Analysis

  • max time kernel
    68s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2023 08:51

General

  • Target

    tmp.exe

  • Size

    1.6MB

  • MD5

    373992db74a918562686a9e9144ecbbe

  • SHA1

    953c7daaec55cdf106b371b555bc73f83a127b26

  • SHA256

    c17ee50458ad78fb43b23fd8001002cd35bb8effac19ec33091ddadefbc7dcac

  • SHA512

    ddf9af3d9b765708ce9e91f1ba7631f4111202016deae60f0da80026688fd465e9877fe55ec175be0296db153e300188a5aeadd5566b2e72fc8cf0e1bb8a80e4

  • SSDEEP

    24576:U2G/nvxW3Ww0t1urfikuV13mFFkwIuKOaZDIpw6P/KlBrJ/GB+8xNEJnw:UbA30Wiku13qF1jtpwG/KR/YxNEJw

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 36 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 36 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\vQ3VIYUYL2xofTcP0gCIzAw.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:756
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\mQTPECbUX38DuLpdMmoUBOwQ.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\componentMonitorcommon.exe
          "C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\componentMonitorcommon.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\componentMonitorcommon.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1460
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\L2Schemas\conhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:604
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Recent\services.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:588
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ModemLogs\System.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1480
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1096
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\csrss.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1720
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Templates\WMIADAP.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\lsm.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:920
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\taskhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2064
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\spoolsv.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1236
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\explorer.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2080
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2072
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1984
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mMBZzEy8nT.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2780
              • C:\Users\Default User\csrss.exe
                "C:\Users\Default User\csrss.exe"
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2608
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Windows\L2Schemas\conhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1240
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\L2Schemas\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:680
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Windows\L2Schemas\conhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1636
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Recent\services.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1748
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\Recent\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1784
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Recent\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\ModemLogs\System.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1708
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\ModemLogs\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:604
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Windows\ModemLogs\System.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1556
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1236
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1264
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1700
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1584
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 13 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1676
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1764
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:560
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1572
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:816
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:336
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:612
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Users\Public\lsm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:512
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Users\Public\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1940
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\Users\Public\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1240
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Templates\WMIADAP.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1664
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Users\Admin\Templates\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Templates\WMIADAP.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\taskhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:284
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1744
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1148
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:652
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Recovery\3c215342-b1b4-11ed-8beb-cee1c2fbb193\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:920
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\explorer.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1784
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1960

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\Cab9936.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar9B8E.tmp
      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\mMBZzEy8nT.bat
      Filesize

      196B

      MD5

      fbd775dfad3d7e8136ee201bac66e56f

      SHA1

      e5af0a32610be81a391cac4ad0846834f466c61c

      SHA256

      bf81e451317b2325bf251e1a41b4524a5a228f85fc4f932df7aa9496fb2f2908

      SHA512

      23ff0947c8f6524665d4fcb5a2ed133838113bccd10ea41ab70d84ee38969f49f3673fcfa685a84140d7f91017702e6b691277581a8c81804101a0c04c67b0db

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZXDB3JNBOCZ6CDEAZE1U.temp
      Filesize

      7KB

      MD5

      7b6de6420ba223fced0239339abab7d8

      SHA1

      283e124f416923b0fb8e68062c15a579727ce48f

      SHA256

      9377ed71393807db0938073bfc27a6b0d9795e123b1408a033c1fd23c74b82eb

      SHA512

      d9d7fa0ef9e9972d9d5075bed1ba60e2eef4a9b12bdacba326acf23f97c29b2c51a110d9b27f1ba947bc1a565e28266204310b7b495cadbf60b5972854ec5032

    • C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\componentMonitorcommon.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\componentMonitorcommon.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\mQTPECbUX38DuLpdMmoUBOwQ.bat
      Filesize

      55B

      MD5

      4eca9a6bf6c52d04c26fa14ea74bf227

      SHA1

      ca0fea58051517e6295da2da5e3f249ad4ff3504

      SHA256

      96ca7d8a38fd1f411bf623f952bbd4b8e93243167c2158917eba0d68f00e85cc

      SHA512

      3d818f8e1ea332deb3a0aaff2284deb6380639a56dc30a7e675cfe76c253f0c626783e5b7652cd6dbad541022ccb6058376ec5d7f12d0674a4478cfefef9df18

    • C:\Users\Admin\AppData\Roaming\blockRuntimedhcp\vQ3VIYUYL2xofTcP0gCIzAw.vbe
      Filesize

      224B

      MD5

      7b5df8b8d4d8d1b95b3313ffaf3c420b

      SHA1

      70c9cb3ea22d5349044e03f7e6fa4d98e6bc208d

      SHA256

      1c307726e10a7546162838a9981c0d0565306998ed731ee73a047d664d72a3ea

      SHA512

      ddc870977887cd25ca709ff3b3be1311d7478e5c361936d3ff3dd845aa04633fcc081a27bc088e20001f1105862c88972d9325a3b40126157906400ccda65270

    • C:\Users\Default User\csrss.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • C:\Users\Default\csrss.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • C:\Windows\ModemLogs\System.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • \Users\Admin\AppData\Roaming\blockRuntimedhcp\componentMonitorcommon.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • \Users\Admin\AppData\Roaming\blockRuntimedhcp\componentMonitorcommon.exe
      Filesize

      1.3MB

      MD5

      231efb7ab5b36cda91e06456480228c1

      SHA1

      11edb782a254ead91bef459fb4dac0ca393ffeaf

      SHA256

      5d876dee883aabe22c89e9332d18d41580e7dc5c5030be843538b5a11c053a1d

      SHA512

      c51446bf048412031b5ea5c09b55b8c1ba8d3319eaf84cda647c0048f919a9f408220200ae1d405acd54557af9626a91e03789573a556ccafea9b7bfbcec2017

    • memory/588-186-0x0000000002860000-0x00000000028E0000-memory.dmp
      Filesize

      512KB

    • memory/588-188-0x0000000002860000-0x00000000028E0000-memory.dmp
      Filesize

      512KB

    • memory/588-189-0x0000000002860000-0x00000000028E0000-memory.dmp
      Filesize

      512KB

    • memory/588-205-0x0000000002860000-0x00000000028E0000-memory.dmp
      Filesize

      512KB

    • memory/604-185-0x00000000024D0000-0x0000000002550000-memory.dmp
      Filesize

      512KB

    • memory/604-198-0x00000000024D0000-0x0000000002550000-memory.dmp
      Filesize

      512KB

    • memory/604-184-0x00000000024D0000-0x0000000002550000-memory.dmp
      Filesize

      512KB

    • memory/920-194-0x00000000029BB000-0x00000000029F2000-memory.dmp
      Filesize

      220KB

    • memory/920-175-0x00000000029B0000-0x0000000002A30000-memory.dmp
      Filesize

      512KB

    • memory/920-174-0x00000000029B0000-0x0000000002A30000-memory.dmp
      Filesize

      512KB

    • memory/1096-119-0x00000000028A0000-0x0000000002920000-memory.dmp
      Filesize

      512KB

    • memory/1096-115-0x000000001B320000-0x000000001B602000-memory.dmp
      Filesize

      2.9MB

    • memory/1096-138-0x00000000028A0000-0x0000000002920000-memory.dmp
      Filesize

      512KB

    • memory/1096-195-0x00000000028AB000-0x00000000028E2000-memory.dmp
      Filesize

      220KB

    • memory/1096-176-0x00000000028A0000-0x0000000002920000-memory.dmp
      Filesize

      512KB

    • memory/1236-177-0x00000000025B0000-0x0000000002630000-memory.dmp
      Filesize

      512KB

    • memory/1236-178-0x00000000025B0000-0x0000000002630000-memory.dmp
      Filesize

      512KB

    • memory/1236-193-0x00000000025BB000-0x00000000025F2000-memory.dmp
      Filesize

      220KB

    • memory/1460-197-0x000000000263B000-0x0000000002672000-memory.dmp
      Filesize

      220KB

    • memory/1460-179-0x0000000002630000-0x00000000026B0000-memory.dmp
      Filesize

      512KB

    • memory/1480-166-0x0000000002410000-0x0000000002490000-memory.dmp
      Filesize

      512KB

    • memory/1480-167-0x0000000002410000-0x0000000002490000-memory.dmp
      Filesize

      512KB

    • memory/1480-196-0x000000000241B000-0x0000000002452000-memory.dmp
      Filesize

      220KB

    • memory/1656-69-0x0000000000600000-0x0000000000616000-memory.dmp
      Filesize

      88KB

    • memory/1656-67-0x0000000000DB0000-0x0000000000F04000-memory.dmp
      Filesize

      1.3MB

    • memory/1656-68-0x0000000000550000-0x000000000056C000-memory.dmp
      Filesize

      112KB

    • memory/1656-70-0x00000000003C0000-0x00000000003CE000-memory.dmp
      Filesize

      56KB

    • memory/1656-77-0x000000001B040000-0x000000001B0C0000-memory.dmp
      Filesize

      512KB

    • memory/1656-72-0x00000000007C0000-0x00000000007CC000-memory.dmp
      Filesize

      48KB

    • memory/1656-71-0x0000000000570000-0x000000000057E000-memory.dmp
      Filesize

      56KB

    • memory/1720-180-0x00000000022A0000-0x0000000002320000-memory.dmp
      Filesize

      512KB

    • memory/1720-199-0x00000000022A0000-0x0000000002320000-memory.dmp
      Filesize

      512KB

    • memory/1720-200-0x00000000022A0000-0x0000000002320000-memory.dmp
      Filesize

      512KB

    • memory/1984-170-0x0000000002900000-0x0000000002980000-memory.dmp
      Filesize

      512KB

    • memory/1984-192-0x000000000290B000-0x0000000002942000-memory.dmp
      Filesize

      220KB

    • memory/2056-168-0x0000000002960000-0x00000000029E0000-memory.dmp
      Filesize

      512KB

    • memory/2056-125-0x0000000002230000-0x0000000002238000-memory.dmp
      Filesize

      32KB

    • memory/2056-165-0x0000000002960000-0x00000000029E0000-memory.dmp
      Filesize

      512KB

    • memory/2056-164-0x0000000002960000-0x00000000029E0000-memory.dmp
      Filesize

      512KB

    • memory/2056-206-0x0000000002960000-0x00000000029E0000-memory.dmp
      Filesize

      512KB

    • memory/2064-201-0x00000000025D0000-0x0000000002650000-memory.dmp
      Filesize

      512KB

    • memory/2064-181-0x00000000025D0000-0x0000000002650000-memory.dmp
      Filesize

      512KB

    • memory/2064-183-0x00000000025D0000-0x0000000002650000-memory.dmp
      Filesize

      512KB

    • memory/2064-182-0x00000000025D0000-0x0000000002650000-memory.dmp
      Filesize

      512KB

    • memory/2072-208-0x000000000243B000-0x0000000002472000-memory.dmp
      Filesize

      220KB

    • memory/2072-207-0x0000000002430000-0x00000000024B0000-memory.dmp
      Filesize

      512KB

    • memory/2072-204-0x0000000002430000-0x00000000024B0000-memory.dmp
      Filesize

      512KB

    • memory/2072-203-0x0000000002430000-0x00000000024B0000-memory.dmp
      Filesize

      512KB

    • memory/2080-202-0x0000000002340000-0x00000000023C0000-memory.dmp
      Filesize

      512KB

    • memory/2080-190-0x0000000002340000-0x00000000023C0000-memory.dmp
      Filesize

      512KB

    • memory/2080-191-0x0000000002340000-0x00000000023C0000-memory.dmp
      Filesize

      512KB

    • memory/2080-187-0x0000000002340000-0x00000000023C0000-memory.dmp
      Filesize

      512KB

    • memory/2608-211-0x0000000000D60000-0x0000000000EB4000-memory.dmp
      Filesize

      1.3MB

    • memory/2608-212-0x000000001AFB0000-0x000000001B030000-memory.dmp
      Filesize

      512KB

    • memory/2608-213-0x000000001AFB0000-0x000000001B030000-memory.dmp
      Filesize

      512KB

    • memory/2608-305-0x000000001AFB0000-0x000000001B030000-memory.dmp
      Filesize

      512KB