Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 21:55

General

  • Target

    JaffaCakes118_deab59c31a68d6a84e6fa91e7655945405d2f89252b45245b9efb9513c91e3af.exe

  • Size

    1.3MB

  • MD5

    992871c5c4f8d36a56265ef4302ce8df

  • SHA1

    d9e5dc06db965ceeed5bc3b05b796994a337825a

  • SHA256

    deab59c31a68d6a84e6fa91e7655945405d2f89252b45245b9efb9513c91e3af

  • SHA512

    38ccbe5cbf7b6c1c5a974f9c2b1d30be3496c273d0bf38a0563368a5e61e1ff6ebd064d1372497ffdf5b7f0906667182b8d65023648c8a5c1709ac51b84c18a5

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_deab59c31a68d6a84e6fa91e7655945405d2f89252b45245b9efb9513c91e3af.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_deab59c31a68d6a84e6fa91e7655945405d2f89252b45245b9efb9513c91e3af.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1708
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dwm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2024
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1684
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3qIDwt1oDr.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2932
              • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1588
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HEz7ZQMTyX.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1504
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:776
                    • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                      "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1128
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\76lQa6YaxV.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:928
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:2756
                          • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                            "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2920
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7lFc7N4hi3.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1956
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:588
                                • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                                  "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                                  12⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:2020
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YzNOjOTGFC.bat"
                                    13⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:948
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      14⤵
                                        PID:2288
                                      • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                                        "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                                        14⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:524
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9j3rBUpSkc.bat"
                                          15⤵
                                            PID:2472
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              16⤵
                                                PID:2592
                                              • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                                                "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                                                16⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1384
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vF7CrwxjwX.bat"
                                                  17⤵
                                                    PID:2560
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      18⤵
                                                        PID:2612
                                                      • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                                                        "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                                                        18⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2860
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7kLsQlNPpi.bat"
                                                          19⤵
                                                            PID:320
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              20⤵
                                                                PID:2160
                                                              • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                                                                "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                                                                20⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:900
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UWQnaEvoMY.bat"
                                                                  21⤵
                                                                    PID:1804
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      22⤵
                                                                        PID:2004
                                                                      • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                                                                        "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                                                                        22⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1616
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Urxb3wPgb0.bat"
                                                                          23⤵
                                                                            PID:2368
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              24⤵
                                                                                PID:2136
                                                                              • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe
                                                                                "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe"
                                                                                24⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2172
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dwm.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2868
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2612
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\dwm.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2560
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2180
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:1672
                                • C:\Windows\system32\schtasks.exe
                                  schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                                  1⤵
                                  • Process spawned unexpected child process
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2076

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  719b4882d9d741ecc228beceb8c6af5b

                                  SHA1

                                  708222e20d8500b1c5e8ce762c7c219c4bf023b6

                                  SHA256

                                  212444f346d810dfc8004b8f7448b9f93cb9c1e9a431ef64a203d7aae542d601

                                  SHA512

                                  040986f1c49b18f61fc43fe4733236d1b36bdf29315950550405cbb32f6224c934300cebaefd1722e1399917a12aa421adb665790915ef21ba41df79d87bc352

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  e28bd05d2ca76744224a1b8ce1348885

                                  SHA1

                                  2113692d87c5753920d814f9ca07f7c07ce3f5dc

                                  SHA256

                                  c32978ce1eda03c1447f255aab506227f968026903c4f5b82bb453ad0474abfb

                                  SHA512

                                  b5474f9dc7583f3e2631e394a34cea91c15bea20c4d7f10be5bda435804fb30bc031dc62de6c9184f0f4d58f300c28088cf58ad9d9a5ec96d6dae551d3191678

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  23cff6c8a940a4648d3cbcb4f78f511b

                                  SHA1

                                  7afec0f72f7db3313a43fb803abfe1a115f5f597

                                  SHA256

                                  7c19bcab5039d462b5468c7131ad1c01be831615f3d12bb75ab621a38b691c22

                                  SHA512

                                  17b819a5484682d29a618dca8dd516a29f572b3c5b88b3b452c6c672c8d0805f222dd3a45c333b324677925f1020d02ca353a1c81ac6c1e8b346eb507a2cb995

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  c481a0f5672e9955c0135a8bef95d0a6

                                  SHA1

                                  bb20341bb5b6b3f98bd9f04090c4ff023e23c0c5

                                  SHA256

                                  8888d1ced6a9e4f6377d88dbdb20910321bad2b6b8a59776996a8dc64e27676b

                                  SHA512

                                  dd03eeb91328a154e74ade89d2eed14e33289cb4955fa79be5a36da2f857cbba371621648c9a1f9ea6154c7bdf97444803a563e510da389ca6d844b1cfeabc62

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  1eb242f147d31f5fce9cf5e4236289fd

                                  SHA1

                                  66215ba85e12d1cd4c22924742df98dec487270f

                                  SHA256

                                  4c9910b1f6d2e51a083e792efe8bb9d92c2c93485ca1b862b7ceefec1bd739c3

                                  SHA512

                                  f865b7f74362bcb69188f3aa73fee04071b849c6262cd5149ab5da73dca686ddefad6f5347570b8350e2cfd531868226789733d1ae2677d7c99faf54d59c6d7e

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  01deb2e3404938e064a0e96b45851dfa

                                  SHA1

                                  bcce9578c2b8c0f222628fbb46c0e15c0e2e94f0

                                  SHA256

                                  6c71ce1fb2bd845d75c963595814da7dbefe0ad337526f3609e81ea9fb5490ad

                                  SHA512

                                  a77064761b83d7b608e2461adbad99ed7d46fa7313ad6d9bc42b323712e8fac1424fdbbc5f1b52c5cbdc60381c6e9a37984cac8e83d54f1c0e9018e8f4413e78

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  29ccbdcdcfd1c3dfd4f18d1435e88561

                                  SHA1

                                  32936b5e0fdd9ff6a6e8f2ce7944c1a181027578

                                  SHA256

                                  f608efcc110905701ea374cb2436267e6a493032305e52d65fc05d172de7100b

                                  SHA512

                                  ead0d9537d0e7cf73188b20074f7811f255097e0ae472ecf40114d83b4281a0e34fbe9e6946e5f2e34d7e50ecab3fadf2cd804cc14b44ec4130d900f07174a05

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  f58e180dd3196cde5fea0b6d1ba633d9

                                  SHA1

                                  4981606e3d0a7f3a5c257fbf3b2326dfe444985d

                                  SHA256

                                  8632743b4c90d97a12a0542a9b10b417eec898594cf0a1b6669137f6f2692de4

                                  SHA512

                                  38e5b05e7e4617a7c41732d0eb9a5b0160a60bdf66404fb89b4b1c003b31c86e8d6c1e2dea8ed68e07cb170539703007d39a2e380998ca1cf085ccb256d76f98

                                • C:\Users\Admin\AppData\Local\Temp\3qIDwt1oDr.bat

                                  Filesize

                                  240B

                                  MD5

                                  21f16089dd14512e8e6d0935364c35e0

                                  SHA1

                                  c3c5784f51d9e535a647dc8eb8df90278d6a209d

                                  SHA256

                                  e93390c9671e4aa66a6b349ac3e0d2854fa53eb21688a4c1dd96f11e398a28ba

                                  SHA512

                                  ec6268942793d8704c9cbc372c4469bc88de6833448bc033ca6ab41b2e93a3e0a15ad05a57dd879688a76e9af4aa34a0ef9506e9fc89a83e98d3a312155e44f7

                                • C:\Users\Admin\AppData\Local\Temp\76lQa6YaxV.bat

                                  Filesize

                                  240B

                                  MD5

                                  6240aa14839a502610401cb92f5f8442

                                  SHA1

                                  2319c9811ec71f392b64a973e2ad402997f60533

                                  SHA256

                                  3d9567fe0c723e60b41aad26af031079ceb244b2c4137100f7d00fc114e84534

                                  SHA512

                                  da162b8558a1db815f4de73588830053874fe401b9350db32893ba9df250f8bdfede35292f296093088099496a2c9f36bc71b3d479d65d60c087a2e02da76f11

                                • C:\Users\Admin\AppData\Local\Temp\7kLsQlNPpi.bat

                                  Filesize

                                  240B

                                  MD5

                                  806f6e3ebae1ef15636fc143b49f9493

                                  SHA1

                                  b59c7363ab2d756591b41b679f0fcb16800b0dfc

                                  SHA256

                                  ad406fe620ab58939d26a6b144df7cd2fc15d9870bef9291102318a5005f3a2e

                                  SHA512

                                  295a592eb391c9e34e4426d9eee05f15a9ca7090fbbc566fdad428fbee6ec6416ccdd2c212a9ca6fe92da5d5e020d4a6eb612635b5ef24fee7a24dc870074cd2

                                • C:\Users\Admin\AppData\Local\Temp\7lFc7N4hi3.bat

                                  Filesize

                                  240B

                                  MD5

                                  2fbe391a631d8a20feb87ed6d0f3ea8a

                                  SHA1

                                  4feec8f13fe5bf1cf621b92b8dc7e072fc00f04f

                                  SHA256

                                  d50d537ba03bdef7a9d274594441017fb4c344c61ebb9d8e954d3475a08f0779

                                  SHA512

                                  80a4836a1879c895270a9f3597d8fa30def30eccb4510b8c6bc18d4e08149470655206bc8dc7ae8b44206c5fe35e02280581abedb810c7348f9b7065e480812c

                                • C:\Users\Admin\AppData\Local\Temp\9j3rBUpSkc.bat

                                  Filesize

                                  240B

                                  MD5

                                  955f48dfce09a5e456a9e36685ad9dee

                                  SHA1

                                  5af559c52ca6e9e3706676e488de8f92cc5e8c98

                                  SHA256

                                  4f94a87751c54c671626f2e50821a6f6ceb3dee874aba35df7aeea63f605764b

                                  SHA512

                                  efb32d1b037cb7658d28e456a6b6f75a5a7260b6028e485b0baf34f5104caceef7d4f0d5ba0c97bf96bb296ed1cfe60d8fc68e52ea427ed37ac1fb5a7275dd05

                                • C:\Users\Admin\AppData\Local\Temp\Cab4397.tmp

                                  Filesize

                                  70KB

                                  MD5

                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                  SHA1

                                  1723be06719828dda65ad804298d0431f6aff976

                                  SHA256

                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                  SHA512

                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                • C:\Users\Admin\AppData\Local\Temp\HEz7ZQMTyX.bat

                                  Filesize

                                  240B

                                  MD5

                                  339ff138afa879e82a81eb09d5198ae3

                                  SHA1

                                  5690417d81c46eb5cfeac689e150eaa28b9dde9f

                                  SHA256

                                  978413726b1759e97172a5cbb14a7faa9b14084ecbb1ea87f4f9cc7e3bd9e932

                                  SHA512

                                  7707c269c9a6f933fa064835dae688c48f9a299730f21d79b71c5c7bd4a1fc733bf40a3fa12c092f3041389adf2b031bbd30aa4f164a87b2968bac2936086bc7

                                • C:\Users\Admin\AppData\Local\Temp\Tar43C9.tmp

                                  Filesize

                                  181KB

                                  MD5

                                  4ea6026cf93ec6338144661bf1202cd1

                                  SHA1

                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                  SHA256

                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                  SHA512

                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                • C:\Users\Admin\AppData\Local\Temp\UWQnaEvoMY.bat

                                  Filesize

                                  240B

                                  MD5

                                  eaeedde72d2b125964af271826caec72

                                  SHA1

                                  3717457dde2a49ce2e1a554e5608273aac6c6f52

                                  SHA256

                                  d06047906de3bd8364f5c1c5be73bc05c1b4e9c6db8a633cfb5528a5e784e017

                                  SHA512

                                  53c35be963989bd5847216091596f716d2a3a029189f456c14e4fe561f8d1cd8e1e7ae7be1846bcedc21815258b3bfee7e3935c028cf58f936b82ec4f8f5a524

                                • C:\Users\Admin\AppData\Local\Temp\Urxb3wPgb0.bat

                                  Filesize

                                  240B

                                  MD5

                                  d0d03043239033d8310243cef7fcfdd4

                                  SHA1

                                  c5d1d5b63bfeb652d29b11e48b89610c1d384c4f

                                  SHA256

                                  905308a61486b8ba6e4aa83b12f1bd911ea951bf8dfc0795299dc4f5edd97260

                                  SHA512

                                  3be5536e29415a0ac211b7ee2c13e7ec2a7d62e7f893b37b38d45c79a8ec50c9199fa8b93388ef898493ecbb47c7b3ee88f95c00c13dcc7e43f3f3a2050ce977

                                • C:\Users\Admin\AppData\Local\Temp\YzNOjOTGFC.bat

                                  Filesize

                                  240B

                                  MD5

                                  75f9db3c577ad34a860295fd9b51e75f

                                  SHA1

                                  9f5b108cc5a3e24a1e0aef70cc20283416f78c69

                                  SHA256

                                  1709337387ad255f1d502904e742dbe59d65ceb50b7c592e9312f6b577ffa469

                                  SHA512

                                  7a594aab2b954354fe665b070d9e6d9e201a6f311252e9646724519a5d07d000b2af4cdbb702113c2452c5c96dd036dd0878cf42589089f3095d9b5f0bd7ab4c

                                • C:\Users\Admin\AppData\Local\Temp\vF7CrwxjwX.bat

                                  Filesize

                                  240B

                                  MD5

                                  d3d6900ebc70a5ea55cf05c25201d8dc

                                  SHA1

                                  aaac9049e0ed15f736edc1a233a55c1412efa0ab

                                  SHA256

                                  661fe17fdb754a8d94d860cc33f1f060c7911b545856a543246021a6c0ba96bb

                                  SHA512

                                  40a0a8ce986f15f83537f01cc341d3248ddc0c2f6528204925834de72b322b6d4a57b6048cb8399d23d8ff6f6ee37a5662a665f12f76feb9b55a736e3f0c54ed

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MPD8HTRT0KBT7GH6QEXC.temp

                                  Filesize

                                  7KB

                                  MD5

                                  af9b23ebe686f974124e31c2812bd647

                                  SHA1

                                  428b5e7fab7104a5a15b3ff97fe4fd44a296fe75

                                  SHA256

                                  3d5513fbc8b7d3f69a6bfcc0e532b96db15e4cf16cf6615eb340da32a8123404

                                  SHA512

                                  ecd7d884de873e0ca9a64a2e4d844f9741b5f7d13e906eaa8eae92b6b5bfeb290eab9f75d62599f4e71e634d6fdc27cf4da581bf711bf62ce40633b555bbc571

                                • C:\providercommon\1zu9dW.bat

                                  Filesize

                                  36B

                                  MD5

                                  6783c3ee07c7d151ceac57f1f9c8bed7

                                  SHA1

                                  17468f98f95bf504cc1f83c49e49a78526b3ea03

                                  SHA256

                                  8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                  SHA512

                                  c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                  Filesize

                                  197B

                                  MD5

                                  8088241160261560a02c84025d107592

                                  SHA1

                                  083121f7027557570994c9fc211df61730455bb5

                                  SHA256

                                  2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                  SHA512

                                  20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                • \providercommon\DllCommonsvc.exe

                                  Filesize

                                  1.0MB

                                  MD5

                                  bd31e94b4143c4ce49c17d3af46bcad0

                                  SHA1

                                  f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                  SHA256

                                  b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                  SHA512

                                  f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                • memory/1384-342-0x00000000009C0000-0x00000000009D2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1384-341-0x0000000001330000-0x0000000001440000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/1588-45-0x0000000001000000-0x0000000001110000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/1588-46-0x0000000000140000-0x0000000000152000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1616-520-0x00000000002F0000-0x0000000000400000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/1708-40-0x000000001B350000-0x000000001B632000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/1708-41-0x00000000022E0000-0x00000000022E8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/1824-14-0x0000000000550000-0x0000000000562000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/1824-13-0x00000000009B0000-0x0000000000AC0000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/1824-15-0x0000000000810000-0x000000000081C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/1824-16-0x00000000005E0000-0x00000000005EC000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/1824-17-0x0000000000800000-0x000000000080C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/2172-580-0x0000000000C70000-0x0000000000D80000-memory.dmp

                                  Filesize

                                  1.1MB