Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2025 03:26

General

  • Target

    b8fd8ab8d6bffd83d24ec8c669958653.exe

  • Size

    1.5MB

  • MD5

    b8fd8ab8d6bffd83d24ec8c669958653

  • SHA1

    7cf5979b3d3aa0a10d595f9a9db286b689a2d167

  • SHA256

    65063fcd5a9010a706580e11f6abf886a45fa6dd15743bdc41a49b1f9ac5761a

  • SHA512

    b258de30aebe40dd80112011827e23c569c776e90c79fb4d00ac25760c4ce9344d6f5104d9f79d78ea8884fb53b25ced0a12f1df5d4a232057686422611afb4a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6kS6gR4zPK3r0Y2bpq5vbf4w8IzRII4Wa6gSqJ8S:UbA306DRcIruWf7RII2vS+r

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8fd8ab8d6bffd83d24ec8c669958653.exe
    "C:\Users\Admin\AppData\Local\Temp\b8fd8ab8d6bffd83d24ec8c669958653.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\refhostperf\YDUzd2DburnkxzGba.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\refhostperf\24yvIrFqc9yigx6x0kwB7b7gqXz7Pn.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\refhostperf\serverperf.exe
          "C:\refhostperf\serverperf.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Users\All Users\Application Data\spoolsv.exe
            "C:\Users\All Users\Application Data\spoolsv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EH4KCibIlQ.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2532
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:1856
                • C:\Users\All Users\Application Data\spoolsv.exe
                  "C:\Users\All Users\Application Data\spoolsv.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2940
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EVfp7xrD4G.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2652
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:3064
                      • C:\Users\All Users\Application Data\spoolsv.exe
                        "C:\Users\All Users\Application Data\spoolsv.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2872
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ww6iFNwlpp.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2500
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:780
                            • C:\Users\All Users\Application Data\spoolsv.exe
                              "C:\Users\All Users\Application Data\spoolsv.exe"
                              11⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2836
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J91AFVPMIK.bat"
                                12⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2580
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  13⤵
                                    PID:1644
                                  • C:\Users\All Users\Application Data\spoolsv.exe
                                    "C:\Users\All Users\Application Data\spoolsv.exe"
                                    13⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:2768
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8KwMxVG80h.bat"
                                      14⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:2120
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        15⤵
                                          PID:1612
                                        • C:\Users\All Users\Application Data\spoolsv.exe
                                          "C:\Users\All Users\Application Data\spoolsv.exe"
                                          15⤵
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:2212
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sNl5EWIzDs.bat"
                                            16⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:336
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              17⤵
                                                PID:920
                                              • C:\Users\All Users\Application Data\spoolsv.exe
                                                "C:\Users\All Users\Application Data\spoolsv.exe"
                                                17⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2396
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0LMDaVm4bI.bat"
                                                  18⤵
                                                    PID:2668
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      19⤵
                                                        PID:2068
                                                      • C:\Users\All Users\Application Data\spoolsv.exe
                                                        "C:\Users\All Users\Application Data\spoolsv.exe"
                                                        19⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1820
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uOEGMIRuqZ.bat"
                                                          20⤵
                                                            PID:2116
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              21⤵
                                                                PID:1784
                                                              • C:\Users\All Users\Application Data\spoolsv.exe
                                                                "C:\Users\All Users\Application Data\spoolsv.exe"
                                                                21⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1148
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\Windows\LiveKernelReports\cmd.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2652
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\LiveKernelReports\cmd.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2776
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Windows\LiveKernelReports\cmd.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2808
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\refhostperf\Idle.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2676
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\refhostperf\Idle.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:3052
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\refhostperf\Idle.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2448
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\lsass.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:688
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\lsass.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1248
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\lsass.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1052
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\csrss.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1048
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2840
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2860
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\refhostperf\smss.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1260
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\refhostperf\smss.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:660
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\refhostperf\smss.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1720
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\dwm.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2572
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\dwm.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2856
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\dwm.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1800
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\refhostperf\explorer.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1228
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\refhostperf\explorer.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1176
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\refhostperf\explorer.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2212
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Desktop\OSPPSVC.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2708
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\OSPPSVC.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2284
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Desktop\OSPPSVC.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:576
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Windows\security\audit\dwm.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:3008
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\security\audit\dwm.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:768
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Windows\security\audit\dwm.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2996
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\lsass.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1496
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\lsass.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:2492
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\lsass.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1804
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1632
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:968
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1852
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Application Data\spoolsv.exe'" /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1656
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\All Users\Application Data\spoolsv.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:788
                      • C:\Windows\system32\schtasks.exe
                        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Application Data\spoolsv.exe'" /rl HIGHEST /f
                        1⤵
                        • Process spawned unexpected child process
                        • Scheduled Task/Job: Scheduled Task
                        PID:1520

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\0LMDaVm4bI.bat

                        Filesize

                        212B

                        MD5

                        73250f16103f01c09c5617566950d184

                        SHA1

                        d832cbd1e0f3e83f9128f0f3dc4c1574d5b7b2d2

                        SHA256

                        148fec7d346593a3da98cdbf0248a16318d725fb715c76ee9f88904bb1857b1f

                        SHA512

                        c6dbbaa72e93f7a18ec2b310b7b8d07300b2cdabc56effbb369a2c367fc1fbfdcedeea5e7ca15225c15dd1bcf6ecb02d4a199d3dd049a1441ac99af50f6274e0

                      • C:\Users\Admin\AppData\Local\Temp\8KwMxVG80h.bat

                        Filesize

                        212B

                        MD5

                        6bef13a983ca6df5ff600d53dd4a7361

                        SHA1

                        026d8f8b7d2c69d97dfaa757d00ddcc8376718b3

                        SHA256

                        bb0c6d935ee91dec0dfe9a971aae5dd7a51ee96500b015aa9630cfa7b0685ec1

                        SHA512

                        51c6f480fe418100829e251cfac9a2f7b2e319e57a427ce0e4eec0852a2ea5a2942039d7001739847a5ac6087ff395ddf8a779894d48b56323e6e0a1dff8bea8

                      • C:\Users\Admin\AppData\Local\Temp\EH4KCibIlQ.bat

                        Filesize

                        212B

                        MD5

                        50beb920c019e214f88cc167ad2c9dd2

                        SHA1

                        dda8c2d6f58de9eac359c309d85f56057083513c

                        SHA256

                        cde5ddab8d7d845ff27828079701890723f91c9a55a36fb6240127387bfc6046

                        SHA512

                        88991c6033e773a082c32d503a56ff42d058166a7fc49081901ec524de3205312786af493ff147d22f350d3b0a447b983a88c30a447f961da18fd860214feca5

                      • C:\Users\Admin\AppData\Local\Temp\EVfp7xrD4G.bat

                        Filesize

                        212B

                        MD5

                        9085a461764ec44a4f9e82c24c937821

                        SHA1

                        33e28bded8395c1b5407c4cced56a7c5a4d3e322

                        SHA256

                        aaaf1578aa31aa8da5bd8088910e74aa1b4f2a6521054c4e1103d90c3d9326ce

                        SHA512

                        aef27242ee027bc907920d9a72734ffab4756b465565bfc6d75c1c6ba417fccbb59978d84a5beb9fc7e175cdf297c50aa4ae6609443613900bcb03928b2fa478

                      • C:\Users\Admin\AppData\Local\Temp\J91AFVPMIK.bat

                        Filesize

                        212B

                        MD5

                        9764190b405ef836088aca7efe01c734

                        SHA1

                        35813e6ad9c5f86101b5c79400409be01a49bc0d

                        SHA256

                        209d5b6a818454aa4eeefabc521b721e72131638216f73a8245e279bf2c2461b

                        SHA512

                        8d9ef3197c3d74c427365aa107cb02c290d4d3c282dd812c311604ef856fda377c547420b60db5396b1b51a27173590c9cb8558ec397d018ab7472e2ab56f4e9

                      • C:\Users\Admin\AppData\Local\Temp\Ww6iFNwlpp.bat

                        Filesize

                        212B

                        MD5

                        9e6d21f9f445cc7ec8b6d2942dbb8f0d

                        SHA1

                        e0608a50539c16f5dbf1e0aaefd779986fc09406

                        SHA256

                        ebfe420d9125a54bc855f125b007f7810d929afeee0c99bbfd2b4330f04a83ba

                        SHA512

                        ae6dd48249d006899f8f785e1ee1929e15750527e1abca28eea676adb3d4d1b680c0f082b4df57a65865bdd4523cfdbf15199f69b457ac0a4d805dc2ab630c55

                      • C:\Users\Admin\AppData\Local\Temp\sNl5EWIzDs.bat

                        Filesize

                        212B

                        MD5

                        b7fc06354dd082cc75bfecb68ce7367b

                        SHA1

                        198a854346e6519f1b7761a216b78c63367de6b0

                        SHA256

                        61152a59a286fc0a1a636f17054b8936cabcd985248b79614299efecace15383

                        SHA512

                        7e3be574dba742907618a82ccbe0da553fb5fd7805ca64f61ca31a20588e6c34a993a1c26c4b29a373d749775cae5aea29f4dc1e7b65d93d9ee92673374a2adc

                      • C:\Users\Admin\AppData\Local\Temp\uOEGMIRuqZ.bat

                        Filesize

                        212B

                        MD5

                        3c9b514f1cea846858c4239d0c9e2c75

                        SHA1

                        721965e494446a88125ef5ef06f92d726c736c57

                        SHA256

                        18cabeda955d6cce00d8b6b04dc0499bbf5f85fadaf5b3f49c909f1c518317c5

                        SHA512

                        9717aa2b6010086ad737ab0a7c3c3dbb9749174422c1614dc8418c2ec2c7597952f8b971e23408057178c0defb000cc9c97d88fae9b388050b42555b58d85af6

                      • C:\refhostperf\24yvIrFqc9yigx6x0kwB7b7gqXz7Pn.bat

                        Filesize

                        31B

                        MD5

                        659397b18711665774947ed6189e91ae

                        SHA1

                        73006ef2a02a72132f180e873324e8a6e4c593df

                        SHA256

                        a939eb9c97b5aad7a4aa9cc522e93a81399fffc03b7536f603175a90d3fc6130

                        SHA512

                        f68315f1f2aad292176dc1f845da4fa4acb59bedf4f446130edc73481bf6bcc2e765258fbc558b1b3b3a08590e25e6937e9046adf4f00eb2afbb172646298c30

                      • C:\refhostperf\YDUzd2DburnkxzGba.vbe

                        Filesize

                        218B

                        MD5

                        693da7c1e4c7e39bb88041ca03bbf61e

                        SHA1

                        87ff5e77258e4ff5833a04ce4168d287510d32d6

                        SHA256

                        3ea997020623cbd40f68cff156f5ede16b0a4c2418b07ee5dacf64770a7fff99

                        SHA512

                        f64a9f10099e9cc009160ead27a6c6420a78a7265ffeb754fc3819f418bc02ccea0be2c3b24dd9849b90a7423e850ae4fb5253958ccd5cc92867e094508da837

                      • C:\refhostperf\serverperf.exe

                        Filesize

                        1.2MB

                        MD5

                        7fec3eebd710313f7b35254d792228fc

                        SHA1

                        e55a429782c6f78e6fc8c80d6fb71a85ce1d01aa

                        SHA256

                        3d32ef71bff87e2ac881484cea6b82bd52090a7252c8719f11fb73bb8f63a405

                        SHA512

                        83932d7ac29af18c3a0f1424d2cd3e2a1810e908c828377f5c0d6e72240820c3778378c9c3f0c7b86ca94a8265d9c7c0e2b9460de288f07b62c98cd89d699af4

                      • memory/2212-80-0x00000000012B0000-0x00000000013E6000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2560-47-0x0000000000950000-0x0000000000A86000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2872-61-0x0000000001210000-0x0000000001346000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2900-13-0x00000000011B0000-0x00000000012E6000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2900-14-0x0000000000150000-0x000000000016C000-memory.dmp

                        Filesize

                        112KB

                      • memory/2900-16-0x0000000000390000-0x000000000039E000-memory.dmp

                        Filesize

                        56KB

                      • memory/2900-15-0x0000000000170000-0x0000000000186000-memory.dmp

                        Filesize

                        88KB

                      • memory/2940-54-0x0000000000F90000-0x00000000010C6000-memory.dmp

                        Filesize

                        1.2MB