Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 03:32

General

  • Target

    f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe

  • Size

    2.2MB

  • MD5

    7fb943a550881e7c59acdbba1164cbfd

  • SHA1

    ed5bb95d080cbcc5fafaaa0949fdcdfaece4dabe

  • SHA256

    f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510

  • SHA512

    a4b7e40e07f1d5b24fd2bec828c433d984087ee22478f11da9a2ab4bfb42c3c4609e3d24ba19e8fd0239bfffa532c6e4526d6ff9eb7e3a3d1788cb3e5f6e66fc

  • SSDEEP

    49152:K31tZUmbFNH1wLJDPqTo9lIS/MXU2F4/1l5eQ7K6:KltZUE6NDyTo9lv2F+VvK6

Malware Config

Signatures

  • DcRat 38 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 12 IoCs
  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • System policy modification 1 TTPs 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe
    "C:\Users\Admin\AppData\Local\Temp\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe"
    1⤵
    • DcRat
    • Modifies WinLogon for persistence
    • UAC bypass
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:432
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HtiEmsSKVk.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:2940
        • C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe
          "C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3020
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eca11220-2652-4d0c-9709-56a7601d3d7f.vbs"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:236
            • C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe
              C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe
              5⤵
              • UAC bypass
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2336
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a1216965-7938-4990-90c9-600508e144ba.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2624
                • C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe
                  C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe
                  7⤵
                  • UAC bypass
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:2036
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5a71b615-7413-492e-a5f8-bd7f3443c9a3.vbs"
                    8⤵
                      PID:2292
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\20d0e0d0-8b35-41c6-9cdb-9b5c481e1dc6.vbs"
                      8⤵
                        PID:2976
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ea53c429-b540-4c63-9056-87af927fddc6.vbs"
                    6⤵
                      PID:984
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e4768ce1-5837-4df0-bcb7-7ac036702c1d.vbs"
                  4⤵
                    PID:2120
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3056
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2928
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2732
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Windows\de-DE\dwm.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2704
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\de-DE\dwm.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2752
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Windows\de-DE\dwm.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2288
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Journal\services.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2012
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\services.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2396
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Journal\services.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1036
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Music\spoolsv.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3000
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Admin\Music\spoolsv.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:3024
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Music\spoolsv.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2588
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Documents\taskhost.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:872
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\All Users\Documents\taskhost.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1120
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Documents\taskhost.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:816
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510f" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Favorites\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2988
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510" /sc ONLOGON /tr "'C:\Users\Public\Favorites\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1208
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510f" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Favorites\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2984
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\de-DE\explorer.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1628
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\de-DE\explorer.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1984
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Mail\de-DE\explorer.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1920
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsass.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1908
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsass.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2660
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsass.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2208
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\System.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2536
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\System.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1224
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\System.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1996
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Templates\csrss.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:592
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Templates\csrss.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2436
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Templates\csrss.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1624
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510f" /sc MINUTE /mo 7 /tr "'C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:2336
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510" /sc ONLOGON /tr "'C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:676
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510f" /sc MINUTE /mo 9 /tr "'C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1056
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Recorded TV\Sample Media\lsm.exe'" /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1100
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Public\Recorded TV\Sample Media\lsm.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1968
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Recorded TV\Sample Media\lsm.exe'" /rl HIGHEST /f
              1⤵
              • DcRat
              • Process spawned unexpected child process
              • Scheduled Task/Job: Scheduled Task
              PID:1888

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\System.exe

              Filesize

              2.2MB

              MD5

              423f2febda25478c15d061acdb430fd8

              SHA1

              42ed3de9f2ba8b98aeaf669ab1b2c9d705ec6eb7

              SHA256

              1f8c8cd1ec50ab8e740ca3cb71a8fe64a8463f824371e29afb711177248363e8

              SHA512

              9b98baf4a33fb702539be1499f025f1261644f17930692d439ba139878d48b8de524eb3f4d0ee09af719ea7f0775fb912b9ffe885ef0bad68c8e1100f0a5b21b

            • C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\lsass.exe

              Filesize

              2.2MB

              MD5

              4a6bafa82a23cf364290eeb66a420320

              SHA1

              a60150dff5c69a8b526d61cf51904252a1dc7f1c

              SHA256

              ff764432e23f38e155c2f11e69c9c2ce45bb5db18c9f960d83f113ef8504e522

              SHA512

              5b7aafcba48d256f1097c20a4e55cb651c3964458bcac7b35df33f053e71907d0a56b81a797d9500640572cbb8ed28b1e55b0253d9d3a4572dca8b7867d6f0c2

            • C:\Users\Admin\AppData\Local\Temp\5a71b615-7413-492e-a5f8-bd7f3443c9a3.vbs

              Filesize

              765B

              MD5

              6c588745468e91409b1cd5be17b51ef3

              SHA1

              72c46682105958510152c2cf64f25299efa69f96

              SHA256

              221626fe69a6dd1baa107de3b9e37b28ab35a53827c7dd1ae94c436c02ae8faa

              SHA512

              0699cd60aac6c20cf60d7fdb7d312e02aada8ad25b8e2397dda7d31d4faea6e1da8fa98350a49d8c78309a5113cb7392a0e9c65301abc6e88d9caacb24f5a9d9

            • C:\Users\Admin\AppData\Local\Temp\HtiEmsSKVk.bat

              Filesize

              254B

              MD5

              ae88f1c6e3886eb3ac1ed55e7a36f3ef

              SHA1

              49fa481748d7c6d1ad5cf64f5ef206e90c019c8f

              SHA256

              43f814a5a51c72eec0063b0ea48e230e505df5e55f3e88938eb2043605144566

              SHA512

              93fe036742cf91317253c21cddb252e8dd0f3b513492552f940c7435440fd3c4c11d07306dd5a00ebc609f4884d0769376f61bf191f077d92643f8c0d73eb874

            • C:\Users\Admin\AppData\Local\Temp\a1216965-7938-4990-90c9-600508e144ba.vbs

              Filesize

              765B

              MD5

              133c074402151b3fd7517d35216e29ef

              SHA1

              7cb8ee0fde0169dce23be28f6fe994359b5bb8f4

              SHA256

              dfcb8ce0eae388a4d743c60b982421dc8b25ba5d906604d43aaaa0cdbaf7cd83

              SHA512

              decfc8aefd319186e96ce74dc72743b98ffe88c4bf97d6be45dbaab395d25bd6d772d94de58009a4901764592ff0d0dff0f66bee364844b7680b55ff77f9cb2d

            • C:\Users\Admin\AppData\Local\Temp\e4768ce1-5837-4df0-bcb7-7ac036702c1d.vbs

              Filesize

              541B

              MD5

              b6bb0d8102e1caf4f3459f47b5030c4c

              SHA1

              790a45ceea5a88d1bcf05b007132b807b438aa1d

              SHA256

              e861f2bd024b31c9652b2333ce03c777ef297ddae023c2d42888df45a87cac85

              SHA512

              14d1fb5f244e76ca299d7b4a3096017b7de28cb8c0e9bdfedabbcdefe98c13a39b7576eee80916def8efde75ada91d191f651b3c08c793d2ba55df121092a9db

            • C:\Users\Admin\AppData\Local\Temp\eca11220-2652-4d0c-9709-56a7601d3d7f.vbs

              Filesize

              765B

              MD5

              e474735dcee47c689c4a732e8496be5d

              SHA1

              d41faeef373b2e0322e8f7cea19fb3cc06cd6b92

              SHA256

              e1d861ec29ac33fb85e686541b1717c2a0e7ececf19e6454581a17cd863655a4

              SHA512

              92e1b5374b16775721c331f4cb68e9fc7d064c3368f8e90e0b387332cbc6791a1aa0ea3eb7a464b49f301ab3bc9ffadc35c0ba8a26e88e049114188eb5e9cf21

            • C:\Users\Public\Documents\taskhost.exe

              Filesize

              2.2MB

              MD5

              7fb943a550881e7c59acdbba1164cbfd

              SHA1

              ed5bb95d080cbcc5fafaaa0949fdcdfaece4dabe

              SHA256

              f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510

              SHA512

              a4b7e40e07f1d5b24fd2bec828c433d984087ee22478f11da9a2ab4bfb42c3c4609e3d24ba19e8fd0239bfffa532c6e4526d6ff9eb7e3a3d1788cb3e5f6e66fc

            • C:\Windows\Logs\DISM\f62010b7a1b10bb8cc3bcdfa7e4c96e4acc5e792d670916e0fd7372288a28510.exe

              Filesize

              2.2MB

              MD5

              f5855c0d31d22bfe8c13ce9e79f3eb1e

              SHA1

              fc6b0bc11b24465d599e35e1d260d4c5c739c4a4

              SHA256

              c245430eef823acf84f042649f248ebdfac00ed0bd3d530b1002bbfab331f75e

              SHA512

              604e967b82df23eb5384030ee2752469ee09a055202436228092da2746bc86d894e4905a6752a919bf8ef1eee1054bc24665db9fca9999442e8240982a1d8cd5

            • memory/432-25-0x0000000002410000-0x000000000241E000-memory.dmp

              Filesize

              56KB

            • memory/432-29-0x000007FEF65A0000-0x000007FEF6F8C000-memory.dmp

              Filesize

              9.9MB

            • memory/432-11-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB

            • memory/432-12-0x00000000004E0000-0x00000000004EA000-memory.dmp

              Filesize

              40KB

            • memory/432-13-0x00000000004F0000-0x00000000004FC000-memory.dmp

              Filesize

              48KB

            • memory/432-14-0x0000000000510000-0x0000000000518000-memory.dmp

              Filesize

              32KB

            • memory/432-15-0x0000000000520000-0x000000000052C000-memory.dmp

              Filesize

              48KB

            • memory/432-16-0x00000000006B0000-0x00000000006B8000-memory.dmp

              Filesize

              32KB

            • memory/432-18-0x00000000006C0000-0x00000000006D2000-memory.dmp

              Filesize

              72KB

            • memory/432-19-0x0000000000C20000-0x0000000000C2C000-memory.dmp

              Filesize

              48KB

            • memory/432-20-0x0000000000C30000-0x0000000000C3C000-memory.dmp

              Filesize

              48KB

            • memory/432-21-0x0000000000CC0000-0x0000000000CCC000-memory.dmp

              Filesize

              48KB

            • memory/432-22-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

              Filesize

              40KB

            • memory/432-23-0x0000000000CE0000-0x0000000000CEE000-memory.dmp

              Filesize

              56KB

            • memory/432-24-0x0000000000CF0000-0x0000000000CF8000-memory.dmp

              Filesize

              32KB

            • memory/432-0-0x000007FEF65A3000-0x000007FEF65A4000-memory.dmp

              Filesize

              4KB

            • memory/432-26-0x000000001A930000-0x000000001A93C000-memory.dmp

              Filesize

              48KB

            • memory/432-28-0x000000001A950000-0x000000001A95C000-memory.dmp

              Filesize

              48KB

            • memory/432-27-0x000000001A940000-0x000000001A948000-memory.dmp

              Filesize

              32KB

            • memory/432-10-0x00000000004D0000-0x00000000004D8000-memory.dmp

              Filesize

              32KB

            • memory/432-32-0x000007FEF65A0000-0x000007FEF6F8C000-memory.dmp

              Filesize

              9.9MB

            • memory/432-9-0x00000000004C0000-0x00000000004CC000-memory.dmp

              Filesize

              48KB

            • memory/432-84-0x000007FEF65A3000-0x000007FEF65A4000-memory.dmp

              Filesize

              4KB

            • memory/432-133-0x000007FEF65A0000-0x000007FEF6F8C000-memory.dmp

              Filesize

              9.9MB

            • memory/432-8-0x00000000004A0000-0x00000000004B6000-memory.dmp

              Filesize

              88KB

            • memory/432-7-0x0000000000490000-0x00000000004A0000-memory.dmp

              Filesize

              64KB

            • memory/432-6-0x0000000000480000-0x0000000000488000-memory.dmp

              Filesize

              32KB

            • memory/432-191-0x000007FEF65A0000-0x000007FEF6F8C000-memory.dmp

              Filesize

              9.9MB

            • memory/432-209-0x000007FEF65A0000-0x000007FEF6F8C000-memory.dmp

              Filesize

              9.9MB

            • memory/432-5-0x0000000000460000-0x000000000047C000-memory.dmp

              Filesize

              112KB

            • memory/432-211-0x000007FEF65A0000-0x000007FEF6F8C000-memory.dmp

              Filesize

              9.9MB

            • memory/432-1-0x0000000000D00000-0x0000000000F2E000-memory.dmp

              Filesize

              2.2MB

            • memory/432-2-0x000007FEF65A0000-0x000007FEF6F8C000-memory.dmp

              Filesize

              9.9MB

            • memory/432-4-0x00000000002D0000-0x00000000002DE000-memory.dmp

              Filesize

              56KB

            • memory/432-3-0x00000000002C0000-0x00000000002CE000-memory.dmp

              Filesize

              56KB

            • memory/2036-238-0x0000000000370000-0x000000000059E000-memory.dmp

              Filesize

              2.2MB

            • memory/2336-226-0x0000000000140000-0x000000000036E000-memory.dmp

              Filesize

              2.2MB

            • memory/3020-215-0x0000000002120000-0x0000000002132000-memory.dmp

              Filesize

              72KB

            • memory/3020-214-0x00000000009C0000-0x0000000000BEE000-memory.dmp

              Filesize

              2.2MB