Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23/12/2024, 13:42

General

  • Target

    JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe

  • Size

    1.3MB

  • MD5

    e570065fa523a3acb20a81d91b3fef6c

  • SHA1

    fdfa35dbe77eb334bc90690bef04afdfbe3f226c

  • SHA256

    63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556

  • SHA512

    2d5cacc35af780d2567f36a553f1151e1e8e1f58f941017706803bd5ae18220d6d02e5b580888ff325b0680ca538599f5f29c555ff32704dc18e81056ff863c3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63f704a3e82871e9b6d3831f7f4c9cd67b157b1674ed8db3f63f91bed6c1f556.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2784
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2244
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:760
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Local Settings\WmiPrvSE.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1364
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2840
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\debug\WIA\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:484
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:548
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aIQ010jr8y.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:1972
              • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:608
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TEfATY8not.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1476
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:2928
                    • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                      "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2276
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SaOkt9ru2m.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:844
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:1676
                          • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                            "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2648
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6Po3x2tXZG.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1720
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:1808
                                • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                  "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                  12⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2356
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dCyIaH4v8D.bat"
                                    13⤵
                                      PID:2904
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        14⤵
                                          PID:2020
                                        • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                          "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                          14⤵
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2160
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yvohz7Nokj.bat"
                                            15⤵
                                              PID:952
                                              • C:\Windows\system32\w32tm.exe
                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                16⤵
                                                  PID:2616
                                                • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                                  "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                                  16⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2824
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Zi7wkUpBKE.bat"
                                                    17⤵
                                                      PID:1364
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        18⤵
                                                          PID:2960
                                                        • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                                          "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                                          18⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3048
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XdxpZ3I66P.bat"
                                                            19⤵
                                                              PID:1348
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                20⤵
                                                                  PID:1056
                                                                • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                                                  "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                                                  20⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2764
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4stVUxPy0P.bat"
                                                                    21⤵
                                                                      PID:1208
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        22⤵
                                                                          PID:1768
                                                                        • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                                                          "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                                                          22⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:324
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\V9nTU0UPEK.bat"
                                                                            23⤵
                                                                              PID:320
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                24⤵
                                                                                  PID:2584
                                                                                • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                                                                  "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                                                                  24⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1664
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BGyPdaK1JU.bat"
                                                                                    25⤵
                                                                                      PID:1668
                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                        26⤵
                                                                                          PID:356
                                                                                        • C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe
                                                                                          "C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe"
                                                                                          26⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1852
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2sHl3bGdB9.bat"
                                                                                            27⤵
                                                                                              PID:2288
                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                28⤵
                                                                                                  PID:2660
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2420
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2948
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\ja-JP\Idle.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2456
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Local Settings\WmiPrvSE.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1676
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\WmiPrvSE.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1200
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Local Settings\WmiPrvSE.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2088
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2544
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3012
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Recovery\f6a14ac2-8725-11ef-a9ab-dab21757c799\spoolsv.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2292
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\debug\WIA\csrss.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2984
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\debug\WIA\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2996
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Windows\debug\WIA\csrss.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3044
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 5 /tr "'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'" /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2708
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:572
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\Windows\Help\mui\0C0A\OSPPSVC.exe'" /rl HIGHEST /f
                                            1⤵
                                            • Process spawned unexpected child process
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2228

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            8d654eef5984996e7e291b0c123ebb90

                                            SHA1

                                            d2c6e0f87a6e77717a24cd8c49dd9db510f7b420

                                            SHA256

                                            18e04f342f1097de1c79bb41ce864d8d73a2d4b92bdb0138521846853d5af33b

                                            SHA512

                                            fec882be28db656dd6090999b6e6aac0766c81b4e98e38575e4a0f460561cebc9bbbf5c300446918d2ab906d2be98c11bef3dcfcabdc08de994e6024bac893ca

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            7fa834b587a8b5fcc15ceb4151c6cbb6

                                            SHA1

                                            6cbcd93a7150dc745daa7de4c4c83220c13e50e5

                                            SHA256

                                            543e196e528e13a79f76d74638ededeb06b370dd6b9111cb586a43c2f5bc14cb

                                            SHA512

                                            aa7c4bd07f20c51ca7cf78acbaacc8c9e8f61ec1dcdb20155d8b9ed9eb6440037a957a7a59e6bb9a7484df3b1b7079d5855c6c278bc0347f66cc2a961837ea93

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            3b9f8f8231ad3003189d77dff670d996

                                            SHA1

                                            0050b992c9c0200a5976187793ccadd89cde7030

                                            SHA256

                                            93958eeb5ffbef6b6eaf482db5e05394bc7761d19f0bf074fc03845cea62f362

                                            SHA512

                                            89cc81818f0adc0125522e4a6032c97530bf5a6d9160b053f3855e8784b518e2d110f0c15f15783e49b26957292dbea8bb73baa2d5e95e79e6348925b6bcfa36

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            c741cc2d5ac4dd7e6e58ce099c129614

                                            SHA1

                                            6736592a3bae93b3c195524ff1d89afb6695e2a9

                                            SHA256

                                            a0d805ab76e37bc3e059c643b9e0dd8bfe0e9a1d084b6533fe2638525e126330

                                            SHA512

                                            838d3327c49c9b81cbeb362a32e43c77ea2a181d89588fbf5c5efc7d2ad2cae823cd1b6b9484321d853a89b06e6add7f59b19b4a1b227de7f23f8b527c815192

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            7a2093a81f6c0cbe4807044fd83dc712

                                            SHA1

                                            f2bf97a19a8386083886480eb778af5040a3d10e

                                            SHA256

                                            b8e47fd5620d532fb323ba58408c33a3c0c38bf647c22a340f088c855d13533f

                                            SHA512

                                            cf00b003f1f4a122ed57344423665f2b436413eb8227f71e04c1541c61662916c4e1059ef759ec20e6e57fca615057c7285d2363a4ad95e9d9ef593aa1ba52fa

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            136cd353123e0e747b6764a461c3fbd8

                                            SHA1

                                            ed374f13173c130bfa4b0fbd59464746a06f6447

                                            SHA256

                                            d9d184ca3b6b852973a8a5789aac9019c9fdf9030e58437db0c514260ceeeba3

                                            SHA512

                                            6609228000094c89a0b6374b309da1ef95877d95e199f660abc5dc9aee03c25ce4152f66441861b0e4f99ee4335e96fc090573f41c9ef0743a49e2ce49f4088e

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            879b560dcd4f89fe65a2bd88427e8884

                                            SHA1

                                            5e0e03e5e7ee1ffe6eae6ecc5987690e564edf3f

                                            SHA256

                                            1308f14793bc1710c212c7a3acaef44d8c922935d9f392bc384054935b13973a

                                            SHA512

                                            718e2e7cb36507bd00ff61bc99982f9d09f95658fdcd00d5deab2c18d9acdc7502012a871b06395bf56aa20d3ca0296b8f129bed20b1338fcfad504c29a31f03

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            97678a9011d744c7d0e58667360e9172

                                            SHA1

                                            b26e10690de3bd8f325f2906ade682fe87fb8865

                                            SHA256

                                            308098e9ff7d280eb317d77fe441e3ae2cdd525d226bd267b71c6fd46f24b117

                                            SHA512

                                            877819404b5c07a64d74ab05226aa2ade266372047b1ec10236fa9bef9d28036f69f95d47bb1ce5799e70d1dbb930215f3fe65ef53184ef8bf8a025abc756b61

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            6d35e55320d986f17ba1050dde502b1e

                                            SHA1

                                            04fb6802906778877971560d834a299b4979e7af

                                            SHA256

                                            17d921336adc117a4f4f6a53a0b5c8a037a2a768c40d9e96b5629eb734ef9003

                                            SHA512

                                            8b1e2f168c8397401735e273082448c43c6b2df105dde9fbe5cf0bae3b90adcbbd8a70e79c24dfbf8554f565daca7df0f7b8686cce5480da495b4cf19c3f8ee1

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            342B

                                            MD5

                                            8cb846f5a000d1b012db5fd3c1bff664

                                            SHA1

                                            034613df98a1fcc31acaf471d6b88129db5b8ab5

                                            SHA256

                                            c026737d79702784bb5b033f288684b98e40b523d27459240083e7b76a6ddef6

                                            SHA512

                                            cab912a834baa1c886545317a4a2781ccd42ae2d1aed51c87031fec7ad7198e4915ad9787b9b87de8ad78dbe76162fd27b6c5bd405d8fcbb94b27f0c2e5fcff8

                                          • C:\Users\Admin\AppData\Local\Temp\2sHl3bGdB9.bat

                                            Filesize

                                            215B

                                            MD5

                                            a4eac82e4637da9a6f3731fb69166c62

                                            SHA1

                                            7446bd2ca78d345a5a45616bcf3afec8da0ad1e8

                                            SHA256

                                            2adda00ff144c4d64dcd96b4216673a0a77455ba3efaa507c063f2caf14a9682

                                            SHA512

                                            5d86805b041a93dedfe01dff233f55ca059609e0cc51d788d27288d3066480db20c5e4ee24e541a9baa4ed61ddb703ea39494a39cd211b4b9b9d299d65f424d2

                                          • C:\Users\Admin\AppData\Local\Temp\4stVUxPy0P.bat

                                            Filesize

                                            215B

                                            MD5

                                            a3e60f6f05f0c4acfc53d2698619cc2d

                                            SHA1

                                            c77fc031d380eb183225f464377b8599249c80be

                                            SHA256

                                            de8b3e1ab0adaeb326b9b3096450bfab7aa14242056e2b1c526bfd3ff8ba6c57

                                            SHA512

                                            3351a398c3feb390869f8bfa865d2ca210b16dc3994207f5a82493835e7f51a17e8c1c3b27ac48916cdd8e460cd01eaa82b62fcbba7bbb6504ff2a3297638286

                                          • C:\Users\Admin\AppData\Local\Temp\6Po3x2tXZG.bat

                                            Filesize

                                            215B

                                            MD5

                                            27207d22bc6cc243660894b3b690b2c0

                                            SHA1

                                            d14df189e445cd3e0bbc2b239475d1686a883f77

                                            SHA256

                                            6ff6fdb165e0cc226bfcb39f5334f048491147d07e1d857548f72c71bad9e12a

                                            SHA512

                                            0f0f596802c6ab04dfd414860a9cbe4189b1b9524167c3de437cd9b4b408403a276db2f6b4bb19b538af911488766d5719c4a97319b23ceb7fa7fa020e3b53e4

                                          • C:\Users\Admin\AppData\Local\Temp\BGyPdaK1JU.bat

                                            Filesize

                                            215B

                                            MD5

                                            4e697fe8942f1ef39c7c91a4f77de1f7

                                            SHA1

                                            8d01db0691026840a2ffa4c2d8e14760b5f696d0

                                            SHA256

                                            78585863f23c7854c2380c446bab2729982e6dc13e980e3b34e6017bf759c852

                                            SHA512

                                            2ffce0da957d04930939d44a8edc77ff34adbf4d751a9642a24689ca74f8744fc4ecb8eaea975de731d85bfed2b4f0ec70e4053b2c221f5dcdd91aff1681f14e

                                          • C:\Users\Admin\AppData\Local\Temp\Cab2DF5.tmp

                                            Filesize

                                            70KB

                                            MD5

                                            49aebf8cbd62d92ac215b2923fb1b9f5

                                            SHA1

                                            1723be06719828dda65ad804298d0431f6aff976

                                            SHA256

                                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                            SHA512

                                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                          • C:\Users\Admin\AppData\Local\Temp\SaOkt9ru2m.bat

                                            Filesize

                                            215B

                                            MD5

                                            5bb6f5fb1384ce3b2c6e57efea6cf41a

                                            SHA1

                                            932a016307730d43be76461b5a4360fc1fab974c

                                            SHA256

                                            a2e6d4722cb406d27d949829e87ee9bb0a11970964de07522bb2c436ad69d17d

                                            SHA512

                                            f8baa6dad7b10255d12b0788db6f49ff6b557073c1fcc29f2a8abb6a5629bc542928d4e000977cab1c985c521c0563588f76a08ffe0d3507c1243b4a466200db

                                          • C:\Users\Admin\AppData\Local\Temp\TEfATY8not.bat

                                            Filesize

                                            215B

                                            MD5

                                            21695c33a221c2198d129a53c588e587

                                            SHA1

                                            37c438374cc892d15202c7f445099c79a6a92bcf

                                            SHA256

                                            1e8b22df7ec8cd5f97cfa53854627cacbd32926a8f7fddf7db58bf9c9d533f37

                                            SHA512

                                            9d8143f3cf63a779623ae1187a4c0a072850276b20731d3765554e1df61f2e2ff5f9493d41678e7e1dcf0887a5519c03c2e02c0ce7447586663de5fb40e68e66

                                          • C:\Users\Admin\AppData\Local\Temp\Tar2E17.tmp

                                            Filesize

                                            181KB

                                            MD5

                                            4ea6026cf93ec6338144661bf1202cd1

                                            SHA1

                                            a1dec9044f750ad887935a01430bf49322fbdcb7

                                            SHA256

                                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                            SHA512

                                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                          • C:\Users\Admin\AppData\Local\Temp\V9nTU0UPEK.bat

                                            Filesize

                                            215B

                                            MD5

                                            dbb445e70d770bfd096e3436f52b1237

                                            SHA1

                                            0b03192c545265d70e8ba1a416200aeb1729043d

                                            SHA256

                                            d35ed45e965562de00f409df70f8c30141c84f45656692b9ff331cb54d768975

                                            SHA512

                                            1f9fe8805787290725acb3753eef618fc31cfc8cd56b7503aca66478e2a3f4df1cd057b6c538730d1e5d0251af720cc6eeeff3e568a3ff0256e04db6b3e3641b

                                          • C:\Users\Admin\AppData\Local\Temp\XdxpZ3I66P.bat

                                            Filesize

                                            215B

                                            MD5

                                            2a1b8e3150a14cafd97381e74a531ac7

                                            SHA1

                                            d063957ff4650e0a8d708c6f647b6b8a36eb22e0

                                            SHA256

                                            f07c0bca7081952f88648e33b50b2b32580a5a0393b58f6cf25f4c239c676600

                                            SHA512

                                            d855125389124557fa70b4543bda12d28fa93811f2459ae6048d2ded6c3039814be270ad1ee55de7fee6abf7891bf00636ffc914731f54a7937be2b69fe8a011

                                          • C:\Users\Admin\AppData\Local\Temp\Yvohz7Nokj.bat

                                            Filesize

                                            215B

                                            MD5

                                            3ec01ecb48fcaf7a8e6532c842b18b2c

                                            SHA1

                                            db66ffb2afc38e888f7db545cffdd63588639577

                                            SHA256

                                            7f2e222ad88d97ef75492bf6445a90baac18631f5b3162186940616881223feb

                                            SHA512

                                            1a570d9577e8f5aee245aba0cd3966af2a74a7ee717efde493c4f9e2a4b72f12bf326d8564420f2c8f4d921242f68270d3a882dad51babdc8100d2b96f67f93d

                                          • C:\Users\Admin\AppData\Local\Temp\Zi7wkUpBKE.bat

                                            Filesize

                                            215B

                                            MD5

                                            1d675807713f0dd3b1d0317f6e402f1c

                                            SHA1

                                            93cea7961987e63ffe3f2c4446f79ca8beb2072d

                                            SHA256

                                            5092b48749eaa958d53679039b4cb84a14b2e149cdf9f9bec46bc2cacff9792f

                                            SHA512

                                            0f8608079b1b12ea9d929a6eaeb0cd0a2ea8613b9ff90ca7b48584f2b5ca28a0506d62d3325056c13aa630bc72e89345c0569d71faeee06e6e3ab72aa709a682

                                          • C:\Users\Admin\AppData\Local\Temp\aIQ010jr8y.bat

                                            Filesize

                                            215B

                                            MD5

                                            8463117c4182609452aad8e515eee61a

                                            SHA1

                                            9172cc6782602734800df2e965cda34ed3d21ce0

                                            SHA256

                                            ac659c658593b2ab45cf85e017a9d3b9ea6c404bbadae159bba0f135b1f28eb2

                                            SHA512

                                            b46924493f3c8d4e919360c6f44c795edeb3572940c6d9c6e25fc305e7e3149f4bb5a123d1068fa8adeff54c1888bf0baf3f1262694d26748ff589d52cf29d60

                                          • C:\Users\Admin\AppData\Local\Temp\dCyIaH4v8D.bat

                                            Filesize

                                            215B

                                            MD5

                                            3bfc95b86367620d788aa64969842685

                                            SHA1

                                            29417ec3a327e650446f519bedd209e5bce1ffc3

                                            SHA256

                                            ff16985ae2a3111f10aaacb60495e2b24ca8c3755ce35cd546ef347a03fd1693

                                            SHA512

                                            08b82332da539ead84ce7bb062eed1fe15c4bc78d80431fe3bbc1b4b3a7a9d878b2d920c2d43221cb35fe01b4a8bbca304c4faccee4e657b647906b1e2d8e024

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                            Filesize

                                            7KB

                                            MD5

                                            450dcd7e7f29fe08ccdf291148c8af1a

                                            SHA1

                                            efe6b8591d1ffdec012af676c917aa1addb96ead

                                            SHA256

                                            296c24da178f13e27a4dcc48e53a74692f4192ffed117193c858350cd36dd14c

                                            SHA512

                                            7101bc68ea74c7300e0a6dc9b58959c3506a7366efde7a82431518eee7ae94b0c091dce565291631f8cab4b2426aee2e0f0fe5265a77a2a4efd1c46fd59b6bf5

                                          • C:\providercommon\1zu9dW.bat

                                            Filesize

                                            36B

                                            MD5

                                            6783c3ee07c7d151ceac57f1f9c8bed7

                                            SHA1

                                            17468f98f95bf504cc1f83c49e49a78526b3ea03

                                            SHA256

                                            8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                            SHA512

                                            c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                          • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                            Filesize

                                            197B

                                            MD5

                                            8088241160261560a02c84025d107592

                                            SHA1

                                            083121f7027557570994c9fc211df61730455bb5

                                            SHA256

                                            2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                            SHA512

                                            20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                          • \providercommon\DllCommonsvc.exe

                                            Filesize

                                            1.0MB

                                            MD5

                                            bd31e94b4143c4ce49c17d3af46bcad0

                                            SHA1

                                            f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                            SHA256

                                            b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                            SHA512

                                            f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                          • memory/608-63-0x0000000000D20000-0x0000000000E30000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1664-599-0x0000000001210000-0x0000000001320000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1852-659-0x0000000001230000-0x0000000001340000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2160-301-0x0000000000150000-0x0000000000162000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2160-300-0x0000000000160000-0x0000000000270000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2276-122-0x0000000000350000-0x0000000000362000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2764-480-0x0000000000240000-0x0000000000252000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2784-15-0x0000000002190000-0x000000000219C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2784-14-0x0000000002170000-0x0000000002182000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2784-16-0x0000000002180000-0x000000000218C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2784-13-0x0000000000340000-0x0000000000450000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2784-17-0x00000000021A0000-0x00000000021AC000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/2824-361-0x0000000000F50000-0x0000000001060000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2840-58-0x000000001B710000-0x000000001B9F2000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2840-59-0x0000000002760000-0x0000000002768000-memory.dmp

                                            Filesize

                                            32KB