Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1653s
  • max time network
    1557s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2024, 16:38

General

  • Target

    XBinderOutput(1).exe

  • Size

    607KB

  • MD5

    19d31479381cfda2c9878b427f51a0c2

  • SHA1

    5b8774c60b71dd32e7325d0fbceb3434975ca7cc

  • SHA256

    e3b4620b85709a793de2b777da764d094f9a6dc19ead0a7fcad953c1fb3e8550

  • SHA512

    14ce10c974af40f5ab3e93f3bb3ff5ada22a8c2245bf45f40be0a59a75bcd9bfb2bf2288416744a2cebb93b3eb487ba070670d553ea87ca8c0e566c727bf28a2

  • SSDEEP

    12288:DikJ/Wmo/J594F3o472LiJgSifSdq/UByol53uFb/V4YUWpcZm83:TJ/+z4F3osuiKoqsyol54bWYUK

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Process spawned unexpected child process 43 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 4 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 64 IoCs
  • Manipulates Digital Signatures 4 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 36 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 52 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Modifies termsrv.dll 1 TTPs 1 IoCs

    Commonly used to allow simultaneous RDP sessions.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XBinderOutput(1).exe
    "C:\Users\Admin\AppData\Local\Temp\XBinderOutput(1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\kendalcp.exe
      "C:\Users\Admin\AppData\Local\Temp\kendalcp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\blocksavesperfMonitorDll\R7uOS4kiQeNNM8oo5bGADNHtfWe.vbe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\blocksavesperfMonitorDll\SAymW4LctOmWulF1E6221.bat" "
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\blocksavesperfMonitorDll\reviewDll.exe
            "C:\blocksavesperfMonitorDll\reviewDll.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2564
            • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\spoolsv.exe
              "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\spoolsv.exe"
              6⤵
              • Modifies WinLogon for persistence
              • Drops file in Drivers directory
              • Manipulates Digital Signatures
              • Boot or Logon Autostart Execution: Print Processors
              • Deletes itself
              • Executes dropped EXE
              • Indicator Removal: Clear Windows Event Logs
              • Drops desktop.ini file(s)
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Modifies termsrv.dll
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2000
              • C:\Windows\system32\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\QLJ4q7S46F.bat" "
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1056
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  8⤵
                    PID:2112
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\explorer.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2880
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2656
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Esl\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3020
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:620
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2648
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2540
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\wininit.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:328
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Common Files\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:600
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Common Files\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1380
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\es-ES\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\es-ES\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:680
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\es-ES\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:872
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\dwm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1012
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1416
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:588
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1956
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2356
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Google\Update\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2024
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2248
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\Update\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2364
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Windows\AppCompat\Programs\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1004
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\AppCompat\Programs\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2044
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Windows\AppCompat\Programs\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1084
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows NT\Accessories\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2160
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1452
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\Accessories\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:840
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\audiodg.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1988
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2520
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 9 /tr "'C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:908
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1324
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2500
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1824
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows NT\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1776
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows NT\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1312
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "reviewDllr" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\reviewDll.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "reviewDll" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\reviewDll.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1196
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "reviewDllr" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\reviewDll.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:760
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {B449CD01-0B1B-4130-B9F5-9443F95B1742} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]
      1⤵
        PID:1248
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /delete /tn "spoolsv" /f
        1⤵
        • Process spawned unexpected child process
        PID:3016
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /delete /tn "spoolsvs" /f
        1⤵
        • Process spawned unexpected child process
        PID:1808
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /delete /tn "spoolsv" /f
        1⤵
        • Process spawned unexpected child process
        PID:1380
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /delete /tn "spoolsvs" /f
        1⤵
        • Process spawned unexpected child process
        PID:2540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\f3b6ecef712a24

        Filesize

        449B

        MD5

        ba025e78cea131b7af8ffeb52ffee200

        SHA1

        582a10773f338d95c2cf22fc47313e13f77fa100

        SHA256

        1f2bf4a33737ed3f05ef82e2c73ed0b546e0f57da286a31df6a29d26b7153a3f

        SHA512

        bc096e931b64242c2f4e4b266c3494078b1494f83c8440fb87adaddae837a680dc9ca8fd8e52b7fc170ed7416660b19e34eb86265398fe0eddd0e2ac66a79104

      • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\05124c6dd8237f

        Filesize

        342B

        MD5

        996b009cbcdbc9d479d3d245a4520640

        SHA1

        b3ac6c880b235bffa67913217a3b867898db0e43

        SHA256

        26111f50cd109f821e37e11ace52ead48e29676ba6f52750510d8cdecb7b6602

        SHA512

        65b9bd451cf84a8329e8382978fad75ff2f8bd4ec3b292715229ef3aa584dc1897e422e76df6209eba3b7ff1279f0300a63eeb7067e9fae21e0ce8fdf9030f2b

      • C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7a0fd90576e088

        Filesize

        950B

        MD5

        c00ef3ed9381ad811e2e5dd94ebb6a5b

        SHA1

        c177c627db76e196d1fe107507418c761e9f60e2

        SHA256

        654df55c3a9ad04db94e73980ab12d65fd24bde68c7c0d01a9f9dcc524cd3a7e

        SHA512

        adba0862c084954675be37d54fd5eb070f467a01bdf2fcb55d2695814bbecdb422019aebc37de75880c3298d7f184bc4856f6a0f491f12e7e4aea01dea7ae049

      • C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\6cb0b6c459d5d3

        Filesize

        126B

        MD5

        85140f9a132b7a0787357c3586a7417f

        SHA1

        fa0f4b69e259ca87a7d174397e287e7ba3c0c955

        SHA256

        8a89400a8a08950c7256090476d935897f56d55f2c4860f65130485ecda55f23

        SHA512

        d344865f98b2812ae3de12eb16ce566a3cd72af7ce7789b06c6b2c5fa8b4cacc9fccc8b1a5f93e150235d2fcde3c3f48908fcb4e9ef93b1f8c0c597752945d94

      • C:\Program Files (x86)\Google\Update\6ccacd8608530f

        Filesize

        613B

        MD5

        28dfef6693d65042f5e2338bf91d98f0

        SHA1

        82aa03c14ae46f9c45ca427f3aeda40828cdbbaf

        SHA256

        62d2bd08a5ddb5afc6451d15a1ec0831a86291e1cc68b7e45af472bdfbfbc27f

        SHA512

        7fb9d45a46103b6d2e836f0009835c02e5eb546c916219f8352e72c5cee4a152e7db1b5a86805a1d8fc640fce4d732694dc47e676d571fb5e368b398d99aebd7

      • C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6ccacd8608530f

        Filesize

        31B

        MD5

        21da6a3dcd4ed5cfdb7f903beca787c0

        SHA1

        6676ad9d2cbefd097bf4e403afac18efb24cdf5b

        SHA256

        d5f36b545046df25014134fa17d4b38c649ccd4fc70aacac08cbfc71c43cf030

        SHA512

        536adeb318166beeadde04f017ac270178558c479ebef9beb389dad59d3496989d1ddb18b8ffc2a7288a28c56f9c2b130f2cb6ba395d8f442c75fa0b06c5a6cd

      • C:\Program Files (x86)\Windows NT\5940a34987c991

        Filesize

        339B

        MD5

        9b73328d8450dd2f2547fb9a7da89100

        SHA1

        592b498d97e2028ad3757f948def08aac86488ad

        SHA256

        5fef504d1981536ad1f0290a18cfb76d376048a101e343c8ea8fa3b3c742abc5

        SHA512

        fe08074819e67dfaa758482270d75ed0a53982da8d60eccc609ea7c54733151472d2229569ff688a948988a7edb068b44b731a9009815c5ed6ab029da8395b1b

      • C:\Program Files\Common Files\56085415360792

        Filesize

        205B

        MD5

        59a824c12caf16ccc97c9fb6d0740332

        SHA1

        dfdbe03ab65af813867f398a89833ecf240fcaf8

        SHA256

        ca75f6d81834f6102adefbbc12a2efce61e43d87f15f5441d97fa7648492fb3e

        SHA512

        71301f0116f7a1677a680b4d45379703b32cb993557eaeda765c2724dad2e996a135b455d7f046db5d8ed08d96a47c9b8d9d5243ecf687a558969ced59c73ee4

      • C:\Program Files\Uninstall Information\5940a34987c991

        Filesize

        150B

        MD5

        974a310d5d96cab4eca2b5550bebcd2b

        SHA1

        28e2ba6b9a3b4ae28bed037e0aa799cf4c340928

        SHA256

        de03a3dde8183f217b1b21e1020c778b66227301c963381ae69a42393e5b4216

        SHA512

        215fd6220e4454515beacacc14cc1563b9d2648985963a02072535f51a7e8f9a15bcae376e21f100d81ac1716b07fac4f4dae8647ae7620650e994e35797c10f

      • C:\Program Files\Windows NT\Accessories\886983d96e3d3e

        Filesize

        32B

        MD5

        6df8f96dd421082c8427ba4279461fd1

        SHA1

        ea297358f312320315667074d999b392e381305c

        SHA256

        160694735204506dfb2e9b0ec79ab47a8995cd745a66defc3fb5d5c9e07bb000

        SHA512

        11980c79f292410af9d5b95ace3169d1ece53a299437e130731e394bcd32a771cf40dc1f985f3e9a631ed657cb786e1371cf725246fc423aedf6fd90dffa4199

      • C:\Program Files\Windows Sidebar\es-ES\f3b6ecef712a24

        Filesize

        433B

        MD5

        c7719b30d7e60c8ea3e86cf89396cf13

        SHA1

        38994c9c896e0316acf40de950aa04953d047c69

        SHA256

        c9b70b1696ef092eb1596c47f1472c1c9917328ce52ae7555c33a9578f45243a

        SHA512

        837b8f73f65109f1b7e2a7cf11e8079f309287a76ed562bf493b715d7ffb07cf9bac3ebf5e8df986ebdf7af7b6ee36d107ddbd99721bc5e504bfe0c5dd54c173

      • C:\Recovery\209d6542-69f6-11ef-b491-62cb582c238c\42af1c969fbb7b

        Filesize

        845B

        MD5

        7f26bbc270c17663e93f7e628723bf9e

        SHA1

        64435ad9cd85371f818be6b40a660a98667afcf7

        SHA256

        0b3c250232add398e4af8d525cb957943d34624dd455ccc2d5139eb14740331c

        SHA512

        15779da5749d0c8c1dbfe120d667526cb5885eaaa7ee1a48d35b3e7693972edd207c18886821ffc58a780379dc53a182821fca8356910ac00f48c15098c5275e

      • C:\Users\Admin\AppData\Local\Temp\QLJ4q7S46F.bat

        Filesize

        355B

        MD5

        9778900948d870e5dd70cb516b1b9747

        SHA1

        6fb620237c43522b21128f2a195bbbaaaaa5c037

        SHA256

        f5e4e92da4bfecea8634273c7dab692f68306eacbdde93bcc067568e30d6c232

        SHA512

        1e6e670b3644e3246d1a75c54108c5f5d0f1c8176946ff0894cc5f2df56b55e2352ea60bbbbb2f2383b46785ff0ee3b30dd94130d6eaa8d8216ec901abde3ea9

      • C:\Users\Admin\AppData\Local\Temp\kendalcp.exe

        Filesize

        1.1MB

        MD5

        0d015cc111d53a019e680b0bed11fcad

        SHA1

        3b3fb6eeba0c2ba286a4db5e850697399ccb5e36

        SHA256

        2b7365d9634016b0483009225b959692c290a6b17fad133e42434dc89fdf4150

        SHA512

        c3a7ea551d0151033dde83a3dda1042e8fe26702c84da2b630ecffb739aecb654730bb5f7ec8914189f72ca7d0ecf1352f0ca7effa938bc1d6f0ae56c3358eab

      • C:\Windows\AppCompat\Programs\5940a34987c991

        Filesize

        833B

        MD5

        aa96ffdb8fd70a9949dd8df95ac63b57

        SHA1

        6418f73a243ee1c8945669682190786d5c4da9c8

        SHA256

        a26379d44e218188d48968a45383ecbfa0fda3d31de3327bc484ebd5442265f9

        SHA512

        1b5bdb9afdc6657fd9bbb22fe74136b7aaaffd747e1a2f21caa9d71ef040821f45dab07c6d49777edc668201f7bdfb7fd5feb7a8a13fe9d3e4ba7e2efc846599

      • C:\blocksavesperfMonitorDll\R7uOS4kiQeNNM8oo5bGADNHtfWe.vbe

        Filesize

        222B

        MD5

        a6f295a2e58c722b5935cc905e81fd8b

        SHA1

        a2a30408197320a639e3e2f18a57fc8578c97b58

        SHA256

        8bcebca170fc0768cb1afb63f1350d63c3a295b26ca04602e07ec43498b9691c

        SHA512

        839605d7eadcdc470dd4edd117cedd976cb9f36bf0a636d08afecc6378adadf0fccb80beb44de849b6dfec814845cef8ca83ca171b39c1f6d90d55485bd06635

      • C:\blocksavesperfMonitorDll\SAymW4LctOmWulF1E6221.bat

        Filesize

        43B

        MD5

        7c582abd8874b9cc60df72d62bd86440

        SHA1

        564e7b01338d08f657f2c02fa8fc5b8dadb92331

        SHA256

        c5e95b783c6ec1b98a40edf8663370c678de43e9b657e09ca1f054618277b329

        SHA512

        444cf67666329ea359e221560a229990013af07d1ed074b2406e903c7ee04cf279953ad0726a96c2ca875216da68369dfdde00f905adf1de9ed93b8582bf8828

      • C:\blocksavesperfMonitorDll\reviewDll.exe

        Filesize

        828KB

        MD5

        d9dac9e1d95e84e6aec084cf2ddb3f3a

        SHA1

        a231a41c7ad994879b15116dcea41fdc09bb5879

        SHA256

        0fbeb71fb1dfe793eace5ed167f035a8f4bcc6b56d0930b6b97481f2b222b1d5

        SHA512

        c4aa115de6f61c7311e8654d40537cd1ce08f0fb7efd0a225a42e06ad000ed420ba905e5cc26a19cb56af951ee1441aa257c073c47911a72fff733c0db1c2f9a

      • memory/2000-55-0x00000000003B0000-0x0000000000486000-memory.dmp

        Filesize

        856KB

      • memory/2188-0-0x000007FEF5173000-0x000007FEF5174000-memory.dmp

        Filesize

        4KB

      • memory/2188-7-0x000007FEF5170000-0x000007FEF5B5C000-memory.dmp

        Filesize

        9.9MB

      • memory/2188-1-0x0000000000130000-0x00000000001CE000-memory.dmp

        Filesize

        632KB

      • memory/2564-22-0x0000000001040000-0x0000000001116000-memory.dmp

        Filesize

        856KB