Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2024, 19:22

General

  • Target

    JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe

  • Size

    1.3MB

  • MD5

    929a44bdac708fcdeba341d2b0ae8574

  • SHA1

    7ce5208efbe594b8a07704e31851f88f851e8627

  • SHA256

    981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2

  • SHA512

    4ddd9c58636418a6be4e2a4436bd539ebfe50d688ca7c4ad5653b08003787e8fd18ac697323caad6aab74ec897550c6bc2bf566391a9c6f3b694d5fb99cf837d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 16 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 14 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981eacf6731a58c1ccc3a94ec77fcad97284eb851a1c99806b767e9ab0d633f2.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4660
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4324
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:212
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4344
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\spoolsv.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2176
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2992
          • C:\Recovery\WindowsRE\spoolsv.exe
            "C:\Recovery\WindowsRE\spoolsv.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:244
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9gHfnS8a2p.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3296
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:3416
                • C:\Recovery\WindowsRE\spoolsv.exe
                  "C:\Recovery\WindowsRE\spoolsv.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2188
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1540
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:1212
                      • C:\Recovery\WindowsRE\spoolsv.exe
                        "C:\Recovery\WindowsRE\spoolsv.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3204
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\00vfQAbtTV.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4308
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:2988
                            • C:\Recovery\WindowsRE\spoolsv.exe
                              "C:\Recovery\WindowsRE\spoolsv.exe"
                              11⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:944
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FdUsM3mSuD.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:348
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:1784
                                  • C:\Recovery\WindowsRE\spoolsv.exe
                                    "C:\Recovery\WindowsRE\spoolsv.exe"
                                    13⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:692
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QOz0umrEhM.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:2352
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:2884
                                        • C:\Recovery\WindowsRE\spoolsv.exe
                                          "C:\Recovery\WindowsRE\spoolsv.exe"
                                          15⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:384
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VG36Hwy0Lv.bat"
                                            16⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:1156
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              17⤵
                                                PID:4324
                                              • C:\Recovery\WindowsRE\spoolsv.exe
                                                "C:\Recovery\WindowsRE\spoolsv.exe"
                                                17⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:1688
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZES4mQr7Bk.bat"
                                                  18⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:3652
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    19⤵
                                                      PID:3616
                                                    • C:\Recovery\WindowsRE\spoolsv.exe
                                                      "C:\Recovery\WindowsRE\spoolsv.exe"
                                                      19⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:3808
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2wxi7FenmH.bat"
                                                        20⤵
                                                          PID:2272
                                                          • C:\Windows\system32\w32tm.exe
                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                            21⤵
                                                              PID:4056
                                                            • C:\Recovery\WindowsRE\spoolsv.exe
                                                              "C:\Recovery\WindowsRE\spoolsv.exe"
                                                              21⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Modifies registry class
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4288
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aJcBxrOCPY.bat"
                                                                22⤵
                                                                  PID:2968
                                                                  • C:\Windows\system32\w32tm.exe
                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                    23⤵
                                                                      PID:556
                                                                    • C:\Recovery\WindowsRE\spoolsv.exe
                                                                      "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                      23⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3576
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iIDKKqsGny.bat"
                                                                        24⤵
                                                                          PID:2604
                                                                          • C:\Windows\system32\w32tm.exe
                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                            25⤵
                                                                              PID:944
                                                                            • C:\Recovery\WindowsRE\spoolsv.exe
                                                                              "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                              25⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3312
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x4tck5X09i.bat"
                                                                                26⤵
                                                                                  PID:2504
                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                    27⤵
                                                                                      PID:408
                                                                                    • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                      "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                      27⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2536
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cU7BGbiaqd.bat"
                                                                                        28⤵
                                                                                          PID:2496
                                                                                          • C:\Windows\system32\w32tm.exe
                                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                            29⤵
                                                                                              PID:2036
                                                                                            • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                              "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                              29⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4008
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dFeEewS5jL.bat"
                                                                                                30⤵
                                                                                                  PID:4828
                                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                    31⤵
                                                                                                      PID:3592
                                                                                                    • C:\Recovery\WindowsRE\spoolsv.exe
                                                                                                      "C:\Recovery\WindowsRE\spoolsv.exe"
                                                                                                      31⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2844
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\providercommon\sppsvc.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4740
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4896
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3552
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\providercommon\dllhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3700
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2764
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1792
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4112
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:264
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4752
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\providercommon\conhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2544
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2008
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1324

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          d85ba6ff808d9e5444a4b369f5bc2730

                                          SHA1

                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                          SHA256

                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                          SHA512

                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\spoolsv.exe.log

                                          Filesize

                                          1KB

                                          MD5

                                          baf55b95da4a601229647f25dad12878

                                          SHA1

                                          abc16954ebfd213733c4493fc1910164d825cac8

                                          SHA256

                                          ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                          SHA512

                                          24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          d28a889fd956d5cb3accfbaf1143eb6f

                                          SHA1

                                          157ba54b365341f8ff06707d996b3635da8446f7

                                          SHA256

                                          21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                          SHA512

                                          0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          6d42b6da621e8df5674e26b799c8e2aa

                                          SHA1

                                          ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                          SHA256

                                          5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                          SHA512

                                          53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                        • C:\Users\Admin\AppData\Local\Temp\00vfQAbtTV.bat

                                          Filesize

                                          198B

                                          MD5

                                          2a253cc77f70b42be9d69ea89c470071

                                          SHA1

                                          37f94764248f3899aa53e450c064c02a1070586f

                                          SHA256

                                          8d811a269590675b86ebab2c7e5b00f76216934a9c4061b199f2a6eec1155be1

                                          SHA512

                                          ce3ff9fc6fd377ef301185fed64e72c5371131ee2d0fd1d3fa80b5e980a9540fc0f95b7ac6112ca49e3b7f29d75dbda08aa8c6c66293c8beadad02c626e9b955

                                        • C:\Users\Admin\AppData\Local\Temp\12JaEZR6zX.bat

                                          Filesize

                                          198B

                                          MD5

                                          8889b96c79e07ae5a582268f82e7f136

                                          SHA1

                                          644b14123f0a15253b93e49b893fc3e76e991330

                                          SHA256

                                          f12060839243c9d7ac139027c1c5a7bfc86a14475442ed91e2947b2c0c32e6a7

                                          SHA512

                                          27e226c5a59161aa86bb14f7003600d76717855e481954da219f977b62aa5917d8d7bf2d9f8653f2cfadf199e43fdabaf35922aada2e5d0bc74b6e3d4558c3fa

                                        • C:\Users\Admin\AppData\Local\Temp\2wxi7FenmH.bat

                                          Filesize

                                          198B

                                          MD5

                                          325a795191daf24c6df63e95c7ceab19

                                          SHA1

                                          6a050fdfec2223910a8ef9a5082cdda998c61e6b

                                          SHA256

                                          c67d04ed80a9b9a58515aa3c375ae2a34d95696dec2e693d86aa422508f4bd9c

                                          SHA512

                                          7032ff62632bb08f9a35e554a4c3cd584d6534b137a21d68031ad9057288582b65773bc50e16788cca390dab2f99e6353cf0010cd864a34c907390a0216387b1

                                        • C:\Users\Admin\AppData\Local\Temp\9gHfnS8a2p.bat

                                          Filesize

                                          198B

                                          MD5

                                          0a06d3a15c70e6aa068b4b3d4af6e40e

                                          SHA1

                                          0856ca80054d098da285aca2070b28fa420a3437

                                          SHA256

                                          c810665704d3757be003b94407651eb654c821404a88b09957e10e5040c9bdd3

                                          SHA512

                                          f06cec105261d388373f1e4a6529a627b9fd0d5281158c2d345f584498192da5641345892ff8cc2203092f3c14c3420d6381674ef2c6eb14f2bfa719dec3ef1a

                                        • C:\Users\Admin\AppData\Local\Temp\FdUsM3mSuD.bat

                                          Filesize

                                          198B

                                          MD5

                                          f2d0188db1fda5d7a058a4f81270a5d8

                                          SHA1

                                          bd22e53dd78da175f3a22064ec27ec4f43b99c3e

                                          SHA256

                                          50279b441bdaf2f88209a2f21d5c8d458d9e62859bcd69a6a8fe56634cfd7757

                                          SHA512

                                          349269dc0747a6161820e4a862cd39e1e27d25ed76f17dbd2677b7ba4f1814759b17583aca3f5f5386b4b901274387b37f7a6d10c3476662c05779a560bccace

                                        • C:\Users\Admin\AppData\Local\Temp\QOz0umrEhM.bat

                                          Filesize

                                          198B

                                          MD5

                                          fd6475db6be06435b5741cca3d5b1208

                                          SHA1

                                          b8d2ee6d60b0ffca3d86458be6df6f0eb83dfa06

                                          SHA256

                                          4dc732ef43433368297b936c3090aeb6891e4eaf277c7fe83f968cb1fd168b3c

                                          SHA512

                                          9e8e438bc0116e1d383e335540406c30b2163306381a34db4bc092ea5d0fbe86bbc8f627f370c96335ebb9bc0252411c2c16a1a702fce02f450ba0ca47431955

                                        • C:\Users\Admin\AppData\Local\Temp\VG36Hwy0Lv.bat

                                          Filesize

                                          198B

                                          MD5

                                          0032b4c020488674b51853eb9a1368cb

                                          SHA1

                                          7b8a09c89731c98476d480671517e1496d57cc0f

                                          SHA256

                                          6f82aa29c3bfc71a8ce6d6268a6cbe90b7030948b18dabb45c1d06f939cd1162

                                          SHA512

                                          1ba67d7e686fa412ad81dea0353160ea7a55ba4c1449ad79f8e3612dc1659ca5fb589679a05434eb6a7bc969924e14848d198dea9bfd702918410bf1870dd9c9

                                        • C:\Users\Admin\AppData\Local\Temp\ZES4mQr7Bk.bat

                                          Filesize

                                          198B

                                          MD5

                                          5d5fa734f2fb10eade44bbb0877794ba

                                          SHA1

                                          6c2fd10ef9530061741b7ce4ecc0433035ed4510

                                          SHA256

                                          6248e7d570c448b9ce7db6b28b6e7cf90502e27040d15f14ad3a575f0f316fbb

                                          SHA512

                                          4fc5a1d27eb987ed60afe8fad0e61e7e079f1a6c1fdc0ead2d36aea3591b8e91257a9cd06fa0a46839da86425616dfbb8f859ad5565d60b9299271e776dc1a80

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r21a1qn3.p3h.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\aJcBxrOCPY.bat

                                          Filesize

                                          198B

                                          MD5

                                          2d3b82ca4affbe659af64b1aaa644260

                                          SHA1

                                          f7c2dcce31a7608ee5573577c6f585a224814acc

                                          SHA256

                                          866111ecbcd2f01a7840e5c682d3337f8ec474b9b31af5bc33332a7e3e61e81d

                                          SHA512

                                          96073e0dfefa457a66af9091de4ed46b1908d8c0e0d113fe232ab0b1c41698810d5a31a22c0c48a339b92a97d30976d827d23ccc16fba6177101eaaf2d2cc875

                                        • C:\Users\Admin\AppData\Local\Temp\cU7BGbiaqd.bat

                                          Filesize

                                          198B

                                          MD5

                                          bf10f2a79650d9e6bac9c537a36047d4

                                          SHA1

                                          ee116b7f3b3a6474851b4ddd0ab8dd508718846d

                                          SHA256

                                          d60cbc1d05d6fc6d0acd916579938ee0af942151f6fcb88b8c04e17a3243538b

                                          SHA512

                                          18480830533ec7d466f6feb990fb922565832a597428b365516ec53152d35e704d432955d0daa76e6f22e7daa66bf40227a42ede2ccec07bc3fc6e34cb40f402

                                        • C:\Users\Admin\AppData\Local\Temp\dFeEewS5jL.bat

                                          Filesize

                                          198B

                                          MD5

                                          cd49efca3d474d454852df784a7845bd

                                          SHA1

                                          d0876efce10f4e798cdc9dbdf17fe9dcf8900692

                                          SHA256

                                          6281c5d77f89a522162468ca197290621a3c580d4a4397c50b9709896b9ba087

                                          SHA512

                                          8ef3171cd727dfa7bf3625a63429637f3bf993b57e716144d09e3acae00e6205e5a7179e918e1b351df2f8689799d9d09c29d26d49832f458449de8394b0c350

                                        • C:\Users\Admin\AppData\Local\Temp\iIDKKqsGny.bat

                                          Filesize

                                          198B

                                          MD5

                                          0ac550ba68ab5d5d23b4316effd11529

                                          SHA1

                                          1e41b2d5c4c269eb1cf27be792035fbcb59b1769

                                          SHA256

                                          1ae05131a743a6317d17a6f5cef37af5dda563ebd668aa3c1b44cbe1029abe52

                                          SHA512

                                          d74a09792ccde251866df36f2f42ebc6e8adac52015c7f3827d26ffa44cbde28381bd33d4360cc4c10c2127d7945cf29ffc3a1648c369510b4e244cc60dc7d5e

                                        • C:\Users\Admin\AppData\Local\Temp\x4tck5X09i.bat

                                          Filesize

                                          198B

                                          MD5

                                          332e49de83ed936cbae9511ecf2809b0

                                          SHA1

                                          dc230979d3f348eb27ec6a958b66604a06e053c4

                                          SHA256

                                          6cdcba6c8ca7a763c60c0e6ba9f0af4ca5a1ea56c8844692ddfa36f189d1a6ba

                                          SHA512

                                          aaa9fef2105920e1e33ca1a9e4c672e8e301582828bac0a8a320262264e602c5500b4d28fdbd7056bb3a0b961c354e96d6014eb738a236662b5a6cbef7fa8d16

                                        • C:\providercommon\1zu9dW.bat

                                          Filesize

                                          36B

                                          MD5

                                          6783c3ee07c7d151ceac57f1f9c8bed7

                                          SHA1

                                          17468f98f95bf504cc1f83c49e49a78526b3ea03

                                          SHA256

                                          8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                          SHA512

                                          c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                        • C:\providercommon\DllCommonsvc.exe

                                          Filesize

                                          1.0MB

                                          MD5

                                          bd31e94b4143c4ce49c17d3af46bcad0

                                          SHA1

                                          f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                          SHA256

                                          b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                          SHA512

                                          f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                        • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                          Filesize

                                          197B

                                          MD5

                                          8088241160261560a02c84025d107592

                                          SHA1

                                          083121f7027557570994c9fc211df61730455bb5

                                          SHA256

                                          2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                          SHA512

                                          20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                        • memory/212-37-0x00000208FDE30000-0x00000208FDE52000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/244-74-0x0000000002430000-0x0000000002442000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/692-122-0x0000000002CD0000-0x0000000002CE2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1688-135-0x0000000001870000-0x0000000001882000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2536-167-0x0000000000D40000-0x0000000000D52000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/3204-109-0x0000000001380000-0x0000000001392000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/3312-160-0x0000000000BF0000-0x0000000000C02000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4008-174-0x00000000017D0000-0x00000000017E2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4660-16-0x00000000027B0000-0x00000000027BC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4660-17-0x00000000027C0000-0x00000000027CC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4660-14-0x0000000002790000-0x00000000027A2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4660-15-0x00000000027A0000-0x00000000027AC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/4660-13-0x0000000000570000-0x0000000000680000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/4660-12-0x00007FFB305C3000-0x00007FFB305C5000-memory.dmp

                                          Filesize

                                          8KB