Resubmissions

15-10-2023 15:31

231015-sx9b1aaf63 10

03-06-2023 11:19

230603-ne62psge66 10

12-04-2023 12:00

230412-n6gk5aca73 10

05-09-2022 16:12

220905-tny1cabffk 10

Analysis

  • max time kernel
    170s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2022 16:12

General

  • Target

    $RDUQK6W.exe

  • Size

    10.5MB

  • MD5

    4a5a3ad1c74f3f7d525e1c97995ca649

  • SHA1

    cc0548dcbf4c0bc4489529e9148cf9f921485e84

  • SHA256

    19b66b877aa9324a2e9a51d828e1cab41b553070d37729096c555a7f1810fbb3

  • SHA512

    fbb94f6b670fbd6e32ac71b97cfe00d3c67a9747e1e4192ad1889bd8cf121b1b3bfe6e9fa0d4ba8634b5a8431b84c4ba7b3800bb6e128ce9ad759f952ac875b3

  • SSDEEP

    196608:OXBAqsvidH8HkLOogdmCvl6SsT2bygeHHNc8zKiSKu5GjY2+rZvPTetsi0ERHblh:vidcEiJtNUEMH6kXYj5etb0qHblVFV

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 3 IoCs
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 19 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$RDUQK6W.exe
    "C:\Users\Admin\AppData\Local\Temp\$RDUQK6W.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAbQBkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAagBoACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG0AZABpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGkAbQByACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1696
    • C:\Windows\5779722125.exe
      "C:\Windows\5779722125.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\tmp1AA3.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp1AA3.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 96
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1964
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
        3⤵
          PID:2188
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2304
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
          3⤵
            PID:2384
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2336
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2292
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2252
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2240
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
            3⤵
              PID:2212
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2200
          • C:\Windows\Blitz.exe
            "C:\Windows\Blitz.exe"
            2⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:1768
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
              3⤵
              • Creates scheduled task(s)
              PID:1172
          • C:\Windows\XboxUpdate.exe
            "C:\Windows\XboxUpdate.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1212
            • C:\Users\Admin\AppData\Local\Temp\tmp1C48.tmp.exe
              "C:\Users\Admin\AppData\Local\Temp\tmp1C48.tmp.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1044
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 96
                4⤵
                • Loads dropped DLL
                • Program crash
                PID:1792
          • C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe
            "C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:1940
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\PrintHood\services.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:960
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Admin\PrintHood\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1736
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\PrintHood\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1316
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Journal\ja-JP\dwm.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:784
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Journal\ja-JP\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:660
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Journal\ja-JP\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1424
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Users\Default\NetHood\spoolsv.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:900
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\NetHood\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1332
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Users\Default\NetHood\spoolsv.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1712
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Windows\schemas\WCN\smss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1768
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\schemas\WCN\smss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:576
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Windows\schemas\WCN\smss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:536
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Start Menu\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:540
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1440
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Start Menu\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1976
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Pictures\Sample Pictures\services.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:820
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Public\Pictures\Sample Pictures\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:572
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Pictures\Sample Pictures\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1520
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          1⤵
            PID:2768
          • C:\Windows\explorer.exe
            "C:\Windows\explorer.exe"
            1⤵
              PID:2844
            • C:\Windows\system32\AUDIODG.EXE
              C:\Windows\system32\AUDIODG.EXE 0x478
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3000
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {83159812-8506-4510-B2C7-F2B591D391CA} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
              1⤵
                PID:1476
                • C:\Users\Admin\AppData\Local\cache\MoUSO.exe
                  C:\Users\Admin\AppData\Local\cache\MoUSO.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1968
              • C:\Windows\helppane.exe
                C:\Windows\helppane.exe -Embedding
                1⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:3024

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe

                Filesize

                1.9MB

                MD5

                ec801a7d4b72a288ec6c207bb9ff0131

                SHA1

                32eec2ae1f9e201516fa7fcdc16c4928f7997561

                SHA256

                b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46

                SHA512

                a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac

              • C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe

                Filesize

                1.9MB

                MD5

                ec801a7d4b72a288ec6c207bb9ff0131

                SHA1

                32eec2ae1f9e201516fa7fcdc16c4928f7997561

                SHA256

                b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46

                SHA512

                a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac

              • C:\Users\Admin\AppData\Local\Temp\tmp1AA3.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • C:\Users\Admin\AppData\Local\Temp\tmp1C48.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

                Filesize

                461KB

                MD5

                9c30b653d66d104fa03e85c9c5987c19

                SHA1

                1db5a95ca0e2303bc7bc69ce1259e59594cbeb4d

                SHA256

                6f38484383e3301e91664d2cf8cfdc9347c37fa2c11e9c03838484745f6f1ba2

                SHA512

                464b6e92be6e4c0b74161a1d3eecccd766e4ced0c7940ab235cc96e80703b391cf56142c6c256d8fd45498949fde9f5cc5a8977d89752fac0cca133410c4744d

              • C:\Users\Admin\AppData\Local\cache\MoUSO.exe

                Filesize

                461KB

                MD5

                9c30b653d66d104fa03e85c9c5987c19

                SHA1

                1db5a95ca0e2303bc7bc69ce1259e59594cbeb4d

                SHA256

                6f38484383e3301e91664d2cf8cfdc9347c37fa2c11e9c03838484745f6f1ba2

                SHA512

                464b6e92be6e4c0b74161a1d3eecccd766e4ced0c7940ab235cc96e80703b391cf56142c6c256d8fd45498949fde9f5cc5a8977d89752fac0cca133410c4744d

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                00c9fc2750312cb51b2bd44897bb1ea4

                SHA1

                665347b8c597797564f9a38ab319c16da014bb8b

                SHA256

                2259b77280bbc2c8c7a4f8a70aa751895e24c39ce2960813079992803705cc64

                SHA512

                e704f282112817eec9aefd231678a198bd964f4bdb3b615c4db22a9fd5a931c42d7554cd04e33baf68f7ff82c6114c4be5504277e8189b4da562fafc72e6f7f1

              • C:\Windows\5779722125.exe

                Filesize

                5.7MB

                MD5

                44e4646b76a889c2115bdacc6e63ba2a

                SHA1

                efe7c1dae715922ff19121ff4f0e97ca904ee536

                SHA256

                91169afa1085d0402983787772694f1e19f08f62c636683cf73e30cc9299bee8

                SHA512

                b4fc6250eb1b250e78571ecab8b301adcbb5f25a4faf42842f95bf8f73c8a3ba5ac2f64190e7f450a738aff4d495816ab9c7b4c894ff04db5754b5561c60717d

              • C:\Windows\5779722125.exe

                Filesize

                5.7MB

                MD5

                44e4646b76a889c2115bdacc6e63ba2a

                SHA1

                efe7c1dae715922ff19121ff4f0e97ca904ee536

                SHA256

                91169afa1085d0402983787772694f1e19f08f62c636683cf73e30cc9299bee8

                SHA512

                b4fc6250eb1b250e78571ecab8b301adcbb5f25a4faf42842f95bf8f73c8a3ba5ac2f64190e7f450a738aff4d495816ab9c7b4c894ff04db5754b5561c60717d

              • C:\Windows\Blitz.exe

                Filesize

                461KB

                MD5

                9c30b653d66d104fa03e85c9c5987c19

                SHA1

                1db5a95ca0e2303bc7bc69ce1259e59594cbeb4d

                SHA256

                6f38484383e3301e91664d2cf8cfdc9347c37fa2c11e9c03838484745f6f1ba2

                SHA512

                464b6e92be6e4c0b74161a1d3eecccd766e4ced0c7940ab235cc96e80703b391cf56142c6c256d8fd45498949fde9f5cc5a8977d89752fac0cca133410c4744d

              • C:\Windows\Blitz.exe

                Filesize

                461KB

                MD5

                9c30b653d66d104fa03e85c9c5987c19

                SHA1

                1db5a95ca0e2303bc7bc69ce1259e59594cbeb4d

                SHA256

                6f38484383e3301e91664d2cf8cfdc9347c37fa2c11e9c03838484745f6f1ba2

                SHA512

                464b6e92be6e4c0b74161a1d3eecccd766e4ced0c7940ab235cc96e80703b391cf56142c6c256d8fd45498949fde9f5cc5a8977d89752fac0cca133410c4744d

              • C:\Windows\XboxUpdate.exe

                Filesize

                2.4MB

                MD5

                9539d670b998aa46651b51d69123b909

                SHA1

                77c4912a7b67260c486fda2f93a3b98ecb5e7d65

                SHA256

                52712a99b6b73458711a3af355c6b63a45457a9590964c835e08f6da84a09669

                SHA512

                9352b2c5c3b7f19a9c80bd574bd376d1db67cfcb8284abbab81b43efa881591a59cb25de0ff843d54bb958a05dccd783d342316a504bf8528f5e7b2cc02ee1aa

              • C:\Windows\XboxUpdate.exe

                Filesize

                2.4MB

                MD5

                9539d670b998aa46651b51d69123b909

                SHA1

                77c4912a7b67260c486fda2f93a3b98ecb5e7d65

                SHA256

                52712a99b6b73458711a3af355c6b63a45457a9590964c835e08f6da84a09669

                SHA512

                9352b2c5c3b7f19a9c80bd574bd376d1db67cfcb8284abbab81b43efa881591a59cb25de0ff843d54bb958a05dccd783d342316a504bf8528f5e7b2cc02ee1aa

              • \Users\Admin\AppData\Local\Temp\Extreme Injector.exe

                Filesize

                1.9MB

                MD5

                ec801a7d4b72a288ec6c207bb9ff0131

                SHA1

                32eec2ae1f9e201516fa7fcdc16c4928f7997561

                SHA256

                b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46

                SHA512

                a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac

              • \Users\Admin\AppData\Local\Temp\tmp1AA3.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • \Users\Admin\AppData\Local\Temp\tmp1AA3.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • \Users\Admin\AppData\Local\Temp\tmp1AA3.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • \Users\Admin\AppData\Local\Temp\tmp1C48.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • \Users\Admin\AppData\Local\Temp\tmp1C48.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • \Users\Admin\AppData\Local\Temp\tmp1C48.tmp.exe

                Filesize

                74KB

                MD5

                cdd3d44d9e64a113618961f0a4e691b9

                SHA1

                a762037bc50ddb7507d5ef1a20ce813ad990bb54

                SHA256

                dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

                SHA512

                55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

              • memory/1212-78-0x000000001B050000-0x000000001B09E000-memory.dmp

                Filesize

                312KB

              • memory/1212-76-0x0000000002200000-0x00000000022A6000-memory.dmp

                Filesize

                664KB

              • memory/1212-75-0x00000000005B0000-0x0000000000636000-memory.dmp

                Filesize

                536KB

              • memory/1212-151-0x000000001AF20000-0x000000001AF6C000-memory.dmp

                Filesize

                304KB

              • memory/1212-207-0x000000001B0B6000-0x000000001B0D5000-memory.dmp

                Filesize

                124KB

              • memory/1212-70-0x0000000000340000-0x00000000005B0000-memory.dmp

                Filesize

                2.4MB

              • memory/1356-91-0x00000000006F0000-0x00000000006FC000-memory.dmp

                Filesize

                48KB

              • memory/1356-79-0x0000000000360000-0x000000000036E000-memory.dmp

                Filesize

                56KB

              • memory/1356-95-0x0000000000730000-0x0000000000738000-memory.dmp

                Filesize

                32KB

              • memory/1356-96-0x0000000000740000-0x000000000074E000-memory.dmp

                Filesize

                56KB

              • memory/1356-97-0x0000000000750000-0x000000000075C000-memory.dmp

                Filesize

                48KB

              • memory/1356-98-0x0000000000760000-0x000000000076C000-memory.dmp

                Filesize

                48KB

              • memory/1356-94-0x0000000000720000-0x000000000072E000-memory.dmp

                Filesize

                56KB

              • memory/1356-146-0x000000001B436000-0x000000001B455000-memory.dmp

                Filesize

                124KB

              • memory/1356-92-0x0000000000700000-0x0000000000708000-memory.dmp

                Filesize

                32KB

              • memory/1356-71-0x0000000000C80000-0x0000000001242000-memory.dmp

                Filesize

                5.8MB

              • memory/1356-104-0x000000001B436000-0x000000001B455000-memory.dmp

                Filesize

                124KB

              • memory/1356-90-0x00000000006E0000-0x00000000006EC000-memory.dmp

                Filesize

                48KB

              • memory/1356-89-0x0000000000550000-0x0000000000558000-memory.dmp

                Filesize

                32KB

              • memory/1356-88-0x0000000000540000-0x000000000054C000-memory.dmp

                Filesize

                48KB

              • memory/1356-85-0x00000000004F0000-0x00000000004FA000-memory.dmp

                Filesize

                40KB

              • memory/1356-73-0x000000001BB60000-0x000000001BCBE000-memory.dmp

                Filesize

                1.4MB

              • memory/1356-84-0x00000000004E0000-0x00000000004F0000-memory.dmp

                Filesize

                64KB

              • memory/1356-83-0x00000000004C0000-0x00000000004D6000-memory.dmp

                Filesize

                88KB

              • memory/1356-80-0x0000000000370000-0x000000000038C000-memory.dmp

                Filesize

                112KB

              • memory/1356-81-0x00000000004A0000-0x00000000004A8000-memory.dmp

                Filesize

                32KB

              • memory/1356-82-0x00000000004B0000-0x00000000004C0000-memory.dmp

                Filesize

                64KB

              • memory/1356-93-0x0000000000710000-0x000000000071A000-memory.dmp

                Filesize

                40KB

              • memory/1696-74-0x0000000074380000-0x000000007492B000-memory.dmp

                Filesize

                5.7MB

              • memory/1696-112-0x0000000074380000-0x000000007492B000-memory.dmp

                Filesize

                5.7MB

              • memory/1884-54-0x0000000076171000-0x0000000076173000-memory.dmp

                Filesize

                8KB

              • memory/1940-152-0x000000001B146000-0x000000001B165000-memory.dmp

                Filesize

                124KB

              • memory/1940-113-0x000000001B146000-0x000000001B165000-memory.dmp

                Filesize

                124KB

              • memory/1940-72-0x0000000000800000-0x00000000009E6000-memory.dmp

                Filesize

                1.9MB

              • memory/1940-77-0x000007FEFC281000-0x000007FEFC283000-memory.dmp

                Filesize

                8KB

              • memory/2188-166-0x0000000002A04000-0x0000000002A07000-memory.dmp

                Filesize

                12KB

              • memory/2188-171-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2188-183-0x000000001B900000-0x000000001BBFF000-memory.dmp

                Filesize

                3.0MB

              • memory/2188-198-0x0000000002A04000-0x0000000002A07000-memory.dmp

                Filesize

                12KB

              • memory/2188-209-0x0000000002A0B000-0x0000000002A2A000-memory.dmp

                Filesize

                124KB

              • memory/2188-135-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2188-199-0x0000000002A0B000-0x0000000002A2A000-memory.dmp

                Filesize

                124KB

              • memory/2200-191-0x0000000002814000-0x0000000002817000-memory.dmp

                Filesize

                12KB

              • memory/2200-192-0x000000000281B000-0x000000000283A000-memory.dmp

                Filesize

                124KB

              • memory/2200-168-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2200-178-0x000000001B980000-0x000000001BC7F000-memory.dmp

                Filesize

                3.0MB

              • memory/2200-148-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2200-208-0x000000000281B000-0x000000000283A000-memory.dmp

                Filesize

                124KB

              • memory/2200-162-0x0000000002814000-0x0000000002817000-memory.dmp

                Filesize

                12KB

              • memory/2212-155-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2212-205-0x0000000002964000-0x0000000002967000-memory.dmp

                Filesize

                12KB

              • memory/2212-206-0x000000000296B000-0x000000000298A000-memory.dmp

                Filesize

                124KB

              • memory/2212-144-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2212-158-0x0000000002964000-0x0000000002967000-memory.dmp

                Filesize

                12KB

              • memory/2212-188-0x000000001B8A0000-0x000000001BB9F000-memory.dmp

                Filesize

                3.0MB

              • memory/2240-130-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2240-170-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2240-174-0x000000001B830000-0x000000001BB2F000-memory.dmp

                Filesize

                3.0MB

              • memory/2240-164-0x00000000023D4000-0x00000000023D7000-memory.dmp

                Filesize

                12KB

              • memory/2240-189-0x00000000023DB000-0x00000000023FA000-memory.dmp

                Filesize

                124KB

              • memory/2240-187-0x00000000023D4000-0x00000000023D7000-memory.dmp

                Filesize

                12KB

              • memory/2252-172-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2252-150-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2252-203-0x000000000256B000-0x000000000258A000-memory.dmp

                Filesize

                124KB

              • memory/2252-196-0x0000000002564000-0x0000000002567000-memory.dmp

                Filesize

                12KB

              • memory/2252-165-0x0000000002564000-0x0000000002567000-memory.dmp

                Filesize

                12KB

              • memory/2252-182-0x000000001B7F0000-0x000000001BAEF000-memory.dmp

                Filesize

                3.0MB

              • memory/2292-153-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2292-169-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2292-179-0x000000001B940000-0x000000001BC3F000-memory.dmp

                Filesize

                3.0MB

              • memory/2292-204-0x00000000027EB000-0x000000000280A000-memory.dmp

                Filesize

                124KB

              • memory/2292-197-0x00000000027E4000-0x00000000027E7000-memory.dmp

                Filesize

                12KB

              • memory/2292-163-0x00000000027E4000-0x00000000027E7000-memory.dmp

                Filesize

                12KB

              • memory/2304-202-0x000000000244B000-0x000000000246A000-memory.dmp

                Filesize

                124KB

              • memory/2304-145-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2304-195-0x0000000002444000-0x0000000002447000-memory.dmp

                Filesize

                12KB

              • memory/2304-160-0x0000000002444000-0x0000000002447000-memory.dmp

                Filesize

                12KB

              • memory/2304-181-0x000000001B8C0000-0x000000001BBBF000-memory.dmp

                Filesize

                3.0MB

              • memory/2304-157-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2336-175-0x000000001B820000-0x000000001BB1F000-memory.dmp

                Filesize

                3.0MB

              • memory/2336-167-0x0000000002684000-0x0000000002687000-memory.dmp

                Filesize

                12KB

              • memory/2336-200-0x000000000268B000-0x00000000026AA000-memory.dmp

                Filesize

                124KB

              • memory/2336-173-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2336-190-0x000000000268B000-0x00000000026AA000-memory.dmp

                Filesize

                124KB

              • memory/2336-194-0x0000000002684000-0x0000000002687000-memory.dmp

                Filesize

                12KB

              • memory/2336-154-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2356-201-0x000000000250B000-0x000000000252A000-memory.dmp

                Filesize

                124KB

              • memory/2356-193-0x0000000002504000-0x0000000002507000-memory.dmp

                Filesize

                12KB

              • memory/2356-156-0x000007FEEB7A0000-0x000007FEEC2FD000-memory.dmp

                Filesize

                11.4MB

              • memory/2356-159-0x0000000002504000-0x0000000002507000-memory.dmp

                Filesize

                12KB

              • memory/2356-186-0x000000000250B000-0x000000000252A000-memory.dmp

                Filesize

                124KB

              • memory/2356-147-0x000007FEEC300000-0x000007FEECD23000-memory.dmp

                Filesize

                10.1MB

              • memory/2356-180-0x000000001B8E0000-0x000000001BBDF000-memory.dmp

                Filesize

                3.0MB