Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/12/2024, 14:17

General

  • Target

    JaffaCakes118_d36ded0639ead2a353383079e81c8fc0e708406881e79b9ed6af02d7aa27b4f3.exe

  • Size

    1.3MB

  • MD5

    64f6398391ad11ec5f688e7bf576e165

  • SHA1

    ee8ca37ea2a9b2648b02f1b1ee283ca82adafdbe

  • SHA256

    d36ded0639ead2a353383079e81c8fc0e708406881e79b9ed6af02d7aa27b4f3

  • SHA512

    7ff8f7e4dee96517613934e9be937ae4f0dc368d465d4552b5306dfca25dc53f4f045d26e8f33180b20c572362fab711cf0e5cc1f22294a1742869c181172d68

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 17 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d36ded0639ead2a353383079e81c8fc0e708406881e79b9ed6af02d7aa27b4f3.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d36ded0639ead2a353383079e81c8fc0e708406881e79b9ed6af02d7aa27b4f3.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3904
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3208
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\RuntimeBroker.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1972
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Contacts\unsecapp.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4828
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Offline Web Pages\fontdrvhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5028
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:456
          • C:\Windows\Offline Web Pages\fontdrvhost.exe
            "C:\Windows\Offline Web Pages\fontdrvhost.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2276
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SzaURWjxsM.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4440
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:1760
                • C:\Windows\Offline Web Pages\fontdrvhost.exe
                  "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1512
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0MFyH7TMVd.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1756
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:812
                      • C:\Windows\Offline Web Pages\fontdrvhost.exe
                        "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                        9⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1908
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fg7ffKrc0I.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4484
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:228
                            • C:\Windows\Offline Web Pages\fontdrvhost.exe
                              "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                              11⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:3024
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WzmeI2KvQx.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:5044
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:3200
                                  • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                    "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                    13⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:3168
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WzmeI2KvQx.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:4956
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:2892
                                        • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                          "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                          15⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:1408
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5EJ4eIa89C.bat"
                                            16⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:264
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              17⤵
                                                PID:4588
                                              • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                17⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:4912
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tbw0avzYF4.bat"
                                                  18⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:3656
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    19⤵
                                                      PID:3248
                                                    • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                      "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                      19⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2624
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dk6czFnjgV.bat"
                                                        20⤵
                                                          PID:388
                                                          • C:\Windows\system32\w32tm.exe
                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                            21⤵
                                                              PID:964
                                                            • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                              "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                              21⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Modifies registry class
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3104
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dk6czFnjgV.bat"
                                                                22⤵
                                                                  PID:5084
                                                                  • C:\Windows\system32\w32tm.exe
                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                    23⤵
                                                                      PID:2060
                                                                    • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                                      "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                                      23⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4088
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DCuC0H4DXb.bat"
                                                                        24⤵
                                                                          PID:1768
                                                                          • C:\Windows\system32\w32tm.exe
                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                            25⤵
                                                                              PID:696
                                                                            • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                                              "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                                              25⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4068
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uSow6ZWML2.bat"
                                                                                26⤵
                                                                                  PID:4152
                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                    27⤵
                                                                                      PID:1380
                                                                                    • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                                                      "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                                                      27⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:4024
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AQ0EpYUV7r.bat"
                                                                                        28⤵
                                                                                          PID:2808
                                                                                          • C:\Windows\system32\w32tm.exe
                                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                            29⤵
                                                                                              PID:3028
                                                                                            • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                                                              "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                                                              29⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:540
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jhJpXqSaXt.bat"
                                                                                                30⤵
                                                                                                  PID:3076
                                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                    31⤵
                                                                                                      PID:4360
                                                                                                    • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                                                                      "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                                                                      31⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:2176
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\L59TFxmxil.bat"
                                                                                                        32⤵
                                                                                                          PID:2164
                                                                                                          • C:\Windows\system32\w32tm.exe
                                                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                            33⤵
                                                                                                              PID:212
                                                                                                            • C:\Windows\Offline Web Pages\fontdrvhost.exe
                                                                                                              "C:\Windows\Offline Web Pages\fontdrvhost.exe"
                                                                                                              33⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4760
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3172
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1964
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2940
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Contacts\unsecapp.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4500
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\Admin\Contacts\unsecapp.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3124
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Contacts\unsecapp.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1852
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Windows\Offline Web Pages\fontdrvhost.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2108
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\fontdrvhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:760
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Windows\Offline Web Pages\fontdrvhost.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4204
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default\AppData\csrss.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4580
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\AppData\csrss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3492
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Default\AppData\csrss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:840

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log

                                              Filesize

                                              1KB

                                              MD5

                                              baf55b95da4a601229647f25dad12878

                                              SHA1

                                              abc16954ebfd213733c4493fc1910164d825cac8

                                              SHA256

                                              ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                              SHA512

                                              24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              a43e653ffb5ab07940f4bdd9cc8fade4

                                              SHA1

                                              af43d04e3427f111b22dc891c5c7ee8a10ac4123

                                              SHA256

                                              c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe

                                              SHA512

                                              62a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              05626d543357a7b9aab66738323d7ac6

                                              SHA1

                                              8a0366530637b0f977af59dde44fae4df8906f0f

                                              SHA256

                                              352265151df8fcc298bbbde14c4ddff51683a9a43416ce1987511ee7a27fa433

                                              SHA512

                                              11222b457bce9d25eca8b7f4768c5706ad117960d122bf049f94158725187fbaea86f38b3910402043f5a565dcc5faca535366880c0bd92f58a799931a32401d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              d28a889fd956d5cb3accfbaf1143eb6f

                                              SHA1

                                              157ba54b365341f8ff06707d996b3635da8446f7

                                              SHA256

                                              21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                              SHA512

                                              0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              62623d22bd9e037191765d5083ce16a3

                                              SHA1

                                              4a07da6872672f715a4780513d95ed8ddeefd259

                                              SHA256

                                              95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

                                              SHA512

                                              9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

                                            • C:\Users\Admin\AppData\Local\Temp\0MFyH7TMVd.bat

                                              Filesize

                                              209B

                                              MD5

                                              0f01abff05202cdba71ec90af65462f4

                                              SHA1

                                              b0aa284852a2f96a5f23d8c7faf57c1175c46a4a

                                              SHA256

                                              3fd4dae68ab8928efea62b5500935dd3c0d74b6c3a07d31e57527a833fb9127f

                                              SHA512

                                              c94b636bce67e576dd8d9e5552c9d1b36b576fdbf2b5eecd339fa7ad35a06a7bc2df1aa02eb42bbb5ba7299e012db69ab7777f840c90ea5a946f215b5d8b12a7

                                            • C:\Users\Admin\AppData\Local\Temp\5EJ4eIa89C.bat

                                              Filesize

                                              209B

                                              MD5

                                              ce9296fb0826f69e919f592a4d429584

                                              SHA1

                                              6f624659944de0bd320fd26888017c6e86803d23

                                              SHA256

                                              be6489efb8535994a4e566745b52bf4fc085c92210fc037ebe17acb3b9dd3f39

                                              SHA512

                                              7c4dff8ebc8e4b7bf4492c4ff3c1c54a07f7ff0ce3b83f7599385d4558599266172b0d2445f27debb02915f4b6d680082d04d9aeda52d896c34a41e3ec6d2174

                                            • C:\Users\Admin\AppData\Local\Temp\AQ0EpYUV7r.bat

                                              Filesize

                                              209B

                                              MD5

                                              68f3947662954ca659062b81a2e5c6e2

                                              SHA1

                                              1973bc881e16f8b7f7cc09ad370f24343aa2392a

                                              SHA256

                                              e9428b9a0c422572c4941a826d81ebcaed2a65a592e46d135cedca93496dbc6e

                                              SHA512

                                              2c11bd5a7007809883c49e634431d8c8c860407c803d2a074cd6bf135a4780b82d47154539f5abae67a9c0e8dce279e34fc11a5aa32196c89b8e728c1b6ebbd8

                                            • C:\Users\Admin\AppData\Local\Temp\DCuC0H4DXb.bat

                                              Filesize

                                              209B

                                              MD5

                                              964741be9c1a6d2630b6e69cd658b441

                                              SHA1

                                              3a887acd7c94911c8f8b1bcd3910de32c91199bb

                                              SHA256

                                              e27e7b5ab08a3a48763afd18a7f36912cba7d7c7fa07087b8b171ff42adda42a

                                              SHA512

                                              e193d2a1298fdb2d4d755d9acc64a0f9e69f2306ef136220ab3e3dbc14699f3372bf334525ff5bc67bf3621f586e4bdfddf91eb34deffd4388bb14663d1dd3c2

                                            • C:\Users\Admin\AppData\Local\Temp\L59TFxmxil.bat

                                              Filesize

                                              209B

                                              MD5

                                              782bd6be7874b7b12ff4bfaa764895cf

                                              SHA1

                                              211f08cf744cb14bceb1389388e6a76ab9537f57

                                              SHA256

                                              c6cfb54f194e01d9b610278c9e7d6cb362d16c59fb8493cf53865d4e6481d7bf

                                              SHA512

                                              aa6e48b642ada6c67d35fd1083760e4e9427bee521039a930e258b1dada2bcf2c6d7a85118a11114a56eac53ba6d376c037b8faf945597f78a7c7b5b09b0b79a

                                            • C:\Users\Admin\AppData\Local\Temp\SzaURWjxsM.bat

                                              Filesize

                                              209B

                                              MD5

                                              304b00c61e28874c890ac22365bfc372

                                              SHA1

                                              6daa0abeaaeba730e3f9998cca5cbf8c8a81f654

                                              SHA256

                                              e4317bfe84fade6d75089fa3dc4f67da217cce6f637512cfee34d4622bbba9c4

                                              SHA512

                                              6f04dcd313d7cd8d771cb7382ceff3db0a380619991492812c3acd2da38f240ee84b3b5cb405368e643fbde50640067acb070ea90960fc51edf5878f757f42ed

                                            • C:\Users\Admin\AppData\Local\Temp\WzmeI2KvQx.bat

                                              Filesize

                                              209B

                                              MD5

                                              77c820eb23dd1ee24ae9c280d5f780ae

                                              SHA1

                                              59fc0c327c73e4916f42a7df9783694c8679eb5e

                                              SHA256

                                              5146ba186a7ebcfc7a2f01e444225f9ed14d5d95511fe4ccfd5ce1801b36eda5

                                              SHA512

                                              4fccdeb014fdf819487995abd85c534e2c7e61ad4d675a95d333e23244d92e90bbda901b3854aeeec8bdcc01a32d33caba73a5876fbde369b1b174183a26d081

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4cbw5klv.hdm.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\dk6czFnjgV.bat

                                              Filesize

                                              209B

                                              MD5

                                              d948bc5f3f534ef337c5a1c56fe66076

                                              SHA1

                                              28867ba764b409c403cd57b8f7739a248e25117b

                                              SHA256

                                              8db81e7c3a78c92128425a15fa5857641b4aedd3300f22d1f3a8d1026aae86d5

                                              SHA512

                                              702273c2afb3b7519dc787d3ec304f1025779bce368c38948317e8bb518f8895c1d35cede93b94c1b2415ea4671eff28df2e01569a8d75e0a9ea6c090d8b834a

                                            • C:\Users\Admin\AppData\Local\Temp\fg7ffKrc0I.bat

                                              Filesize

                                              209B

                                              MD5

                                              79675eb602935cc2576f2197bf884db3

                                              SHA1

                                              6265e2e0e334a4354f63002a1cb314e8c3baf5fe

                                              SHA256

                                              720f79b185c6040390a245aab10c54c51453664db07c39bdc4bce8d7f13fba98

                                              SHA512

                                              f823bbed5af1fc31c4603b18ddccb39d5d9531b995a408414b2427d765c100a30c8becd51980724b068e2c344b46c49b46600402dda1c83138f2d170b04dda9c

                                            • C:\Users\Admin\AppData\Local\Temp\jhJpXqSaXt.bat

                                              Filesize

                                              209B

                                              MD5

                                              021be7a2cf1735178df9ff530a98d1ae

                                              SHA1

                                              fbfa1c25a67ce7e7933ee0716f27573425040d68

                                              SHA256

                                              15428703cd9df01e5d734453e15939b1dcac0d9629a6025438cfd33055c1b021

                                              SHA512

                                              802ecde60ace815d0ce1d02e710ce31c61e8eda105b53c24eabc24d8da3fa03521e81d7d3c1f6550ae3de5075a0ca43485963da00889e2ad727787fde132daf6

                                            • C:\Users\Admin\AppData\Local\Temp\tbw0avzYF4.bat

                                              Filesize

                                              209B

                                              MD5

                                              06e7043a1ab6b96057bf03090e427070

                                              SHA1

                                              230712be41e8719eeb7818e3597223040922b261

                                              SHA256

                                              3271ade9aa6886b76b81128a01802fa122f7bf9ee04eae5e502e5222436d7114

                                              SHA512

                                              9b41185a5f750671e846e287d32c33ccd093bbdc3450fced188d20232f2c6af2751a078bb6fe953b7debae43bc6e55fbcb3c304e5417b5eb16ce4b5a0188c041

                                            • C:\Users\Admin\AppData\Local\Temp\uSow6ZWML2.bat

                                              Filesize

                                              209B

                                              MD5

                                              3e702654c8e04afcaff98be1682aef0e

                                              SHA1

                                              459309e5458196bf91afa481283d4cbe04e125a8

                                              SHA256

                                              d4531976db732c73b8105c261757c4757540bff1251ca71ba7cec693532a778d

                                              SHA512

                                              f5322b97738cfaaf7eac4567c4ca563d1da502ac44dd274b7019b30f42bbe3548916fd1d7be998c2b93253896cd0bacc54f1567b263fc06ee882c4c3434a652d

                                            • C:\providercommon\1zu9dW.bat

                                              Filesize

                                              36B

                                              MD5

                                              6783c3ee07c7d151ceac57f1f9c8bed7

                                              SHA1

                                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                                              SHA256

                                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                              SHA512

                                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                            • C:\providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                              Filesize

                                              197B

                                              MD5

                                              8088241160261560a02c84025d107592

                                              SHA1

                                              083121f7027557570994c9fc211df61730455bb5

                                              SHA256

                                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                              SHA512

                                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                            • memory/1512-102-0x0000000002540000-0x0000000002552000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/1512-107-0x000000001B7C0000-0x000000001B8C2000-memory.dmp

                                              Filesize

                                              1.0MB

                                            • memory/1972-46-0x000001F0D88C0000-0x000001F0D88E2000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/2624-141-0x00000000024B0000-0x00000000024C2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3104-148-0x0000000000EE0000-0x0000000000EF2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3168-122-0x000000001AF60000-0x000000001AF72000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4888-13-0x0000000000220000-0x0000000000330000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/4888-16-0x00000000023D0000-0x00000000023DC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/4888-12-0x00007FFBA8913000-0x00007FFBA8915000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4888-17-0x0000000002480000-0x000000000248C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/4888-14-0x00000000023A0000-0x00000000023B2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4888-15-0x00000000023B0000-0x00000000023BC000-memory.dmp

                                              Filesize

                                              48KB