Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 07:40

General

  • Target

    E96B9E17DA08C5A64C26DC666402C64F.exe

  • Size

    1.2MB

  • MD5

    e96b9e17da08c5a64c26dc666402c64f

  • SHA1

    cceec5c7f6f4bbf08c63153a0dea8b5834ed38ee

  • SHA256

    8e7147a2aaffb6632052f190dad38b7d945ae42f1c4e21307f6d9079afb76372

  • SHA512

    dd71101f1b6b0dcd545bec2e448c6368a8653b599a5b0de3287ac50126b0c380a325e92fa201bdd869d97cf18e63d0795879923e9364abb92adfc57af02d5040

  • SSDEEP

    24576:QGZn/lA+WQi7Tw3d3pI0eqZb/bte1aMiL/8LLKwi/TIRk:QGzAy1Sob6CsL8

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 54 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 18 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 36 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 17 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\E96B9E17DA08C5A64C26DC666402C64F.exe
    "C:\Users\Admin\AppData\Local\Temp\E96B9E17DA08C5A64C26DC666402C64F.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2136
    • C:\Users\Admin\AppData\Local\upfc.exe
      "C:\Users\Admin\AppData\Local\upfc.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2336
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d282dcec-7fa2-464f-85ff-b017f5b7321b.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Users\Admin\AppData\Local\upfc.exe
          C:\Users\Admin\AppData\Local\upfc.exe
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2412
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\59d1508d-814b-488b-9032-fcc3ab13eafe.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3536
            • C:\Users\Admin\AppData\Local\upfc.exe
              C:\Users\Admin\AppData\Local\upfc.exe
              6⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4728
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\36d99732-6adb-46c6-ab33-9cc8deea54fd.vbs"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1244
                • C:\Users\Admin\AppData\Local\upfc.exe
                  C:\Users\Admin\AppData\Local\upfc.exe
                  8⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:2580
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d81b1313-7319-4125-890f-cb5d82cc58e6.vbs"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3480
                    • C:\Users\Admin\AppData\Local\upfc.exe
                      C:\Users\Admin\AppData\Local\upfc.exe
                      10⤵
                      • UAC bypass
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:2752
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1b0fc7ce-8200-4259-9d5c-bcbf6ed22eee.vbs"
                        11⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2756
                        • C:\Users\Admin\AppData\Local\upfc.exe
                          C:\Users\Admin\AppData\Local\upfc.exe
                          12⤵
                          • UAC bypass
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          • System policy modification
                          PID:1924
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\46a68393-63ab-4c45-8f24-5a5d217d03c3.vbs"
                            13⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1888
                            • C:\Users\Admin\AppData\Local\upfc.exe
                              C:\Users\Admin\AppData\Local\upfc.exe
                              14⤵
                              • UAC bypass
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              • System policy modification
                              PID:2340
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5729203e-7f17-453a-882f-d94374d7492c.vbs"
                                15⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4468
                                • C:\Users\Admin\AppData\Local\upfc.exe
                                  C:\Users\Admin\AppData\Local\upfc.exe
                                  16⤵
                                  • UAC bypass
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  • System policy modification
                                  PID:4800
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9554317e-a944-40bb-8196-3a6978929b3f.vbs"
                                    17⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2624
                                    • C:\Users\Admin\AppData\Local\upfc.exe
                                      C:\Users\Admin\AppData\Local\upfc.exe
                                      18⤵
                                      • UAC bypass
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Modifies registry class
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      • System policy modification
                                      PID:1772
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\018e6b97-9bca-4350-9568-3f7234f385e9.vbs"
                                        19⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:1488
                                        • C:\Users\Admin\AppData\Local\upfc.exe
                                          C:\Users\Admin\AppData\Local\upfc.exe
                                          20⤵
                                          • UAC bypass
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Checks whether UAC is enabled
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          • System policy modification
                                          PID:4452
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4d873c06-c09b-4ab1-bfd6-973a77d174f1.vbs"
                                            21⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:2636
                                            • C:\Users\Admin\AppData\Local\upfc.exe
                                              C:\Users\Admin\AppData\Local\upfc.exe
                                              22⤵
                                              • UAC bypass
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Checks whether UAC is enabled
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              • System policy modification
                                              PID:3272
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7722553f-3a5f-4fe9-988d-47ec36805e4c.vbs"
                                                23⤵
                                                  PID:3236
                                                  • C:\Users\Admin\AppData\Local\upfc.exe
                                                    C:\Users\Admin\AppData\Local\upfc.exe
                                                    24⤵
                                                    • UAC bypass
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Checks whether UAC is enabled
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • System policy modification
                                                    PID:3092
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c78c2a9c-9a68-49c8-8886-3d9c756fd268.vbs"
                                                      25⤵
                                                        PID:1616
                                                        • C:\Users\Admin\AppData\Local\upfc.exe
                                                          C:\Users\Admin\AppData\Local\upfc.exe
                                                          26⤵
                                                          • UAC bypass
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Checks whether UAC is enabled
                                                          • Modifies registry class
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • System policy modification
                                                          PID:4920
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9fa024a1-f7b0-480e-b486-afddd8220124.vbs"
                                                            27⤵
                                                              PID:2248
                                                              • C:\Users\Admin\AppData\Local\upfc.exe
                                                                C:\Users\Admin\AppData\Local\upfc.exe
                                                                28⤵
                                                                • UAC bypass
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Checks whether UAC is enabled
                                                                • Modifies registry class
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • System policy modification
                                                                PID:2476
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ca6bcdc2-8cfe-470b-be1e-62fa58bc7399.vbs"
                                                                  29⤵
                                                                    PID:2596
                                                                    • C:\Users\Admin\AppData\Local\upfc.exe
                                                                      C:\Users\Admin\AppData\Local\upfc.exe
                                                                      30⤵
                                                                      • UAC bypass
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Checks whether UAC is enabled
                                                                      • Modifies registry class
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • System policy modification
                                                                      PID:412
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9f30881c-c3bf-4f06-85eb-a7a545a76908.vbs"
                                                                        31⤵
                                                                          PID:1648
                                                                          • C:\Users\Admin\AppData\Local\upfc.exe
                                                                            C:\Users\Admin\AppData\Local\upfc.exe
                                                                            32⤵
                                                                            • UAC bypass
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Checks whether UAC is enabled
                                                                            • Modifies registry class
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • System policy modification
                                                                            PID:2312
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6230e7bc-a280-45d0-8cc5-1c1c8df0dfc9.vbs"
                                                                              33⤵
                                                                                PID:2368
                                                                                • C:\Users\Admin\AppData\Local\upfc.exe
                                                                                  C:\Users\Admin\AppData\Local\upfc.exe
                                                                                  34⤵
                                                                                  • UAC bypass
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Checks whether UAC is enabled
                                                                                  • Modifies registry class
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • System policy modification
                                                                                  PID:4960
                                                                                  • C:\Windows\System32\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3c49734d-26e2-461e-a76a-6bbbe7b77626.vbs"
                                                                                    35⤵
                                                                                      PID:728
                                                                                    • C:\Windows\System32\WScript.exe
                                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c8cde244-4aa1-4562-a630-660f50feafab.vbs"
                                                                                      35⤵
                                                                                        PID:2832
                                                                                  • C:\Windows\System32\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0c4571df-fb35-4c97-8638-f998bd970d6d.vbs"
                                                                                    33⤵
                                                                                      PID:4272
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\984cc9fd-1f51-46e7-bdb0-c84ad317c19e.vbs"
                                                                                  31⤵
                                                                                    PID:1476
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e2330292-c53c-453d-a675-9ccdb0d47c61.vbs"
                                                                                29⤵
                                                                                  PID:3080
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1afd99d4-c850-4e42-bcbd-7a54a2615361.vbs"
                                                                              27⤵
                                                                                PID:2088
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\40decf69-76b1-4816-a7b9-28eeaffd258e.vbs"
                                                                            25⤵
                                                                              PID:1016
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ffcb04af-3177-4387-86ab-1a037dff2d1d.vbs"
                                                                          23⤵
                                                                            PID:4884
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b7822043-17c1-40fb-b683-c527e1b5f126.vbs"
                                                                        21⤵
                                                                          PID:3252
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\59573127-d319-464c-add8-7e24cfa920ef.vbs"
                                                                      19⤵
                                                                        PID:2956
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\592f2a4e-7346-462d-b396-3840ff0faeac.vbs"
                                                                    17⤵
                                                                      PID:4512
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e550ed8b-cbc0-45c7-9f9f-406aab687659.vbs"
                                                                  15⤵
                                                                    PID:8
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1f0b43ee-a6e7-4d02-a5de-cdca204354e2.vbs"
                                                                13⤵
                                                                  PID:3220
                                                            • C:\Windows\System32\WScript.exe
                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b77362ac-4e36-409d-a3f4-aa45a164f35b.vbs"
                                                              11⤵
                                                                PID:4056
                                                          • C:\Windows\System32\WScript.exe
                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e6a88b1c-dca9-4943-9aee-603916daa729.vbs"
                                                            9⤵
                                                              PID:1868
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1b3e91c9-d8ab-4d02-87c1-295b92fe4770.vbs"
                                                          7⤵
                                                            PID:4004
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\070f4955-1271-4b61-9e02-7aa503e5223b.vbs"
                                                        5⤵
                                                          PID:3828
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4bff3a0e-cb86-4985-bb04-f6e175c89715.vbs"
                                                      3⤵
                                                        PID:532
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:/Users/Admin/AppData/Local/\upfc.exe'" /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1268
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:/Users/Admin/AppData/Local/\upfc.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2516
                                                  • C:\Windows\system32\schtasks.exe
                                                    schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 13 /tr "'C:/Users/Admin/AppData/Local/\upfc.exe'" /rl HIGHEST /f
                                                    1⤵
                                                    • Process spawned unexpected child process
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2756

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\upfc.exe.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    3ad9a5252966a3ab5b1b3222424717be

                                                    SHA1

                                                    5397522c86c74ddbfb2585b9613c794f4b4c3410

                                                    SHA256

                                                    27525f5fc7871c6828ab5173315e95b5c7e918d2ee532781c562c378584b5249

                                                    SHA512

                                                    b1a745f7a0f33b777ffc34f74f42752144d9f2d06b8bc613e703570494762b3af87e153212c3274b18af14f17b8619e2f350b7c3cc11228f7d4208d4251e90e6

                                                  • C:\Users\Admin\AppData\Local\Temp\018e6b97-9bca-4350-9568-3f7234f385e9.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    87a0dc490806025ff40ea06e2f15e828

                                                    SHA1

                                                    49a5419016d7b8c6f105a6bdc1347689197a66f9

                                                    SHA256

                                                    9c1d4e24f1d8d00600a8cac90117b85771ca8749659d7226ca5dbd02defb30c7

                                                    SHA512

                                                    4b84f7bb0c26f8175611df649f93183d5388bee55756bd6a5c9d14d8e74655f48daa5373fe5fc734fefc93df80f38c69e4d58bcb0c4ef27891eef5aaf9d8310a

                                                  • C:\Users\Admin\AppData\Local\Temp\1b0fc7ce-8200-4259-9d5c-bcbf6ed22eee.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    b6e89f5c0840313b5aa04c49f685a531

                                                    SHA1

                                                    05365bf5ae450a11671ac2092a0168ec8c47b574

                                                    SHA256

                                                    58668f7243a46ede75b47bf8c8882373436a73be1b62fa1712de1523b12a2eea

                                                    SHA512

                                                    219f6608ac6a5afa671198045184469a938de7c40d31f227176579f383e71a1322c67afacd020b509bf1add675d61081c5ceefd21bebd35f43ad6ae68d639024

                                                  • C:\Users\Admin\AppData\Local\Temp\36d99732-6adb-46c6-ab33-9cc8deea54fd.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    4d85637238b9af483407d9c88f67f87c

                                                    SHA1

                                                    11134e09e3c85de2dd73a15ae002f88b69c6b734

                                                    SHA256

                                                    4d484ba20d456c9c8860d74dd50d7d728cf59b6fb53f2c9f891c6ee73e831b14

                                                    SHA512

                                                    814f3317dc18efb75a1c0262dc7fb67e04589619451369cf7ee80d340555a33f0dbd3d39fc0e8a789fcc65fa3fd645e8b10224a96a237d52b90bc270f670731a

                                                  • C:\Users\Admin\AppData\Local\Temp\46a68393-63ab-4c45-8f24-5a5d217d03c3.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    5e0b4243128ac83c9cb6ebf144f4c73b

                                                    SHA1

                                                    279183154b32523ffb01aeb190c60d46843b3444

                                                    SHA256

                                                    74c3884da2f6a762545946d6af5692b85c2582a3ae5da4d8c1e7b9e6f6a41d92

                                                    SHA512

                                                    8ae704ee3d582438b604800bd80ea81247a1694f8dcf2db7ae42a01019f9c1ff7a7ee2c2330e4cc8037b21d1d1fccfc25bc7e4e584429c2e8fa9ac9ff82c1c62

                                                  • C:\Users\Admin\AppData\Local\Temp\4bff3a0e-cb86-4985-bb04-f6e175c89715.vbs

                                                    Filesize

                                                    489B

                                                    MD5

                                                    1204c5a1d9b5c3745c37ec37b80edc3c

                                                    SHA1

                                                    b5641c1c41b13f6ebd2a0f7269af24604c526570

                                                    SHA256

                                                    5f923118a512b778eb34a817a3a432353906caa3dad876b0a747caad60483a02

                                                    SHA512

                                                    182c8e82b0a884d06de3fedbce910a7f67d5650a1d8ebbe9993ed65cf0d83ec8f183695d9c89820d146b9f96f2c1453934cbace4aabe89d5a0cd4ea5d2c3305b

                                                  • C:\Users\Admin\AppData\Local\Temp\4d873c06-c09b-4ab1-bfd6-973a77d174f1.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    13af029940a9b921493c8103b95e5972

                                                    SHA1

                                                    4a8027cd9c8a7205ad53c1f4bb1ba9d4c54ee455

                                                    SHA256

                                                    c1bb9e7a2d98de2c9fbe35a03e2693e35a406e1d148ee6fd8cf2fc14b45d7952

                                                    SHA512

                                                    a8a200bf3a3b1f0227acb91649d7c8daea5a6f137f8afa1c4ef07cdbd9f46c0ff3fb0226da4f56c22b12d6a41652d906545d671c3c1768894c5fd6b57a9ce55e

                                                  • C:\Users\Admin\AppData\Local\Temp\5729203e-7f17-453a-882f-d94374d7492c.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    814412d38450d49ba7254eeac1392a7d

                                                    SHA1

                                                    f0352ce5cd4cf14283de15aa3ae43bf20f95fe76

                                                    SHA256

                                                    9d2d939140ae7b02b550d0def7a0535dd762dccf226d63a3aa6ba8e240d934c2

                                                    SHA512

                                                    221ef5fb68d7152e19ebb9fecb8b35fd90d58687ad4abb44521187e12f2b91f835ea5db8de00af23b24c76d999b8225bdaab11ac5aafb9fff717f2bcd9ead02e

                                                  • C:\Users\Admin\AppData\Local\Temp\59d1508d-814b-488b-9032-fcc3ab13eafe.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    f6d151b677c909d5ae17ecaef42b51bd

                                                    SHA1

                                                    fc51cde7665c0e8c3727d351d6d6037ada31f44e

                                                    SHA256

                                                    c8c5e0c9c556d141b417d9b5def8f1266c78d06e39e71d9b6675e44bd011ce27

                                                    SHA512

                                                    05aa7fb328913a7df0c66f57d9bf11d07a19d5b79bb3ee688037e26d01596b7acef30cae1bfe1ce9a6c392df4ce731615968196e96e39ecc93e8efc5f6713a37

                                                  • C:\Users\Admin\AppData\Local\Temp\6230e7bc-a280-45d0-8cc5-1c1c8df0dfc9.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    536b5eb0146d3083c72d1d3c0dc166ab

                                                    SHA1

                                                    262092c0eed1a9770d26eb44289bf913c589ff67

                                                    SHA256

                                                    ae8165df68bd7eb4b1632aa4430b1bba0f79a540c8e9d831d605479dcc6c40cd

                                                    SHA512

                                                    79a8900fbc23897e737e46491c0038aede214a3a1545ed7285d2e48111cd62ccbc4d083c44439273073803faa5caf406cb992e2c329803864a9f69f3fdc0e695

                                                  • C:\Users\Admin\AppData\Local\Temp\7722553f-3a5f-4fe9-988d-47ec36805e4c.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    6b82772a7e37b839e7055374800b6683

                                                    SHA1

                                                    cd64abd64caed14be7b57efd9525e5e3b8d5b2cc

                                                    SHA256

                                                    363b6e2c16e9adb272a080efae13ff4304a9d9ffe24df823048fb578759da50c

                                                    SHA512

                                                    44162cc73df8646ad47d9cb5eeab7e3f412549bbc1d7f4cf44263bf16e0a345a4f0fbc953eb8e03c3f22258b7c237832982ef0b9923d7894050ccba29ad383cb

                                                  • C:\Users\Admin\AppData\Local\Temp\9554317e-a944-40bb-8196-3a6978929b3f.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    4802f00773027586dd2bf5da1db5db04

                                                    SHA1

                                                    961d39f09f2c7ad98928332a31cf44692ca19609

                                                    SHA256

                                                    2937f7ae7dfb61c04bb5aa395d3629b0842c1bfc1a73d9e528edd45e8211311d

                                                    SHA512

                                                    b9ee48bf665b2561a1c34204c6a057ac994a346352561ce3edbbde7e13b7845727e106f103b022a269daac878b6d9cba04e46d0117f116d847189ed86062a7cc

                                                  • C:\Users\Admin\AppData\Local\Temp\9f30881c-c3bf-4f06-85eb-a7a545a76908.vbs

                                                    Filesize

                                                    712B

                                                    MD5

                                                    681830cf9834a46b88a3f846519cb9c3

                                                    SHA1

                                                    7ada972b8e1c3bde25ee20c1aefba591d9e16ef1

                                                    SHA256

                                                    9a9375a6a1c3c5b2df545af8f392dd448f6de147c10e4ab5589a58ce545aec80

                                                    SHA512

                                                    c0c7358d1b4a515125d25b04c5b3b3c89aad09a9b4bb0792628f179e1bf01f97b9fed79d941c8b19ae48c21a2ee88f32c0b310f4f4b51e62c321a4904ae96c7a

                                                  • C:\Users\Admin\AppData\Local\Temp\9fa024a1-f7b0-480e-b486-afddd8220124.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    f56189023417a3230b99f53faea49826

                                                    SHA1

                                                    1fa32bd417e3c074c877e299717a9ca7c7e292bd

                                                    SHA256

                                                    6aae3db4468973926ed4a461b8c44cc71d2ad4090065d886216f90b2f281d0ee

                                                    SHA512

                                                    99d5aabfeecf2590b01c2868640447fea3fc0820cd1bfe1d5679ec60e075715c6c11739a9a942823e0af519f5c5be5eeb4db95693943b701e6ae0c309af80eaa

                                                  • C:\Users\Admin\AppData\Local\Temp\c78c2a9c-9a68-49c8-8886-3d9c756fd268.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    deaecdc7841dc7d5920b087ec2492c32

                                                    SHA1

                                                    92ec54d3ad733bde2d1cb277d2dcbf07da813f6d

                                                    SHA256

                                                    8a3b7c6fb7ec314b31e43080cb1b23d5d5e0341501ab85bc95f21d799bd83bd4

                                                    SHA512

                                                    5d96859aadf2f85f9ad32937d8959f161b28b6cb6aab137196146076207171a8c558d8fc5b0d5bd41769264b1de268753f145dfca434a90d793b58de68354977

                                                  • C:\Users\Admin\AppData\Local\Temp\ca6bcdc2-8cfe-470b-be1e-62fa58bc7399.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    7068bba06015c388da40287adcbb479e

                                                    SHA1

                                                    597d243530cb4d2d085ca52285730b7b6300f2ed

                                                    SHA256

                                                    8737970f2d49caed5b5f0c985c20fb41427616f850d95e98217e6d16fc5dbec9

                                                    SHA512

                                                    bbf6bb540a5d1303a0d0bfa556585aae3dde159ee0dc7b71568afad61f8939ac7feba98b28e0233334c6f7513bbfe21b5672b4a38419f39216e49e3cad9d6eb1

                                                  • C:\Users\Admin\AppData\Local\Temp\d282dcec-7fa2-464f-85ff-b017f5b7321b.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    d8b1639fcd1ad163597ace830d1cb4ed

                                                    SHA1

                                                    4722bfaae21117ec4ae637ed52a1d8dc79751f38

                                                    SHA256

                                                    2067ffbfeb1bf570f062a75fff641d3b38342cee79f180a47c81a6784591fde0

                                                    SHA512

                                                    90f5448060cdea35fd802b3eac7b64d1f48d20c23a86d287899086e37a74e52acb3ab4bb300f70a8dc40e1c3ebf93c29d33b7fb85f0a3e8721e666f3f366b4ae

                                                  • C:\Users\Admin\AppData\Local\Temp\d81b1313-7319-4125-890f-cb5d82cc58e6.vbs

                                                    Filesize

                                                    713B

                                                    MD5

                                                    273e47c4bd141bf88f9bf73ffbf7e1ad

                                                    SHA1

                                                    d7790e838869d04501e19a51ebb1fcc73b5b0897

                                                    SHA256

                                                    13c830e236ee87e27a90f9614f0173119a541ffcb40506bd236f3666e5fdf93a

                                                    SHA512

                                                    2c85df48152e877d39fa9f1030f582b101c2ce305cb326013df6e91e17010b9baf1232b714ee57e61d3ad6e6167ebed73fc78c56c673174b89a861e715c453fb

                                                  • C:\Users\Admin\AppData\Local\upfc.exe

                                                    Filesize

                                                    1.2MB

                                                    MD5

                                                    e96b9e17da08c5a64c26dc666402c64f

                                                    SHA1

                                                    cceec5c7f6f4bbf08c63153a0dea8b5834ed38ee

                                                    SHA256

                                                    8e7147a2aaffb6632052f190dad38b7d945ae42f1c4e21307f6d9079afb76372

                                                    SHA512

                                                    dd71101f1b6b0dcd545bec2e448c6368a8653b599a5b0de3287ac50126b0c380a325e92fa201bdd869d97cf18e63d0795879923e9364abb92adfc57af02d5040

                                                  • memory/2136-6-0x0000000000F10000-0x0000000000F1A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2136-3-0x0000000000FC0000-0x0000000000FDC000-memory.dmp

                                                    Filesize

                                                    112KB

                                                  • memory/2136-2-0x00007FFB52290000-0x00007FFB52D51000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2136-7-0x0000000001000000-0x000000000100A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2136-0-0x00007FFB52293000-0x00007FFB52295000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2136-23-0x00007FFB52290000-0x00007FFB52D51000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2136-5-0x0000000000FE0000-0x0000000000FF6000-memory.dmp

                                                    Filesize

                                                    88KB

                                                  • memory/2136-1-0x0000000000600000-0x0000000000744000-memory.dmp

                                                    Filesize

                                                    1.3MB

                                                  • memory/2136-8-0x00000000028C0000-0x00000000028CC000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2136-4-0x000000001B410000-0x000000001B460000-memory.dmp

                                                    Filesize

                                                    320KB