Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 18:50 UTC

General

  • Target

    JaffaCakes118_0a391e004942f1c430354872ee059c7691476e07a27ff017aecadc2e1f639ac2.exe

  • Size

    1.3MB

  • MD5

    b372992b3eb60f47235583e06889bb24

  • SHA1

    e0fd86a13d82337cf3f6f3da1c7dba54367c395c

  • SHA256

    0a391e004942f1c430354872ee059c7691476e07a27ff017aecadc2e1f639ac2

  • SHA512

    51fa6d56412735148348c358eceedba2cf5e013468d5e35f09cc1fa0680482655ddfeeef0659a52dd1d157f81f4729047cbeebf390ea27d2ebf352988b9b3bf1

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a391e004942f1c430354872ee059c7691476e07a27ff017aecadc2e1f639ac2.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a391e004942f1c430354872ee059c7691476e07a27ff017aecadc2e1f639ac2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2344
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2564
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2572
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2580
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\42CEn0iP2b.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2232
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:1236
              • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1764
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cV1vwDPsky.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1204
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:1564
                    • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                      "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1676
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ww4YVzclJm.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2516
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:2928
                          • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                            "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2792
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Pbn0SniZDX.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1316
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:1700
                                • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                  "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                  12⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:752
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\F8wGhM86rN.bat"
                                    13⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:1928
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      14⤵
                                        PID:1860
                                      • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                        "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                        14⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1324
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KteTxDTZHh.bat"
                                          15⤵
                                            PID:1576
                                            • C:\Windows\system32\w32tm.exe
                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                              16⤵
                                                PID:2528
                                              • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                16⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2376
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\I1IMKnnpZ2.bat"
                                                  17⤵
                                                    PID:2940
                                                    • C:\Windows\system32\w32tm.exe
                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                      18⤵
                                                        PID:1744
                                                      • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                        "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                        18⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3028
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CPhDZIwY3l.bat"
                                                          19⤵
                                                            PID:2364
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              20⤵
                                                                PID:1136
                                                              • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                                "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                                20⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1340
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YpMZYQImRp.bat"
                                                                  21⤵
                                                                    PID:1864
                                                                    • C:\Windows\system32\w32tm.exe
                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                      22⤵
                                                                        PID:540
                                                                      • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                                        "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                                        22⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2900
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UxOjVeUiuv.bat"
                                                                          23⤵
                                                                            PID:2248
                                                                            • C:\Windows\system32\w32tm.exe
                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                              24⤵
                                                                                PID:2616
                                                                              • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                                                "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                                                24⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:684
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kRqsvBC5Qb.bat"
                                                                                  25⤵
                                                                                    PID:2736
                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                      26⤵
                                                                                        PID:1456
                                                                                      • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                                                        "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                                                        26⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1688
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Bf5uratM3O.bat"
                                                                                          27⤵
                                                                                            PID:956
                                                                                            • C:\Windows\system32\w32tm.exe
                                                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                              28⤵
                                                                                                PID:828
                                                                                              • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                                                                "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                                                                28⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:908
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9BpIS9nw5f.bat"
                                                                                                  29⤵
                                                                                                    PID:2492
                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                      30⤵
                                                                                                        PID:2976
                                                                                                      • C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe
                                                                                                        "C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe"
                                                                                                        30⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2468
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\winlogon.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2684
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2428
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\winlogon.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2676
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3040
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1916
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\Idle.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2604

                                            Network

                                            • flag-us
                                              DNS
                                              raw.githubusercontent.com
                                              Idle.exe
                                              Remote address:
                                              8.8.8.8:53
                                              Request
                                              raw.githubusercontent.com
                                              IN A
                                              Response
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.109.133
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.111.133
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.108.133
                                              raw.githubusercontent.com
                                              IN A
                                              185.199.110.133
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              799 B
                                              4.4kB
                                              10
                                              12
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              741 B
                                              4.1kB
                                              9
                                              10
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              793 B
                                              4.2kB
                                              10
                                              11
                                            • 185.199.109.133:443
                                              raw.githubusercontent.com
                                              tls
                                              Idle.exe
                                              793 B
                                              4.2kB
                                              10
                                              10
                                            • 8.8.8.8:53
                                              raw.githubusercontent.com
                                              dns
                                              Idle.exe
                                              71 B
                                              135 B
                                              1
                                              1

                                              DNS Request

                                              raw.githubusercontent.com

                                              DNS Response

                                              185.199.109.133
                                              185.199.111.133
                                              185.199.108.133
                                              185.199.110.133

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              789c9c718343002078b5e106ee09a32e

                                              SHA1

                                              e27b515f1e914fd12b8f4a053cee27ff658a36ca

                                              SHA256

                                              c4eaa52ab71c8233cec4545753fd30b85d25afdc494c4e7677e401234f31b07c

                                              SHA512

                                              d30a918ddeb734583e2d10b8b9017ea408524fadc2ca4cab2d7c072581ea591258343f53781de7db3b3562a3f17d96ec307326297147484fc8621b832b98c0a7

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              ee573eaa4dab0cc1aeabe98ae6de98d0

                                              SHA1

                                              45124e7b43150dc6b7748ac8b1441d85037aa53c

                                              SHA256

                                              906e54877cd36904f820c613eb11a002a5fb9a1e4fbb100d2a2517731c44450d

                                              SHA512

                                              eccb401648e378348f08f9558337ebf05c408a39b1041f85d0bb89c9bd3c4665e7d30109295e7e72c9dcc82efac92b2e6c5e0725d5893b74869b25eaa2443929

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              99aae4ec4ea14f9c9c8add982823cafe

                                              SHA1

                                              28d49c12fd6a9e9044034fc793f741b213aa7832

                                              SHA256

                                              d4d33a596ec06256242f6f358d1268d21acf43ac342c265810b20cbc7bfb53ac

                                              SHA512

                                              628b8e67447e7f6a0abaec5e2d4d34d6e4c287c792e06c193df8849566fc89f1043039f4a59e1ec57efcf64f31dd4cd4aed23229a4a19e55bc4a14f0a7cb318d

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              0f706e94208b00e8db8bdb284d612fa5

                                              SHA1

                                              b7659636b18f9f0a08e8c733f7f8d7f182fd73d5

                                              SHA256

                                              2fad21aedb5c2b2e5074eb069a84e3993f01da95a2e621f6315a1f035feba7eb

                                              SHA512

                                              a7c53ce9a5812bd548d1eefe5a3adc1b00c40f59c13929d58563530da1b58d93cba42e537d006baeb6b64de4044a67f68c15ac68a615d76497744dc246f8c040

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              841efc070cdeb858d1ed86a032b6b1fc

                                              SHA1

                                              f2ff07563752f4c4c079a813f455cc2df6e1004d

                                              SHA256

                                              a44abf33cda264e29b853838abea41f9e3507353a1b2ea3235c228d02fd4eec0

                                              SHA512

                                              24eef42ba409ddddae3c5c73447e0005e59e7077b6eda987ce4f39f8491dcc5eeb8e6707e3102eaef768fba4be93ab4e2bef9000828ea33566a09eda753182e2

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              e11a1f10b0bbcb178a30e84b84b0d338

                                              SHA1

                                              4598513235afea8d7a5b0dadabf1b44cdd545e0e

                                              SHA256

                                              eacaffb13711fe142ad8f2a7533528572184a983622d0667750297333ec832f2

                                              SHA512

                                              d988d150a08c6df1ff9d5bf3a1dd598495e686a5cc0e1995411674bbca9935808dabf8e38e86a133eee642b85b4fceae97f7f25e35cf477576e24967e43833a7

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              8abb9459ae283cee92765b532e1caff3

                                              SHA1

                                              18f5441447dd1284197b999d1fd3969f86d6ba08

                                              SHA256

                                              08f4511e43a71522d97db882ecf0c6aadfb72849b72e3016af276432f38409e7

                                              SHA512

                                              a36b1f5594fe903edde364df6050836996118bc8bbf3801f2c9cfce3899130f63a73fb4988c96d21b6929954b9d7778ec918d899465500aa03ebfa8b37614316

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              33f0b0c9cd16717dc3fdfeff7e8df366

                                              SHA1

                                              29b1faa3a6cfc77abbdc6b4613d8e630d892384d

                                              SHA256

                                              788f126f97fc7f0c3d448af92f5f76e38603ff115d36a298d06cba96771ebc11

                                              SHA512

                                              3aa64bd07feb7506a99abe2864d194a6c0e55f8bf8d120077e5f11c53135b7cde412be6ac33d4ac096fce8cb45ec48215fdca9b8b9b1aae426c29e55eb58d190

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              4fa25041891209ae55be35ffc98621ee

                                              SHA1

                                              b6d9c70be36b142435b3adf262451802417c5ad8

                                              SHA256

                                              fc5dcc6183dac9a712406080d6f3e18d5f636764429fd6243e3415b8500b15c6

                                              SHA512

                                              c16713213f8375a9b23b882a77f973d7179dc12a7122b8d02594269c9e80f9e6d72248bae10c3d58c27c566b7089ee466631d5b678ec03273514533a4f8a8867

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              9d5a34915535f45fdc7cb6b64d57b0cd

                                              SHA1

                                              f9c142d5e4bae8b8f8cec9e322c06d87b2dbb28b

                                              SHA256

                                              74b2a4f83c6d6489be2cf444bc14754b49cd187a81b426e8ea4b034c4d9c184e

                                              SHA512

                                              15bb63525740a2d7dfedb0d83e4207ee0ada6334a1f7b966a2e2b4f5258505635d66f93748e398d5da27478e4633b9add1cd1ec3c243e15829555307a5990ac2

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              c079c1ab6ff2520d620195707c75c55e

                                              SHA1

                                              5cd315e6eff60f4f9a9d87748444259d72762cb2

                                              SHA256

                                              d6b531f906f9a61616ca639e9012ed6ba37216e6f35bf67e94216ce21ceb7ef9

                                              SHA512

                                              9fd71a9ea067c81513a7f4f04b7c5bed2a25297c352774101a8cca99cbdace2d1f79562952616bedb257c04024b6b17e746b14f17020713b594e6cd4c40be2e6

                                            • C:\Users\Admin\AppData\Local\Temp\42CEn0iP2b.bat

                                              Filesize

                                              222B

                                              MD5

                                              826a0d307173da31e9da90b5980ba459

                                              SHA1

                                              ee16e6e1973a48b59d346d7ea9c3a54ea6f92fea

                                              SHA256

                                              f7f9cf4120befbf04116fe7bbc1d7c1094b6d29c081140d3c8e1a482d122140e

                                              SHA512

                                              d3d50739dee8a8ad2a5ea68897a5759b541d6044afe8cf6d04210b6b39f55af74c46e1a2220b4be23b068ae0403b7fe5ccce2919affb96870538a62b270bfb32

                                            • C:\Users\Admin\AppData\Local\Temp\9BpIS9nw5f.bat

                                              Filesize

                                              222B

                                              MD5

                                              46f42915bb634ecacbfb764182ffce50

                                              SHA1

                                              bc42d6dd4a396f0c40153923bb3db518f421c102

                                              SHA256

                                              47999d0fe30c22866c58fff1f2563e7b6365f6e202f56a174f0a728ef69b8cc9

                                              SHA512

                                              068ad3a2a9c5b733e688b3758c3925d015d0af54cd4f193ccf9b7527c85884775a63e90e46634d267b0733a9b51097ea57ba23a87f32aa8735d784801b8d4464

                                            • C:\Users\Admin\AppData\Local\Temp\Bf5uratM3O.bat

                                              Filesize

                                              222B

                                              MD5

                                              a8179d6bda253e2b98bdf57fa586b675

                                              SHA1

                                              9c1961e64755cbe282c3546e34502e80925b9eec

                                              SHA256

                                              364b0bd935ec8d1d509c14abc935a096f00b17895bcb2308c62d78fe0df74e1d

                                              SHA512

                                              552ec3d6dd21e3303b494b5128f64c78b33594e27c5944aae79c6e8e57ea13a8d8a33c035e5075d34a5939d882bb9f3ea33bd383c3d6581a6b7a0803d477f003

                                            • C:\Users\Admin\AppData\Local\Temp\CPhDZIwY3l.bat

                                              Filesize

                                              222B

                                              MD5

                                              1354ca715a780516a810a6371402e269

                                              SHA1

                                              9bedbf713cd9cff6b42c7c7b7315b90deaf96de9

                                              SHA256

                                              722653c93b8cf4fc2d2b8da0e3322f3ee3827caf1b5b6953c50627efd181ee4c

                                              SHA512

                                              a13db941764d89b339a6af1c149a1b5da0638f39d1a808b51ad9a658412819f990fed0113af3de16cae204adf0e25fb7ea64d5d076e89284e3c34420ec2af3ed

                                            • C:\Users\Admin\AppData\Local\Temp\Cab724.tmp

                                              Filesize

                                              70KB

                                              MD5

                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                              SHA1

                                              1723be06719828dda65ad804298d0431f6aff976

                                              SHA256

                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                              SHA512

                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                            • C:\Users\Admin\AppData\Local\Temp\F8wGhM86rN.bat

                                              Filesize

                                              222B

                                              MD5

                                              92c251197074cd20b764235b81e6aedd

                                              SHA1

                                              65b7431df3bae191da55e3a5cb571d3524a3d0f8

                                              SHA256

                                              bf7fe3e905d03aeaf744c81f5ac30fcd62224361b07185338e0bdb4d2eb2cbb4

                                              SHA512

                                              7a67083641e47a1e89c6027cb28ef41b01590dd8914caad31add7f0b5af10605a0545b67cc053086a2c01a201af5a42c14d06c9d49def33a29f3440a1d05cc3c

                                            • C:\Users\Admin\AppData\Local\Temp\I1IMKnnpZ2.bat

                                              Filesize

                                              222B

                                              MD5

                                              016af17d8cb89da8378266ac59f5ec2a

                                              SHA1

                                              e16491627b27bef876e4d9e87e134d5370ed4973

                                              SHA256

                                              8e466fc8aa7c39af1c3a05101d2c17f54c2e4b061614ea1d9203043f723c73e7

                                              SHA512

                                              7bd3e6022cb517b44ab867e7a6ffb9a895d9dc268e1a762a907e947e551f396ee87d85b8785a4c796ce6314e0af87ddac07a99f456304dbe8043189e9279d1e7

                                            • C:\Users\Admin\AppData\Local\Temp\KteTxDTZHh.bat

                                              Filesize

                                              222B

                                              MD5

                                              f8362d695d10890bba66e7a3f99b1372

                                              SHA1

                                              669671744c72497b69e05b0426f30199fc7f859f

                                              SHA256

                                              18e9ad98f73cd25943036e2728e5358e4b4064058b75dfe7d0eccfdfa919c76c

                                              SHA512

                                              138ed6e553043703c16dfbdd297f05a0ce324403b349243dc9cb4fb820d0a02bf83ea65533f9e85551af89b775fba781e7891b6a2b35ccfad67100d242fcbfaf

                                            • C:\Users\Admin\AppData\Local\Temp\Pbn0SniZDX.bat

                                              Filesize

                                              222B

                                              MD5

                                              a5cfbeca8967f55d5cbe7ae007b6ef6d

                                              SHA1

                                              92100b517688202434407bcc393c1f23c4ea588f

                                              SHA256

                                              27c101b5363d8e6993255f603d8dc44625382b30f1dda30bd1acf47e4915fbbd

                                              SHA512

                                              c62edb2dc04ee262b112e20bf57a0d94449c0b22ca425ca7e82a65bbb95122d6754d1201c7ebcbdca3e3f20ce6be413b081af6736bb60beadb4f46cf7944ae63

                                            • C:\Users\Admin\AppData\Local\Temp\Tar746.tmp

                                              Filesize

                                              181KB

                                              MD5

                                              4ea6026cf93ec6338144661bf1202cd1

                                              SHA1

                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                              SHA256

                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                              SHA512

                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                            • C:\Users\Admin\AppData\Local\Temp\UxOjVeUiuv.bat

                                              Filesize

                                              222B

                                              MD5

                                              dc4f582085222f4632321e2d2dc7e067

                                              SHA1

                                              62cef2bd7c525ec096b2e77d034bcd2e1d07c1e6

                                              SHA256

                                              20c58b3232cf555b837da161431948bad3e851793b2890b4b1c041ea6cfb4212

                                              SHA512

                                              2cd78bdfb6c5c282d404722906c81430ee10ff7cf112c34a26de3ab3b5e7c6ceeff68efbf85c7776459b2bbccee5404da094236dad02ac9bb29d784031be4682

                                            • C:\Users\Admin\AppData\Local\Temp\YpMZYQImRp.bat

                                              Filesize

                                              222B

                                              MD5

                                              fe0c9a8ba9a247fa532f0c187bea0980

                                              SHA1

                                              d62bde6b26369a48282a1425bad50211e21b89a5

                                              SHA256

                                              242cef7e63b136021123b5dd880395627073f7b5cd97357f171bdc3b32dc5f26

                                              SHA512

                                              c3d2d7283a6cc6a5e768e8e625d31e30f8ca9ba37c87e62063c61f0967f3993727a3d16023f88f33c6b0182254f024d4e2929721a12efc2402974dc9abe30204

                                            • C:\Users\Admin\AppData\Local\Temp\cV1vwDPsky.bat

                                              Filesize

                                              222B

                                              MD5

                                              dbb0b7c79bf60fecd082e1ef25b85fb7

                                              SHA1

                                              fcba3f892a12f981ff58c6200da15981d9af0426

                                              SHA256

                                              5afa9172e8ab1915ae45ca1d014558ef85d6e6ae505a14a629d2c003fc0c3f21

                                              SHA512

                                              c7a0177aea415173ada34b3c6ce0515c73c9131b8a4b718a8da1b64eb403195f00f5b368ada681c8a3d0516aa8e44846ba834691ca4a4a9ccf35b6df8f500852

                                            • C:\Users\Admin\AppData\Local\Temp\kRqsvBC5Qb.bat

                                              Filesize

                                              222B

                                              MD5

                                              d3e7ca7a9c300a4f9353d808bd60f8b0

                                              SHA1

                                              0ea5edb9fb384586d404e54f7d1414de0b7ca484

                                              SHA256

                                              56a42d46473670eece772f82988cad2351309aa6b57a80ebb75dbe7921fdc370

                                              SHA512

                                              54333eebb21017e46a726941cb0ed31c79d412464c563fcd95d20024a745a650042b52e49e0d6eb9d3d0951f30e200318f4eb50f2768eaf7d7ec84f2934eebfb

                                            • C:\Users\Admin\AppData\Local\Temp\ww4YVzclJm.bat

                                              Filesize

                                              222B

                                              MD5

                                              14e40c2903ef97aecfbe0f997da388f9

                                              SHA1

                                              11972cd1cd466dff7890fc5d0a57b302a1054e92

                                              SHA256

                                              67e67d93094ddc909a0b0fe7b3443be33358b1888db42b9a965719a0f244fe05

                                              SHA512

                                              91fb50294dcc315ef4da8d7034a62964b35959aac0eeffae9dbb7681ec70e19be49dab06158b171bb5a49fb552b4174c0c7f3324fdeee62e7ece57546392552b

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              484cf45e60961750bc2c4bd16e2c7a76

                                              SHA1

                                              1785826abaafa1b45345f33f48194e1e105e53a6

                                              SHA256

                                              7407079d63afced91ad931d6ae8ebd7fbd162aff1c9b3a56f79bce181d402206

                                              SHA512

                                              87ed1804ce0766b50ab3d2e5377007ac2b39d6d2a2236249b9c73f44c24f9a327be969a93b6b010d58cd92f77fd2708a06fa1e7064aeaaa6f54cc2850431da3c

                                            • C:\providercommon\1zu9dW.bat

                                              Filesize

                                              36B

                                              MD5

                                              6783c3ee07c7d151ceac57f1f9c8bed7

                                              SHA1

                                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                                              SHA256

                                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                              SHA512

                                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                              Filesize

                                              197B

                                              MD5

                                              8088241160261560a02c84025d107592

                                              SHA1

                                              083121f7027557570994c9fc211df61730455bb5

                                              SHA256

                                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                              SHA512

                                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                            • \providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • memory/684-582-0x00000000001C0000-0x00000000001D2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/684-581-0x0000000000310000-0x0000000000420000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/908-702-0x00000000009F0000-0x0000000000A02000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/1340-461-0x0000000000B50000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1676-104-0x0000000000380000-0x0000000000392000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/1688-642-0x0000000000EC0000-0x0000000000FD0000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1764-45-0x0000000000D40000-0x0000000000E50000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2344-14-0x00000000004D0000-0x00000000004E2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2344-15-0x00000000004E0000-0x00000000004EC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2344-16-0x00000000004F0000-0x00000000004FC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2344-17-0x0000000000500000-0x000000000050C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2344-13-0x0000000000110000-0x0000000000220000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2564-35-0x000000001B520000-0x000000001B802000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/2564-37-0x0000000002720000-0x0000000002728000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/2792-164-0x00000000012C0000-0x00000000013D0000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2900-521-0x0000000000D30000-0x0000000000E40000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/3028-401-0x0000000000040000-0x0000000000150000-memory.dmp

                                              Filesize

                                              1.1MB

                                            We care about your privacy.

                                            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.