Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2024, 03:20

General

  • Target

    JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe

  • Size

    1.3MB

  • MD5

    646a404dc3a4660c161918c699d85995

  • SHA1

    fd88b22a64dfed30b6a340fd29b4f8c1d645def4

  • SHA256

    ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151

  • SHA512

    6e891d4b26581510e861ccb4d53be8d5b5da69da6b5e48bbc101850f6e3c7c6841e955064f4066f747b6975972a61b10d50f6a0830fde6c68307fbdc584afd79

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 17 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab3df3e21309c0557a1610b4d40d3ce467a75e4e1ca4ead6b8479b1710584151.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4884
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:840
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2544
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4232
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\A1nTHBcTHH.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4292
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2432
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3392
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lE88gYdR15.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2852
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:4040
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:5028
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6uGRILFBWR.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3800
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:5036
                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                              11⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:3032
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uItNEyebdJ.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1744
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:2212
                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                    13⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:4704
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Kq4mDwN7mD.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:4140
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:1132
                                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                          15⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:444
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zGIMjSYhT8.bat"
                                            16⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:1640
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              17⤵
                                                PID:2528
                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                17⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:3524
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aTd08pZfDw.bat"
                                                  18⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:4740
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    19⤵
                                                      PID:4972
                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                      19⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2344
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\38MS6cfT7h.bat"
                                                        20⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:948
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          21⤵
                                                            PID:2956
                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                            21⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2252
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cOf3pucYXi.bat"
                                                              22⤵
                                                                PID:3060
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  23⤵
                                                                    PID:4528
                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                                    23⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2824
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\daA37ewxym.bat"
                                                                      24⤵
                                                                        PID:3512
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          25⤵
                                                                            PID:2220
                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                                            25⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2908
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D2zd9hDRps.bat"
                                                                              26⤵
                                                                                PID:2800
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  27⤵
                                                                                    PID:860
                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                                                    27⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1900
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WSSqGJyhfL.bat"
                                                                                      28⤵
                                                                                        PID:1456
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          29⤵
                                                                                            PID:1268
                                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                                                            29⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2236
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2wrSnsL5gc.bat"
                                                                                              30⤵
                                                                                                PID:4420
                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                  31⤵
                                                                                                    PID:2508
                                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe
                                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe"
                                                                                                    31⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2312
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TfYr4aOzGb.bat"
                                                                                                      32⤵
                                                                                                        PID:1760
                                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                          33⤵
                                                                                                            PID:3340
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2908
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3184
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Portable Devices\wininit.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3032
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2268
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2800
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1984

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\csrss.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            baf55b95da4a601229647f25dad12878

                                            SHA1

                                            abc16954ebfd213733c4493fc1910164d825cac8

                                            SHA256

                                            ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                            SHA512

                                            24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            d85ba6ff808d9e5444a4b369f5bc2730

                                            SHA1

                                            31aa9d96590fff6981b315e0b391b575e4c0804a

                                            SHA256

                                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                            SHA512

                                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            944B

                                            MD5

                                            6d42b6da621e8df5674e26b799c8e2aa

                                            SHA1

                                            ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                            SHA256

                                            5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                            SHA512

                                            53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                          • C:\Users\Admin\AppData\Local\Temp\2wrSnsL5gc.bat

                                            Filesize

                                            221B

                                            MD5

                                            94745a69432429b9ffb3d4d710343a8c

                                            SHA1

                                            a3dcc7e70e061b1cffe501f6200baa44eb412b0f

                                            SHA256

                                            f12809ffb667d9a029ebd71d722cac016be8e5154d2e58609aef535bab1b688e

                                            SHA512

                                            2f1f816f63e48e85c5165a421164bbd046f493a496e0ee7eb871a2286742bc7e98e92e8d3706dfca0461ea51b07fc64078749e44a2c0c23b1dd15be9d9e5dd05

                                          • C:\Users\Admin\AppData\Local\Temp\38MS6cfT7h.bat

                                            Filesize

                                            221B

                                            MD5

                                            be87200e255045f80232ee9370fac3a1

                                            SHA1

                                            35d1c856dc9aa21a765e839b87d521282b8c1ddc

                                            SHA256

                                            950f3d339398b39eeede3eed65171d5f3991f7e7818fb685ab0f932744633ec5

                                            SHA512

                                            2eeea237025e8a18682a5ea35784da474e17c92c3713b34d5a87c7e00c464580b8686a360f6d96db56c998f72f63db3b6296ff0687cf7e87c35ccef1b993e30c

                                          • C:\Users\Admin\AppData\Local\Temp\6uGRILFBWR.bat

                                            Filesize

                                            221B

                                            MD5

                                            5f5dcf0000a8cd993aa0bb46a2cc1f59

                                            SHA1

                                            b4593020e9a2ed4605d8eb498cc3142f151dbdfb

                                            SHA256

                                            33e62928b22b008c1294f5aa1338c95c4267757eedc2ad7680d3d854e66df927

                                            SHA512

                                            7acc35d00975d3f534b4f5bb7a147a79c9aaf5ece0557c39fdf62cda94b107f9394137f4766c8c17e4be78697c229c13499c0418061ff1576f08f875e8fbe898

                                          • C:\Users\Admin\AppData\Local\Temp\A1nTHBcTHH.bat

                                            Filesize

                                            221B

                                            MD5

                                            7baf554a1913c159c58096d25d39cd4e

                                            SHA1

                                            bcb2d34fef1cf1eca77d3f80456e8f6aac32fb94

                                            SHA256

                                            7092ab1b919cd5c012832163448d28a92562ebc8f661f4d5f5ac8de65c38a763

                                            SHA512

                                            9a88d8c19a296c5b6e8d97132dcf968940f6f927e97bd8dd4b25f89c550a1cfd70cf6fede9a3492cbbec44c807c7d78ce50d3cd968914dcaeb3fdd2c859d744d

                                          • C:\Users\Admin\AppData\Local\Temp\D2zd9hDRps.bat

                                            Filesize

                                            221B

                                            MD5

                                            e06d11dc39143d4c931cc5d32d693e0a

                                            SHA1

                                            c29be3bb690ddbabe57afbac565f5c46d0ed7a54

                                            SHA256

                                            1b92be7ad0ea4f2171139b106f545f007c99fb39b9359496c62425a79b5241ab

                                            SHA512

                                            f62739dcada418d4ba6098ff7981199d2927b8b9c2f506140c45efda25da04a804b87581814cdbc5a2eec34fd31cc2b9cb01102af9d3a5f15a4a5ace2acc90c0

                                          • C:\Users\Admin\AppData\Local\Temp\Kq4mDwN7mD.bat

                                            Filesize

                                            221B

                                            MD5

                                            7ea7642e2b53a2c4edb3233f0f9c4d83

                                            SHA1

                                            f422aceceb0d8af3f63e6679ea0a92c0682df62b

                                            SHA256

                                            6b9822c0f1c5176f1a5cbf3f50ffa908bffaebad20b8eb2ef5822377e1254e80

                                            SHA512

                                            f1882a9a524938174e37ef9eb48f2d198e19ff523496afc05fd4a16fda908f016b181e55e34b3f03dbb79f6a73d105c63f59176ea6ea185c31c34a29bfc0b7d5

                                          • C:\Users\Admin\AppData\Local\Temp\TfYr4aOzGb.bat

                                            Filesize

                                            221B

                                            MD5

                                            c385d7144a374ccef32ae8f618580988

                                            SHA1

                                            2f6c99f9e316527d40865cda4d1d57fc3e0d770e

                                            SHA256

                                            11ea40b7e2285e5b42c0fdb47988b5895f23563cf3dce690bd37a4308a7b52f2

                                            SHA512

                                            5b6c3a4c976ee6391b631a6d2b66d293deb129bf9db77d59ef999856433913479306161068ee75641723f734293ccd9452a93e8ff7e1a0ef14c86225ca49dd4b

                                          • C:\Users\Admin\AppData\Local\Temp\WSSqGJyhfL.bat

                                            Filesize

                                            221B

                                            MD5

                                            bdec0b3a7491e5b796f14f018dcedbb5

                                            SHA1

                                            66da89d5bba637425beb605d544ecf91c7153bef

                                            SHA256

                                            585b1eb0fcd8601e4feb2f844c5e3b33b737d6f81a1c927705700a72fea5aa53

                                            SHA512

                                            30e1e2e9ccb7efcf1a722effc053f909bceab74949722697f24bf1962071008f187db57a65b750e9777c6a6933c1dff1495d7bf650ef7bcf6cc0d520a560a47a

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zmm4rxor.itp.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\aTd08pZfDw.bat

                                            Filesize

                                            221B

                                            MD5

                                            b73d53b5ef6b114a8582492fa9dbfb08

                                            SHA1

                                            08e64ab9e4f6b80c278a89823dca38a3243116d0

                                            SHA256

                                            4bb4eb2d7968987b0fca5bf598a59070d411052634c3cbfe87f7eef383c0b5c2

                                            SHA512

                                            83183a06dbd4cd1e97891f5b072c8e2909cc96d57bfcc7faef36f67cbefe9825ac1f20cf81bde66dcbab307a66455c310024c79d40975c50f787202c1567737a

                                          • C:\Users\Admin\AppData\Local\Temp\cOf3pucYXi.bat

                                            Filesize

                                            221B

                                            MD5

                                            9b1e364c57d85ab70613a84861405162

                                            SHA1

                                            183d528f53ca8fefeb93e808c5efacfd7971ef1a

                                            SHA256

                                            433631914565aea66648ef99b1367b949531e61b63cd81a9a11e7cce1c5634e1

                                            SHA512

                                            c520113648a22374c5aa0034984a57709c21acf893005b300a33bfb06049b4b45c26b3554be3ff189851569213a5a26963b340cbcf0f77e4760c8859ce35edb5

                                          • C:\Users\Admin\AppData\Local\Temp\daA37ewxym.bat

                                            Filesize

                                            221B

                                            MD5

                                            968ebc73d0da2dbb4e36de749e777553

                                            SHA1

                                            a6bf3d01be9bbbf2e030925238f6fad2ca28d14b

                                            SHA256

                                            558a49ca02d53fb457f9180edc4ecd14d55910408864549765f8b4ef1fe12d56

                                            SHA512

                                            1a518dcf8bcaa12bea959c4ced62cba57b04a35a0ed3dc983d12f2496b8aa061f269343892d9ca54efbde91ea2b4a9c54a31a9759f646d03061bf321ba56bb2e

                                          • C:\Users\Admin\AppData\Local\Temp\lE88gYdR15.bat

                                            Filesize

                                            221B

                                            MD5

                                            705214b0a87e4d15428aade631da741c

                                            SHA1

                                            38bc0086a19efa9bc0e84b01bf2df30c527cda28

                                            SHA256

                                            3514aaa1e55404e069ad75b4f4b7a9798349ddc4c3317a6d9d0f30097eb553eb

                                            SHA512

                                            4073aaea28d93455085a2b269e02b183c9f87c66b1bf073782742074c9d3477a4e02c6cbe6ee0558279ad32ffd62eb12bc912fd8c46447d9645c8aca3e40ac39

                                          • C:\Users\Admin\AppData\Local\Temp\uItNEyebdJ.bat

                                            Filesize

                                            221B

                                            MD5

                                            1f41059f0daec06e442187c80e9f7425

                                            SHA1

                                            41b1ec4db6f9c64c2564808c69a17f9f59355fe0

                                            SHA256

                                            41a32f9ce5f88f5d517e254aeff0838971c8b26b7328627151caf87482749596

                                            SHA512

                                            8a16b0c9f03e810f1cfcf6705fe201a7954099ab94663f34839c92c3c5c7b9ba46eb31c3904d6a8c90c00dea3b33a7427f8e1b60a5014b525a54d1858b0bb450

                                          • C:\Users\Admin\AppData\Local\Temp\zGIMjSYhT8.bat

                                            Filesize

                                            221B

                                            MD5

                                            324e0413f7ccb2f929245c5b62cd5d10

                                            SHA1

                                            8d559aba8f28f07d4e0bb77292d79ebb59be1fdc

                                            SHA256

                                            8cecf4c2d2779bcdb83e10c368d6c1770b5de8b270769a1c0693be92f151d0f3

                                            SHA512

                                            1ae0dd9cab4266ff0063b0fbbaab8dd048daec7606df891e2a1f83916a3dde7c68db4ff1c0199d2a402f44f4d0b224053116017101a82b1c2cc3f267cdfcc134

                                          • C:\providercommon\1zu9dW.bat

                                            Filesize

                                            36B

                                            MD5

                                            6783c3ee07c7d151ceac57f1f9c8bed7

                                            SHA1

                                            17468f98f95bf504cc1f83c49e49a78526b3ea03

                                            SHA256

                                            8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                            SHA512

                                            c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                          • C:\providercommon\DllCommonsvc.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            bd31e94b4143c4ce49c17d3af46bcad0

                                            SHA1

                                            f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                            SHA256

                                            b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                            SHA512

                                            f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                          • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                            Filesize

                                            197B

                                            MD5

                                            8088241160261560a02c84025d107592

                                            SHA1

                                            083121f7027557570994c9fc211df61730455bb5

                                            SHA256

                                            2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                            SHA512

                                            20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                          • memory/444-101-0x000000001AFF0000-0x000000001B002000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2252-125-0x000000001DB40000-0x000000001DCE9000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/2344-119-0x000000001D840000-0x000000001D9E9000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/2544-38-0x0000014E44B60000-0x0000014E44B82000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2772-17-0x000000001B390000-0x000000001B39C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2772-16-0x000000001B370000-0x000000001B37C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2772-15-0x000000001B380000-0x000000001B38C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2772-14-0x000000001B360000-0x000000001B372000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2772-13-0x0000000000650000-0x0000000000760000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2772-12-0x00007FFCE62F3000-0x00007FFCE62F5000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/3032-88-0x000000001B5F0000-0x000000001B602000-memory.dmp

                                            Filesize

                                            72KB