Analysis

  • max time kernel
    169s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 13:42

General

  • Target

    b8505ce8bfcbcb35e416859fc355d72aa62a0aabc3f28425a8d6267c926c9e88.exe

  • Size

    256KB

  • MD5

    21ca38a38a1d371767412efb73774bf5

  • SHA1

    6d5797b4efee1293d572ee88d471a71c6089f7c7

  • SHA256

    b8505ce8bfcbcb35e416859fc355d72aa62a0aabc3f28425a8d6267c926c9e88

  • SHA512

    3c32bd457492e686c82bc963131e410c0174c2fb0b2a0f1ef13fea5360709ac401ed1240ccb7b9976adea36cba567eafd5f95f77a3c4972cab640ed410ed5e56

  • SSDEEP

    6144:NeTeM/XU1zmDO2RwvBbgCl1/ILmUhvu3ivhWc4G8ZXHmyl1G:xM/U1zmh6xZlamUhvu4yG8Z3mylA

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 24 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8505ce8bfcbcb35e416859fc355d72aa62a0aabc3f28425a8d6267c926c9e88.exe
    "C:\Users\Admin\AppData\Local\Temp\b8505ce8bfcbcb35e416859fc355d72aa62a0aabc3f28425a8d6267c926c9e88.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\yx_dts.exe
      "C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\yx_dts.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe
        "C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe" SW_SHOWNORMAL
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4372
      • C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe
        "C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe" /ShowDeskTop
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        PID:1928
      • C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe
        "C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe" /setupsucc
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious behavior: EnumeratesProcesses
        PID:4764
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.61jingling.com/Yjg1MDVjZThiZmNiY2IzNWU0MTY4NTlmYzM1NWQ3MmFhNjJhMGFhYmMzZjI4NDI1YThkNjI2N2M5MjZjOWU4OC5leGU=/40.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb3e7b46f8,0x7ffb3e7b4708,0x7ffb3e7b4718
        3⤵
          PID:2240
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15343007961733883170,4703518926805655851,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:2
          3⤵
            PID:2808
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,15343007961733883170,4703518926805655851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3908
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,15343007961733883170,4703518926805655851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
            3⤵
              PID:3312
        • C:\Windows\System32\CompPkgSrv.exe
          C:\Windows\System32\CompPkgSrv.exe -Embedding
          1⤵
            PID:3624

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Base64.dll

            Filesize

            4KB

            MD5

            f0e3845fefd227d7f1101850410ec849

            SHA1

            3067203fafd4237be0c186ddab7029dfcbdfb53e

            SHA256

            7c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554

            SHA512

            584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Base64.dll

            Filesize

            4KB

            MD5

            f0e3845fefd227d7f1101850410ec849

            SHA1

            3067203fafd4237be0c186ddab7029dfcbdfb53e

            SHA256

            7c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554

            SHA512

            584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\Inetc.dll

            Filesize

            20KB

            MD5

            50fdadda3e993688401f6f1108fabdb4

            SHA1

            04a9ae55d0fb726be49809582cea41d75bf22a9a

            SHA256

            6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

            SHA512

            e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\System.dll

            Filesize

            11KB

            MD5

            00a0194c20ee912257df53bfe258ee4a

            SHA1

            d7b4e319bc5119024690dc8230b9cc919b1b86b2

            SHA256

            dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

            SHA512

            3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\nsProcess.dll

            Filesize

            4KB

            MD5

            05450face243b3a7472407b999b03a72

            SHA1

            ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

            SHA256

            95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

            SHA512

            f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\nsProcess.dll

            Filesize

            4KB

            MD5

            05450face243b3a7472407b999b03a72

            SHA1

            ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

            SHA256

            95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

            SHA512

            f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\yx_dts.exe

            Filesize

            930KB

            MD5

            d3f054de4c81b4d02c5dba5ab7c97b76

            SHA1

            6e8f39ddc425a7badc66e2e03e813a68e75ca772

            SHA256

            439641179cf715d946321bfb60d8fa0fbabf7a166c8aac941815571401edb489

            SHA512

            f0da7eb8b3b4622897b15c230d7f4b60f0d87ae19e0b32ead3f80f7c497cf6629cac9d047a9efae2e330e65e9d60dbe1997602674eb91759c7b29a544286a406

          • C:\Users\Admin\AppData\Local\Temp\nslE3CE.tmp\yx_dts.exe

            Filesize

            930KB

            MD5

            d3f054de4c81b4d02c5dba5ab7c97b76

            SHA1

            6e8f39ddc425a7badc66e2e03e813a68e75ca772

            SHA256

            439641179cf715d946321bfb60d8fa0fbabf7a166c8aac941815571401edb489

            SHA512

            f0da7eb8b3b4622897b15c230d7f4b60f0d87ae19e0b32ead3f80f7c497cf6629cac9d047a9efae2e330e65e9d60dbe1997602674eb91759c7b29a544286a406

          • C:\Users\Admin\AppData\Local\Temp\nsrA0E1.tmp\FindProcDLL.dll

            Filesize

            3KB

            MD5

            8614c450637267afacad1645e23ba24a

            SHA1

            e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

            SHA256

            0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

            SHA512

            af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

          • C:\Users\Admin\AppData\Local\Temp\nsrA0E1.tmp\FindProcDLL.dll

            Filesize

            3KB

            MD5

            8614c450637267afacad1645e23ba24a

            SHA1

            e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

            SHA256

            0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

            SHA512

            af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

          • C:\Users\Admin\AppData\Local\Temp\nsrA0E1.tmp\System.dll

            Filesize

            11KB

            MD5

            c17103ae9072a06da581dec998343fc1

            SHA1

            b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

            SHA256

            dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

            SHA512

            d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

          • C:\Users\Admin\AppData\Roaming\dts\mydts\Lander.ini

            Filesize

            411B

            MD5

            9fb90ad38724635aefec3be198bbdda6

            SHA1

            e0afb8fd2ebe1e4acd8f365a2a9bf07d4f3d4ca3

            SHA256

            9adc47893fb53680d05264d37e7d0c8d908cbe16586eb1c9fa6198400c2f4d6d

            SHA512

            94bb1ae0b7b2aa693ceee74bbf109a8ac86041f9e0e50519e64da812bac8e7431d637455bb6185428df3e49d985f02b841216e7b214c0a781b80b5b0806bfad1

          • C:\Users\Admin\AppData\Roaming\dts\mydts\Lander.ini

            Filesize

            411B

            MD5

            9fb90ad38724635aefec3be198bbdda6

            SHA1

            e0afb8fd2ebe1e4acd8f365a2a9bf07d4f3d4ca3

            SHA256

            9adc47893fb53680d05264d37e7d0c8d908cbe16586eb1c9fa6198400c2f4d6d

            SHA512

            94bb1ae0b7b2aa693ceee74bbf109a8ac86041f9e0e50519e64da812bac8e7431d637455bb6185428df3e49d985f02b841216e7b214c0a781b80b5b0806bfad1

          • C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe

            Filesize

            883KB

            MD5

            b5d09fd991b640cd198f9c32ca01e25e

            SHA1

            1a312c68d92c13dff436f951af1a1ad56c0fbfcc

            SHA256

            4cca4410d6559adc5b6f81ee2641132220fbc0fb75bf4ead6722ee8a9b2d9bb6

            SHA512

            ba0793bed656c3fdc9aa075eb26dbb52c9bfcdf012231bb5c1bb80ad6857825065ba433cbb0d34fc2dd3f0972bed37e59e74f3eeda60d659561c57a0069831e7

          • C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe

            Filesize

            883KB

            MD5

            b5d09fd991b640cd198f9c32ca01e25e

            SHA1

            1a312c68d92c13dff436f951af1a1ad56c0fbfcc

            SHA256

            4cca4410d6559adc5b6f81ee2641132220fbc0fb75bf4ead6722ee8a9b2d9bb6

            SHA512

            ba0793bed656c3fdc9aa075eb26dbb52c9bfcdf012231bb5c1bb80ad6857825065ba433cbb0d34fc2dd3f0972bed37e59e74f3eeda60d659561c57a0069831e7

          • C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe

            Filesize

            883KB

            MD5

            b5d09fd991b640cd198f9c32ca01e25e

            SHA1

            1a312c68d92c13dff436f951af1a1ad56c0fbfcc

            SHA256

            4cca4410d6559adc5b6f81ee2641132220fbc0fb75bf4ead6722ee8a9b2d9bb6

            SHA512

            ba0793bed656c3fdc9aa075eb26dbb52c9bfcdf012231bb5c1bb80ad6857825065ba433cbb0d34fc2dd3f0972bed37e59e74f3eeda60d659561c57a0069831e7

          • C:\Users\Admin\AppData\Roaming\dts\mydts\dts.exe

            Filesize

            883KB

            MD5

            b5d09fd991b640cd198f9c32ca01e25e

            SHA1

            1a312c68d92c13dff436f951af1a1ad56c0fbfcc

            SHA256

            4cca4410d6559adc5b6f81ee2641132220fbc0fb75bf4ead6722ee8a9b2d9bb6

            SHA512

            ba0793bed656c3fdc9aa075eb26dbb52c9bfcdf012231bb5c1bb80ad6857825065ba433cbb0d34fc2dd3f0972bed37e59e74f3eeda60d659561c57a0069831e7

          • \??\pipe\LOCAL\crashpad_2560_XAWJENRXJRBRBHNC

            MD5

            d41d8cd98f00b204e9800998ecf8427e

            SHA1

            da39a3ee5e6b4b0d3255bfef95601890afd80709

            SHA256

            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

            SHA512

            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

          • memory/228-161-0x0000000002150000-0x0000000002153000-memory.dmp

            Filesize

            12KB

          • memory/228-153-0x0000000000000000-mapping.dmp

          • memory/1928-165-0x0000000000000000-mapping.dmp

          • memory/2240-175-0x0000000000000000-mapping.dmp

          • memory/2560-168-0x0000000000000000-mapping.dmp

          • memory/2808-183-0x0000000000000000-mapping.dmp

          • memory/3312-187-0x0000000000000000-mapping.dmp

          • memory/3908-184-0x0000000000000000-mapping.dmp

          • memory/4236-172-0x0000000000471000-0x0000000000474000-memory.dmp

            Filesize

            12KB

          • memory/4236-143-0x0000000002431000-0x0000000002434000-memory.dmp

            Filesize

            12KB

          • memory/4236-152-0x0000000000441000-0x0000000000444000-memory.dmp

            Filesize

            12KB

          • memory/4236-140-0x00000000023B1000-0x00000000023B4000-memory.dmp

            Filesize

            12KB

          • memory/4372-162-0x0000000000000000-mapping.dmp

          • memory/4764-173-0x0000000000000000-mapping.dmp