Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    563s
  • max time network
    901s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/03/2025, 18:41

General

  • Target

    Registration (Crack)/Crack.bat

  • Size

    2KB

  • MD5

    e90e30e3c6697d870286c1a6831a135b

  • SHA1

    1fa1f0d27f23fe364a2e0c198687ff3362d467fd

  • SHA256

    b08aaa0b0319c50f5614419752f4c45fa30b5e48137018e009672791447f4e6f

  • SHA512

    7feff998c5c7cf4e1cffbf8e654363168b10cd6b942116cb7ab04407ee0e3b40c523d5a273ce984a30ce7fdfb308a43e8ed41f7f3862faa0b25c083dd940ecb6

Malware Config

Extracted

Family

asyncrat

Version

A 14

Botnet

Default

C2

nams.ddnsfree.com:409

aliomar.ooguy.com:409

Mutex

MaterxMutex_Egypt409

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 24 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Registration (Crack)\Crack.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:5044
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "$b='"cG93ZXJzaGVsbCAtRXhlY3V0aW9uUG9saWN5IEJ5cGFzcyAtRmlsZSBsYW5ndWFnZS93aW5feC5wczE="';Invoke-Expression([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($b)))"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File language/win_x.ps1
          3⤵
          • UAC bypass
          • Command and Scripting Interpreter: PowerShell
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Windows\system32\reg.exe
            "C:\Windows\system32\reg.exe" ADD HKCU\SOFTWARE\Valve\Steam\Apps\993090 /v Installed /t REG_DWORD /d 1 /f
            4⤵
            • Modifies registry key
            PID:1952
          • C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe
            "C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies Control Panel
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4352
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /query /tn administrator
            4⤵
              PID:1596
            • C:\Windows\system32\schtasks.exe
              "C:\Windows\system32\schtasks.exe" /query /tn Backup1
              4⤵
                PID:4776
              • C:\Users\Public\IObitUnlocker\RAR.exe
                "C:\Users\Public\IObitUnlocker\RAR.exe" x -pahmad..123 -o+ C:\Users\Public\IObitUnlocker\EN.dll C:\Users\Public\IObitUnlocker\
                4⤵
                • Executes dropped EXE
                PID:2424
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Loader.vbs"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2632
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))
                  5⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3616
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2076
                  • C:\Windows\system32\schtasks.exe
                    "C:\Windows\system32\schtasks.exe" /query /tn administrator
                    6⤵
                      PID:700
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Backup.vbs"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:392
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))
                    5⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4216
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:4896
                    • C:\Windows\system32\schtasks.exe
                      "C:\Windows\system32\schtasks.exe" /query /tn administrator
                      6⤵
                        PID:4612
                  • C:\Windows\system32\schtasks.exe
                    "C:\Windows\system32\schtasks.exe" /query /tn Backup1
                    4⤵
                      PID:2496
                    • C:\Windows\system32\Dism.exe
                      "C:\Windows\system32\Dism.exe" /Online /Enable-Feature /FeatureName:NetFx3
                      4⤵
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:996
                      • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\dismhost.exe
                        C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\dismhost.exe {C0A4A7D3-4084-42F6-93C2-A30DAB5A9D52}
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        PID:2788

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Lossless Scaling\Lossless.dll

                Filesize

                4.3MB

                MD5

                7969a2cbc4c31ccfb1ab8213f19501b9

                SHA1

                06a24af6e922ba2cd7fccb76ce2f43271a9af8b6

                SHA256

                486a48562504a274e984599a5931de200ea73bf6bc4c83bf6ca8daa651e80a68

                SHA512

                935988a39c1af479e971850f6758ee94098b35f173da609206312deeabeb3bc9466f93d1dad4e6d7938235f65fc52fdbd56058d46c1ba775d31718358eb6d8fa

              • C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe

                Filesize

                953KB

                MD5

                2c98d33096e97094cbbbd19f27f40883

                SHA1

                7e28af9d119d2658f962e3b28140c6081be1612b

                SHA256

                010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6

                SHA512

                f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7

              • C:\Program Files (x86)\Lossless Scaling\LosslessScaling.exe.config

                Filesize

                174B

                MD5

                2a2df45a07478a1c77d5834c21f3d7fd

                SHA1

                f949e331f0d75ba38d33a072f74e2327c870d916

                SHA256

                051099983b896673909e01a1f631b6652abb88da95c9f06f3efef4be033091fa

                SHA512

                1a6dd48f92ea6b68ee23b86ba297cd1559f795946ecda17ade68aea3dda188869bba380e3ea3472e08993f4ae574c528b34c3e25503ee6119fd4f998835e09d7

              • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

                Filesize

                2KB

                MD5

                45fed0a3bcbc889ca99d0c5943210e7e

                SHA1

                602584366a413cb9ae459b6c3231190cd787241e

                SHA256

                9812fe8104a86e693d6baa02a4cdb56ea9a4aedb500b050346eb5ec6bda8dd09

                SHA512

                d0728fcce9484daedb2c9552ee2a818f7cccbeb1e9bca24a1c4fc1ca6e8c181c46cdc89670bfee3d6ad219ea6f69750bd03f776af4f9e4667872c66c11dbd255

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\AppxProvider.dll

                Filesize

                664KB

                MD5

                a31cb807bf0ab4ddbbe2b6bb96ae6cd1

                SHA1

                cf63765b41aee9cd7ae76c04dfbb6151e909b3c9

                SHA256

                37f45e6fc1e531279dcffed70c420df7b073504efe43bbb99a33a9ec24b75a47

                SHA512

                6a83378c7e88fe04dde20685889d76fd7efdf4e02342a952ba2e6ab0fa354e3293560986e5fded00718e4c14417970db0c06e6384277ae1e50021bb4dc87fad3

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\AssocProvider.dll

                Filesize

                136KB

                MD5

                702f9c8fb68fd19514c106e749ec357d

                SHA1

                7c141106e4ae8f3a0e5f75d8277ec830fc79eccc

                SHA256

                21ad24a767aeb22d27d356bc8381f103ab620de1a47e374b9f961e44b543a358

                SHA512

                2e7d403c89dacdda623ed1a107bac53aafde089fdd66088d578d6b55bcfe0a4fc7b54733642162bd62d0ca3f1696667a6f0cb4b572d81a6eefd6792d6003c0d9

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\CbsProvider.dll

                Filesize

                1004KB

                MD5

                f51151b2d8d84cddbedbeffebdc6ec6a

                SHA1

                adc9c19aa0663e65997f54835228968e13532198

                SHA256

                7fe4e4924fbbfdf6d772cb9d0a4963d49f6aa18b3c86a2e8df6ca49e22f79884

                SHA512

                802b58617be5e92bfc0c7f8c8d7443128d81908ae99d9a4ce0a785f858dc7832c70dc305f2ad39c9f57db01c05f483f6bf949ad8811fc6fb255c5aee88c729b3

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\DismCore.dll

                Filesize

                444KB

                MD5

                c73ee8f61bce89d1edad64d16fedcdd6

                SHA1

                e8fe02e68fd278fd4af501e350d412a5a91b269f

                SHA256

                b1045fc7dce8fcf5612f82f8f97f8d243008e4c6b7389187e6babc554dd1e413

                SHA512

                8a5960e6bf35cf07e555558db13c89bf940c92d206adae0eb6e28404b7e499500a8158d29f3400f0b24ab8cedbacb75a28b0138be2e029b70a5cc66cce7cef25

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\DismCorePS.dll

                Filesize

                200KB

                MD5

                7f751738de9ac0f2544b2722f3a19eb0

                SHA1

                7187c57cd1bd378ef73ba9ad686a758b892c89dc

                SHA256

                db995f4f55d8654fc1245da0df9d1d9d52b02d75131bc3bce501b141888232fc

                SHA512

                0891c2dedb420e10d8528996bc9202c9f5f96a855997f71b73023448867d7d03abee4a9a7e2e19ebe2811e7d09497bce1ea4e9097fcb810481af10860ff43dfb

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\DismHost.exe

                Filesize

                168KB

                MD5

                17275206102d1cf6f17346fd73300030

                SHA1

                bbec93f6fb2ae56c705efd6e58d6b3cc68bf1166

                SHA256

                dead0ebd5b5bf5d4b0e68ba975e9a70f98820e85d056b0a6b3775fc4df4da0f6

                SHA512

                ce14a4f95328bb9ce437c5d79084e9d647cb89b66cde86a540b200b1667edc76aa27a36061b6e2ceccecb70b9a011b4bd54040e2a480b8546888ba5cc84a01b3

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\DmiProvider.dll

                Filesize

                436KB

                MD5

                e54120aa50f14e0d3d257e77db46ece5

                SHA1

                922203542962ec5f938dcb3c876f060ecf17f9dc

                SHA256

                b5fb1a5eb4090598d5f878cdd37ed8eca82962d85995dd2280b8849fba816b54

                SHA512

                fbce5d707f6a66d451165608520be9d7174a8c22eb9827dfe94d98718e2c961f15ac45583b1743f3b8078b3fe675992d4b97bfc5e4b893b60328d94665f71dc9

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\EdgeProvider.dll

                Filesize

                200KB

                MD5

                c22cc16103ee51ba59b765c6b449bddb

                SHA1

                b0683f837e1e44c46c9a050e0a3753893ece24ad

                SHA256

                eb68c7d48f78b46933acba617cf3b5fcb5b8695c8a29295a9fa075f36910825b

                SHA512

                2c382aaddeca4efda63162584c4a2338ffcc1f4828362ce7e927e0b39c470f1f66a7933ae2210d63afb5a2ae25412266fde2ee6bdb896c3c030bdc08b67ec54e

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\Ffuprovider.dll

                Filesize

                680KB

                MD5

                a41b0e08419de4d9874893b813dccb5c

                SHA1

                2390e00f2c2bc9779e99a669193666688064ea77

                SHA256

                57ce7761531058f3c4289b1240bea6dc06355c9c4b4e88b9c9c0df8012edc5b3

                SHA512

                bd370e49da266148d50144c621f6415bdd5358e6274b1d471b8d4ee1888d93774331c3f75e6cb99782f1c8e772981cbc5a4baf5592c6400f340407dc670e547a

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\GenericProvider.dll

                Filesize

                172KB

                MD5

                20fb116831396d9477e352d42097741c

                SHA1

                7e063ac9bc173a81dc56dc5864f912041e2c725a

                SHA256

                6a940ba16154c4a1729b8560b03efb5f2558d66b10da4a5ec26c1299ea713bc4

                SHA512

                851843da748555eba735e1f5457044f24f225bd029534019814a6d1baf2e0bd1f171d297c362cfed5977274b266e823b7ad131ae2512568f7a5f2e3ea498b69a

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\IBSProvider.dll

                Filesize

                84KB

                MD5

                f6b7301c18f651567a5f816c2eb7384d

                SHA1

                40cd6efc28aa7efe86b265af208b0e49bec09ae4

                SHA256

                8f4e3f600917d49ada481ff0ed125fef4a316b659bb1197dc3036fc8c21a5a61

                SHA512

                4087d819706c64a5d2eed546163c55caacc553b02dc4db0d067b8815d3a24fb06ea08de3de86aac058ff2907f200e4e89eef2357ca23328aaacbe29501ea3286

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\ImagingProvider.dll

                Filesize

                248KB

                MD5

                4c6d681704e3070df2a9d3f42d3a58a2

                SHA1

                a9f6286ac25f17b6b2acd1fce6459b0bc94c6c81

                SHA256

                f1bbab35b2602d04d096c8de060b2a5cf802499a937fd1ffe749ff7f54852137

                SHA512

                daa0c723312680256c24457162e0ef026b753ba267f3e2755f838e2864a163802c078d8668dd2c2064cb8887f4e382a73d6402a5533b6ac5c3cbf662ad83db86

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\IntlProvider.dll

                Filesize

                312KB

                MD5

                34035aed2021763bec1a7112d53732f1

                SHA1

                7132595f73755c3ae20a01b6863ac9518f7b75a4

                SHA256

                aac13ddb9ab5a165a38611f1b61229268a40d416f07740d4eefba1a8fcf7c731

                SHA512

                ea045aa46713133a5d0ad20514cc2a8c8fffb99b4e19c4d5262f86167cfce08a31d336222fd3c91e6efbfd90312bb2325337aa02a8489e047b616085fdf46c1d

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\LogProvider.dll

                Filesize

                108KB

                MD5

                c63f6b6d4498f2ec95de15645c48e086

                SHA1

                29f71180feed44f023da9b119ba112f2e23e6a10

                SHA256

                56aca41c62c8d0d1b26db3a01ef6c2da4a6a51fc963eb28411f8f7f029f1bfde

                SHA512

                3a634340d8c66cbc1bef19f701d8bdb034449c28afecce4e8744d18181a20f85a17af3b66c8853cecb8be53f69ae73f85b70e45deac29debab084a25eb3c69dc

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\MsiProvider.dll

                Filesize

                208KB

                MD5

                eb171b7a41a7dd48940f7521da61feb0

                SHA1

                9f2a5ddac7b78615f5a7af753d835aaa41e788fc

                SHA256

                56a8527d267116af39864feca528be5b7a88c3b5df94750154b2efcf2fda5d55

                SHA512

                5917266aed1a79ee4cb16bb532ccae99782d0ee8af27cb42a6b39496c3de61c12a30ce524a1a66cc063101ebcfac957d1b129aae0b491c0587f40171ba6bae12

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\OSProvider.dll

                Filesize

                180KB

                MD5

                e9833a54c1a1bfdab3e5189f3f740ff9

                SHA1

                ffb999c781161d9a694a841728995fda5b6da6d3

                SHA256

                ec137f9caebcea735a9386112cf68f78b92b6a5a38008ce6415485f565e5cf85

                SHA512

                0b18932b24c0257c80225c99be70c5125d2207f9b92681fd623870e7a62599a18fa46bcb5f2b4b01889be73aeb084e1b7e00a4968c699c7fdb3c083ef17a49f9

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\OfflineSetupProvider.dll

                Filesize

                213KB

                MD5

                3437087e6819614a8d54c9bc59a23139

                SHA1

                ae84efe44b02bacdb9da876e18715100a18362be

                SHA256

                8b247665218f5151f0d19f59ea902a7c28f745d67a5d51b63b77242ffb4bdd74

                SHA512

                018e88f6c121dd4ecaceb44794e2fa7a44b52ddb22e7a5a30a332905e02065cbc1d1dcddc197676277b22f741195c1b7c4c185d328b096b6560b84e9749d6dde

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\ProvProvider.dll

                Filesize

                800KB

                MD5

                2ef388f7769205ca319630dd328dcef1

                SHA1

                6dc9ed84e72af4d3e7793c07cfb244626470f3b6

                SHA256

                4915b0c9cd8dc8a29dd649739974d244f9105dc58725f1da0d592af3b546e2bf

                SHA512

                b465917424dd98125d080c135c7e222a9485ed7ec89004f9a70e335b800e5b9419fbc932c8069bae9ff126494174cf48e2790030dd22aa2d75b7b9d8ccff752b

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\ServicingCommon.dll

                Filesize

                944KB

                MD5

                07231bdae9d15bfca7d97f571de3a521

                SHA1

                04aec0f1afcf7732bc4cd1f7aab36e460c325ba6

                SHA256

                be75afbbc30cad7235adf03dcc07fcee3c0c330c89b00e326ebbef2e57df5935

                SHA512

                2a46e0657e84481faf5c9d3de410884cb5c6e7b35039f5be04183cdac6c088cc42b12d0097e27836af14699e7815d794ca1cec80960833ab093b8dc6d44e2129

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\SmiProvider.dll

                Filesize

                272KB

                MD5

                46e3e59dbf300ae56292dea398197837

                SHA1

                78636b25fdb32c8fcdf5fe73cac611213f13a8be

                SHA256

                5a0f1279013d1d379cb3a3e30f1d5be22549728cd9dc92ed5643eacf46199339

                SHA512

                e0584da3c302ea6ffa85932fa185500543f15237d029fdc4b084aee971ec13967f9e83cad250bea36b31f1a3efb1cc556da7dd231e5b06884809d0af51ebdf8c

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\SysprepProvider.dll

                Filesize

                820KB

                MD5

                4dfa1eeec0822bfcfb95e4fa8ec6c143

                SHA1

                54251e697e289020a72e1fd412e34713f2e292cf

                SHA256

                901cea68c7a158a1d9c030d3939f8f72057d1cf2f902aec1bc1b22a0000c0494

                SHA512

                5f3f710bef75da8cddb6e40686d6a19f59fbc7d8a6842eaceb9a002ab284a91ecf48c352171e13f6a75366610988e67710439f1dde579311ebbb3cd9e4751aa4

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\TransmogProvider.dll

                Filesize

                1.3MB

                MD5

                c1c56a9c6ea636dbca49cfcc45a188c3

                SHA1

                d852e49978a08e662804bf3d7ec93d8f6401a174

                SHA256

                b20b3eb2df22998fd7f9ff6898ba707d6b8833a8274719a5e09d5148d868faaf

                SHA512

                f6db05e4644d734f81c2461e4ad49c4e81880c9e4beee13dbbda923360ef6cf4821fccd9040671b86ab2cd8c85fc313c951c1a69e4df14d94268753ce7ae5b2e

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\UnattendProvider.dll

                Filesize

                256KB

                MD5

                7c61284580a6bc4a4c9c92a39bd9ea08

                SHA1

                4579294e3f3b6c03b03b15c249b9cac66e730d2a

                SHA256

                3665872e68264bbf3827c2bf0cfa60124ea1d87912728f2fc3685dce32855cb8

                SHA512

                b30b89d0d5e065042811d6ff397d226877ff698aeb1153681692aedabe3730e2f3746ad9d70e3120e336552bab880644f9ead0c91a451197a8f0977a2126a0fe

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\Vhdprovider.dll

                Filesize

                596KB

                MD5

                8a655555544b2915b5d8676cbf3d77ab

                SHA1

                5a7529f8a6d50d3f4e13b2e3a0585f08eb0511a2

                SHA256

                d3a2dd7d47bfbb3897b927d1b7230b5b12e5fd7315d687458de15fbb08fb7e27

                SHA512

                c6da649ae3c3688065b37bccfb5525ade25ba7bc3b163ad7d61f3b3d1c4957c8fd6c9f2bf23b0dbc4fffe32e980acb5a5d3895b8a012c5ed086e3e38caee2e93

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\WimProvider.dll

                Filesize

                672KB

                MD5

                bcf8735528bb89555fc687b1ed358844

                SHA1

                5ef5b24631d2f447c58b0973f61cb02118ae4adc

                SHA256

                78b742deddee8305ea06d77f296ad9fe0f4b4a27d71b34dcdff8ae199364790c

                SHA512

                8b2be4e9a4334a5fc7f7c58579c20974c9194b771f7a872fd8e411d79f45fc5b7657df4c57ad11acb915d5ea5d1f0583c8a981b2c05104e3303b3ee1469b93f5

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\dismprov.dll

                Filesize

                292KB

                MD5

                2ac64cc617d144ae4f37677b5cdbb9b6

                SHA1

                13fe83d7489d302de9ccefbf02c7737e7f9442f9

                SHA256

                006464f42a487ab765e1e97cf2d15bfa7db76752946de52ff7e518bc5bbb9a44

                SHA512

                acdb2c9727f53889aa4f1ca519e1991a5d9f08ef161fb6680265804c99487386ca6207d0a22f6c3e02f34eaeb5ded076655ee3f6b4b4e1f5fab5555d73addfd7

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\en-US\AppxProvider.dll.mui

                Filesize

                23KB

                MD5

                f70750a86cda23a3ced4a7ecf03feebd

                SHA1

                1c2d9d79974338ce21561b916130e696236fbb48

                SHA256

                8038c5177461aef977ac6e526ac0851bf7eff5928972462657176ff6b6d06050

                SHA512

                cfb6b5cdb451b12e7aee6e69ab743b91bec8bd417d4d2384def03010851fef0d7f2a65ff6349c4e62e564b44e742597aeb108e71a962a48020b1988a6c6f1a9a

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\en-US\AssocProvider.dll.mui

                Filesize

                8KB

                MD5

                3a26818c500fb74f13342f44c5213114

                SHA1

                af1bfc2ca2a1dcbc7037f61f80a949b67a2c9602

                SHA256

                421bbff0c63377b5fd85591530f4c28d0109bc1ff39162a42eb294f0d0e7c6bb

                SHA512

                afa1d62788d24cd6d739ad78cff19e455b776a71904af1400a44e54e56b55b149eca456db9c686c3a0b515d7fd49d96dc77b217ec769e879b0937bedad53de7f

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\en-US\CbsProvider.dll.mui

                Filesize

                53KB

                MD5

                8644aa200968ce8dfe182f775e1d65c4

                SHA1

                060149f78e374f2983abde607066f2e07e9b0861

                SHA256

                46b59cfae0ea50c722718cdb8c07b3f5d6f02174cc599cd19a157eb6016c6030

                SHA512

                29b4299ae749587c4fc9fd4b9cf3bbe3e9677088b159a40506a2cbd5796808e7432e7af08f0a2eef6c26bacb39b23afa65d0143c72774f38d55dedaef36eba1d

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\en-US\DismCore.dll.mui

                Filesize

                7KB

                MD5

                0a4338fdfb1adaa6592b8f1023ced5cf

                SHA1

                b96bd2067f43e5142e19f9c66e4db7d317d9cd2e

                SHA256

                0b6ac5a720dc9163dea36e565c82da1e375041688e6594de15d97652ab7aca80

                SHA512

                cf8cbb592dc5f09a95892d897680d4ca4f59e74afaeea2701d7258ace84c4c1182e032e7dd76cbd52a77ea08c8d3858e9b5f900691a6d80c728f5e56701382db

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\en-US\DmiProvider.dll.mui

                Filesize

                17KB

                MD5

                3b3ac59021e9dc8918647b454a1f5024

                SHA1

                cf36a48398e2823f7d9b684d9aacf3a0a4d54d06

                SHA256

                a5cd6429d6be85895c4589e08cb33075041a13d93fca69084ffeb4213bb0d4ff

                SHA512

                4eeaaaf3d8a466c0b1723ae97e1ecd1c3f6b8751ddc1ec314a04192e088a38ee5f29f16541ef27a56f2f26c6d146c7f9fc581680ec69ff02843580be525a2b7f

              • C:\Users\Admin\AppData\Local\Temp\AA708320-1B6C-4700-894F-F50909957D58\en-US\dismprov.dll.mui

                Filesize

                2KB

                MD5

                bff1ff3b5a6dba20ce82214fd626dc2b

                SHA1

                affa7a6f6f1bec42dafe0ca868463eddffcc17e0

                SHA256

                f307033265151affded4af3dbc2527bc16479468af740ea913f84a2a3a557c46

                SHA512

                20dfc62f92fc8ab8c7f757a078103414c4e359b744a603f8b655dcd2340677fa7d5fd2acf3c544a3409d31194df788e764c262ea7c625019276e1d00d3f6de19

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vt4tygzm.2y2.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Public\IObitUnlocker\Backup.vbs

                Filesize

                308B

                MD5

                59fca3c2fb6da0d16e0a280716e2f3ed

                SHA1

                dd01f82572e31875faa044c0152e48cc818ba5f3

                SHA256

                55e4fbd4febcf1db761a8f8732484998993b439bae2200f982d81ed35d55265d

                SHA512

                47caacc37ec8ae4c13120f713a35282da72e50dc7d2cdc6c50b1f96a07626d5db9e8c6d5822d8810c7a5096c476e737d8f7845e6fce23bbf39df7cad52938883

              • C:\Users\Public\IObitUnlocker\EN.dll

                Filesize

                95KB

                MD5

                87a0ae5f11c8520bfa67fb4abb44f043

                SHA1

                00d749000686b5dd47fddaad034665afc5423e26

                SHA256

                e97d791465d8cf2abe56450961f0cfa5278f4d0257da025ec949b541074d88e2

                SHA512

                3c981c46e53e795536f5517589da01c858d3a19cf019c988bfe91814415e698707ac7178b5c6a6fa80ca20328b2f02387aa673c7001b9675b0d9b96b71bd95aa

              • C:\Users\Public\IObitUnlocker\Loader.vbs

                Filesize

                308B

                MD5

                2993b76e0b0ba015caf654881638a0c0

                SHA1

                7fbd5f28fb2f6f948cbeb3c4dd5b0672bdfe4bcd

                SHA256

                0e131f595ef67c160de9727d9a92a84b50393e66dd242f330736b916e1bf20a3

                SHA512

                a61e0e7f92f0d78c27939ba21bdda6ff97503adc44e42a4b7eab3c4c1bea8acad4517b90db3430cabc237c2db01e60ab3a2a78e237ae01a896bd09aabba067cb

              • C:\Users\Public\IObitUnlocker\RAR.exe

                Filesize

                629KB

                MD5

                d3e9f98155c0faab869ccc74fb5e8a1e

                SHA1

                8e4feaad1d43306fdd8aa66efa443bca7afde710

                SHA256

                3e0fdb5c40336482dacef3496116053d7772a51720900141b3c6f35c6e9b351b

                SHA512

                2760c139ef276f406770675d89fb667f3369a9e1943a6eff2c18f391114018ad6fdce9daf0b499b18081ef22243ef04d74ff21cbd346eb31a1ddbcb79756697d

              • C:\Users\Public\IObitUnlocker\Report.ps1

                Filesize

                458KB

                MD5

                20d2c488f9ce3e337faf20ea1a9abe47

                SHA1

                ea844520e903e1f7d8f234a057cd3cc778380ae9

                SHA256

                6e7ff182d4509ea804b6ed739ffa2191af2891af164ede9a90e79aea8fee4d1f

                SHA512

                6581df037579fd6684ee4a44d2e631a4aa9c524b47c47fe2afb9434c487824146fb000d9c7a7b63df6c534b00f4a979f24be88019b3ed12d9bf3ce81508b243c

              • C:\Windows\Logs\DISM\dism.log

                Filesize

                282KB

                MD5

                09ee743ea979bb7138a0a410c259a096

                SHA1

                e3c34fc09673b6381170c65aaef4afcb3995778d

                SHA256

                4a3514c94f3e331207a0a47b22c2a4a810a7c7f251f8d50516085a102898e695

                SHA512

                771d6a4e32adfa1b2d28dbbcb71b067f28964dbc2daa16c3f1d061f728ea4bc6812cb63befc6cce50f41e29a6eede9f87f28d01e864b8c8f14c5782eb54b217d

              • C:\Windows\Logs\DISM\dism.log

                Filesize

                288KB

                MD5

                24c8bd6ae10911a6e628b35af54cd155

                SHA1

                02ed8072d621f37fab4ccc20ca33abff03e1f3c7

                SHA256

                dae8293e0c48fbf31ff8c591f5df8ee025f31261c68ae8f5645a5e77394cf72f

                SHA512

                1ece809804af5617975d67ac0b4171c96086dccedb006545f75f0a668393a9136aba3e9fb3bf9d144498be7b2b1944d18d3de1acc069845f578e43b0f0a8e4b2

              • memory/1288-11-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1288-9-0x0000029B4D800000-0x0000029B4D822000-memory.dmp

                Filesize

                136KB

              • memory/1288-105-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1288-10-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1288-0-0x00007FF9F37B3000-0x00007FF9F37B5000-memory.dmp

                Filesize

                8KB

              • memory/1288-513-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1288-12-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-106-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-511-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-125-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-63-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-22-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-21-0x00007FF9F37B0000-0x00007FF9F4272000-memory.dmp

                Filesize

                10.8MB

              • memory/4216-373-0x0000026E4A380000-0x0000026E4A38A000-memory.dmp

                Filesize

                40KB

              • memory/4352-86-0x00000288D4410000-0x00000288D4448000-memory.dmp

                Filesize

                224KB

              • memory/4352-76-0x00000288D1BC0000-0x00000288D1CA6000-memory.dmp

                Filesize

                920KB

              • memory/4352-78-0x00000288D1CC0000-0x00000288D1CC8000-memory.dmp

                Filesize

                32KB

              • memory/4352-77-0x00000288D1D20000-0x00000288D1D46000-memory.dmp

                Filesize

                152KB

              • memory/4352-79-0x00000288D1CF0000-0x00000288D1CFA000-memory.dmp

                Filesize

                40KB

              • memory/4352-83-0x00000288D4360000-0x00000288D4412000-memory.dmp

                Filesize

                712KB

              • memory/4352-84-0x00000288D44D0000-0x00000288D458A000-memory.dmp

                Filesize

                744KB

              • memory/4352-89-0x00000288D53E0000-0x00000288D53EE000-memory.dmp

                Filesize

                56KB

              • memory/4352-75-0x00000288B7530000-0x00000288B7624000-memory.dmp

                Filesize

                976KB

              • memory/4352-87-0x00000288D4FC0000-0x00000288D4FC8000-memory.dmp

                Filesize

                32KB

              • memory/4896-379-0x0000000006130000-0x00000000066D6000-memory.dmp

                Filesize

                5.6MB

              • memory/4896-385-0x0000000007190000-0x00000000071F6000-memory.dmp

                Filesize

                408KB

              • memory/4896-384-0x0000000006D80000-0x0000000006E1C000-memory.dmp

                Filesize

                624KB

              • memory/4896-381-0x0000000005C50000-0x0000000005C5A000-memory.dmp

                Filesize

                40KB

              • memory/4896-380-0x0000000005C70000-0x0000000005D02000-memory.dmp

                Filesize

                584KB

              • memory/4896-374-0x0000000000400000-0x0000000000416000-memory.dmp

                Filesize

                88KB