Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 12:08

General

  • Target

    5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe

  • Size

    1.3MB

  • MD5

    0696b2076485f2e955ec0c5c31877340

  • SHA1

    4d9e6a3a94903be0ac72e0bf969cf5d5a42bc7e5

  • SHA256

    5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9

  • SHA512

    348d8de30402d5ff2105da4b2676d058f4061e071bbb94035a08a69407a6cac774b1692c477e1afb89de3e60acc263950eadb379f63fa374f9e5918a7a2a14ef

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 5 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe
    "C:\Users\Admin\AppData\Local\Temp\5b191231ee68e81881d8e1cce969ab6cdf5fe2c6d44b420bfd939bccd35739d9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:264
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1108
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:376
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1556
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1308
          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1736
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fdSjcfTSOA.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1336
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:1772
                • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
                  "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1976
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nlAvT1Qihc.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2612
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:2412
                      • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
                        "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2668
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\epFjAgKouK.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:296
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:1708
                            • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
                              "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
                              11⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1712
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\y17QM3q8Rw.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1660
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:932
                                  • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
                                    "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                    13⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:740
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WLCDTNV5Zk.bat"
                                      14⤵
                                        PID:2780
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          15⤵
                                            PID:2620
                                          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
                                            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                            15⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2128
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EzJh52oHEl.bat"
                                              16⤵
                                                PID:1908
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  17⤵
                                                    PID:1612
                                                  • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
                                                    "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                                    17⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2208
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XdxpZ3I66P.bat"
                                                      18⤵
                                                        PID:1324
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          19⤵
                                                            PID:1688
                                                          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe
                                                            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                                            19⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2596
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4oJokgKWVw.bat"
                                                              20⤵
                                                                PID:2240
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  21⤵
                                                                    PID:2360
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\providercommon\Idle.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2108
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2752
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\providercommon\Idle.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2728
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2628
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:2664
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:1436
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:460
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:1440
                          • C:\Windows\system32\schtasks.exe
                            schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
                            1⤵
                            • Process spawned unexpected child process
                            • Scheduled Task/Job: Scheduled Task
                            PID:1768

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            ef8a6ddfd66bdfae27b8f9502f51126d

                            SHA1

                            ab0cc917bff81476dfb129d5aada046a2c9edb2d

                            SHA256

                            21471d09dcb5e91f68a1dde474ed2552eeb1ae2844091f2f59fa0422ea889495

                            SHA512

                            6903a0511a2cd06d3296ebed682ff6e1d74b9bc47abd4229218f9f5c715d94ed6f1e005ba7ae2ea6a3b09439034dfae598874a5199efb3b60055ef2bc811b19e

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            9d2d18a79bab07311f6e5a77b971d61e

                            SHA1

                            f92e2835e0d194a1f2666ae3392bfe0e2eff3739

                            SHA256

                            3db61ff9e19e486fc70ec339284706f159c56b4099db68ab93e5cccfa2ac1903

                            SHA512

                            3c09fe32e6b924b76c9989546c5960d3d1e4e0fe2b8d3b5d44caf3809ed7352659f753e5d71fd8f208f206ff53e167766a6483be258df1d01e90f626ed12824b

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            c1f2c62cc6b5efc13a23397dfb33bc4c

                            SHA1

                            aecbb11116c8b5744788538af78d6112bc3ff8d8

                            SHA256

                            8ff78db66d054afcd82d06b045ed246012130b13280201cb764d32b865c2f190

                            SHA512

                            793e0b78c2fb01ce147dc8730188fdce20fce747a1f5bc60067f4e88ac2dcd9850006c200c894fae5f082cebb3927d2d944b8b8b0c195735b6ebe1bd1968ea07

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            c15a12d7107ca8b03fa1dccbc07b5766

                            SHA1

                            48bcebd6371a4bc2709d977cf1df8f9896ffbed6

                            SHA256

                            31198bf0d5dc8a8a4ff099923b8c154f00619af84d108d8ead699be345428cf5

                            SHA512

                            9ca78575bbd2404e862ccbb4960c76549a9ec6930f74a5604d82ba3ab8b56cd912e56e9c60afe8c4b0b53edfde47e766d830ac2e326297f0c44f8f71d18a3cc5

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            6584fb913e43c4189e26abaadf1df15d

                            SHA1

                            a5c52fce15c15780bad313808ef9a8196adb7ce2

                            SHA256

                            581ce15df805ba3fab52d00d7b4b1330c59130ba5caaf20dc0eb2f34ff67f15f

                            SHA512

                            6cf8764111582623f60403cb08878b960a753998448cae607f4333d3ab6a00bbac676bb1c2c83ad656df14f4b0e240944d45956bc71eb1625c70dc2611bece3c

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            33079efc933b106c3472dc5c54297d3d

                            SHA1

                            bf9d7e31208a28d071fadb2f491b43190e166a0f

                            SHA256

                            cf0638405808e38ed2c0a9ba40a6aac039206b6c3c66fd86da420a83b1cf2bea

                            SHA512

                            4917b2cc78ef2a6b6d58b398a9d503d872834d8653c71312d20f1e94a5af360943428c239da1ae9860ed19e1184be8467e2c8f3671113a8107957a751aa23e2c

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            be40f7262028b509712a1b629b64f9d0

                            SHA1

                            7f7791d648c11218f1b70e4206636a34774c5f5b

                            SHA256

                            30b5ec0b3bc6cf324f3644affd5a76a115e54de1c1b3cbc1456f10680f3b5344

                            SHA512

                            5185f08ba95b5a7774042a74277db5de3d874bf5e75604416ef1c57abeb69a38f1a59a49e13f84c16865c97161712f656e815d6498a6d87555f78c4ad7721c9f

                          • C:\Users\Admin\AppData\Local\Temp\4oJokgKWVw.bat

                            Filesize

                            240B

                            MD5

                            43e3760169da4595aff103b9105f1602

                            SHA1

                            7dda86b1fa1e6757dd70895713bcc001553e457d

                            SHA256

                            88a1f3ed2e06ee97978621ee062ef6245f20cfdef1dea858f9f7722ff472a0b0

                            SHA512

                            e4ca110f763ba69dec154f7bbe0d9bc985de996e4a458dfa3d3024797c33d1a590c836f0afcf7e5c524a969c9991ce9ef80bf311d047b21ed66e68f3434b262b

                          • C:\Users\Admin\AppData\Local\Temp\Cab82D.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\EzJh52oHEl.bat

                            Filesize

                            240B

                            MD5

                            3cb7010c38bcf8a7c46cef4b14f5ec45

                            SHA1

                            15e50505057dfa23507b5b968665e7fa23cce35f

                            SHA256

                            d67d265d603c6acf47f16997a533c31428510c8647b60ff3432ee40b391efaeb

                            SHA512

                            a31d34475ab60d2b32d45456e8fce9c5a0066307738039df3aa6076f2e9e7cbaf43a5568312c00b7c51ecd180b8c8f11c58a593d5bf31e53bd1330dc79b4d377

                          • C:\Users\Admin\AppData\Local\Temp\Tar84F.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • C:\Users\Admin\AppData\Local\Temp\WLCDTNV5Zk.bat

                            Filesize

                            240B

                            MD5

                            bc568b7729cfc69833ce18dd1e0c0384

                            SHA1

                            a36ae435abb86e7b1651ccf86a360e11c92a48c3

                            SHA256

                            b257a6da8c29c19ec3b7c27357ab4d3292afa072695ec1898945c9d068035612

                            SHA512

                            715521895363557d5f2898a40feae96ca9fbff2dc51c66c7dc986f7ff0b8ba8393af2a200b6087b10cc81a7284e6579a2d8d2e49094e7cdbc4dcb0265e7d99b9

                          • C:\Users\Admin\AppData\Local\Temp\XdxpZ3I66P.bat

                            Filesize

                            240B

                            MD5

                            553355be00508d9f54546ec10e0931b2

                            SHA1

                            36708d57aca233d44ebd94a6876b912173846cdc

                            SHA256

                            b5f0f940748a5ccb43230c5f9dae0ab39d129fe05684318e63c38eed1d8467ef

                            SHA512

                            13baf9ba86deba20681351febe0ca4e6d31c2ead7924c787835655eae315f62c782a97faf73c130450d1ef547becf1233d4abd18c82272e3f965a3fd663d93ea

                          • C:\Users\Admin\AppData\Local\Temp\epFjAgKouK.bat

                            Filesize

                            240B

                            MD5

                            de2954980b505f3d5c6760bbbfb31a8c

                            SHA1

                            e78c7048afcd2b41516130d923b496674b59cba2

                            SHA256

                            a57dc242941e07704325890b8e012d35f5e386432d7fb39803a851d78d481784

                            SHA512

                            202edff3d24c791f67d667b094ef85dcc2e9b32fd1b1d410dad384f87ab935ff98cf81e7ae51d3f68de1f6ac3066296e06aa85055f8ff781cb5a7aa9233ed084

                          • C:\Users\Admin\AppData\Local\Temp\fdSjcfTSOA.bat

                            Filesize

                            240B

                            MD5

                            e4372b27b49a29975b28e531e5aa1a46

                            SHA1

                            aa6bf06099fc31afb9f522dfc6d427476d95c344

                            SHA256

                            a33fc5c4bcc5e73fe3065044fbff751c597817227db7409f6f9e63af83d1e107

                            SHA512

                            94e8f238d08190722df8393830077ca899af20c0b0aecc85d5bdc48700333f99c636f73afd5b2a9380d3cceb6194a8216ffdbdd221326f1e7639725a832ff0d1

                          • C:\Users\Admin\AppData\Local\Temp\nlAvT1Qihc.bat

                            Filesize

                            240B

                            MD5

                            ae001666b23a4e596962685af0b916cb

                            SHA1

                            5567f9dc5cab905d6df60315713960f54320ebc6

                            SHA256

                            408d0c9b665b7d7c6d841e13544332299cb1dbb5ebddfba1a085a0be3aeb8be4

                            SHA512

                            825b67c0d44bb9b90693975745a42ddd921ca66b310aebd7322efb1e8ed79e2600c387a3972b4569e82bd6fb9c1f94f956254aa2ba7b9af697e65e4a3877cfa5

                          • C:\Users\Admin\AppData\Local\Temp\y17QM3q8Rw.bat

                            Filesize

                            240B

                            MD5

                            3049d6c259909360cc24854ba5cd12ac

                            SHA1

                            ac95be03fc78563344e8a861e7b891cd21ebeb57

                            SHA256

                            fe2190a4a07467324754416d3d4b3c81b2872375cb3dfbb3b719863f686dcb17

                            SHA512

                            c6bb8001a8083fbc1b6438842b70adc0c14f4f64819017de278191ef9c910e2ebccb268796c627b6e51b128ba2a202684594a71b43c439756c33196bedb6c882

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                            Filesize

                            7KB

                            MD5

                            9c63a403a0f0e1f31e5f76cee1926056

                            SHA1

                            80f54c5e6073504c2fd9990ccbbd333d7282347b

                            SHA256

                            78440de37765e26d83e72278576756e7ba5479b08fb38b6b118db7019c869192

                            SHA512

                            f87f555ac2fc5db72874490d27ca69139c8ef23b61c146de9944d06c9dda0b3a0073eab88b148910db96c15020210f6ed44cb3d820c39793133a1f118eddee91

                          • C:\providercommon\1zu9dW.bat

                            Filesize

                            36B

                            MD5

                            6783c3ee07c7d151ceac57f1f9c8bed7

                            SHA1

                            17468f98f95bf504cc1f83c49e49a78526b3ea03

                            SHA256

                            8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                            SHA512

                            c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                          • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                            Filesize

                            197B

                            MD5

                            8088241160261560a02c84025d107592

                            SHA1

                            083121f7027557570994c9fc211df61730455bb5

                            SHA256

                            2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                            SHA512

                            20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                          • \providercommon\DllCommonsvc.exe

                            Filesize

                            1.0MB

                            MD5

                            bd31e94b4143c4ce49c17d3af46bcad0

                            SHA1

                            f8c51ff3ff909531d9469d4ba1bbabae101853ff

                            SHA256

                            b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                            SHA512

                            f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                          • memory/1556-51-0x0000000002970000-0x0000000002978000-memory.dmp

                            Filesize

                            32KB

                          • memory/1556-50-0x000000001B680000-0x000000001B962000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/1736-30-0x0000000000AA0000-0x0000000000BB0000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/1976-110-0x0000000001200000-0x0000000001310000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2128-347-0x00000000003D0000-0x00000000003E2000-memory.dmp

                            Filesize

                            72KB

                          • memory/2208-407-0x0000000001280000-0x0000000001390000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2208-408-0x00000000003B0000-0x00000000003C2000-memory.dmp

                            Filesize

                            72KB

                          • memory/2596-468-0x0000000000240000-0x0000000000252000-memory.dmp

                            Filesize

                            72KB

                          • memory/2756-15-0x0000000000670000-0x000000000067C000-memory.dmp

                            Filesize

                            48KB

                          • memory/2756-13-0x0000000000FA0000-0x00000000010B0000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2756-14-0x00000000004D0000-0x00000000004E2000-memory.dmp

                            Filesize

                            72KB

                          • memory/2756-16-0x00000000004E0000-0x00000000004EC000-memory.dmp

                            Filesize

                            48KB

                          • memory/2756-17-0x0000000000680000-0x000000000068C000-memory.dmp

                            Filesize

                            48KB