Analysis

  • max time kernel
    144s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 16:43

General

  • Target

    b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe

  • Size

    1.3MB

  • MD5

    8bb337eba353818e44fd5f985e1a8d3c

  • SHA1

    875a05913d56539e42df069163dfe4ea003c07e5

  • SHA256

    b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7

  • SHA512

    19f4598127a3c6c11a13565ccc557f0a58f593abb14b3647e0ab04fa6cf08ee26ca792d3f8c8e68b2e723236862e86c306d03b170458e5526436900771bec530

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe
    "C:\Users\Admin\AppData\Local\Temp\b76ed77d0f8ed9d268e61fd39a135d04a29d7ebbc52a5efc14a22440261bfae7.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:792
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:568
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1696
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1976
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\System.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1672
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3052
          • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
            "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3048
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZgKlNS7JdR.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2564
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:2868
                • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                  "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1228
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SQTB2Yz9K3.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1928
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:1752
                      • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                        "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2860
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VF9LbKHiRa.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1920
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:2444
                            • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                              "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                              11⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1216
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rZY5mW9Lj2.bat"
                                12⤵
                                  PID:2572
                                  • C:\Windows\system32\w32tm.exe
                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    13⤵
                                      PID:2016
                                    • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                                      "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                                      13⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1204
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\djCrJd6RmA.bat"
                                        14⤵
                                          PID:1692
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            15⤵
                                              PID:2196
                                            • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                                              "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                                              15⤵
                                              • Executes dropped EXE
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2544
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat"
                                                16⤵
                                                  PID:2408
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    17⤵
                                                      PID:2552
                                                    • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                                                      "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                                                      17⤵
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2052
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LdHmevWlG3.bat"
                                                        18⤵
                                                          PID:2720
                                                          • C:\Windows\system32\w32tm.exe
                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                            19⤵
                                                              PID:3052
                                                            • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                                                              "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                                                              19⤵
                                                              • Executes dropped EXE
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1208
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7ouYA2TrKB.bat"
                                                                20⤵
                                                                  PID:1852
                                                                  • C:\Windows\system32\w32tm.exe
                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                    21⤵
                                                                      PID:2224
                                                                    • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                                                                      "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                                                                      21⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2388
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\onYrHPGvDe.bat"
                                                                        22⤵
                                                                          PID:2072
                                                                          • C:\Windows\system32\w32tm.exe
                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                            23⤵
                                                                              PID:296
                                                                            • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                                                                              "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                                                                              23⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:856
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\R8iYvsD9nO.bat"
                                                                                24⤵
                                                                                  PID:2304
                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                    25⤵
                                                                                      PID:1800
                                                                                    • C:\Program Files (x86)\Internet Explorer\spoolsv.exe
                                                                                      "C:\Program Files (x86)\Internet Explorer\spoolsv.exe"
                                                                                      25⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2924
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2496
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1524
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Internet Explorer\spoolsv.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1600
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1060
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2280
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2848
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2952
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1788
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1164
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\providercommon\System.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2872
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\providercommon\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2896
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\providercommon\System.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1772
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2648
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2844
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Recovery\1f4ba082-69f6-11ef-a143-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2616
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1420
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:980
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\cmd.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:320

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      1ffe88899e17bf51d02d5ec0712f984c

                                      SHA1

                                      4441ff47bb2b2a1b70096b9ce58de380444653f6

                                      SHA256

                                      19ab1327ab41adfe006ade2811d5f91e4384fe563db7c456dd11435ad02800bc

                                      SHA512

                                      036c4554007485850ea1e997fbd04c33da5b95231b1bd3a9be5abaa90c451dc412874949230be8d6f649104ec53356a0aaeb26c42b9690d8e8ca64a4f39d6673

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      daa7cc05d7e4a40dc6d6fd0149ea021f

                                      SHA1

                                      d51c42ac8affba1895dd395ed1bded1355fcbd16

                                      SHA256

                                      6002ee34c9df3ecb38bc73a4df52804d85d858572e751dd6788e6c7a4e2efe15

                                      SHA512

                                      1d8c3e8b2bdb8a7bd643b64bab3ab85832cb1ea352056d6d7861278255a9c2e6dd25cfe2cc1ecea7b30ee12cdcd3346d7cc58849c67dc98a6a80fd2545feee76

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      35a96045837ac063c869335c05bf6d90

                                      SHA1

                                      58b967c49a52681f46a9a8ea9884a0ca9614f740

                                      SHA256

                                      84896e6e4c10458c65ae865312ffbd3a32bb8a62140f67bb124b4a5abd7aeafb

                                      SHA512

                                      00681cd3182c889ada350b2c37707c75acc18799d6b4d263ff54ad37edeb1b934ed661e0abd4e7c4706d414b83c2f8da6e307d8daaa1ce1b354c69f28eea98f3

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      6cdb8fb4b868ee0a38ad75af50a86c8e

                                      SHA1

                                      8e7528fedfbf0f00f48fdf8a19498d56b4519867

                                      SHA256

                                      a33f97a4dd416b0c0997734ba7075c249dc5d86f351275b0009c1be6f8099bd0

                                      SHA512

                                      eea2a3691394f3fad860a98f0ac3d46f9c7395fa50ecfc51422f507c428a5acbdc8de7e8d65940a58b15b355baa3985a1c9cd71d5f1db6a7d85018c641ffca2c

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      9ac388cae874e79d1d35da7e62c1cc1a

                                      SHA1

                                      ea775377ce3755ae3a58a73709c7fa950ddc3fec

                                      SHA256

                                      9543d210c243de57eb3a5ba934d3efa213cc3eaca1e3beb533e91e409b663cf9

                                      SHA512

                                      b03f7c8faafda153b11a4fec834a34134cf6be3c7f189bacedc678e79f3f56bbd459a876476c538cd18437a34c38063bc570fc9ca93827d4b6971e784944fb23

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      758b89f42e3ac5b00f5038acec3b4224

                                      SHA1

                                      7a4ccadfe36f910cfaa5cd15c661b2fcdc84264e

                                      SHA256

                                      109d929afefffc661c8bcd2252f03024aea16942f320eb2e500ade7bde419a12

                                      SHA512

                                      db1c1fc65ab283d240bac8981b480d9f79ddedf09516c236e7ca54d670d7ebd55de1df080385e68a9f9f201bb30b9fe270459fca8ba0a50389d17c76a1258376

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      a0b88b0d29545e99c1ff6ffe0cd178d8

                                      SHA1

                                      df99bef4d28d3631084199b4a9f27fa14f9e04d1

                                      SHA256

                                      62de60f91fc00fc6d9bcedffaa0f14e306b56564a65d9f3cccd4b631cf3ba217

                                      SHA512

                                      5cd27d026cb78a70add2e0d1f80bac56aa4071eb7537f41bd758ec5114c5185cb40ac138637fe2815711fed198d1693b21f087f336e293d8a5d2982a72a5dbef

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      9d2a7cfca9094872b5679d26f5fb797e

                                      SHA1

                                      282b2835abb6b688016fbe5927cfaa41dbe2cd72

                                      SHA256

                                      86ecaaa9af8573c88b3de3914d5fb8ae8fe47e4cb5ec6dc21aaa553bea8fda21

                                      SHA512

                                      360d2c03fad0abdd13d93090ef88d4199cd0b5c3bad9d9ec20daebab3b85bb00c46af890ba0678f438522960d66a3f66ea8d7b86a4b933badf96f30ba2b7e2a7

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      b1bcbf4d7d9c78d1f343c06beae662e1

                                      SHA1

                                      83c07a7b067e10030c1ee07f511c3a80ac2f2225

                                      SHA256

                                      7f148af816ca8bc201e5419d236db58ea1b092cba7dd0483360ae6815c5afdf7

                                      SHA512

                                      8a2bbb5bc928a9c66d1c60a1a1f9fa4681fb4198da2de1ba3b6f9c0113a651205920a82ede4478ec5b04b650b4220ab7c3d18d49d8cf8aa4cb3f1b5d1b8cfebb

                                    • C:\Users\Admin\AppData\Local\Temp\7ouYA2TrKB.bat

                                      Filesize

                                      217B

                                      MD5

                                      80d63cbfe49420987e227256c0c6e869

                                      SHA1

                                      2dc250488913114583d66f8a2c6e7f4bcc8cf9f0

                                      SHA256

                                      3215be7c29827f782d606f03e08d4ec7a9fb97a886cbaa817cff3f4a1a4b247a

                                      SHA512

                                      cb073b9e2a16c228dd37adbf8d4300d618e897329494c9861c9fb30d0b2d465bf65c589f0858360110127ecb3e68bd5d694b9e85f62801246556239cba33d093

                                    • C:\Users\Admin\AppData\Local\Temp\Cab82E8.tmp

                                      Filesize

                                      70KB

                                      MD5

                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                      SHA1

                                      1723be06719828dda65ad804298d0431f6aff976

                                      SHA256

                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                      SHA512

                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                    • C:\Users\Admin\AppData\Local\Temp\LdHmevWlG3.bat

                                      Filesize

                                      217B

                                      MD5

                                      86be5fbeb1b85f05413993ef0fc49183

                                      SHA1

                                      99b9cabec18293e4e5a9853239cd92256c65ad90

                                      SHA256

                                      994ab3b5e8f08f7d2f6a21af0c9b12bc94d21b651280343f283e91e05bcd9068

                                      SHA512

                                      04b62e8715f560cff314612606f10ce484da8922b2ea5cfc098c705fd2a4096365e678eb4a5de88005d21d54922137cc161d2a1484b8728b79b24f3b1f1e4f07

                                    • C:\Users\Admin\AppData\Local\Temp\R8iYvsD9nO.bat

                                      Filesize

                                      217B

                                      MD5

                                      9bd2db25cc4354050a16d0b513f1d2df

                                      SHA1

                                      f66d2765c20c82b5dcf8351fb9f00c9b58ca4558

                                      SHA256

                                      d36a9f33785b937955fff467f162da3b476b0204295598819a7e8bf8a7dd2ef8

                                      SHA512

                                      866c62e82ba6a9bf8cd6cc18bfe8bc82f86af27ceb876d39e01111a95ca14a59793bcf7672f0e5f4f0db06349ee25a8979bb9c60576c99adb57a26e43b421235

                                    • C:\Users\Admin\AppData\Local\Temp\SQTB2Yz9K3.bat

                                      Filesize

                                      217B

                                      MD5

                                      933c851bdfd340308005b2ea39c90f7c

                                      SHA1

                                      67453d27a3e90b599c0046fc74033a87b66a8361

                                      SHA256

                                      fb2727ab5864b60157f584f0f04595f86b9f33e8760dd3ab6b586568eb8b1758

                                      SHA512

                                      13e8c9c3f2b085963d48617e3aa4d885ccfe3d6c32e3994bc299819d12e206c13584f4fa3ba629bd3e28af3202cef621815c80cbcf040f14f43903d45131d0d8

                                    • C:\Users\Admin\AppData\Local\Temp\Tar82FA.tmp

                                      Filesize

                                      181KB

                                      MD5

                                      4ea6026cf93ec6338144661bf1202cd1

                                      SHA1

                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                      SHA256

                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                      SHA512

                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                    • C:\Users\Admin\AppData\Local\Temp\VF9LbKHiRa.bat

                                      Filesize

                                      217B

                                      MD5

                                      584809d28c62b4be72184c518945563f

                                      SHA1

                                      b5e8914a548f72ce961e481269558519e86eba35

                                      SHA256

                                      3a5628d928e076bb834abb94e5611ba338d566e6a9de5e5b348c80b6f83ebe96

                                      SHA512

                                      272b8b069e6c73ce2924e04b4a0f7c6a9d324998bc5034aaeb0aae1f2dd3e0278b95886a155b0049a65322a6905f7295c26f5847f4939aefb87a3e2c8a4d5e0f

                                    • C:\Users\Admin\AppData\Local\Temp\ZgKlNS7JdR.bat

                                      Filesize

                                      217B

                                      MD5

                                      5929ea9c42c18eb66b82c1682392c7af

                                      SHA1

                                      a745d1e74726d620aaf6ebc1738247c7d271b35d

                                      SHA256

                                      a4a013871796a73f6bf88705e4b4aa37a77e19469b022604427b3fb072234445

                                      SHA512

                                      3fafdd99ea4cc1878deebfcc7c9c3e1497808b2b25e780b3848f7d4b80f18579822b682a7f00ea2ffe56f1d1f30c4ba32ebe70c47c8df887a43bfeadabdbb621

                                    • C:\Users\Admin\AppData\Local\Temp\djCrJd6RmA.bat

                                      Filesize

                                      217B

                                      MD5

                                      ef8a26620ea117db66f5d1e691be821b

                                      SHA1

                                      58e76159913d5d047fdd47a1d84ef29e07eeb978

                                      SHA256

                                      5fcb3f45a4946d910e11f24b51cb2b9b74970e93358c12d45b75ae8d490e7bfb

                                      SHA512

                                      38e4c7317aeb110bc8a7d26add7aa5bfa95417177280fe95b102ba094259048e47c650c5786dc47e41431be5abc118418813a6052e23e0e37c35fb337f28413d

                                    • C:\Users\Admin\AppData\Local\Temp\onYrHPGvDe.bat

                                      Filesize

                                      217B

                                      MD5

                                      9786923ffa6fe977eb6184c18bda8907

                                      SHA1

                                      5832c387f9df79ff58f26790453d1702f29c0b06

                                      SHA256

                                      4e7baec802572e5bb6aacc62667796e045654659aad3371c93dd1f8d76237f3e

                                      SHA512

                                      af42a49dfb58cc8885e6e83b8d4e6bbb925447e687ed9ab0c3f87ad79a53920b4edb6cb00b1c582bab7aed6605091607ee596c3c7ee0fecb3da299ac461868c3

                                    • C:\Users\Admin\AppData\Local\Temp\qUPyb5cGVE.bat

                                      Filesize

                                      217B

                                      MD5

                                      f665f3b6d4ea86dc8d7eaf821154315a

                                      SHA1

                                      36c77378025c4ef9a612dec96554518da6e839fd

                                      SHA256

                                      31c48f54ae3036b956a8869ced21e32fc380d1227e1afefe1c3abd79692b7918

                                      SHA512

                                      88a9c47a63870f0c3c5451fbaf82da5434579c0762b5b0f5357574e7f716cca0af72e5412e1f01961aa667af5c5c684eec20d1a94f756093a5e20393bd18a339

                                    • C:\Users\Admin\AppData\Local\Temp\rZY5mW9Lj2.bat

                                      Filesize

                                      217B

                                      MD5

                                      856e84119acc6912a889c9061d88792b

                                      SHA1

                                      f35aebcdddf766b1ac1d9c6dcbd86912ed909697

                                      SHA256

                                      6b2acd304516ad49cfc30fe178efc1180d64bc02ef1c57ef6f9a2c8b9c8fea6a

                                      SHA512

                                      049eff9a97ffaee30fe7d4b3d72e7f90916fa5f867a4cb8e4e863ff87e3094d49100384f2d2b7e828321349ed1c4b4f6ada8f0ba2cb3e22a7a396fda938e77a6

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                      Filesize

                                      7KB

                                      MD5

                                      8b894f5565ac0ceaecb3d83096a53259

                                      SHA1

                                      9d5e3b24d2493aa569341a2ade21db763cb31cf3

                                      SHA256

                                      0c57ade14b19a48147c42ef3679a0674c4c8e2ff9c1f7fca2a84267fec2dc284

                                      SHA512

                                      260bc40d4aa8400ac23b9f8ab2e2c36097320211c8700ce9b8aa26cc2608163e1f6ff066707c989a103e77224178d80b5315d8b761faad6d60996de20c510d5b

                                    • C:\providercommon\1zu9dW.bat

                                      Filesize

                                      36B

                                      MD5

                                      6783c3ee07c7d151ceac57f1f9c8bed7

                                      SHA1

                                      17468f98f95bf504cc1f83c49e49a78526b3ea03

                                      SHA256

                                      8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                      SHA512

                                      c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                    • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                      Filesize

                                      197B

                                      MD5

                                      8088241160261560a02c84025d107592

                                      SHA1

                                      083121f7027557570994c9fc211df61730455bb5

                                      SHA256

                                      2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                      SHA512

                                      20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                    • \providercommon\DllCommonsvc.exe

                                      Filesize

                                      1.0MB

                                      MD5

                                      bd31e94b4143c4ce49c17d3af46bcad0

                                      SHA1

                                      f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                      SHA256

                                      b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                      SHA512

                                      f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                    • memory/856-609-0x0000000000330000-0x0000000000440000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/1204-310-0x0000000000D60000-0x0000000000E70000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/1216-250-0x00000000000D0000-0x00000000001E0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/1976-56-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/1976-72-0x00000000026F0000-0x00000000026F8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2052-430-0x0000000000EE0000-0x0000000000FF0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2388-549-0x0000000001350000-0x0000000001460000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2544-370-0x00000000002B0000-0x00000000002C2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2664-16-0x0000000000360000-0x000000000036C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2664-15-0x0000000000370000-0x000000000037C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2664-14-0x0000000000340000-0x0000000000352000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2664-13-0x00000000001C0000-0x00000000002D0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2664-17-0x0000000000380000-0x000000000038C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2924-669-0x0000000000870000-0x0000000000980000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2924-670-0x0000000000430000-0x0000000000442000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/3048-36-0x0000000000D90000-0x0000000000EA0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/3048-73-0x0000000000870000-0x0000000000882000-memory.dmp

                                      Filesize

                                      72KB