Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 00:07

General

  • Target

    JaffaCakes118_18ac1c4924f35cf9b5349e210e0e47a206c27994e2a3cccd063f876f72eafcff.exe

  • Size

    1.3MB

  • MD5

    0db792a42740e2dc51a63167d9cee57e

  • SHA1

    e89f11f83347d119f8c317106f8e30a489792883

  • SHA256

    18ac1c4924f35cf9b5349e210e0e47a206c27994e2a3cccd063f876f72eafcff

  • SHA512

    23d47d2b53146a867ce9883f4ef4ebe1fcefa6ac372747dad5e0eba8a56ff8bb6e6b891d8e2ddfd06b216b5be3b2a6cfe82639218620fde74dae944e8b2f6c2a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 21 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_18ac1c4924f35cf9b5349e210e0e47a206c27994e2a3cccd063f876f72eafcff.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_18ac1c4924f35cf9b5349e210e0e47a206c27994e2a3cccd063f876f72eafcff.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1080
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\jdk1.7.0_80\db\OSPPSVC.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1620
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2452
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1912
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1896
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2192
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Java\jre7\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2200
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Cursors\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2160
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kslCLW7FWY.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1960
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:1684
              • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2892
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Urxb3wPgb0.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1204
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:1060
                    • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                      "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1748
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Iu2jWrKESR.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:812
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:888
                          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2076
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wKGJ2NUoAL.bat"
                              11⤵
                                PID:2028
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  12⤵
                                    PID:3000
                                  • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                                    "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1468
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XBBOHPKclM.bat"
                                      13⤵
                                        PID:2992
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          14⤵
                                            PID:2948
                                          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                                            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                                            14⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2816
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yvohz7Nokj.bat"
                                              15⤵
                                                PID:1052
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  16⤵
                                                    PID:1632
                                                  • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                                                    "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                                                    16⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1936
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IycQG8Pfyu.bat"
                                                      17⤵
                                                        PID:780
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          18⤵
                                                            PID:368
                                                          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                                                            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                                                            18⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2808
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WtQmBjXbDh.bat"
                                                              19⤵
                                                                PID:1596
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  20⤵
                                                                    PID:1612
                                                                  • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                                                                    "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                                                                    20⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2184
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\l7tVtcAquU.bat"
                                                                      21⤵
                                                                        PID:2056
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          22⤵
                                                                            PID:2668
                                                                          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe
                                                                            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe"
                                                                            22⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2828
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AKY6NrPTox.bat"
                                                                              23⤵
                                                                                PID:2232
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  24⤵
                                                                                    PID:2396
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jdk1.7.0_80\db\OSPPSVC.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2548
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.7.0_80\db\OSPPSVC.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1068
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jdk1.7.0_80\db\OSPPSVC.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2472
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1600
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3040
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2932
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\providercommon\cmd.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:964
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2704
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 8 /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2936
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2260
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1440
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\spoolsv.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2812
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1640
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2224
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\sppsvc.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2980
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files\Java\jre7\services.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:524
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Java\jre7\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:568
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jre7\services.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1556
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Windows\Cursors\csrss.exe'" /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2384
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Cursors\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2216
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Windows\Cursors\csrss.exe'" /rl HIGHEST /f
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2064

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      d2c3e3a9ead2ab59dacadf669ad9b166

                                      SHA1

                                      ddd13b1d8889457da206d29f615b4531f399b430

                                      SHA256

                                      e4f1824cfafdd781484145b7f4100c3a58642d30136f52d35cf22cc1c416a976

                                      SHA512

                                      1dafaf7a40d93502a00c3fa19837552e3e02e16766bbec775bdccc27c0147e85a6709747c707b4b49bc9117d0f26cd406bdbf0d7060e05ba3af2463d3aa407b8

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      63a86222da4aaca81dbfffc146a27c0b

                                      SHA1

                                      8e69412a93810b27689bf5160b6de094f009c055

                                      SHA256

                                      4c95482c08fa78fbd8cb5554686f841bfb5de431adbdd5c567c86126291cd8be

                                      SHA512

                                      6bde1289c3a5455f2cbfd343524af3e60f29bf52f8acbbee65d5b4a59fc2a73d4deb44024d4e6ebcbd4c5ec426a3867eca62c922d1972661b709e4147446569a

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      1767c817b7763b6f348c1ff714a627eb

                                      SHA1

                                      2ee8b0b8c7b1b0fb1bb76a813696be3218e91f0e

                                      SHA256

                                      a6c168bc99df82f3da18a12a66e1bfda5c450eab699ce977945ab074659cb2f6

                                      SHA512

                                      b8aa662b7b2a75669be612cf6eea68800a41636aff6768c4f57b12034f520d4df9401ee6addd6238ddd68230aeb280d02e2aceb027ee1ee74db351c91de2b30e

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      6b479f963ef6f41ed9c0e9c5d3222b85

                                      SHA1

                                      a29af42ae869ae569138b7a97b1334c1da8fbeb0

                                      SHA256

                                      29489f165d9ebd1f2b7ed87e1a4a0d93febf1ca4718669618cdc22b9ebbef070

                                      SHA512

                                      2dc270f554b98067d581339a22b3f4ed5f43c295b6786fe0a3c2b7d4326ad82e12be4b3dd1bad5b3290b6b799b3990da42dc34c33d0c8197366e5bab8091adf3

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      e298737dab82ce8807956115f5e16bad

                                      SHA1

                                      fa9df0991a74deed51869b1390b88cc86bef9ca1

                                      SHA256

                                      50e03414af06206516956d7288896ff6117583be57a2aafb9938789fab95ef55

                                      SHA512

                                      0f980b208c073304e72070ceea83d24df6ae3a7f8f6c10f0210a60f46defb85ad09e64362f7646dc7bd90a33af0c812af5619fe7eab7f36d8e27c1f05220a77e

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      55f0b7b62674209f32d78227e36a6a20

                                      SHA1

                                      5f5d39ab55e620dbff2a2b3418f8bf799a7813d1

                                      SHA256

                                      22bcd335593999bdad2fdc615dc0b5c949e78a7ee4ffd33ef5758619bf5bb523

                                      SHA512

                                      8fcc8580dd384042e7b0612b202d24dca71eaafbe60070bc92f2830b45ca401588886ab2ed34997d41bf7bdcc5a7c1a83b339ff7636ee34db802b466058bd8c7

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      e816d2f2fb213147e38cea7ac97fd05d

                                      SHA1

                                      5f92999b41d42f378e616d2715c6a597a079db8a

                                      SHA256

                                      ceb9f1779122059feb0b359d9ca3085594c1b8cd56080c7f946bbbb2414772c6

                                      SHA512

                                      a6a8cb74cd2bf9c321c9c303a3a11675075ad3c6719836e43e45f1f6c11cbdfc287e7a61e0168c34ca7d9f3aae937171d079356bb3df40c8f22ba924c5ef138e

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                      Filesize

                                      342B

                                      MD5

                                      0a2702073fd10bb791276c59087255eb

                                      SHA1

                                      d25ddabd1a267ed0a65890fd52ceb459a102a2dd

                                      SHA256

                                      7da8e2adc04a845296f60459bf5658fecec480b192f02810501bb7144ccde68d

                                      SHA512

                                      77b2b14d5b03cf327716f539ba1465f1b04274f7b3b770b7951031162b091bd02b8481b7ddd7265c761610ad05b9c4f474117148fa14de2c4404c952b6f8dac8

                                    • C:\Users\Admin\AppData\Local\Temp\AKY6NrPTox.bat

                                      Filesize

                                      235B

                                      MD5

                                      4095f381508cb9ad64c2e2c5b3bdc4db

                                      SHA1

                                      b38cae88decc805e070178ebb10fcc74742b8e8b

                                      SHA256

                                      67a1c1f60817630dbee1d77ddde3cba9b5b3cee4a5bb35be41c01b11fbeab58c

                                      SHA512

                                      0bcc806908cfec09509e3df98275c2364271692a573aefb4a4071a67a7e48fcb9397f2fa96eee90ff1af46b1915462bdd744e053308ca381d850c60e77690da2

                                    • C:\Users\Admin\AppData\Local\Temp\Cab957E.tmp

                                      Filesize

                                      70KB

                                      MD5

                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                      SHA1

                                      1723be06719828dda65ad804298d0431f6aff976

                                      SHA256

                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                      SHA512

                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                    • C:\Users\Admin\AppData\Local\Temp\Iu2jWrKESR.bat

                                      Filesize

                                      235B

                                      MD5

                                      1cd33067c49c6e5d2b10eb66b73f60f1

                                      SHA1

                                      1c72e00a8b072281a06aa7df4303adbd0fa11e7c

                                      SHA256

                                      e15c4835af4134d6747e40582d09bfa78d1987aa2e2cd839bed7fdb26f0b6e6d

                                      SHA512

                                      ae73b019b3ae1150f296f78bd05afed583e1214066ce25fbcfe21ef816f1fb70271a57b97f95f02a25ea522c85d5e125846b506f67446744f3038f2c2b3c251c

                                    • C:\Users\Admin\AppData\Local\Temp\IycQG8Pfyu.bat

                                      Filesize

                                      235B

                                      MD5

                                      1cc1c1c65950df2be5aec7863324fe7c

                                      SHA1

                                      b30145cd78c255763bc229fe2f6466b2dd2cf7e7

                                      SHA256

                                      e14eabe089474a308dd3602de0c4bf2b52a47fe76375a3724513f625ca118bc8

                                      SHA512

                                      1995404047d2e0f96936f0add20e9ea828b6256a7a3c0a5c9ff1ba677a10fe0460df5c7562937ea765309f7f62383ab37bc40e3ac428d3e7c90c3b48ccbe18f8

                                    • C:\Users\Admin\AppData\Local\Temp\Tar95A0.tmp

                                      Filesize

                                      181KB

                                      MD5

                                      4ea6026cf93ec6338144661bf1202cd1

                                      SHA1

                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                      SHA256

                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                      SHA512

                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                    • C:\Users\Admin\AppData\Local\Temp\Urxb3wPgb0.bat

                                      Filesize

                                      235B

                                      MD5

                                      7bfe2320eeece864fc75624c06d8f0c0

                                      SHA1

                                      14e472f4fe29bc6be51a9882991949cff13d6063

                                      SHA256

                                      8319a7995eea47321e651d5b280b43e5484f8ea8ec6641c82d4280df2e54dabe

                                      SHA512

                                      2656f3acf535837a659314c7047df615888036f45644831702dc7c2e63aa2afbb804380fb9187198026524f2a5609c2f1d179437a42410fc6c142dc2e861c2fa

                                    • C:\Users\Admin\AppData\Local\Temp\WtQmBjXbDh.bat

                                      Filesize

                                      235B

                                      MD5

                                      627fe3f02f986e63ebdb663c5ca5d021

                                      SHA1

                                      5b99fa3f960e6b6117901c56292d67000b5762eb

                                      SHA256

                                      86e6252acb534c7ed831fdf7a4d1bdf3d2032136fa915bcecaea729620c332a0

                                      SHA512

                                      e60b4089178e093b762e87e0945f3113f1295958527ab4a831eb2e453303c4b09b13e8bbc42f5e826c4acb4cbd9e0e3baf6dfba76ca25fd2f6af546ac66a771c

                                    • C:\Users\Admin\AppData\Local\Temp\XBBOHPKclM.bat

                                      Filesize

                                      235B

                                      MD5

                                      b110fd86d3e277cd25b3d24b1b2ed8f2

                                      SHA1

                                      0f31435051207a7a2b1f1136a81b02981137f039

                                      SHA256

                                      8346309ac545d77bc4a7d2ad5829cadfd1196585bbc490fa20a7f8ecac03a278

                                      SHA512

                                      fbbc0fd0fe8ccabc7dc69c626630eefd6b5d910d491ce5b4a81c84821bd864f46bb1139b49ff1fbc5008395f30d07755b8cb104a08d720bc58077123ccbbb3e0

                                    • C:\Users\Admin\AppData\Local\Temp\Yvohz7Nokj.bat

                                      Filesize

                                      235B

                                      MD5

                                      afedd878a8a2ab4e0f9d7687f20e4f12

                                      SHA1

                                      a65883e3267908c5dd09af0dd0f2f762b3c8992a

                                      SHA256

                                      83b598fa4a223dcaee40549ed2352fa84de39aeae8dce4f3f71ebd6ddf602da1

                                      SHA512

                                      0d437f7967eac0e65511b6f20fb44f4232c85a62b3592e0caee5c5815dfdaa180c4b635025ce90b9ad3f86736e9a2b2a603bf4f9686a6d6b18332005771bef10

                                    • C:\Users\Admin\AppData\Local\Temp\kslCLW7FWY.bat

                                      Filesize

                                      235B

                                      MD5

                                      e548f13edd20b5d52d0aedc7d9c18d01

                                      SHA1

                                      ba08cc1cb2acb71d710afc50041341ef8052c91e

                                      SHA256

                                      72050287e8c517fa1ccff1f1b9278764b245a48ffd258ce253ae2166ca48efd9

                                      SHA512

                                      f3fa45d7362c9e2ed893be7657ed8ca8fb49505e6d0a8aa2c6c8625261a29d7f973169a4001ce88b9bc8ca9ca02b2c8a01e2efa2add919210caf66b95ecedbdc

                                    • C:\Users\Admin\AppData\Local\Temp\l7tVtcAquU.bat

                                      Filesize

                                      235B

                                      MD5

                                      b011148d54e444a0a03293adc877ebed

                                      SHA1

                                      4edb47a6233d899bb157d553a221bbf8766c75c0

                                      SHA256

                                      0ad169498702e2eb00e433e2d136605351ae26a757cef62b14aadd0d34be32f3

                                      SHA512

                                      12ee4d13de511b942286fe738d7ac27a012016f6cfeae07bf8ee3b0ff77b83fcddb00fc5afe79f34ed5aba365811d39c6719d40d08bd187defb6cb89290943f3

                                    • C:\Users\Admin\AppData\Local\Temp\wKGJ2NUoAL.bat

                                      Filesize

                                      235B

                                      MD5

                                      3cd33c596000a53c3680d340ae3ae203

                                      SHA1

                                      224957d0258711ec9bca1eaec6b1d11469a3185f

                                      SHA256

                                      dcf047717b8ce793d2775540a56bd4a64bab928880072943a288a6c6f0bec6e5

                                      SHA512

                                      0646e6b622e21b45bb0cd3728d79185debe2894146350cfe88afd6241b4719673edb0f4e100615240decbbe93e3b47faa6125257f257fbca4bf696385a6cb79e

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                      Filesize

                                      7KB

                                      MD5

                                      95d87434c6fdb1c60b4b7b49f4156d67

                                      SHA1

                                      ca33f481d32cb898cc2c7fde77e2e60bb8f25647

                                      SHA256

                                      a10cdc185785158c2d92d2fc7cb02afd597ac0bda93bf1845af8335d9f35f21f

                                      SHA512

                                      32bffc843f5d9956b87efb28df914a6f1474ed8e0dff1973fc96ab8be9fc93d991d88fd620bbb92a6f142e22752d9b484d66b09f3a8df306ec6f66e0bc3c1335

                                    • C:\providercommon\1zu9dW.bat

                                      Filesize

                                      36B

                                      MD5

                                      6783c3ee07c7d151ceac57f1f9c8bed7

                                      SHA1

                                      17468f98f95bf504cc1f83c49e49a78526b3ea03

                                      SHA256

                                      8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                      SHA512

                                      c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                    • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                      Filesize

                                      197B

                                      MD5

                                      8088241160261560a02c84025d107592

                                      SHA1

                                      083121f7027557570994c9fc211df61730455bb5

                                      SHA256

                                      2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                      SHA512

                                      20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                    • \providercommon\DllCommonsvc.exe

                                      Filesize

                                      1.0MB

                                      MD5

                                      bd31e94b4143c4ce49c17d3af46bcad0

                                      SHA1

                                      f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                      SHA256

                                      b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                      SHA512

                                      f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                    • memory/1748-127-0x0000000000150000-0x0000000000260000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2076-187-0x0000000001220000-0x0000000001330000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2200-54-0x000000001B370000-0x000000001B652000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/2200-55-0x0000000001F30000-0x0000000001F38000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2660-15-0x0000000000350000-0x000000000035C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2660-14-0x0000000000340000-0x0000000000352000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2660-16-0x0000000000360000-0x000000000036C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2660-13-0x0000000000890000-0x00000000009A0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2660-17-0x0000000000370000-0x000000000037C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/2808-424-0x0000000000150000-0x0000000000162000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2828-543-0x00000000002B0000-0x00000000003C0000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/2892-68-0x0000000001330000-0x0000000001440000-memory.dmp

                                      Filesize

                                      1.1MB