d-421e1ec28ee1.vbs"
                                                      16⤵
                                                        PID:620
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\427fd45b-66de-40f6-a110-e4c3d720cfdf.vbs"
                                                    14⤵
                                                      PID:2988
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\125d32e8-bc6c-48cb-bcb1-a311dee24fe5.vbs"
                                                  12⤵
                                                    PID:2636
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\76762459-4b81-416b-b890-5422decfdfcb.vbs"
                                                10⤵
                                                  PID:1888
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3012bbbe-e4db-4190-ae96-0b88584e9f24.vbs"
                                              8⤵
                                                PID:1272
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\94638264-2696-42d8-ab95-3636b5974e61.vbs"
                                            6⤵
                                              PID:2288
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9d5ece4e-98b5-4f6c-83de-94d24315421e.vbs"
                                          4⤵
                                            PID:2664
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2484
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2908
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3036
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\Idle.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2916
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\Idle.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2836
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\Idle.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2944
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Windows\it-IT\services.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2912
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\it-IT\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1700
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Windows\it-IT\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1940

                                    Network

                                    MITRE ATT&CK Matrix ATT&CK v13

                                    Execution

                                    Command and Scripting Interpreter

                                    1
                                    T1059

                                    PowerShell

                                    1
                                    T1059.001

                                    Scheduled Task/Job

                                    1
                                    T1053

                                    Scheduled Task

                                    1
                                    T1053.005

                                    Persistence

                                    Scheduled Task/Job

                                    1
                                    T1053

                                    Scheduled Task

                                    1
                                    T1053.005

                                    Privilege Escalation

                                    Abuse Elevation Control Mechanism

                                    1
                                    T1548

                                    Bypass User Account Control

                                    1
                                    T1548.002

                                    Scheduled Task/Job

                                    1
                                    T1053

                                    Scheduled Task

                                    1
                                    T1053.005

                                    Defense Evasion

                                    Abuse Elevation Control Mechanism

                                    1
                                    T1548

                                    Bypass User Account Control

                                    1
                                    T1548.002

                                    Impair Defenses

                                    1
                                    T1562

                                    Disable or Modify Tools

                                    1
                                    T1562.001

                                    Modify Registry

                                    2
                                    T1112

                                    Discovery

                                    System Information Discovery

                                    2
                                    T1082

                                    Query Registry

                                    1
                                    T1012

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Recovery\1f5748e2-69f6-11ef-b486-62cb582c238c\dllhost.exe
                                      Filesize

                                      4.9MB

                                      MD5

                                      32de90b90981bb082a047551b4c393c0

                                      SHA1

                                      757888a42212bc2be39b5107b540d0811457c897

                                      SHA256

                                      d612212bad7a5ebda6756ef7c1b37b4d5062e042887c43235c10f28941e73573

                                      SHA512

                                      304b8676740c00bfdcc8fd277917da1adc8270abaefe7e3a0eec03d0c082cb12461f760942c7100165ad6e719409e49fae61123c2ad5dede7728ff35b1605345

                                    • C:\Users\Admin\AppData\Local\Temp\1a8c1a1b-1e19-481d-a157-9057b27b370f.vbs
                                      Filesize

                                      736B

                                      MD5

                                      b9504af3f4804b172e452990007156ae

                                      SHA1

                                      7fd5fa1d8e3c43ef5b7adfae1f0e0b02a6c48a31

                                      SHA256

                                      8c1e01ac5040cafb2ddbda97dfc5073c9aa2dc33a902ee6b845b3b2a6795786f

                                      SHA512

                                      6049822a574ce73af44f7cb0ccc307a01d7541e1753ed40922340d1ad795634792bbcb477508e2892091a309afee0942a6b36f7617d83537de7d5a36a5c99770

                                    • C:\Users\Admin\AppData\Local\Temp\3665c3ab-e186-445e-9228-a4fbaca9dc5a.vbs
                                      Filesize

                                      736B

                                      MD5

                                      11e9f431af9af8a84b2502ea8c19d5a1

                                      SHA1

                                      e1c4a128aa73ecab728a69861c12a68854087119

                                      SHA256

                                      8aea16c4f9e286993117cfe836a1d660b34454cfb10436d735ac4a4a7011e427

                                      SHA512

                                      0e6c7c0de099603d33e3c1005269f0634c7a2d4da6ebcf17892a7bd2c051b01081e240b93930fcb9ef81ad2b17ccf0b964effc22ffd1bfbfc1cdb0c0c7828a89

                                    • C:\Users\Admin\AppData\Local\Temp\48042a89-05d5-4774-8e4f-9c730d72be2c.vbs
                                      Filesize

                                      736B

                                      MD5

                                      902b8ee7ef1eea26cc467d53f3e134f5

                                      SHA1

                                      467cf6124d41413aacf3a9bf397a144ecbb0ab2b

                                      SHA256

                                      0ca0824b8795d80a18ef94fa3e5e31ee0dff2b0d863f6d7434ff3b8d07008bda

                                      SHA512

                                      7050398d77ae7a6e4ecdc844075042489ff97a8dbbec5b3ba653c8a432eac24e8a39f141e10b76b07d0582ab12e0b85eba7e4bcf03ce1441ff1225b70f48a3ed

                                    • C:\Users\Admin\AppData\Local\Temp\48e36187-5238-4324-8a02-ed2bdfef91cd.vbs
                                      Filesize

                                      736B

                                      MD5

                                      db802198bc779c58f941910d8494339d

                                      SHA1

                                      2671d9e392495bd1eccc090a44d900a802b7a647

                                      SHA256

                                      7a72ad1a8f199859a6aa6a7e38f3d4e6b571c0c333968456bbbbf2169ecf0d01

                                      SHA512

                                      63e4cfc36b2aabfb0686469cb7285a7839743022319433ff1dbb8f9e2f0f7f29b4b9fd968c709c7d101d3221ba7c91bbf1e3d0cfa5fbc700d5e4891edfb1671f

                                    • C:\Users\Admin\AppData\Local\Temp\58aec2c8-ba68-4999-a808-048d610a7b2b.vbs
                                      Filesize

                                      736B

                                      MD5

                                      3a7ea39b9abb477f068ee33561141062

                                      SHA1

                                      4ae4d5d802115c90bd83a39ed467eef2243d92b6

                                      SHA256

                                      45b046360cfe8e6c305790497a183cc936320adc9e26be00ad54d56de1869fc4

                                      SHA512

                                      296f9ed3f9bb094d62228bebff35c840daf39e9bc8b3d5a3304e830fca7cef2b3fbe302ddef54ed3ab9bccd7d1fa177fa8b51769e388263978c24b1d14fa6c87

                                    • C:\Users\Admin\AppData\Local\Temp\5976ce13-94ef-4f0c-bdd3-1ce003fe2026.vbs
                                      Filesize

                                      736B

                                      MD5

                                      e38972ac720de699718e66533c8fecd9

                                      SHA1

                                      e2d51c0483364fad20e1ad2b75a9996b4d2991a7

                                      SHA256

                                      2bd948b91c0207ede6c685baec53a038b0977fcdd58d521451430e672c68ebca

                                      SHA512

                                      65ef1a2fb3be2749085679626d839fbcd4289be542ea4e3951912d01e1724fde96a20d126d9cf277c8e6dc8b3fa802108061135b74298645727f5051b724dd61

                                    • C:\Users\Admin\AppData\Local\Temp\6c979172-1cfb-4eef-b9fd-d00d5f42afc9.vbs
                                      Filesize

                                      736B

                                      MD5

                                      1d85d51db3b3f80cb732f0eb492ce29f

                                      SHA1

                                      fc885a609a1bfb86cda5f5075990afb847be1719

                                      SHA256

                                      bc5953b8d3bdb0e86b9150097336312155b66fbb1999e5bb04d4bb23b5d7c1be

                                      SHA512

                                      b053acff23a09a1825c87acd00d4428300cf5e739d5ce48490f84004da4b3df161c8204a60206f844f6824ad19a22d5129c07033e61b376df583996ecb85d919

                                    • C:\Users\Admin\AppData\Local\Temp\8c1d36ee-27de-4222-85a5-4240c8238bf3.vbs
                                      Filesize

                                      735B

                                      MD5

                                      aacb41f2715bd8f093aef8743a7aa592

                                      SHA1

                                      6ab91d225aa85312897c9df2a39cff25d26c17a3

                                      SHA256

                                      4d7e4b3cf6bb6f8df3eb1d3adba029754bb35b83e3b34a0fb2aedee033e725e4

                                      SHA512

                                      1c30ed2cbc7c372a50b4644567d665e22e97671604a61b2615d75e0a0b8a9942b7820902b380d51d3f03840e085fad440ac1dc4b54146a1ba871707aa583376d

                                    • C:\Users\Admin\AppData\Local\Temp\9d5ece4e-98b5-4f6c-83de-94d24315421e.vbs
                                      Filesize

                                      512B

                                      MD5

                                      1781118f9ebf7395789022bc8928a6e3

                                      SHA1

                                      e4154a5dc638107b4134a1512174685dfe58b666

                                      SHA256

                                      9ad2d09e43acf409315dcd47d4fc333a8a3e1b28daa4c713d735e4e1916f5509

                                      SHA512

                                      8fd38ba00c518b73727f91630d69e7b80fca56374ab6c1db77b614d0125381e3bf7920725de2c19ba20e39c331fcde53ab3fb3c3abe193c8fb36b663ca851e47

                                    • C:\Users\Admin\AppData\Local\Temp\JIHYs3bAOw.bat
                                      Filesize

                                      225B

                                      MD5

                                      b8c03afac7d2bb8ff78a1da49c831726

                                      SHA1

                                      9ceb8cc0197599f8c7265e2e233fdb12196edfdf

                                      SHA256

                                      8dde66cc52c6485134e4d36adf90301bf1103652a65d241a448c0aa72da6fc67

                                      SHA512

                                      ed5631580ee80ec922ca633e01cd523d48ad92c772c12c0faa02bf1d13404bf14af65a8dcd944c95015700e28f99f99b5574180b27b8450a75aade03e3721109

                                    • C:\Users\Admin\AppData\Local\Temp\f04fce3f-3389-4550-88bf-c257b764574e.vbs
                                      Filesize

                                      736B

                                      MD5

                                      f46447d8d79307d69c22174052abdd98

                                      SHA1

                                      beeb9fa3f6bd7f1d924c9e433d0ecbea442cbc7c

                                      SHA256

                                      94282e5b793e5958ef52e3d145aeab929533b8b7cd81cb3b226f3be6610c09cc

                                      SHA512

                                      332948ae969ae19720001fbb22a55ee6713cd021ef559eb691549dd79bb0ac8a4f05e5717346d5bb7f70847f7452d12f9a89b116f16a19a1ccb4a50c663e31cb

                                    • C:\Users\Admin\AppData\Local\Temp\tmpF7D6.tmp.exe
                                      Filesize

                                      75KB

                                      MD5

                                      e0a68b98992c1699876f818a22b5b907

                                      SHA1

                                      d41e8ad8ba51217eb0340f8f69629ccb474484d0

                                      SHA256

                                      2b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f

                                      SHA512

                                      856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                                      Filesize

                                      7KB

                                      MD5

                                      eb8b2ecb12a3907a3f7f46ae5550eb1d

                                      SHA1

                                      2b7ecf1e7cc07718bc2c2edd8f23c568d66f603a

                                      SHA256

                                      2806be4561585ce24564df0f03416c5e6f0189f8c2c0937c8b6b778185124ad6

                                      SHA512

                                      8952f8a923885130b34e166faa9dfcd808e69cb293861dae58671454a6625b0dea45f4f1838b08241d5e43fea5ad7967c6a6ccbc43d38f476554bb4381a2912b

                                    • memory/912-161-0x0000000000AA0000-0x0000000000F94000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/1544-131-0x0000000000220000-0x0000000000714000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/1552-146-0x00000000008C0000-0x0000000000DB4000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/1736-63-0x000000001B500000-0x000000001B7E2000-memory.dmp
                                      Filesize

                                      2.9MB

                                    • memory/2016-67-0x0000000002340000-0x0000000002348000-memory.dmp
                                      Filesize

                                      32KB

                                    • memory/2084-206-0x0000000000FC0000-0x00000000014B4000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/2084-207-0x0000000000B40000-0x0000000000B52000-memory.dmp
                                      Filesize

                                      72KB

                                    • memory/2092-11-0x0000000000AD0000-0x0000000000ADA000-memory.dmp
                                      Filesize

                                      40KB

                                    • memory/2092-7-0x0000000000A80000-0x0000000000A96000-memory.dmp
                                      Filesize

                                      88KB

                                    • memory/2092-1-0x00000000012E0000-0x00000000017D4000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/2092-16-0x0000000000BA0000-0x0000000000BAC000-memory.dmp
                                      Filesize

                                      48KB

                                    • memory/2092-15-0x0000000000B10000-0x0000000000B18000-memory.dmp
                                      Filesize

                                      32KB

                                    • memory/2092-14-0x0000000000B00000-0x0000000000B08000-memory.dmp
                                      Filesize

                                      32KB

                                    • memory/2092-13-0x0000000000AF0000-0x0000000000AFE000-memory.dmp
                                      Filesize

                                      56KB

                                    • memory/2092-12-0x0000000000AE0000-0x0000000000AEE000-memory.dmp
                                      Filesize

                                      56KB

                                    • memory/2092-0-0x000007FEF57A3000-0x000007FEF57A4000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/2092-10-0x0000000000AC0000-0x0000000000AD2000-memory.dmp
                                      Filesize

                                      72KB

                                    • memory/2092-9-0x0000000000AB0000-0x0000000000ABA000-memory.dmp
                                      Filesize

                                      40KB

                                    • memory/2092-78-0x000007FEF57A0000-0x000007FEF618C000-memory.dmp
                                      Filesize

                                      9.9MB

                                    • memory/2092-2-0x000007FEF57A0000-0x000007FEF618C000-memory.dmp
                                      Filesize

                                      9.9MB

                                    • memory/2092-8-0x0000000000AA0000-0x0000000000AB0000-memory.dmp
                                      Filesize

                                      64KB

                                    • memory/2092-3-0x000000001BC10000-0x000000001BD3E000-memory.dmp
                                      Filesize

                                      1.2MB

                                    • memory/2092-6-0x0000000000A70000-0x0000000000A80000-memory.dmp
                                      Filesize

                                      64KB

                                    • memory/2092-5-0x0000000000730000-0x0000000000738000-memory.dmp
                                      Filesize

                                      32KB

                                    • memory/2092-4-0x0000000000310000-0x000000000032C000-memory.dmp
                                      Filesize

                                      112KB

                                    • memory/2524-176-0x0000000001110000-0x0000000001604000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/2780-191-0x00000000002D0000-0x00000000007C4000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/2876-237-0x00000000000A0000-0x0000000000594000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/3032-117-0x00000000010B0000-0x00000000015A4000-memory.dmp
                                      Filesize

                                      5.0MB

                                    • memory/3060-222-0x00000000013B0000-0x00000000018A4000-memory.dmp
                                      Filesize

                                      5.0MB