Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 20:48

General

  • Target

    JaffaCakes118_c91f21622352ba61629030a62ae9fe55b26222eb4fdb8d300b8783c02b43a05b.exe

  • Size

    1.3MB

  • MD5

    f0d4b365ddb351b02f761d2fa85ad09d

  • SHA1

    c8b246f3cafdc536d2231639ac08b6bb2bd5513b

  • SHA256

    c91f21622352ba61629030a62ae9fe55b26222eb4fdb8d300b8783c02b43a05b

  • SHA512

    2b8510de4ae41ccc1498bd1e076dcdff36ab5996e25e07d32901e9b8dac78d63060fb681002a38da620d832af56f2c970d31ee4df60cf85e1ed640ec21705d06

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 24 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c91f21622352ba61629030a62ae9fe55b26222eb4fdb8d300b8783c02b43a05b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c91f21622352ba61629030a62ae9fe55b26222eb4fdb8d300b8783c02b43a05b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2904
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2164
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2404
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2276
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2416
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2252
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\dwm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2136
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Common Files\Services\conhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2140
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\taskhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2132
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2180
          • C:\Program Files\Common Files\Services\conhost.exe
            "C:\Program Files\Common Files\Services\conhost.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8t4fMT0wY0.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1628
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:784
                • C:\Program Files\Common Files\Services\conhost.exe
                  "C:\Program Files\Common Files\Services\conhost.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2204
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3IH1xDWFpP.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:828
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:2848
                      • C:\Program Files\Common Files\Services\conhost.exe
                        "C:\Program Files\Common Files\Services\conhost.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1968
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NYP5fOsMgV.bat"
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2612
                          • C:\Windows\system32\w32tm.exe
                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                            11⤵
                              PID:2440
                            • C:\Program Files\Common Files\Services\conhost.exe
                              "C:\Program Files\Common Files\Services\conhost.exe"
                              11⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1728
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VDNADHaqjn.bat"
                                12⤵
                                  PID:1476
                                  • C:\Windows\system32\w32tm.exe
                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    13⤵
                                      PID:3012
                                    • C:\Program Files\Common Files\Services\conhost.exe
                                      "C:\Program Files\Common Files\Services\conhost.exe"
                                      13⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1796
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RgqsKqwwLg.bat"
                                        14⤵
                                          PID:1984
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            15⤵
                                              PID:2788
                                            • C:\Program Files\Common Files\Services\conhost.exe
                                              "C:\Program Files\Common Files\Services\conhost.exe"
                                              15⤵
                                              • Executes dropped EXE
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2836
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Pi2dGiCBJ7.bat"
                                                16⤵
                                                  PID:1624
                                                  • C:\Windows\system32\w32tm.exe
                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                    17⤵
                                                      PID:1948
                                                    • C:\Program Files\Common Files\Services\conhost.exe
                                                      "C:\Program Files\Common Files\Services\conhost.exe"
                                                      17⤵
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1484
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\N7XO3McAFn.bat"
                                                        18⤵
                                                          PID:980
                                                          • C:\Windows\system32\w32tm.exe
                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                            19⤵
                                                              PID:2280
                                                            • C:\Program Files\Common Files\Services\conhost.exe
                                                              "C:\Program Files\Common Files\Services\conhost.exe"
                                                              19⤵
                                                              • Executes dropped EXE
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1728
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tGPC7CVf0d.bat"
                                                                20⤵
                                                                  PID:2244
                                                                  • C:\Windows\system32\w32tm.exe
                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                    21⤵
                                                                      PID:2344
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\providercommon\dllhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2864
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2732
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2692
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\providercommon\conhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2752
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:568
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2236
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1036
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1524
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 12 /tr "'C:\Recovery\31f19e42-8726-11ef-be9a-dab21757c799\OSPPSVC.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1520
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\providercommon\dllhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2092
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2312
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:872
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\dwm.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:948
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Admin\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2740
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\dwm.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1464
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files\Common Files\Services\conhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:3036
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Common Files\Services\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2992
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Common Files\Services\conhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1272
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1984
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:700
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:1832
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\providercommon\taskhost.exe'" /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:544
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2192
                            • C:\Windows\system32\schtasks.exe
                              schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\providercommon\taskhost.exe'" /rl HIGHEST /f
                              1⤵
                              • Process spawned unexpected child process
                              • Scheduled Task/Job: Scheduled Task
                              PID:2584

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              556d666333be047e5cc95339147d08bb

                              SHA1

                              9530ea28a4a6458ba2cdbfb7fdc4e614607cf593

                              SHA256

                              7dcb5512e8e90be47b209ca7487a596189b4f9c97a9557461db5bd1686751749

                              SHA512

                              a9a26544445e4cfbe58eaef5e7c49844be33c9e4a980dafc7f0ee0fbdd508cbdcca101de92540f60ca89c8720c84c9fcf4692681ff2b75136a9ee49cf91a0468

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              20104f5b5fe0ff71c5d4e15d2f966fb4

                              SHA1

                              b350e5f4ff2e2e4cc98d5779bfaa92b6c5421fed

                              SHA256

                              d6cc6ad9208e18bbcb5a3eb13243a7175f783c9e60b10174a5a3847a20df3d0c

                              SHA512

                              b74377fe21294e96d6c7a2adf6263b55f17b4e4e49e64f763751762d4608d39aea44773b68a2732941adf21bed694a103cd937a27ab91fc8eb42d4bfa9629a17

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              98a77c7acf73afa1b4c3fb1eeb844fd0

                              SHA1

                              554d46fa814e77a3a2beda7576e3f27174de773a

                              SHA256

                              36c616a86a95ad39be943dae8be709c7eb6af969d94ff152ea69e3d631eb144c

                              SHA512

                              c31262232e00c830280c0db1d6e4323beb16635adcbf4119fcebd717a15ff5a8dde6b60fbbb084c3836aca472559af017e920b864e45fb9009fad53afb56d7dc

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              00c24bf74b0fdfb0f19f044a554517d7

                              SHA1

                              43816a1452fde4c41389b80b374303e09cf2ef19

                              SHA256

                              3146cf4402d1c76e16209fa65ec1787fb29e4e68b8db49d150b0486b9728727b

                              SHA512

                              3352384c35090bfb467c925173522784bc2ca90f810d01aedeea387253c3bd2b868b7f1ce5dfcb8e2bca8c3cb1840ad47ff358ee9573a7c9a14f56f34dfb5ec8

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              770d11ec2b8a3430dd34c98ab808be50

                              SHA1

                              d055ab0d725b94ef9241cbed47bbb3a7042138ef

                              SHA256

                              cced4b16aae41fec1f75f1fea3e08c9715d30c00cd1f443856b30d79d29f243f

                              SHA512

                              176a1fe25282dccb64e91320f724fe2076c3decb26d5606acd6ad3913b161e77eae4c45e998bbb2cba0bc7b70cfe3f28bffacef657ed40c3be35cca455b616e4

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              1d0d4f44ffe60d0e5f6226156798cd82

                              SHA1

                              eface4dec676a98cd066d96bd367206f5bd269c5

                              SHA256

                              20ccc5f82cfabac2e3990b836eaa3c52d825c2d2c312dad1eea15217e710a128

                              SHA512

                              35f659ab91a9f4b852444631262ad6b1ff2d2270a9c1dd261b1ff93f608280c1ee78162bcdeeb7de546c20485208ec64f1c46f955364eb0d40817e83b128b657

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              566f339603f0c344ddfb72ac68547fb3

                              SHA1

                              3a90dcdffa382d0fb7d0a5709e4cd1e25cc38920

                              SHA256

                              1cd73af82c4c30f9603d1fe07c3292eec834c9dae2350410d8ca7d134f5defcf

                              SHA512

                              e981deeb9079a5db23ec604e2dadf1f9306daaa474861d9e31be1d12e3bf7de7f006d025b827cb1ffeb6680c256385b06b1484f594dbaeaef57d4715c8083401

                            • C:\Users\Admin\AppData\Local\Temp\3IH1xDWFpP.bat

                              Filesize

                              215B

                              MD5

                              8dc27a797ec779f9e5a4c5ec11618978

                              SHA1

                              3b2f89d345a34ebb4ab2223e2d97be068259fe49

                              SHA256

                              cca314b9c1bb18224cfe9466d6bbb340da210557cf9660523539cbc8e1530ee7

                              SHA512

                              a398503c222ce83486a42f1a8a940945e582a4629efa6ab121842809c9342a6cfa728566a9945e26c8e7375098a7875d9052cca1b40426dd2e2b5ef98e81d477

                            • C:\Users\Admin\AppData\Local\Temp\8t4fMT0wY0.bat

                              Filesize

                              215B

                              MD5

                              1878de368b50f4bab94d7b5682e7611d

                              SHA1

                              2ad10b6dde7223922db55257adf8bb3e1db4673d

                              SHA256

                              9e19d54a14945ce627c2a44ee95bcd3383fb1957d563c6966ceeb2bf119cd3bd

                              SHA512

                              833bcbf947fe1232d3fd46ab46f1fff3dd4b4ee48eea3243657199b4f5294e2a8af1b713376cfb92d02565d06d3d077e5993aaf853f0db90911ce07bfe6332ef

                            • C:\Users\Admin\AppData\Local\Temp\CabADCE.tmp

                              Filesize

                              70KB

                              MD5

                              49aebf8cbd62d92ac215b2923fb1b9f5

                              SHA1

                              1723be06719828dda65ad804298d0431f6aff976

                              SHA256

                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                              SHA512

                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                            • C:\Users\Admin\AppData\Local\Temp\N7XO3McAFn.bat

                              Filesize

                              215B

                              MD5

                              7092f55d118625ec663e5bfe609f399b

                              SHA1

                              1feecaf1113fddc827336554fb94837e9a123449

                              SHA256

                              72b11bf20148b9bdaf152883b47b97ca2b27f1d06f749b62ac44bdeb9427f285

                              SHA512

                              04c623ac9c1657fc0abdac3e0b89d27892435f882dd14cf683832dfe62990f6a749416b0c2b3da05329336a8cca7df6f1c685af3f2120d4328b218b8c7cfbc41

                            • C:\Users\Admin\AppData\Local\Temp\NYP5fOsMgV.bat

                              Filesize

                              215B

                              MD5

                              67806c74a81bb3dcbaae19b2ea06ebd8

                              SHA1

                              6cae7ec227afd4fc43e6eba6aefb67a7bc4e8253

                              SHA256

                              b02fbf1180d3fee728cb98880937f07c24c3a8a04ae6e63a175d708a56ff5e91

                              SHA512

                              d31fdfba19c64b19614502a1be678f1fe8833546b04cc67f7352c39570c0367b5ff1331f0ef47cd925ecde753edf7cea68492a08b01352ef6ecd850bce2485df

                            • C:\Users\Admin\AppData\Local\Temp\Pi2dGiCBJ7.bat

                              Filesize

                              215B

                              MD5

                              1ae96c0b8e8d457b8b6b535d78f64534

                              SHA1

                              ae6cff5f143578209a89b3b229ea2f3e2d0ef779

                              SHA256

                              1ca1ccfcb18d88374a3cab4741056c27e827f0606417bbb9a9759009443c92f1

                              SHA512

                              50e163c8c4f16e92dc88885a7ef50592384b0ff13be6c8fe5c14d93c76e5bc7ec046d75bff9a0e0c8a96f200428508af76cd5f82276e457ed0fdc2c73f50e5ba

                            • C:\Users\Admin\AppData\Local\Temp\RgqsKqwwLg.bat

                              Filesize

                              215B

                              MD5

                              4fa55642a84df0849ea1b3a048bfb87e

                              SHA1

                              2452644326f8c2a39e04888da6284086cb4c0292

                              SHA256

                              934520487d4ca414c2f32482bbaca2987fa56dc0f6d3423d12932969b4578436

                              SHA512

                              0e95880a980c9f606cd37ae0eabe101df907832b73d793faf4fd0989e3dfcd995b8eeef1a9aba49392ab52ade8c7e8d190f0d2ee0d5ca0b6063ee59a793f59b6

                            • C:\Users\Admin\AppData\Local\Temp\TarAE6D.tmp

                              Filesize

                              181KB

                              MD5

                              4ea6026cf93ec6338144661bf1202cd1

                              SHA1

                              a1dec9044f750ad887935a01430bf49322fbdcb7

                              SHA256

                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                              SHA512

                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                            • C:\Users\Admin\AppData\Local\Temp\VDNADHaqjn.bat

                              Filesize

                              215B

                              MD5

                              89abfe5a6dc5c4102938d4e04b4df7db

                              SHA1

                              8fae4f0092b639ed1829885c9712b52663a9e12b

                              SHA256

                              ab64f3054aaf69b9cea2771c889da39bdc78bc3d03711980be678017b3b1a167

                              SHA512

                              24b48799dc77fb6626d414e6bb1f670d16fdde2bc6693e0dbfacc3fd2e2eb7be3f6b57ef3a0d9f671629465effeca2354c5015f772a93e6a682cbd26d3ee2f6d

                            • C:\Users\Admin\AppData\Local\Temp\tGPC7CVf0d.bat

                              Filesize

                              215B

                              MD5

                              3d92597968091c79f936758e278806bd

                              SHA1

                              85b51d1cf0d7b941ccd23d2ada616fca8586ce8e

                              SHA256

                              60f4895e1c5aa90820323a3e8786bf9968995fb42425a294955a735b49a4fe82

                              SHA512

                              ce9fc9ac720fbc32ca65912ba66dc44c4399da427b7cb3481ce27f3d6be60f470fdc40f17cb2cd6eec91d89b97275bd65f0c7387be089cb36cbae4a9cac56d5c

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                              Filesize

                              7KB

                              MD5

                              0ce82af2074e6c5c1d748b8c841ed28e

                              SHA1

                              9e396b2b29fada290a813caf8a022bd34ee8d6e0

                              SHA256

                              c5ba7b42a02e195e0b4d123a8637c69b882ccf916e9ff55d02348950d1de7849

                              SHA512

                              16d688e6113750f91cdb2e657933e7e8bb4fb9bf6c92e546d8cf0d46b3b19cd8f39dc82bcd9f46075d2ac82151f32ffe212eb98ba93b5584a36eea0a56b5b1b4

                            • C:\providercommon\1zu9dW.bat

                              Filesize

                              36B

                              MD5

                              6783c3ee07c7d151ceac57f1f9c8bed7

                              SHA1

                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                              SHA256

                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                              SHA512

                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                            • C:\providercommon\DllCommonsvc.exe

                              Filesize

                              1.0MB

                              MD5

                              bd31e94b4143c4ce49c17d3af46bcad0

                              SHA1

                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                              SHA256

                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                              SHA512

                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                              Filesize

                              197B

                              MD5

                              8088241160261560a02c84025d107592

                              SHA1

                              083121f7027557570994c9fc211df61730455bb5

                              SHA256

                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                              SHA512

                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                            • memory/1728-261-0x0000000000310000-0x0000000000420000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/1796-321-0x00000000013A0000-0x00000000014B0000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2204-142-0x0000000001150000-0x0000000001260000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2272-40-0x0000000000B80000-0x0000000000C90000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2276-83-0x0000000001FD0000-0x0000000001FD8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2416-81-0x000000001B280000-0x000000001B562000-memory.dmp

                              Filesize

                              2.9MB

                            • memory/2904-17-0x0000000000490000-0x000000000049C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2904-15-0x0000000000460000-0x000000000046C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2904-13-0x0000000000300000-0x0000000000410000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/2904-14-0x0000000000450000-0x0000000000462000-memory.dmp

                              Filesize

                              72KB

                            • memory/2904-16-0x0000000000480000-0x000000000048C000-memory.dmp

                              Filesize

                              48KB