Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 18:14

General

  • Target

    3c85ad90afa66cd4c5d1cccf63adc862.exe

  • Size

    4.2MB

  • MD5

    3c85ad90afa66cd4c5d1cccf63adc862

  • SHA1

    ed3e4c1e2c9d3d588c48a855cad21dfe0a556930

  • SHA256

    00564ed0e7500f4ed88ae136b1c140425556bf536c6bd8c6c74b7d9665d6fe20

  • SHA512

    9358c25d694a546dfa91faddb9517a5f3b8602364cc0e3b5ec55818dd49b111f09b7635f646670a56da3e77e179630120ce034f8a3bb73b39df6b35739766e87

  • SSDEEP

    98304:fbNBi6P/9/7w3zThAILRk5/919K6K2ze2jIN:fBV9/7azT+ILcxKR2fjIN

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 39 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c85ad90afa66cd4c5d1cccf63adc862.exe
    "C:\Users\Admin\AppData\Local\Temp\3c85ad90afa66cd4c5d1cccf63adc862.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Hypercontainer\vn0WDvdQhnymz38qOIXaYP3Vb.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Hypercontainer\n880E6sbFEumx9tx.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Hypercontainer\blockwin.exe
          "C:\Hypercontainer\blockwin.exe"
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2240
          • C:\Recovery\WindowsRE\fontdrvhost.exe
            "C:\Recovery\WindowsRE\fontdrvhost.exe"
            5⤵
            • UAC bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1408
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3040aa8f-8794-4ac9-8ab2-a76f3168c31d.vbs"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:5068
              • C:\Recovery\WindowsRE\fontdrvhost.exe
                C:\Recovery\WindowsRE\fontdrvhost.exe
                7⤵
                • UAC bypass
                • Checks computer location settings
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:3236
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d680cc60-6f55-4338-8217-5cfb6e8034d3.vbs"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1248
                  • C:\Recovery\WindowsRE\fontdrvhost.exe
                    C:\Recovery\WindowsRE\fontdrvhost.exe
                    9⤵
                    • UAC bypass
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:1648
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\05088347-e9f3-436b-ae7d-3fadacb71ea4.vbs"
                      10⤵
                        PID:2860
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\31f58a4a-784d-4c53-bdc6-bd99b29ae47c.vbs"
                        10⤵
                          PID:1444
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ba2128b4-c39e-4c5d-bf5f-ccc84c813516.vbs"
                      8⤵
                        PID:1220
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\62c2141d-7498-48e8-aa5d-01395ac2d87f.vbs"
                    6⤵
                      PID:1108
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Update\Install\{8A1C963D-7054-4DC6-AA98-9FBFCE5E4C3B}\sysmon.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4472
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Install\{8A1C963D-7054-4DC6-AA98-9FBFCE5E4C3B}\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4592
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Update\Install\{8A1C963D-7054-4DC6-AA98-9FBFCE5E4C3B}\sysmon.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1340
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:952
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4844
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3464
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:5048
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3736
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:112
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\services.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3580
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3848
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\services.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3680
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Windows\en-US\backgroundTaskHost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2504
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\en-US\backgroundTaskHost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2432
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Windows\en-US\backgroundTaskHost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4764
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2108
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4188
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:964
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\Windows\Panther\UnattendGC\OfficeClickToRun.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3780
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\Panther\UnattendGC\OfficeClickToRun.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1304
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 11 /tr "'C:\Windows\Panther\UnattendGC\OfficeClickToRun.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:620
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4784
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4344
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\Lang\System.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2024
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1188
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2296
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4376
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2592
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4860
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2372
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Hypercontainer\sppsvc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2396
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Hypercontainer\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:204
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Hypercontainer\sppsvc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2980
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4400
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:4516
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:3304
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\fontdrvhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1068
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:812
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\fontdrvhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1636

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Hypercontainer\blockwin.exe

            Filesize

            3.7MB

            MD5

            3e2ca8a03a09e9232a24945d78e87398

            SHA1

            26c4f20fe3fbfe14f27611c949ca7989ecf7dbd8

            SHA256

            64e73ffba3cbf8754b24831016a6a9ce43a1e0b111b898f528e7be65f88a5357

            SHA512

            9e7ad75b2d2689ae92a843a50180df34d04b3728a1783c8f9d3dd2dd725e68290e32e022cb0129732b2fc968807aa07a9e91fc25c4f5fb0a0a1bba61f44dbf6c

          • C:\Hypercontainer\n880E6sbFEumx9tx.bat

            Filesize

            32B

            MD5

            1fe47a1f963b69d57e6ea01cd6153758

            SHA1

            2f4fa015c8558811c0928f9dc4e919609a3364c3

            SHA256

            2974ac71a1c7925397ca4bbad37392f1fdde5dbdfad8f7f96acb85a1877caa13

            SHA512

            69318cbce7b6b65f29aa6835079aca0222806d28dc053d4bdc5148ff48cb5d16315726c77dbdece621b15e7ff2b61d80182cecbbccaa1080f2353d053a2d0970

          • C:\Hypercontainer\vn0WDvdQhnymz38qOIXaYP3Vb.vbe

            Filesize

            207B

            MD5

            8b836240f8332ed3aea9a1a7f923a808

            SHA1

            036cd5a0ab5ddae9d53f66111e408ca315308505

            SHA256

            007155d2a8af49ef8544c930d7e3b860ef796f788544aa118ed61c0ef80ae579

            SHA512

            67a96622f17c0a0146f71f22a3ec4a2851398cbcc2d8883eb5b0b4546ac4cbb2894fd1acf303aedf0a9932e7a6aa3ae0e45491ee5aaac0df6d7b0196eb49747f

          • C:\Recovery\WindowsRE\fontdrvhost.exe

            Filesize

            3.7MB

            MD5

            93e47907ca5c2776eca7396e8ea5dd67

            SHA1

            16dcc6c53d0fba815d808c04d9eebefbc50557cc

            SHA256

            9e0322493b6ab3ed96d8e7aef0796129f9673c9d3e8a500f574a20c5ab345c1a

            SHA512

            f821c399204cbb9ba25999b15696326f00a4c6bd98e7627e3ee6da90de731370038da5e211b29560c5cd44374fc35fffbeaa9a405f853168486a00d38444b1fb

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log

            Filesize

            1KB

            MD5

            49b64127208271d8f797256057d0b006

            SHA1

            b99bd7e2b4e9ed24de47fb3341ea67660b84cca1

            SHA256

            2a5d403a2e649d8eceef8f785eeb0f6d33888ec6bbf251b3c347e34cb32b1e77

            SHA512

            f7c728923c893dc9bc88ad2159e0abcda41e1b40ff7e7756e6252d135ed238a2248a2662b3392449836dd1b0b580f0c866cc33e409527484fe4602e3d3f10e3e

          • C:\Users\Admin\AppData\Local\Temp\05088347-e9f3-436b-ae7d-3fadacb71ea4.vbs

            Filesize

            713B

            MD5

            eb10b1dd467a9ce7d761e95b9b972c59

            SHA1

            2e7bbf5b415470ea585cf98a92ea578a96e27151

            SHA256

            5dede7f9483b1e88c03a70aaf82e2bba8b76a4ab97945353334ef596709011e5

            SHA512

            bfe7ff29a2e96f0c952a982f4fefe2e1843fb328eddf1368344b3477ed4828e48c772c1b44ea0a2ad7d21deef9d1ff8a62ddbcef6546adfe1e3cc9551b7cb5d6

          • C:\Users\Admin\AppData\Local\Temp\3040aa8f-8794-4ac9-8ab2-a76f3168c31d.vbs

            Filesize

            713B

            MD5

            f8a5db267e66fb21fc666baed3300640

            SHA1

            3e93450ce89a44a0123cd49ae8a3945dca4b0609

            SHA256

            5ef1c837793fcd9860df4689dadc3c6f19a9fd9019d72891abb31e673d928df8

            SHA512

            088d951b21d7100e633dd4ea5803d6eedd538e33e3f12ef0f5f1383fb9cc7c1c1978d62f448c64bd22a4c4d59e1b716816e58b2d6f8b52f61d0353667a236f12

          • C:\Users\Admin\AppData\Local\Temp\62c2141d-7498-48e8-aa5d-01395ac2d87f.vbs

            Filesize

            489B

            MD5

            61e851d6fd6c2b585beabe60064fcb85

            SHA1

            7bd5406db64d23ce947671ef6be520949a343642

            SHA256

            ca2cc2857afd2b854747d2178d0ef17d8ccfd5872cab04bccfed93c0de1a8f4a

            SHA512

            bb5c070d0fe2fc8b1db4c7829c4a938f00903959ac332191cc9742e68ea9570c35821b0a761cf9a608d7281aa62a53d749d4355bfc131b15760520efd6f9fa0d

          • C:\Users\Admin\AppData\Local\Temp\d680cc60-6f55-4338-8217-5cfb6e8034d3.vbs

            Filesize

            713B

            MD5

            402a7358fa631146c9b619a89b9aa233

            SHA1

            0179ca3a40dc7687f879c990ad975ff90d92b341

            SHA256

            fd9b370fed9042d09b0ef4d89c316da5796cea4695a31bbd224d00616090a54d

            SHA512

            d3d4ba102ddc88642f33d8cbec6f8c36946327fec20413980c9206b4b7664720c55128ea81de12ea176536ea39b14471ae0aeca54988a910ff36b65b49e0f4d2

          • memory/1408-72-0x000000001AFC0000-0x000000001AFD2000-memory.dmp

            Filesize

            72KB

          • memory/1648-97-0x000000001BED0000-0x000000001BEE2000-memory.dmp

            Filesize

            72KB

          • memory/2240-25-0x000000001BF60000-0x000000001BF68000-memory.dmp

            Filesize

            32KB

          • memory/2240-31-0x000000001BFF0000-0x000000001BFF8000-memory.dmp

            Filesize

            32KB

          • memory/2240-22-0x000000001B6C0000-0x000000001B6CC000-memory.dmp

            Filesize

            48KB

          • memory/2240-23-0x000000001B6D0000-0x000000001B6E2000-memory.dmp

            Filesize

            72KB

          • memory/2240-24-0x000000001C490000-0x000000001C9B8000-memory.dmp

            Filesize

            5.2MB

          • memory/2240-20-0x000000001B6B0000-0x000000001B6BA000-memory.dmp

            Filesize

            40KB

          • memory/2240-26-0x000000001BF70000-0x000000001BF7C000-memory.dmp

            Filesize

            48KB

          • memory/2240-27-0x000000001BF80000-0x000000001BF88000-memory.dmp

            Filesize

            32KB

          • memory/2240-28-0x000000001BFE0000-0x000000001BFE8000-memory.dmp

            Filesize

            32KB

          • memory/2240-30-0x000000001C100000-0x000000001C10E000-memory.dmp

            Filesize

            56KB

          • memory/2240-32-0x000000001C000000-0x000000001C00E000-memory.dmp

            Filesize

            56KB

          • memory/2240-21-0x000000001BEF0000-0x000000001BF46000-memory.dmp

            Filesize

            344KB

          • memory/2240-29-0x000000001C0F0000-0x000000001C0FA000-memory.dmp

            Filesize

            40KB

          • memory/2240-33-0x000000001C020000-0x000000001C02A000-memory.dmp

            Filesize

            40KB

          • memory/2240-34-0x000000001C030000-0x000000001C03C000-memory.dmp

            Filesize

            48KB

          • memory/2240-19-0x000000001B6A0000-0x000000001B6AC000-memory.dmp

            Filesize

            48KB

          • memory/2240-18-0x000000001B680000-0x000000001B696000-memory.dmp

            Filesize

            88KB

          • memory/2240-17-0x000000001B670000-0x000000001B678000-memory.dmp

            Filesize

            32KB

          • memory/2240-16-0x000000001BCF0000-0x000000001BD40000-memory.dmp

            Filesize

            320KB

          • memory/2240-15-0x000000001B650000-0x000000001B66C000-memory.dmp

            Filesize

            112KB

          • memory/2240-12-0x00007FF9E2183000-0x00007FF9E2185000-memory.dmp

            Filesize

            8KB

          • memory/2240-14-0x0000000002B20000-0x0000000002B2E000-memory.dmp

            Filesize

            56KB

          • memory/2240-13-0x0000000000680000-0x0000000000A40000-memory.dmp

            Filesize

            3.8MB

          • memory/3236-85-0x0000000002890000-0x00000000028A2000-memory.dmp

            Filesize

            72KB