Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-04-2023 17:34

General

  • Target

    DCRat Crack Test VERSION.exe

  • Size

    3.7MB

  • MD5

    0cf54aebcc76f09c147863b916a494fc

  • SHA1

    5a41a7060f20f4bc16ba4a60c8f22aa16495cb3e

  • SHA256

    0cac16b9e6b85c3415ebc63def32b4bc999182a7a09197afdcf0851f57aae68d

  • SHA512

    8dc0c4fe4649523e155bf7c57ceccb70524b27a18374e4e5fa1b991ad322181dca131b99729926f9d54dd3a1c1f86fdb40607a4e9790d0acceef2e116ba4712e

  • SSDEEP

    98304:OavNz0cqlVkGIgKuP04hZ9gA2aT3v9f8473v0H:OUNYcqMGIgdrgfaT/p8S3v0H

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 9 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • .NET Reactor proctector 36 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 8 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DCRat Crack Test VERSION.exe
    "C:\Users\Admin\AppData\Local\Temp\DCRat Crack Test VERSION.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe
      "C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:268
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:760
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:976
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1088
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:308
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1148
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:544
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:856
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:572
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:900
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kcDIWAC5CG.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          4⤵
            PID:2372
          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe
            "C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2744
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Documents\My Music\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:624
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Music\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1872
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Documents\My Music\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2044
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1480
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\services.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1808
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:576
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Recovery\48dcfae2-b1a4-11ed-9bb2-cee1c2fbb193\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:276

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe
      Filesize

      5.7MB

      MD5

      4bf0c454f9ec3e15308e5f2e362f9e87

      SHA1

      0ba55233e7510c060fc1f62d2a760096fb1b1136

      SHA256

      43f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f

      SHA512

      c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b

    • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe
      Filesize

      5.7MB

      MD5

      4bf0c454f9ec3e15308e5f2e362f9e87

      SHA1

      0ba55233e7510c060fc1f62d2a760096fb1b1136

      SHA256

      43f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f

      SHA512

      c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b

    • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wininit.exe
      Filesize

      5.7MB

      MD5

      4bf0c454f9ec3e15308e5f2e362f9e87

      SHA1

      0ba55233e7510c060fc1f62d2a760096fb1b1136

      SHA256

      43f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f

      SHA512

      c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      304B

      MD5

      b3db050760208687fddc9f883532901a

      SHA1

      b7106f7884e8a151a4650c5596b51e6af67b637e

      SHA256

      d70e7bd6dac974f644c42dcf463fe7a92a50bdf1d5b5d0809ec9e8b426113632

      SHA512

      e4d32c95f7465d1604a945cd114e8acdbd699efc09400ea2dd1505348326f43145198dae4f11374903632fcea755c73777714af15ac47e8e59c5324d8730d509

    • C:\Users\Admin\AppData\Local\Temp\Cab209E.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe
      Filesize

      5.7MB

      MD5

      4bf0c454f9ec3e15308e5f2e362f9e87

      SHA1

      0ba55233e7510c060fc1f62d2a760096fb1b1136

      SHA256

      43f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f

      SHA512

      c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b

    • C:\Users\Admin\AppData\Local\Temp\DCRatSupport.exe
      Filesize

      5.7MB

      MD5

      4bf0c454f9ec3e15308e5f2e362f9e87

      SHA1

      0ba55233e7510c060fc1f62d2a760096fb1b1136

      SHA256

      43f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f

      SHA512

      c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b

    • C:\Users\Admin\AppData\Local\Temp\Tar225A.tmp
      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Local\Temp\kcDIWAC5CG.bat
      Filesize

      239B

      MD5

      eb67ca93d41226a9e25eb9f8f6fb5e75

      SHA1

      4e8c9f62aed9a8d456836a1a82cd4a429555a81d

      SHA256

      4160be3eab6b566bbfc55be7be6315a205dc9b1d2180bf1dadf14bef61ae78db

      SHA512

      412074b9ab2895cc4b0705f444be9da543d9ee1284bdc9a531997146e8decbeda00b3e6837995a2fdaa5cfa5cbc36360b8a53e9b75b7b5ea778136ba19541b42

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OK8H1GWMDH1445PJLG7Z.temp
      Filesize

      7KB

      MD5

      e2c8bc305c19a1535e8bbec03e422b71

      SHA1

      5864a56242e931bb42249b9f31b996ae83df66e7

      SHA256

      995b6d837ded1c9f3794664c2d079140c3c4021429dd550a22dc6df5f7d8c617

      SHA512

      a7fcd2fff2819ebdad5596af5ee6ed6ab23e148f34fbf196aa42074aba98397e6cdca9ce18f6d06cc9c5f6c8450f6e7f75cd0dd685dac6fc3a451b116ac4a641

    • \Users\Admin\AppData\Local\Temp\DCRatSupport.exe
      Filesize

      5.7MB

      MD5

      4bf0c454f9ec3e15308e5f2e362f9e87

      SHA1

      0ba55233e7510c060fc1f62d2a760096fb1b1136

      SHA256

      43f1c47730d2764a0954a14e733605b8d9115bd3d77edfc2652fbdba12c71f6f

      SHA512

      c0eb34ec3cb65c2ae75d99befa1dac84babc9e7c944f46a1650430bcc5935d3aad83b96cf5ab1b0f026de44d10f409fd9498762a53d41737ef3fba1a3c8b077b

    • memory/268-1730-0x0000000002460000-0x00000000024E0000-memory.dmp
      Filesize

      512KB

    • memory/268-1726-0x0000000002460000-0x00000000024E0000-memory.dmp
      Filesize

      512KB

    • memory/268-1732-0x0000000002460000-0x00000000024E0000-memory.dmp
      Filesize

      512KB

    • memory/268-1684-0x000000001B2B0000-0x000000001B592000-memory.dmp
      Filesize

      2.9MB

    • memory/268-1755-0x000000000246B000-0x00000000024A2000-memory.dmp
      Filesize

      220KB

    • memory/308-1757-0x000000000279B000-0x00000000027D2000-memory.dmp
      Filesize

      220KB

    • memory/308-1742-0x0000000002790000-0x0000000002810000-memory.dmp
      Filesize

      512KB

    • memory/308-1743-0x0000000002790000-0x0000000002810000-memory.dmp
      Filesize

      512KB

    • memory/544-1772-0x000000000294B000-0x0000000002982000-memory.dmp
      Filesize

      220KB

    • memory/544-1760-0x0000000002940000-0x00000000029C0000-memory.dmp
      Filesize

      512KB

    • memory/544-1762-0x0000000002940000-0x00000000029C0000-memory.dmp
      Filesize

      512KB

    • memory/544-1763-0x0000000002940000-0x00000000029C0000-memory.dmp
      Filesize

      512KB

    • memory/572-1749-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/572-1769-0x00000000028DB000-0x0000000002912000-memory.dmp
      Filesize

      220KB

    • memory/572-1750-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/572-1753-0x00000000028D0000-0x0000000002950000-memory.dmp
      Filesize

      512KB

    • memory/760-1751-0x0000000002340000-0x00000000023C0000-memory.dmp
      Filesize

      512KB

    • memory/760-1770-0x000000000234B000-0x0000000002382000-memory.dmp
      Filesize

      220KB

    • memory/760-1754-0x0000000002340000-0x00000000023C0000-memory.dmp
      Filesize

      512KB

    • memory/760-1759-0x0000000002340000-0x00000000023C0000-memory.dmp
      Filesize

      512KB

    • memory/856-1738-0x0000000002660000-0x00000000026E0000-memory.dmp
      Filesize

      512KB

    • memory/856-1739-0x0000000002660000-0x00000000026E0000-memory.dmp
      Filesize

      512KB

    • memory/856-1758-0x000000000266B000-0x00000000026A2000-memory.dmp
      Filesize

      220KB

    • memory/900-1767-0x000000000283B000-0x0000000002872000-memory.dmp
      Filesize

      220KB

    • memory/900-1745-0x0000000002830000-0x00000000028B0000-memory.dmp
      Filesize

      512KB

    • memory/900-1744-0x0000000002830000-0x00000000028B0000-memory.dmp
      Filesize

      512KB

    • memory/900-1746-0x0000000002830000-0x00000000028B0000-memory.dmp
      Filesize

      512KB

    • memory/976-1728-0x0000000002740000-0x00000000027C0000-memory.dmp
      Filesize

      512KB

    • memory/976-1766-0x000000000274B000-0x0000000002782000-memory.dmp
      Filesize

      220KB

    • memory/976-1690-0x0000000001F90000-0x0000000001F98000-memory.dmp
      Filesize

      32KB

    • memory/976-1729-0x0000000002740000-0x00000000027C0000-memory.dmp
      Filesize

      512KB

    • memory/976-1737-0x0000000002740000-0x00000000027C0000-memory.dmp
      Filesize

      512KB

    • memory/1088-1748-0x00000000023A0000-0x0000000002420000-memory.dmp
      Filesize

      512KB

    • memory/1088-1747-0x00000000023A0000-0x0000000002420000-memory.dmp
      Filesize

      512KB

    • memory/1088-1768-0x00000000023AB000-0x00000000023E2000-memory.dmp
      Filesize

      220KB

    • memory/1148-1771-0x00000000026CB000-0x0000000002702000-memory.dmp
      Filesize

      220KB

    • memory/1148-1756-0x00000000026C0000-0x0000000002740000-memory.dmp
      Filesize

      512KB

    • memory/1148-1761-0x00000000026C0000-0x0000000002740000-memory.dmp
      Filesize

      512KB

    • memory/1148-1752-0x00000000026C0000-0x0000000002740000-memory.dmp
      Filesize

      512KB

    • memory/1260-96-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-69-0x0000000005280000-0x00000000052C0000-memory.dmp
      Filesize

      256KB

    • memory/1260-55-0x00000000052C0000-0x0000000005680000-memory.dmp
      Filesize

      3.8MB

    • memory/1260-56-0x0000000005280000-0x00000000052C0000-memory.dmp
      Filesize

      256KB

    • memory/1260-92-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-1639-0x0000000006820000-0x0000000006DE6000-memory.dmp
      Filesize

      5.8MB

    • memory/1260-657-0x0000000005280000-0x00000000052C0000-memory.dmp
      Filesize

      256KB

    • memory/1260-563-0x0000000005280000-0x00000000052C0000-memory.dmp
      Filesize

      256KB

    • memory/1260-561-0x0000000005280000-0x00000000052C0000-memory.dmp
      Filesize

      256KB

    • memory/1260-559-0x0000000005280000-0x00000000052C0000-memory.dmp
      Filesize

      256KB

    • memory/1260-118-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-120-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-122-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-114-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-116-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-112-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-108-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-110-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-98-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-57-0x0000000005280000-0x00000000052C0000-memory.dmp
      Filesize

      256KB

    • memory/1260-58-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-106-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-104-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-100-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-94-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-59-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-61-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-54-0x0000000005690000-0x0000000005A56000-memory.dmp
      Filesize

      3.8MB

    • memory/1260-67-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-65-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-102-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-86-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-90-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-88-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-63-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-70-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-84-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-80-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-72-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-82-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-78-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-74-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1260-76-0x00000000052C0000-0x000000000567A000-memory.dmp
      Filesize

      3.7MB

    • memory/1500-1765-0x00000000028F0000-0x0000000002970000-memory.dmp
      Filesize

      512KB

    • memory/1500-1740-0x00000000028F0000-0x0000000002970000-memory.dmp
      Filesize

      512KB

    • memory/1500-1741-0x00000000028F0000-0x0000000002970000-memory.dmp
      Filesize

      512KB

    • memory/1860-1764-0x0000000002620000-0x00000000026A0000-memory.dmp
      Filesize

      512KB

    • memory/1864-1654-0x0000000000BB0000-0x0000000000BBE000-memory.dmp
      Filesize

      56KB

    • memory/1864-1653-0x0000000000BA0000-0x0000000000BA8000-memory.dmp
      Filesize

      32KB

    • memory/1864-1646-0x0000000000200000-0x00000000007BA000-memory.dmp
      Filesize

      5.7MB

    • memory/1864-1655-0x0000000000C40000-0x0000000000C4C000-memory.dmp
      Filesize

      48KB

    • memory/1864-1648-0x000000001B7A0000-0x000000001B912000-memory.dmp
      Filesize

      1.4MB

    • memory/1864-1650-0x00000000001F0000-0x0000000000200000-memory.dmp
      Filesize

      64KB

    • memory/1864-1656-0x0000000000C50000-0x0000000000C5C000-memory.dmp
      Filesize

      48KB

    • memory/1864-1652-0x0000000000B90000-0x0000000000B9C000-memory.dmp
      Filesize

      48KB

    • memory/1864-1649-0x00000000007C0000-0x00000000007DC000-memory.dmp
      Filesize

      112KB

    • memory/1864-1647-0x000000001B440000-0x000000001B4C0000-memory.dmp
      Filesize

      512KB

    • memory/1864-1651-0x00000000007E0000-0x00000000007F6000-memory.dmp
      Filesize

      88KB