Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23/12/2024, 13:04

General

  • Target

    JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe

  • Size

    1.3MB

  • MD5

    7118285af78dee239d39bc84ada97740

  • SHA1

    df7c25ec4e9dd2b9dc97ddd0a4c35b586a4eb0b1

  • SHA256

    aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36

  • SHA512

    f8f4b5cdf3d98412e2074764bd003f09c30cdac2da733cf223c76317903df6c0c72dac0b79287cd64959773b77b535ccfb0ac3e977f32d7fdcc024f7c48ee119

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aa3d1f0544d820f50272b2906899aade4528c19d98588b151072e2c33e144c36.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2012
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2440
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:832
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1904
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1632
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender\ja-JP\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1912
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1808
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Sdsu350QiF.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:924
              • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2628
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hfpeQ4JfvC.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2000
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:2200
                    • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                      "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2372
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VeFqpJq3BV.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:580
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:396
                          • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                            "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2124
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TK13bru719.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2428
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:1028
                                • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                                  "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                                  12⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:324
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\syea0WjfTx.bat"
                                    13⤵
                                      PID:604
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        14⤵
                                          PID:2364
                                        • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                                          "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                                          14⤵
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2988
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x4tck5X09i.bat"
                                            15⤵
                                              PID:2784
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                16⤵
                                                  PID:2288
                                                • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                                                  "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                                                  16⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2344
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3Lxx1rvPQX.bat"
                                                    17⤵
                                                      PID:1312
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        18⤵
                                                          PID:2284
                                                        • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                                                          "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                                                          18⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1272
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5cWoBfSAzl.bat"
                                                            19⤵
                                                              PID:1896
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                20⤵
                                                                  PID:1992
                                                                • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                                                                  "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                                                                  20⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2972
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bbMo3XBCxD.bat"
                                                                    21⤵
                                                                      PID:1860
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        22⤵
                                                                          PID:2228
                                                                        • C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe
                                                                          "C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe"
                                                                          22⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3048
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NiQtqM3qVs.bat"
                                                                            23⤵
                                                                              PID:2256
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                24⤵
                                                                                  PID:820
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1128
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2352
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows NT\TableTextService\ja-JP\smss.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1888
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2016
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2200
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\conhost.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2328
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2620
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:592
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\winlogon.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3028
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\providercommon\services.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2032
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2992
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3012
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender\ja-JP\cmd.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1996
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\ja-JP\cmd.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1740
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender\ja-JP\cmd.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1932
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'" /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:1612
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:316
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\lsm.exe'" /rl HIGHEST /f
                                    1⤵
                                    • Process spawned unexpected child process
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2220

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    219f2a9fe8afcc1d31631b68a8066bf2

                                    SHA1

                                    b4f047e0cfddcf000be79ecbf49c034493ad52f6

                                    SHA256

                                    dbd4f90cf684a4b39e45e3d64d283ec91b88f696c59beca5e895552e782ca881

                                    SHA512

                                    4cee674f8b7a3b0b9d6633f5782542a2a74bc02baad6b160ac941710491f83609c5a64bcd4e23b04af7c64fcb62b464a47d8bf6d983b2574ac4bdd2660c7c98f

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    e216330793d0d44ed8cc91cef59a155d

                                    SHA1

                                    93c670288ad03ec48273500d2e48b01ca0c2db60

                                    SHA256

                                    0d9d3789e7928dc8bb7c158a74c459dc0a2287342f2a74d65c29ed5c85668e6d

                                    SHA512

                                    6414466d3076e914eca6f7a7679ed8370be00ff106aeaf26aa32ba27f357cf7104bf1325d86e601340dbbf7567bdd37c49acf5138d9588ec245a991d0266928b

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    d688ac632fe8c359dcc9ff98daa92990

                                    SHA1

                                    fc0cc3510326131606519b126183633dea8f2af0

                                    SHA256

                                    1e45ed38110382220cbeab5c95f63a227a125dbceefa54bb4922fb1af96569b5

                                    SHA512

                                    e4b9624644e0f177f888bef4e8cfceee7f0886b45fcef0c273781d2f4cdcc3566f5aa2e99c7435c4ba02b23c18d543a6a0907f0956ad87be56eb25ae8a087e85

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    c91d006b0c503f43d7b0a42cac0cb7ac

                                    SHA1

                                    60f2cdb623a5f08cb555ffbb3d44a59333cc603b

                                    SHA256

                                    88e91dbee7b0fe5c47150cc52bca382008fff0c0a26f2d65a9ad3f5e89b00151

                                    SHA512

                                    8e0d6926db6d8efd5f350117c8a6498973560043e4ed1c66fd73ea711e0818c000bab866df9c38c7dd55ffd7c1136010c5a4e0d5d25c4936612e6842a14e7048

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    b70359008519df18c6af798b6b8fb4a8

                                    SHA1

                                    1384105bd5e892bb0b05c8e062ebefeb22888002

                                    SHA256

                                    5e0b3b7acca64adcfdb8bf729908f43dd4b48253a33256b18febb3057ff9917f

                                    SHA512

                                    545284d192d7461ed113291411129be990289a34333f5769e88ebaf1f8756171be325bc81e178b34c649e4a19bd3e49125d50dc5896515896796f2acc741558b

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    35928963ce46f5d33d7f2ea72c22bc80

                                    SHA1

                                    b0c7d106ae53f325f14fdddae20ba342bf1ba832

                                    SHA256

                                    1d210d1a5978646ec5713a796176dff655bf270c38c315926d9f03940073c409

                                    SHA512

                                    8a58ced7c4de0fecfeb3649b62a5f5d9a082ed6c21fdd398ba637f00a5db001e46c91198b97ee97e182b99f5992ad9360b15e7da2d66586244390d7fb32b86b2

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    a4676353dc76dd74fa050e9875aa51b1

                                    SHA1

                                    96d94f51423b7316429f85c2267d038878e5663b

                                    SHA256

                                    0ea9b6738cd1ead576012d8de15c08095ea8066c869671aecc3349692759bf4f

                                    SHA512

                                    199352c21f4a2191f110224042ed443a7332024fee66f986ba3b47a700e8bc1902618d6d00414e6375e546942decbfef9c15a75883d68d462c79acdd443c68a8

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                    Filesize

                                    342B

                                    MD5

                                    63c98cc6da81cf0160938a79d56d7bc2

                                    SHA1

                                    e169a32694cd572adf48b1c5efa035951bf61894

                                    SHA256

                                    39f45768dde77534019be7cfc9741566774ac2b7e6ddcd0408200975a73dd885

                                    SHA512

                                    e83d8fa1a707d6dcbd0b0cc7b5c3c84f2b217ec07c583640d563d593474dabfd1ab02baf2e70ece9d5e4e07f231b8cc91c6491b9ffc827329e53fb918c0e4205

                                  • C:\Users\Admin\AppData\Local\Temp\3Lxx1rvPQX.bat

                                    Filesize

                                    225B

                                    MD5

                                    ecc895602ea288d39261cc0d2c16f64a

                                    SHA1

                                    58870be17cdbc8db5f4c177157e44bf8600e1ad7

                                    SHA256

                                    28f30250fc36ac52da1c64a89b68eff8d7f9fa6c279cbad9a7f395480809dab4

                                    SHA512

                                    340468d1f1597ca83cc7cc3cd6969787f9ab1a70a7ff85978dd215b9db7be61674b2cd59700c943995b38645adf8e3776c169c421201a8a06bcf5a2b2ca245a6

                                  • C:\Users\Admin\AppData\Local\Temp\5cWoBfSAzl.bat

                                    Filesize

                                    225B

                                    MD5

                                    167993ee58562f29f9030554f3c5d505

                                    SHA1

                                    6b800bfd9efa6b35ba7c17a1de2648cba6ba40d0

                                    SHA256

                                    a6a05926c2da5ae84d1506e1fa1599281c6ff2d65a3522345131bdc8bf7d6fbb

                                    SHA512

                                    4bb2a091743cb39b609ff18ef30c78e0985e575da99d1faba886937dd08c65afa100eb1f687c0e830bdc8d21a9fd71c3bb311bf9ad957754941240307511d28f

                                  • C:\Users\Admin\AppData\Local\Temp\CabDC3D.tmp

                                    Filesize

                                    70KB

                                    MD5

                                    49aebf8cbd62d92ac215b2923fb1b9f5

                                    SHA1

                                    1723be06719828dda65ad804298d0431f6aff976

                                    SHA256

                                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                    SHA512

                                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                  • C:\Users\Admin\AppData\Local\Temp\NiQtqM3qVs.bat

                                    Filesize

                                    225B

                                    MD5

                                    0b7f067749802c901a1ea608d98372a3

                                    SHA1

                                    756b2c64faeaaf33937d054855258e8cd95ac2b3

                                    SHA256

                                    6dbbaf02fb82826309b9821645a0d2ca6e17304a98b1b4cca79c69da26448d91

                                    SHA512

                                    a1c7ceab157b2f1879e6b2a67746191ef0f9a27010e078d058a6499ad5c40e12c7e355f9b5a2f3eba0d198b3ca42f3321071c5823e2304cf600120215d8512a8

                                  • C:\Users\Admin\AppData\Local\Temp\Sdsu350QiF.bat

                                    Filesize

                                    225B

                                    MD5

                                    d339fd81b6b0b3c10e8830381a533a6d

                                    SHA1

                                    0b72eaa0fb1c679fcef795bc51258b502a88d597

                                    SHA256

                                    eacbe6ab227e52c0df82444c1659558764e0b940f3b9dcd2036363659607c734

                                    SHA512

                                    672df2c64b4988da3c0ca3d68b43508228a6c999c714825201ba0c2d72e95180ef9a4447ecda3303976cad47693d6193e5973aa9b3526992a3e5d20571ad8558

                                  • C:\Users\Admin\AppData\Local\Temp\TK13bru719.bat

                                    Filesize

                                    225B

                                    MD5

                                    42f3799d2e240fc04ffde86144744be6

                                    SHA1

                                    d358ea1fdae4276997c4cad56f7731fb04288ecf

                                    SHA256

                                    3c2433dbcbe04f01100cc3731fe117e5758c6f86adbb2e7fa13029db46eebc0c

                                    SHA512

                                    f0b75b7191f01cf0e5eebd796d7315455f1e2340c5a5037b33aac082e1086a4470a995a2849de42d080ce46246c4cd33035d80ccef1153a70abddd0cbee85468

                                  • C:\Users\Admin\AppData\Local\Temp\TarDC50.tmp

                                    Filesize

                                    181KB

                                    MD5

                                    4ea6026cf93ec6338144661bf1202cd1

                                    SHA1

                                    a1dec9044f750ad887935a01430bf49322fbdcb7

                                    SHA256

                                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                    SHA512

                                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                  • C:\Users\Admin\AppData\Local\Temp\VeFqpJq3BV.bat

                                    Filesize

                                    225B

                                    MD5

                                    ae211cc1eac2f6cd7820e183fffd3383

                                    SHA1

                                    dca306dc037c97be9e558423ecee72e4845c9b94

                                    SHA256

                                    d01c1c790db52199a1ebc4ccb8622b1ac230ffd23dcd50fa3f251e3c88b7a323

                                    SHA512

                                    60536bc9bb7d2d38d85e51f36dd72ac4918c8ae7c5fae61a64b59cfa0d1018e1b331c0c93d6b84ae71ace2ae75510a636ddd45428c655fe5eaa9501d8b958a19

                                  • C:\Users\Admin\AppData\Local\Temp\bbMo3XBCxD.bat

                                    Filesize

                                    225B

                                    MD5

                                    7c0c557d755016c8b80d05de578a73d1

                                    SHA1

                                    92776c7ce2220b92794fe3f406b550a15b36383d

                                    SHA256

                                    3d8c5ac9c2c417a45cfb25e4b2a7ddb127c9eb3fceee882d8a0bec4bd5abaa76

                                    SHA512

                                    1da2565155b5b748337f8e6024a3042968e29fd1285d5617a3bbb57e87c55e57beb19b9e0e63433792421db7cc76743c31c7ff6df10a3fcaf7bed59d55e70d9c

                                  • C:\Users\Admin\AppData\Local\Temp\hfpeQ4JfvC.bat

                                    Filesize

                                    225B

                                    MD5

                                    9d7e954ac16a4e297f20daf4198cf2f4

                                    SHA1

                                    d259c578473e5cefe3fbfe4f83de8844a6b25914

                                    SHA256

                                    57116e31e2a19060b73931a856fcbe7069cac90521f919e8f83159fbee3928dc

                                    SHA512

                                    db106664846c7d17c44896096ff9ad2f0441f35be275da1d21b16a0b1abeaf0cf3dfbe05a9368e94840d77168a14fa05f8e35f64d56828b746ffe7c30012e31a

                                  • C:\Users\Admin\AppData\Local\Temp\syea0WjfTx.bat

                                    Filesize

                                    225B

                                    MD5

                                    a72099013825d16e66194892aaa54631

                                    SHA1

                                    c63e93eda750648a4c906313aca4fe624a50d05d

                                    SHA256

                                    f4ed4fef232e1e03de14a7939ad8db1bf0b801d1e660993919a787cb7acb83c2

                                    SHA512

                                    eca769661db1fe584bbf976f908cb47dcbe0c5cbdf3f59c04bb6854f034fcdf9d9ae6ff0965645e76fc64d50821773c8782d0d5d140d542a2d9ac6f7d8596c14

                                  • C:\Users\Admin\AppData\Local\Temp\x4tck5X09i.bat

                                    Filesize

                                    225B

                                    MD5

                                    4f3933c4b512ede05d182202015b6265

                                    SHA1

                                    586e883a6f2d2d140cbd210089eaf6854f67ca3a

                                    SHA256

                                    5dc2277e4be3cb38677a446b1c47b692fc760755e32b24fdb29c6b921aa58dca

                                    SHA512

                                    020a7cd81c8fd760914483654117a70eaf763d8aebcc5675ace0a21bf6568c5155aa86c877a009ece51b74f197ff7dc40c282c31d3bca5a612adf11d3cc74736

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                    Filesize

                                    7KB

                                    MD5

                                    ee2e146cb15b9c7944f35ea668bdc1d2

                                    SHA1

                                    3121fab55e293f8e6ec3dab79a5aacd1802eb874

                                    SHA256

                                    f50d28cf53abf9048e4f4dead4d01190cdca88e30f9a87b0311203dd50956603

                                    SHA512

                                    a1b7a85c6384c5e056738d298fe6240802e04c305fb73d35ecbf71af6cce357d56cbbca90349d4419ce18c670de6d1d69470e3526aa6d5b4df5bd57e79cc87b3

                                  • C:\providercommon\1zu9dW.bat

                                    Filesize

                                    36B

                                    MD5

                                    6783c3ee07c7d151ceac57f1f9c8bed7

                                    SHA1

                                    17468f98f95bf504cc1f83c49e49a78526b3ea03

                                    SHA256

                                    8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                    SHA512

                                    c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                  • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                    Filesize

                                    197B

                                    MD5

                                    8088241160261560a02c84025d107592

                                    SHA1

                                    083121f7027557570994c9fc211df61730455bb5

                                    SHA256

                                    2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                    SHA512

                                    20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                  • \providercommon\DllCommonsvc.exe

                                    Filesize

                                    1.0MB

                                    MD5

                                    bd31e94b4143c4ce49c17d3af46bcad0

                                    SHA1

                                    f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                    SHA256

                                    b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                    SHA512

                                    f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                  • memory/324-252-0x0000000001080000-0x0000000001190000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/1912-55-0x00000000021E0000-0x00000000021E8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/1912-53-0x000000001B550000-0x000000001B832000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/2124-192-0x0000000000290000-0x00000000003A0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2372-132-0x0000000000E70000-0x0000000000F80000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2628-73-0x0000000000300000-0x0000000000410000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2908-17-0x0000000000A20000-0x0000000000A2C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/2908-16-0x0000000000560000-0x000000000056C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/2908-15-0x0000000000A10000-0x0000000000A1C000-memory.dmp

                                    Filesize

                                    48KB

                                  • memory/2908-14-0x0000000000550000-0x0000000000562000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2908-13-0x0000000000D80000-0x0000000000E90000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2988-312-0x0000000001100000-0x0000000001210000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3048-549-0x00000000005B0000-0x00000000005C2000-memory.dmp

                                    Filesize

                                    72KB