Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2023 20:40

General

  • Target

    705e9d3021467e35dd43057a8e412e0eddb04603eb344ac4a31c3650f751aa14.exe

  • Size

    150KB

  • MD5

    0325ec4dc777b79587a835850fb9ee72

  • SHA1

    d764e57392b7b547887afd713a1962853f2c9620

  • SHA256

    705e9d3021467e35dd43057a8e412e0eddb04603eb344ac4a31c3650f751aa14

  • SHA512

    7edcdd871752c14babd0ebf6fced4e59bf92c953710c4f1bd6f8dc22ed2768c6e4b4f2e382d7f89ad87c93b00273f86c786d4b2fe9f16a0205764e3387a1a685

  • SSDEEP

    3072:1FsoVrqI7B2FDEeSs/quhQRiNoxaFzFzXGGxg:Uarv7B1eS5XRfxQyGx

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Detected potential entity reuse from brand microsoft.
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 39 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\705e9d3021467e35dd43057a8e412e0eddb04603eb344ac4a31c3650f751aa14.exe
    "C:\Users\Admin\AppData\Local\Temp\705e9d3021467e35dd43057a8e412e0eddb04603eb344ac4a31c3650f751aa14.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:404
  • C:\Users\Admin\AppData\Local\Temp\4FB6.exe
    C:\Users\Admin\AppData\Local\Temp\4FB6.exe
    1⤵
    • Executes dropped EXE
    PID:2216
  • C:\Users\Admin\AppData\Local\Temp\6B1F.exe
    C:\Users\Admin\AppData\Local\Temp\6B1F.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=6B1F.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
      2⤵
      • Adds Run key to start application
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff1e9f46f8,0x7fff1e9f4708,0x7fff1e9f4718
        3⤵
          PID:4972
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
          3⤵
            PID:4056
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
            3⤵
              PID:5084
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:8
              3⤵
                PID:3428
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                3⤵
                  PID:1948
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                  3⤵
                    PID:1080
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                    3⤵
                      PID:5116
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 /prefetch:8
                      3⤵
                        PID:3976
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                        3⤵
                          PID:2752
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                          3⤵
                            PID:3828
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:1
                            3⤵
                              PID:3900
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                              3⤵
                                PID:4132
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5196 /prefetch:8
                                3⤵
                                  PID:2668
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6300 /prefetch:8
                                  3⤵
                                    PID:4192
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:2284
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7e15d5460,0x7ff7e15d5470,0x7ff7e15d5480
                                      4⤵
                                        PID:1796
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6300 /prefetch:8
                                      3⤵
                                        PID:1468
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,6520893125675091162,10037961780170411957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5716 /prefetch:8
                                        3⤵
                                          PID:1492
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=6B1F.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                        2⤵
                                          PID:1684
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1e9f46f8,0x7fff1e9f4708,0x7fff1e9f4718
                                            3⤵
                                              PID:2892
                                        • C:\Users\Admin\AppData\Local\Temp\77F1.exe
                                          C:\Users\Admin\AppData\Local\Temp\77F1.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of WriteProcessMemory
                                          PID:2888
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                            2⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3148
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:540
                                          • C:\Users\Admin\AppData\Local\Temp\9CC0.exe
                                            C:\Users\Admin\AppData\Local\Temp\9CC0.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Modifies Internet Explorer settings
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4640
                                          • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                            C:\Users\Admin\AppData\Local\Temp\A339.exe
                                            1⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            PID:4872
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
                                              2⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3048
                                            • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                              C:\Users\Admin\AppData\Local\Temp\A339.exe
                                              2⤵
                                              • Executes dropped EXE
                                              PID:208
                                            • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                              C:\Users\Admin\AppData\Local\Temp\A339.exe
                                              2⤵
                                              • Executes dropped EXE
                                              PID:1392
                                            • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                              C:\Users\Admin\AppData\Local\Temp\A339.exe
                                              2⤵
                                              • Executes dropped EXE
                                              PID:1464
                                          • C:\Users\Admin\AppData\Local\Temp\A9B2.exe
                                            C:\Users\Admin\AppData\Local\Temp\A9B2.exe
                                            1⤵
                                            • Executes dropped EXE
                                            PID:1440
                                          • C:\Windows\SysWOW64\explorer.exe
                                            C:\Windows\SysWOW64\explorer.exe
                                            1⤵
                                              PID:592
                                            • C:\Windows\explorer.exe
                                              C:\Windows\explorer.exe
                                              1⤵
                                              • Suspicious behavior: MapViewOfSection
                                              PID:4752
                                            • C:\Windows\SysWOW64\explorer.exe
                                              C:\Windows\SysWOW64\explorer.exe
                                              1⤵
                                                PID:1360
                                              • C:\Windows\explorer.exe
                                                C:\Windows\explorer.exe
                                                1⤵
                                                  PID:3512
                                                • C:\Windows\SysWOW64\explorer.exe
                                                  C:\Windows\SysWOW64\explorer.exe
                                                  1⤵
                                                    PID:4816
                                                  • C:\Windows\SysWOW64\explorer.exe
                                                    C:\Windows\SysWOW64\explorer.exe
                                                    1⤵
                                                      PID:4444
                                                    • C:\Windows\SysWOW64\explorer.exe
                                                      C:\Windows\SysWOW64\explorer.exe
                                                      1⤵
                                                        PID:4404
                                                      • C:\Windows\explorer.exe
                                                        C:\Windows\explorer.exe
                                                        1⤵
                                                          PID:4428
                                                        • C:\Windows\SysWOW64\explorer.exe
                                                          C:\Windows\SysWOW64\explorer.exe
                                                          1⤵
                                                            PID:4448

                                                          Network

                                                          MITRE ATT&CK Matrix ATT&CK v6

                                                          Persistence

                                                          Registry Run Keys / Startup Folder

                                                          1
                                                          T1060

                                                          Defense Evasion

                                                          Virtualization/Sandbox Evasion

                                                          1
                                                          T1497

                                                          Modify Registry

                                                          2
                                                          T1112

                                                          Discovery

                                                          Query Registry

                                                          5
                                                          T1012

                                                          Virtualization/Sandbox Evasion

                                                          1
                                                          T1497

                                                          System Information Discovery

                                                          6
                                                          T1082

                                                          Peripheral Device Discovery

                                                          1
                                                          T1120

                                                          Command and Control

                                                          Web Service

                                                          1
                                                          T1102

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\A339.exe.log
                                                            Filesize

                                                            1KB

                                                            MD5

                                                            9e39b702ddcbdc603ad47b9d318dce62

                                                            SHA1

                                                            31709fbc20df043f4699fc3b288ce9bccd666b94

                                                            SHA256

                                                            b91057818a6617ee8e0c725d144403d30226b04d8181fed08cf0e5d634ee6388

                                                            SHA512

                                                            bab6b606b18f68e775d5a4fc2033adb1f228f66fe7103fe49a58dc7349227769df14d53b665615c7a9fb0cf2bbf679d5aa1ff2e97b0200d0a3603f8aebb9f533

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                            Filesize

                                                            152B

                                                            MD5

                                                            77c5176b80498efa00b6017129739c95

                                                            SHA1

                                                            b687aceede3bb326320a8ac6f652d3cbc5482635

                                                            SHA256

                                                            f0a2332f3aead2f03825b552d03d66574b3877ef4a0b9f0d61c99e71b721a413

                                                            SHA512

                                                            db6984d885a42f1fcc9a6598540d8c94744a74f09822eccddb8d9e81cd7cf2a54689720af729dd99bf97a482963e5939e71ae62e24251c1bd2f6ce8c30fd5301

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico
                                                            Filesize

                                                            70KB

                                                            MD5

                                                            e5e3377341056643b0494b6842c0b544

                                                            SHA1

                                                            d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                            SHA256

                                                            e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                            SHA512

                                                            83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                          • C:\Users\Admin\AppData\Local\Temp\4FB6.exe
                                                            Filesize

                                                            4KB

                                                            MD5

                                                            9748489855d9dd82ab09da5e3e55b19e

                                                            SHA1

                                                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                            SHA256

                                                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                            SHA512

                                                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                          • C:\Users\Admin\AppData\Local\Temp\4FB6.exe
                                                            Filesize

                                                            4KB

                                                            MD5

                                                            9748489855d9dd82ab09da5e3e55b19e

                                                            SHA1

                                                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                            SHA256

                                                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                            SHA512

                                                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                          • C:\Users\Admin\AppData\Local\Temp\6B1F.exe
                                                            Filesize

                                                            3.0MB

                                                            MD5

                                                            4df973fc60804e9bc6a8051582351ee5

                                                            SHA1

                                                            4ddc2e8ef17773fe4b7a29ea8634ff92861cd647

                                                            SHA256

                                                            bd036b1298af5791d217f59dcedb65fd719f942f7da224bdf6cea433d45c34b1

                                                            SHA512

                                                            86633629198870b36a5d9b28178140a4892f75581ac0f2bac77cb744bbdf0c7e2453656a31db4a4a9418d532212f3ed31a7061a0b84aa4bcc37da0f0d907048e

                                                          • C:\Users\Admin\AppData\Local\Temp\6B1F.exe
                                                            Filesize

                                                            3.0MB

                                                            MD5

                                                            4df973fc60804e9bc6a8051582351ee5

                                                            SHA1

                                                            4ddc2e8ef17773fe4b7a29ea8634ff92861cd647

                                                            SHA256

                                                            bd036b1298af5791d217f59dcedb65fd719f942f7da224bdf6cea433d45c34b1

                                                            SHA512

                                                            86633629198870b36a5d9b28178140a4892f75581ac0f2bac77cb744bbdf0c7e2453656a31db4a4a9418d532212f3ed31a7061a0b84aa4bcc37da0f0d907048e

                                                          • C:\Users\Admin\AppData\Local\Temp\77F1.exe
                                                            Filesize

                                                            344KB

                                                            MD5

                                                            0907dc351caecbe56e4ae22c041efd17

                                                            SHA1

                                                            019335863db510b409415c574764c7728a5831ec

                                                            SHA256

                                                            9aef4e5ba4269eeaf266e914e7d48b9ed3e947da9345ec7a9d9e860d6798ea3d

                                                            SHA512

                                                            61518ad3b9c29ff7d53ab755ca0a4ee66a1e522cf0cd30d7baceb2597dab0c4896597207a0eaf5acfef5b0b5a08b52e9267ebd24ec5f6d15349ac97dcacdcee8

                                                          • C:\Users\Admin\AppData\Local\Temp\77F1.exe
                                                            Filesize

                                                            344KB

                                                            MD5

                                                            0907dc351caecbe56e4ae22c041efd17

                                                            SHA1

                                                            019335863db510b409415c574764c7728a5831ec

                                                            SHA256

                                                            9aef4e5ba4269eeaf266e914e7d48b9ed3e947da9345ec7a9d9e860d6798ea3d

                                                            SHA512

                                                            61518ad3b9c29ff7d53ab755ca0a4ee66a1e522cf0cd30d7baceb2597dab0c4896597207a0eaf5acfef5b0b5a08b52e9267ebd24ec5f6d15349ac97dcacdcee8

                                                          • C:\Users\Admin\AppData\Local\Temp\9CC0.exe
                                                            Filesize

                                                            6.4MB

                                                            MD5

                                                            3e9adb4d8dbec6eddee3065caf5911f6

                                                            SHA1

                                                            31c7111c8044afdf5c6ddb1e55244acfd06229d3

                                                            SHA256

                                                            215426d36754e9d391ae8ccabb74de1489fb8c18a127fec02a5be4e45462a7a5

                                                            SHA512

                                                            b62f413092028a3bdbc4ee7f6a085e881f51ed68c28d2950d1665cb4ecb1170f173a6003660b3c0d6629cc85f6f4b0e28dedd42c839ebbb29343b46a4f474ff9

                                                          • C:\Users\Admin\AppData\Local\Temp\9CC0.exe
                                                            Filesize

                                                            6.4MB

                                                            MD5

                                                            3e9adb4d8dbec6eddee3065caf5911f6

                                                            SHA1

                                                            31c7111c8044afdf5c6ddb1e55244acfd06229d3

                                                            SHA256

                                                            215426d36754e9d391ae8ccabb74de1489fb8c18a127fec02a5be4e45462a7a5

                                                            SHA512

                                                            b62f413092028a3bdbc4ee7f6a085e881f51ed68c28d2950d1665cb4ecb1170f173a6003660b3c0d6629cc85f6f4b0e28dedd42c839ebbb29343b46a4f474ff9

                                                          • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                                            Filesize

                                                            1.5MB

                                                            MD5

                                                            c8c05c344c028625e22fbf3f9b00a9a7

                                                            SHA1

                                                            ab3b124bb475a411307a7b699e0f6cd1ad549051

                                                            SHA256

                                                            5be19294bec8749e2473edb88ced8d8d6844d79dc2d7181002f37d3b740fb747

                                                            SHA512

                                                            c771810a128d77e978a034d69a1bd27309812e9f17c30d5bd407c43293500a60d09c386c98be16f20b582c5457c6b03ee6e1758cf661ecc81e03726a7192aeaf

                                                          • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                                            Filesize

                                                            1.5MB

                                                            MD5

                                                            c8c05c344c028625e22fbf3f9b00a9a7

                                                            SHA1

                                                            ab3b124bb475a411307a7b699e0f6cd1ad549051

                                                            SHA256

                                                            5be19294bec8749e2473edb88ced8d8d6844d79dc2d7181002f37d3b740fb747

                                                            SHA512

                                                            c771810a128d77e978a034d69a1bd27309812e9f17c30d5bd407c43293500a60d09c386c98be16f20b582c5457c6b03ee6e1758cf661ecc81e03726a7192aeaf

                                                          • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                                            Filesize

                                                            1.5MB

                                                            MD5

                                                            c8c05c344c028625e22fbf3f9b00a9a7

                                                            SHA1

                                                            ab3b124bb475a411307a7b699e0f6cd1ad549051

                                                            SHA256

                                                            5be19294bec8749e2473edb88ced8d8d6844d79dc2d7181002f37d3b740fb747

                                                            SHA512

                                                            c771810a128d77e978a034d69a1bd27309812e9f17c30d5bd407c43293500a60d09c386c98be16f20b582c5457c6b03ee6e1758cf661ecc81e03726a7192aeaf

                                                          • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                                            Filesize

                                                            1.5MB

                                                            MD5

                                                            c8c05c344c028625e22fbf3f9b00a9a7

                                                            SHA1

                                                            ab3b124bb475a411307a7b699e0f6cd1ad549051

                                                            SHA256

                                                            5be19294bec8749e2473edb88ced8d8d6844d79dc2d7181002f37d3b740fb747

                                                            SHA512

                                                            c771810a128d77e978a034d69a1bd27309812e9f17c30d5bd407c43293500a60d09c386c98be16f20b582c5457c6b03ee6e1758cf661ecc81e03726a7192aeaf

                                                          • C:\Users\Admin\AppData\Local\Temp\A339.exe
                                                            Filesize

                                                            1.5MB

                                                            MD5

                                                            c8c05c344c028625e22fbf3f9b00a9a7

                                                            SHA1

                                                            ab3b124bb475a411307a7b699e0f6cd1ad549051

                                                            SHA256

                                                            5be19294bec8749e2473edb88ced8d8d6844d79dc2d7181002f37d3b740fb747

                                                            SHA512

                                                            c771810a128d77e978a034d69a1bd27309812e9f17c30d5bd407c43293500a60d09c386c98be16f20b582c5457c6b03ee6e1758cf661ecc81e03726a7192aeaf

                                                          • C:\Users\Admin\AppData\Local\Temp\A9B2.exe
                                                            Filesize

                                                            4KB

                                                            MD5

                                                            9748489855d9dd82ab09da5e3e55b19e

                                                            SHA1

                                                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                            SHA256

                                                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                            SHA512

                                                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                          • C:\Users\Admin\AppData\Local\Temp\A9B2.exe
                                                            Filesize

                                                            4KB

                                                            MD5

                                                            9748489855d9dd82ab09da5e3e55b19e

                                                            SHA1

                                                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                            SHA256

                                                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                            SHA512

                                                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
                                                            Filesize

                                                            2KB

                                                            MD5

                                                            57fac65886e310c738de6a70f6656619

                                                            SHA1

                                                            5d22807afb64abe93dc2cc10497d064c805a3a9f

                                                            SHA256

                                                            09f37b1465242ac86de173f503214ef52c9f3a7a6df96d8fd632cf2d4ee4270a

                                                            SHA512

                                                            b32e8f153d057d5cdf747fbcfe2cf5eb9c6e3bbb236f6426c62b1c499bf46e5f867e9111677a00b0d39c4dbf9b81293da50460b044857db76e1bdf7688398ed2

                                                          • C:\Users\Admin\Desktop\Microsoft Edge.lnk
                                                            Filesize

                                                            2KB

                                                            MD5

                                                            b8c92b3bd1077227e8cbb58f57ef85d3

                                                            SHA1

                                                            bbcaa9f11c006f170c3259f6e21c0af0e7a1344d

                                                            SHA256

                                                            4775382c668ccafb1e7d6c39baa5c518a5329e86ace9a1e88464fdf880d83660

                                                            SHA512

                                                            af91c4000aae2493ba50ad338ce139d4e5c28946fc62403b0f486fe0ee293fb8bed7ba513fdac2f99df0afd46316b5dd9dd899c9ea56fde24979991652482d19

                                                          • \??\pipe\LOCAL\crashpad_2680_VZGXDEYSNJODBIHN
                                                            MD5

                                                            d41d8cd98f00b204e9800998ecf8427e

                                                            SHA1

                                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                            SHA256

                                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                            SHA512

                                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                          • memory/208-266-0x0000000000000000-mapping.dmp
                                                          • memory/404-132-0x0000000000601000-0x0000000000614000-memory.dmp
                                                            Filesize

                                                            76KB

                                                          • memory/404-133-0x0000000002290000-0x0000000002299000-memory.dmp
                                                            Filesize

                                                            36KB

                                                          • memory/404-135-0x0000000000400000-0x0000000000556000-memory.dmp
                                                            Filesize

                                                            1.3MB

                                                          • memory/404-134-0x0000000000400000-0x0000000000556000-memory.dmp
                                                            Filesize

                                                            1.3MB

                                                          • memory/592-214-0x0000000000540000-0x000000000054B000-memory.dmp
                                                            Filesize

                                                            44KB

                                                          • memory/592-212-0x0000000000000000-mapping.dmp
                                                          • memory/592-213-0x0000000000990000-0x0000000000997000-memory.dmp
                                                            Filesize

                                                            28KB

                                                          • memory/592-256-0x0000000000990000-0x0000000000997000-memory.dmp
                                                            Filesize

                                                            28KB

                                                          • memory/1080-179-0x0000000000000000-mapping.dmp
                                                          • memory/1360-231-0x0000000000C90000-0x0000000000C99000-memory.dmp
                                                            Filesize

                                                            36KB

                                                          • memory/1360-258-0x0000000000CA0000-0x0000000000CA5000-memory.dmp
                                                            Filesize

                                                            20KB

                                                          • memory/1360-227-0x0000000000000000-mapping.dmp
                                                          • memory/1360-229-0x0000000000CA0000-0x0000000000CA5000-memory.dmp
                                                            Filesize

                                                            20KB

                                                          • memory/1392-268-0x0000000000000000-mapping.dmp
                                                          • memory/1440-209-0x00007FFF1A6B0000-0x00007FFF1B171000-memory.dmp
                                                            Filesize

                                                            10.8MB

                                                          • memory/1440-205-0x0000000000000000-mapping.dmp
                                                          • memory/1464-270-0x0000000000000000-mapping.dmp
                                                          • memory/1464-271-0x0000000000400000-0x000000000052A000-memory.dmp
                                                            Filesize

                                                            1.2MB

                                                          • memory/1468-243-0x0000000000000000-mapping.dmp
                                                          • memory/1492-275-0x0000000000000000-mapping.dmp
                                                          • memory/1684-195-0x0000000000000000-mapping.dmp
                                                          • memory/1796-238-0x0000000000000000-mapping.dmp
                                                          • memory/1948-176-0x0000000000000000-mapping.dmp
                                                          • memory/2216-136-0x0000000000000000-mapping.dmp
                                                          • memory/2216-139-0x0000000000660000-0x0000000000668000-memory.dmp
                                                            Filesize

                                                            32KB

                                                          • memory/2216-140-0x00007FFF1D070000-0x00007FFF1DB31000-memory.dmp
                                                            Filesize

                                                            10.8MB

                                                          • memory/2284-237-0x0000000000000000-mapping.dmp
                                                          • memory/2668-226-0x0000000000000000-mapping.dmp
                                                          • memory/2680-160-0x0000000000000000-mapping.dmp
                                                          • memory/2680-221-0x000001C2C9C30000-0x000001C2C9C3F000-memory.dmp
                                                            Filesize

                                                            60KB

                                                          • memory/2752-200-0x0000000000000000-mapping.dmp
                                                          • memory/2888-147-0x0000000000000000-mapping.dmp
                                                          • memory/2892-196-0x0000000000000000-mapping.dmp
                                                          • memory/3048-201-0x0000000000000000-mapping.dmp
                                                          • memory/3048-210-0x00000000050D0000-0x0000000005136000-memory.dmp
                                                            Filesize

                                                            408KB

                                                          • memory/3048-216-0x00000000064B0000-0x00000000064CA000-memory.dmp
                                                            Filesize

                                                            104KB

                                                          • memory/3048-204-0x0000000004A20000-0x0000000004A56000-memory.dmp
                                                            Filesize

                                                            216KB

                                                          • memory/3048-215-0x0000000007670000-0x0000000007CEA000-memory.dmp
                                                            Filesize

                                                            6.5MB

                                                          • memory/3048-211-0x0000000006000000-0x000000000601E000-memory.dmp
                                                            Filesize

                                                            120KB

                                                          • memory/3048-208-0x00000000051B0000-0x00000000057D8000-memory.dmp
                                                            Filesize

                                                            6.2MB

                                                          • memory/3148-163-0x00000000066B0000-0x0000000006742000-memory.dmp
                                                            Filesize

                                                            584KB

                                                          • memory/3148-172-0x0000000008250000-0x000000000877C000-memory.dmp
                                                            Filesize

                                                            5.2MB

                                                          • memory/3148-165-0x0000000007AD0000-0x0000000007B46000-memory.dmp
                                                            Filesize

                                                            472KB

                                                          • memory/3148-169-0x0000000007B50000-0x0000000007D12000-memory.dmp
                                                            Filesize

                                                            1.8MB

                                                          • memory/3148-178-0x00000000069C0000-0x0000000006A10000-memory.dmp
                                                            Filesize

                                                            320KB

                                                          • memory/3148-162-0x0000000005B30000-0x0000000005B96000-memory.dmp
                                                            Filesize

                                                            408KB

                                                          • memory/3148-159-0x00000000057F0000-0x000000000582C000-memory.dmp
                                                            Filesize

                                                            240KB

                                                          • memory/3148-164-0x0000000006D00000-0x00000000072A4000-memory.dmp
                                                            Filesize

                                                            5.6MB

                                                          • memory/3148-174-0x0000000007740000-0x000000000775E000-memory.dmp
                                                            Filesize

                                                            120KB

                                                          • memory/3148-158-0x00000000058C0000-0x00000000059CA000-memory.dmp
                                                            Filesize

                                                            1.0MB

                                                          • memory/3148-157-0x0000000005790000-0x00000000057A2000-memory.dmp
                                                            Filesize

                                                            72KB

                                                          • memory/3148-156-0x0000000005CF0000-0x0000000006308000-memory.dmp
                                                            Filesize

                                                            6.1MB

                                                          • memory/3148-151-0x0000000000400000-0x0000000000444000-memory.dmp
                                                            Filesize

                                                            272KB

                                                          • memory/3148-150-0x0000000000000000-mapping.dmp
                                                          • memory/3428-173-0x0000000000000000-mapping.dmp
                                                          • memory/3428-236-0x0000014517140000-0x000001451714F000-memory.dmp
                                                            Filesize

                                                            60KB

                                                          • memory/3512-233-0x0000000000000000-mapping.dmp
                                                          • memory/3512-260-0x0000000000F80000-0x0000000000F86000-memory.dmp
                                                            Filesize

                                                            24KB

                                                          • memory/3512-235-0x0000000000F70000-0x0000000000F7C000-memory.dmp
                                                            Filesize

                                                            48KB

                                                          • memory/3512-234-0x0000000000F80000-0x0000000000F86000-memory.dmp
                                                            Filesize

                                                            24KB

                                                          • memory/3828-203-0x0000000000000000-mapping.dmp
                                                          • memory/3900-222-0x0000000000000000-mapping.dmp
                                                          • memory/3912-144-0x0000000000440000-0x0000000000C74000-memory.dmp
                                                            Filesize

                                                            8.2MB

                                                          • memory/3912-141-0x0000000000000000-mapping.dmp
                                                          • memory/3912-186-0x0000000000440000-0x0000000000C74000-memory.dmp
                                                            Filesize

                                                            8.2MB

                                                          • memory/3912-197-0x0000000000440000-0x0000000000C74000-memory.dmp
                                                            Filesize

                                                            8.2MB

                                                          • memory/3976-185-0x0000000000000000-mapping.dmp
                                                          • memory/4056-230-0x000002249EDC0000-0x000002249EDCF000-memory.dmp
                                                            Filesize

                                                            60KB

                                                          • memory/4056-167-0x0000000000000000-mapping.dmp
                                                          • memory/4132-224-0x0000000000000000-mapping.dmp
                                                          • memory/4404-247-0x0000000000000000-mapping.dmp
                                                          • memory/4404-263-0x0000000001210000-0x0000000001216000-memory.dmp
                                                            Filesize

                                                            24KB

                                                          • memory/4404-249-0x0000000001200000-0x000000000120B000-memory.dmp
                                                            Filesize

                                                            44KB

                                                          • memory/4404-248-0x0000000001210000-0x0000000001216000-memory.dmp
                                                            Filesize

                                                            24KB

                                                          • memory/4428-250-0x0000000000000000-mapping.dmp
                                                          • memory/4428-251-0x0000000000710000-0x0000000000717000-memory.dmp
                                                            Filesize

                                                            28KB

                                                          • memory/4428-252-0x0000000000700000-0x000000000070D000-memory.dmp
                                                            Filesize

                                                            52KB

                                                          • memory/4428-264-0x0000000000710000-0x0000000000717000-memory.dmp
                                                            Filesize

                                                            28KB

                                                          • memory/4444-262-0x0000000000350000-0x0000000000355000-memory.dmp
                                                            Filesize

                                                            20KB

                                                          • memory/4444-245-0x0000000000350000-0x0000000000355000-memory.dmp
                                                            Filesize

                                                            20KB

                                                          • memory/4444-244-0x0000000000000000-mapping.dmp
                                                          • memory/4444-246-0x0000000000340000-0x0000000000349000-memory.dmp
                                                            Filesize

                                                            36KB

                                                          • memory/4448-253-0x0000000000000000-mapping.dmp
                                                          • memory/4448-254-0x0000000000490000-0x0000000000498000-memory.dmp
                                                            Filesize

                                                            32KB

                                                          • memory/4448-255-0x0000000000480000-0x000000000048B000-memory.dmp
                                                            Filesize

                                                            44KB

                                                          • memory/4448-265-0x0000000000490000-0x0000000000498000-memory.dmp
                                                            Filesize

                                                            32KB

                                                          • memory/4640-187-0x0000000000000000-mapping.dmp
                                                          • memory/4752-217-0x0000000000000000-mapping.dmp
                                                          • memory/4752-257-0x0000000000770000-0x0000000000779000-memory.dmp
                                                            Filesize

                                                            36KB

                                                          • memory/4752-219-0x0000000000760000-0x000000000076F000-memory.dmp
                                                            Filesize

                                                            60KB

                                                          • memory/4752-218-0x0000000000770000-0x0000000000779000-memory.dmp
                                                            Filesize

                                                            36KB

                                                          • memory/4816-239-0x0000000000000000-mapping.dmp
                                                          • memory/4816-242-0x0000000000C90000-0x0000000000CB7000-memory.dmp
                                                            Filesize

                                                            156KB

                                                          • memory/4816-261-0x0000000000CC0000-0x0000000000CE2000-memory.dmp
                                                            Filesize

                                                            136KB

                                                          • memory/4816-241-0x0000000000CC0000-0x0000000000CE2000-memory.dmp
                                                            Filesize

                                                            136KB

                                                          • memory/4872-190-0x0000000000000000-mapping.dmp
                                                          • memory/4872-193-0x0000000000690000-0x0000000000820000-memory.dmp
                                                            Filesize

                                                            1.6MB

                                                          • memory/4872-194-0x0000000005B70000-0x0000000005B92000-memory.dmp
                                                            Filesize

                                                            136KB

                                                          • memory/4972-161-0x0000000000000000-mapping.dmp
                                                          • memory/4972-228-0x00000207F7DA0000-0x00000207F7DAF000-memory.dmp
                                                            Filesize

                                                            60KB

                                                          • memory/5084-259-0x0000019DA1B40000-0x0000019DA1B4F000-memory.dmp
                                                            Filesize

                                                            60KB

                                                          • memory/5084-232-0x0000019DA1B40000-0x0000019DA1B4F000-memory.dmp
                                                            Filesize

                                                            60KB

                                                          • memory/5084-168-0x0000000000000000-mapping.dmp
                                                          • memory/5116-183-0x0000000000000000-mapping.dmp