Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 21:37

General

  • Target

    JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe

  • Size

    1.3MB

  • MD5

    a27a81c22b49aa80b27ff875be43948d

  • SHA1

    d63e2a6b68582d8d3da3e7e1f8f98919336c9e23

  • SHA256

    d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413

  • SHA512

    09e431375191f3e7ca433219ed8a831bcd74a1410b5899ea67e19e1406edc098b0526439d22e9d5411f062ab38890bcc10eba4d0666a1a608121cd077c5eeb2e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d19b2dd4f28348f4d96ed1fb9c9beb32cda9d5e3b7adc3e476e33f47b9072413.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2808
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2516
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2528
          • C:\providercommon\smss.exe
            "C:\providercommon\smss.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X5jGqiFaSS.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1200
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2344
                • C:\providercommon\smss.exe
                  "C:\providercommon\smss.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1640
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vad0LeRbBz.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2064
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:2244
                      • C:\providercommon\smss.exe
                        "C:\providercommon\smss.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2268
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LW19r029AS.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1272
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:2680
                            • C:\providercommon\smss.exe
                              "C:\providercommon\smss.exe"
                              11⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1964
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3HNGHapxv4.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2084
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:1812
                                  • C:\providercommon\smss.exe
                                    "C:\providercommon\smss.exe"
                                    13⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:776
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kUVpzpaF2i.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:2092
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:2212
                                        • C:\providercommon\smss.exe
                                          "C:\providercommon\smss.exe"
                                          15⤵
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1680
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ys8lvSze9b.bat"
                                            16⤵
                                              PID:1244
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                17⤵
                                                  PID:2720
                                                • C:\providercommon\smss.exe
                                                  "C:\providercommon\smss.exe"
                                                  17⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1072
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\79RMekxjZd.bat"
                                                    18⤵
                                                      PID:2784
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        19⤵
                                                          PID:2712
                                                        • C:\providercommon\smss.exe
                                                          "C:\providercommon\smss.exe"
                                                          19⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2960
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fmTXnddwCX.bat"
                                                            20⤵
                                                              PID:980
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                21⤵
                                                                  PID:596
                                                                • C:\providercommon\smss.exe
                                                                  "C:\providercommon\smss.exe"
                                                                  21⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3064
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6x2cfOw3ED.bat"
                                                                    22⤵
                                                                      PID:1768
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        23⤵
                                                                          PID:2612
                                                                        • C:\providercommon\smss.exe
                                                                          "C:\providercommon\smss.exe"
                                                                          23⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2688
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1CKPPXbanu.bat"
                                                                            24⤵
                                                                              PID:2768
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                25⤵
                                                                                  PID:1380
                                                                                • C:\providercommon\smss.exe
                                                                                  "C:\providercommon\smss.exe"
                                                                                  25⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:296
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WOs9W2tFAs.bat"
                                                                                    26⤵
                                                                                      PID:2808
                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                        27⤵
                                                                                          PID:1080
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\providercommon\smss.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2636
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2688
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\providercommon\smss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2680
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\cmd.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2740
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2860
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2412

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      c0128a7c20d3f007bf0d68dcab681268

                                      SHA1

                                      7b2e79d7d36b77a0b8b1246280c6d8b2d0bfc88f

                                      SHA256

                                      f2343b39bdbf4718473fc80a136315f42fa327c30c248af96db247f1db794079

                                      SHA512

                                      dd6039497da016f6cf2df18174850bba3200371fe9f00c9a7fbf0b4cd348052d662dcee1b3e4961de80f0b93473117cd9dcf50cbbf7a3bcb827e38a058aaa536

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      3be68cd4feb191d9e33f45d7bd3ab89a

                                      SHA1

                                      4add48728e1be3a63c2e95655b4542ac4fa4bd89

                                      SHA256

                                      4ddc469c8484cab8a5c172fc26a0d91c5c9637da854559205d77923fd40def57

                                      SHA512

                                      cbb840228a0b1573cd942ceca3ac8070b2cb5ec2d7ce88e461f4a8ecf08bf5624f058c466d4b04c415b9e28bbd0961830797e667930b86ce348e3914d2013d4d

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      29da6701dc0a9feabd9f977bb5c8d6f3

                                      SHA1

                                      5fe755b4bcce65073cdc8d95fa4c2674492aef7c

                                      SHA256

                                      d14da7f564f7418310bdec7a77060d330d59ef0d199dd1ad8d05f9e7020fc7a4

                                      SHA512

                                      c3b75ca4a6ace17ebe5ebd9275e1747fcd1589df2bb08bcee80010fc6992950180e23135d3dc28b57f559301a63cb2be04e2b73eaafe4c06bd560fbd76cb0b11

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      156d007b10dffe3610cc7913e1f879cc

                                      SHA1

                                      2afea914fbf4f77f6c21a5388f186466c6c8b8f1

                                      SHA256

                                      5917d74424dbded7030e2d4fd2af3eacdd6c2402f33ea9441e38d29fc95062e6

                                      SHA512

                                      9b7c4ef16cccaacbbb41580048bb2b1d7a4c8bf77dacb2d063ee98ea701b9b8cac8d680dad5b046307f5c4bd574f306becc93dc393ae587ed31c602b470de00c

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      874ab07ce8b4d852997d25903c769384

                                      SHA1

                                      c617437ece8d006c7ed5c8b204c42e0ed92e1ad4

                                      SHA256

                                      e3e45eed139ca94ead0c49bd5aae57d580bfbf82b294dbaa5e407f67056844a0

                                      SHA512

                                      c805943dc9e65ddc24eb78bc6e6ffbdb695f77f3f507841e017ce6d18bb7e0661127da022a4b8a00fd91e613009c55e463bda59ca4dffdeefab4d06bc279e6c0

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      1bd0697f53137d031d89bdf0ec13b025

                                      SHA1

                                      2d66995431251d85fdc962799e9b19594e69f147

                                      SHA256

                                      c9c02cd56f45eb29f9d49646a90a7876332e7fb814a2278c428b084bca5fb143

                                      SHA512

                                      3eacb9f604956e1695a30ec539da611ccf2d32cb693a8bd6607b2e312359b59d1c91597c92572beaa4c21d4e297a9c20e5137ce2887ea90b6038a49dbf3cc5c8

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      dfd1480bb7c337d871409696199619e4

                                      SHA1

                                      327a71bc07aabbbcb5475eea1eab9759d4259a21

                                      SHA256

                                      b53c56b578d399eac67729a5eda3730867fc656cc6b8d06064a91978b9832339

                                      SHA512

                                      91589cb096ab5ba8a76f4a396a91068bba6314e8985cffc28ab8ae08e6208ab23e1917915f6096c7182c5bb046625446c1fc61561c627153e0c5a79d2e77e52f

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      e59c6eb904554f49ce73441e20d924ea

                                      SHA1

                                      75511801a0e9246bcda788de5cf012d2ad8a164a

                                      SHA256

                                      81324474f7f77ecfe89287f3b87514ba727b754f73619ab235d7c424359f6fed

                                      SHA512

                                      aa1b8b496d666a0c4c138d6fed31f55f9a574ab6de21bfee142be8cc96c7736f8edbe6b2d25e6d31c2ab0ff1412bfc7cdd3714b988849a940a309645022f332b

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      dcf42d22417489a6643dc01f9a7b2bb8

                                      SHA1

                                      34708260bbc20075c253270bdb6c9b98bcc5df3e

                                      SHA256

                                      ac2bb30a81a48e478c6fc478ebfc9ccf8d02e6df415d81fe44edb3efc096a6b8

                                      SHA512

                                      1da8c9b611c0f53fec5d382b2273dee31d2c7cb70ef33d84d3b977a276ada111559ae2849cc701b9d4c3611790f6509b5b1a8f4797ef29df36b9de7e94191daf

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      1ee445b3fd229f6d58f260e9a7de6def

                                      SHA1

                                      16c4c76890cd01b36915dd65f81039c0183d1351

                                      SHA256

                                      6eb4efe7c02728fb1ad3744eb2dce830dabd862a2007e9dcdb0d73c97b2eff55

                                      SHA512

                                      7c2aba4f707338eaf83633ffa646e74e2d39b05e1dce2f65f34293fc829fc8f5b81a872ecad256ffcc4e0e372557cf8a116d912f1a089e6e2f1bf1fea1f3fd77

                                    • C:\Users\Admin\AppData\Local\Temp\1CKPPXbanu.bat

                                      Filesize

                                      191B

                                      MD5

                                      6cb1d32a60c24703253a842113d87c5f

                                      SHA1

                                      ccbbaf87b9c1c03ab62f5cc1b81bff121e5b54b9

                                      SHA256

                                      83b4365dd03ae413891e3ae43c601f72d655e5af4fe9c70bc796ed9e0386db7e

                                      SHA512

                                      dd66cda643ec7d48a77b13db300b0546fe4cfd84e8d41d3fcefec605f1916889a3662cb4411ae1f453490a5eb2470b8066a06c7e014d11633cd68ea645f189a9

                                    • C:\Users\Admin\AppData\Local\Temp\3HNGHapxv4.bat

                                      Filesize

                                      191B

                                      MD5

                                      7119e434f699210ea142083f6c10ab42

                                      SHA1

                                      2eb3d3186a432f423362f96a81ac31470fc63252

                                      SHA256

                                      9906e28057f74f67536aaf70eff9efd49fcb7a1c27a43b133548b105ffc6ea17

                                      SHA512

                                      77c1c815ef81ac4962361c75442757e09c97c18351f11efb8becfc854512ffd09212e1da779f4f94cf22b0ddae7d781ec183d7b0e7761d6902d940c2b9a20fbc

                                    • C:\Users\Admin\AppData\Local\Temp\6x2cfOw3ED.bat

                                      Filesize

                                      191B

                                      MD5

                                      7beac56efb0f96eb6db6792f9c9091b3

                                      SHA1

                                      36cb88330b9552a98b645e168406cc1b657af212

                                      SHA256

                                      034751e17c2d4edfa51454a9ec6a168663ba6e71d043f4d78ebc3aa4119f0c2a

                                      SHA512

                                      890011a75cdc295e5eefe8681faf76c00bcf30ae3dfb17800cc887b3362ad4c8be4cedfba79cf07803996926c300a2a5a6e8133e1b002f5d75016264c9bf8812

                                    • C:\Users\Admin\AppData\Local\Temp\79RMekxjZd.bat

                                      Filesize

                                      191B

                                      MD5

                                      f5a29cd712e461295c2a0a8ed86625ef

                                      SHA1

                                      3601094be9ac79aca556871eef5716881fb23073

                                      SHA256

                                      e0a873d0a45968852f52413f5d8c1824da6d5aa01c02603180d22718b15ebe3e

                                      SHA512

                                      1bb7d75d0b79268fb20af39f8517c47cce52b92623bae6a42f1109b17cdc061e1c3f27731f45bc23e407e31d3110f2a68fae47f9986d374dbbc5c4f9819673d0

                                    • C:\Users\Admin\AppData\Local\Temp\CabC4B8.tmp

                                      Filesize

                                      70KB

                                      MD5

                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                      SHA1

                                      1723be06719828dda65ad804298d0431f6aff976

                                      SHA256

                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                      SHA512

                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                    • C:\Users\Admin\AppData\Local\Temp\LW19r029AS.bat

                                      Filesize

                                      191B

                                      MD5

                                      4524dc7e1aa4444d0c3d199e2af19b33

                                      SHA1

                                      5b3087e8b7995e0c4e98398f0c84e1b8bb84bfcb

                                      SHA256

                                      c9a2641287ddbfc98b28541433723780650cf801c6483f5bc49c1797f6236c21

                                      SHA512

                                      c07fa524cb72774b19630d64494ac5212fce34eaf94e728f06e6d84f29123c54f392059dbffbfc1c98ca4fdbf3333ab61f1c1a055e90b481386c82bb5dbf09d9

                                    • C:\Users\Admin\AppData\Local\Temp\TarC4DA.tmp

                                      Filesize

                                      181KB

                                      MD5

                                      4ea6026cf93ec6338144661bf1202cd1

                                      SHA1

                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                      SHA256

                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                      SHA512

                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                    • C:\Users\Admin\AppData\Local\Temp\WOs9W2tFAs.bat

                                      Filesize

                                      191B

                                      MD5

                                      c18ebb8df04182984676e593c20b4a1f

                                      SHA1

                                      fc49eeb238aa96e99d11d5cea7703429f9af8130

                                      SHA256

                                      9fe3ee5d1357d952b4ed75af4633a333d00c75430a8ae18bd5ff06ef2d3fc93a

                                      SHA512

                                      3ae6d693fe9f4cbdacbc69a91652076f81ba4f30aa52ef960ca9875df56e720def70661ab8ed390dc6805e1e5b397fb74fa885311a73647a90d2aa59bf5f1ba0

                                    • C:\Users\Admin\AppData\Local\Temp\X5jGqiFaSS.bat

                                      Filesize

                                      191B

                                      MD5

                                      d3644e7e5c2de40fc3af0d0f9ebb78f8

                                      SHA1

                                      0a228deb2aee64ff71954c81e91d3c8cc865b7ec

                                      SHA256

                                      26bb56e4308f566da9145cfd8fa7597f03b6f4e313386e4900cd1287dd1436d0

                                      SHA512

                                      b7e2f065233273bc63b0a7428a034c71a4f11d949869b94f136f44a60af472e683ae0d355e5b552dffc931d5f434dcea459e7e211618ecfabd68fe39eae57504

                                    • C:\Users\Admin\AppData\Local\Temp\Ys8lvSze9b.bat

                                      Filesize

                                      191B

                                      MD5

                                      49a4a1788530f9f861f01f0b0c20fcbe

                                      SHA1

                                      6d785caf20efacccc5c4da5c83e91871ce59a980

                                      SHA256

                                      1283bd4b765b5011ef0a4e6f78b02b563ee80f51bfa0de5db5263f9f47a020cb

                                      SHA512

                                      1969aefb1453e302f44140b99d9058af506fd5fd4ffb33cb5a75dc51512861f751d9a613606b821cd20103aea5235aba4a14d4370042a514a6209233795e41bc

                                    • C:\Users\Admin\AppData\Local\Temp\fmTXnddwCX.bat

                                      Filesize

                                      191B

                                      MD5

                                      5282dbcc6286ca42e4f011655050bcaa

                                      SHA1

                                      7298c7e9ce81f58afb8ea45984c620b0bf08bd8c

                                      SHA256

                                      5636b1c9cca1f56b698917cf644212c3ee29ffb724525ab846a2ba01867624ed

                                      SHA512

                                      0d9c4e670b31a1c5f6fed1d41c189d73e73fac80bb65e8a44ab7411b77d0a19ce4f888e3185c8f70182fe97422330d36a3345cbe0da3fbdd93bc6d15699c0487

                                    • C:\Users\Admin\AppData\Local\Temp\kUVpzpaF2i.bat

                                      Filesize

                                      191B

                                      MD5

                                      4ba4e983e9fae3df3a0252d1d4eedfb7

                                      SHA1

                                      c1909a3b0543d13c05a91c2bc01b12e463198f8d

                                      SHA256

                                      2e095eea16897fd14c83315f851c45a838631366163d367febe11fb54488db3f

                                      SHA512

                                      11efa26560c45a107b3fca95e12e29a2072b480698e860faf91cba3f6375dae9fb1385e83b8c2ba823d4e7b950360e162abfd3e14e12210c6c5d74619b2a6dd5

                                    • C:\Users\Admin\AppData\Local\Temp\vad0LeRbBz.bat

                                      Filesize

                                      191B

                                      MD5

                                      b57f876829564fddb0e733220a57ae7e

                                      SHA1

                                      26f2ab7ed8305fac31f04c32536d2957a2f115f5

                                      SHA256

                                      1ab4bf00613f28639db3fedff2afa30604e266046ab683feeed746b8fb7970d2

                                      SHA512

                                      149da49723bf8b4b25e0574640615c3a73c8e85fca68ca0258003abcadd418c32fc7b52859d665cd72fa5342a0cefe40506b2584f7d94abe6b39f64bd7be1b4a

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A7QTMYBTHPJSZDDPHJU6.temp

                                      Filesize

                                      7KB

                                      MD5

                                      5a26930e076f677d628dc1bf0faf4b02

                                      SHA1

                                      b0fa20f246df294f54d58fd19d5305f220ca4afc

                                      SHA256

                                      c44e918f503a158dc5de75ec2ada48b07642302d13108ca7ed7d9badeb6ece0b

                                      SHA512

                                      0b8607ed78a330240fa7fb46f9cc728ad5f2e3c6954f14f8169a95f6ba728e449540baff11db8211b8979a93fec846ff48eac57a5e74227432636a1ad5a9f28d

                                    • C:\providercommon\1zu9dW.bat

                                      Filesize

                                      36B

                                      MD5

                                      6783c3ee07c7d151ceac57f1f9c8bed7

                                      SHA1

                                      17468f98f95bf504cc1f83c49e49a78526b3ea03

                                      SHA256

                                      8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                      SHA512

                                      c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                    • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                      Filesize

                                      197B

                                      MD5

                                      8088241160261560a02c84025d107592

                                      SHA1

                                      083121f7027557570994c9fc211df61730455bb5

                                      SHA256

                                      2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                      SHA512

                                      20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                    • \providercommon\DllCommonsvc.exe

                                      Filesize

                                      1.0MB

                                      MD5

                                      bd31e94b4143c4ce49c17d3af46bcad0

                                      SHA1

                                      f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                      SHA256

                                      b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                      SHA512

                                      f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                    • memory/296-640-0x0000000000360000-0x0000000000470000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/776-281-0x00000000013A0000-0x00000000014B0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/1680-341-0x00000000003C0000-0x00000000003D2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1964-221-0x0000000000330000-0x0000000000440000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2500-32-0x0000000000FB0000-0x00000000010C0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2516-39-0x000000001B4E0000-0x000000001B7C2000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/2516-40-0x0000000002870000-0x0000000002878000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2688-580-0x0000000000D90000-0x0000000000EA0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2848-17-0x0000000000480000-0x000000000048C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2848-16-0x0000000000470000-0x000000000047C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2848-15-0x00000000002D0000-0x00000000002DC000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2848-14-0x00000000002C0000-0x00000000002D2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2848-13-0x0000000000A80000-0x0000000000B90000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2960-460-0x0000000000380000-0x0000000000490000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3064-520-0x0000000000250000-0x0000000000360000-memory.dmp

                                      Filesize

                                      1.1MB