Analysis

  • max time kernel
    171s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 21:48

General

  • Target

    a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadebmsi_JC.msi

  • Size

    2.2MB

  • MD5

    7996ed8cc6479124c941ab5d136e4841

  • SHA1

    092bd61e92aa0745af69e777f341ea7184c3d743

  • SHA256

    a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadeb

  • SHA512

    bf7270402f3cf4111a0a64d6bf29145ab9bc9c32ea4e5272d49beaf4d178a1bec540fa28935d36bbb0fc783fe42746f450e6c4e7a19ecc5317c4fbc097a0fb6d

  • SSDEEP

    49152:NpUPhaTtpSD6TmY7GBXGBr4wBlBLr1GAtrlc+jjK0I7SfBx1jDbKg5A+:NpgktID6dFBrJBLrY+rmR1s3L

Malware Config

Extracted

Family

darkgate

Botnet

ioeooow8ur

C2

http://178.236.247.102

Attributes
  • alternative_c2_port

    9999

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    27850

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    xXOZBnzVWHqoqB

  • internal_mutex

    cbdKcC

  • minimum_disk

    50

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ioeooow8ur

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • NSIS installer 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
    1⤵
      PID:3548
      • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"
        2⤵
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:756
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadebmsi_JC.msi
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4424
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:2344
        • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe
          "C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops startup file
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:4684
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3204
        • C:\Windows\system32\srtasks.exe
          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2544
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 3C6FDEE5EC31FDB088B2C4BF6DDFB67B
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4172
          • C:\Windows\SysWOW64\ICACLS.EXE
            "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
            3⤵
            • Modifies file permissions
            PID:3132
          • C:\Windows\SysWOW64\EXPAND.EXE
            "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
            3⤵
            • Drops file in Windows directory
            PID:956
          • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe
            "C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of WriteProcessMemory
            PID:824
            • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Autoit3.exe
              "C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Autoit3.exe" C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\script.au3
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1400
          • C:\Windows\SysWOW64\ICACLS.EXE
            "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\." /SETINTEGRITYLEVEL (CI)(OI)LOW
            3⤵
            • Modifies file permissions
            PID:2436
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\gfbehab\bebehda\badhfaa

        Filesize

        135B

        MD5

        58797e33ebdcedf6565639b2d503b730

        SHA1

        2df156a2251b3e2edd21f31ef86751f77918bb05

        SHA256

        73c77cead6692bf59d4718138ebf0ee40d908c9fdd6a0c43391e202fbdd42e09

        SHA512

        17ebd7fbeb7ca63e2f259ac79b7eedf8e5d0aa1e07d14a27282217c4151e36c5dbbd64b1c7368565f4bad5917e45e0130f213e8b6c1d593d6393bb33a785de4c

      • C:\ProgramData\gfbehab\bebehda\badhfaa

        Filesize

        135B

        MD5

        58797e33ebdcedf6565639b2d503b730

        SHA1

        2df156a2251b3e2edd21f31ef86751f77918bb05

        SHA256

        73c77cead6692bf59d4718138ebf0ee40d908c9fdd6a0c43391e202fbdd42e09

        SHA512

        17ebd7fbeb7ca63e2f259ac79b7eedf8e5d0aa1e07d14a27282217c4151e36c5dbbd64b1c7368565f4bad5917e45e0130f213e8b6c1d593d6393bb33a785de4c

      • C:\ProgramData\gfbehab\dbddfae.au3

        Filesize

        783KB

        MD5

        54d2b083dfd042469b41fe03adbf28ad

        SHA1

        42257f789576c40ef61d77d0e920b01e5c2370f6

        SHA256

        ca8cf6a787e653a0352ae8fc2290f0557765503c862909ce5580c3fb7fa57b46

        SHA512

        7f399603d8da86f7f21d034d5802260d5ab258e401401d61b5226edc24e2529635331b0bb64558ca5231eb9c5e66c35e5a018c2733bded4e8f8b6d62496f7871

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_90CA53BF93380499933443132F1E0073

        Filesize

        1KB

        MD5

        8c4d3f5706d748937cc85456457d75a6

        SHA1

        8852bca10232f592730b08e440d7ec69698fe590

        SHA256

        b5d55f3c57e53be2ea341db778cb181879ad51f98867df1ba68ec35471bdba67

        SHA512

        18f9ba0d3d60e5a4c8017a0495eef51942207abd9b83fba51e026c7a163fd6907d70c1f6756acb5aa533cdae67af685a21719c92fc5bfa0b5d70811f114f091a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

        Filesize

        1KB

        MD5

        8e9720460ecac671b8997fb034bef388

        SHA1

        39d3b2ff183ca8fa3983588cdc3786fae2e50dd3

        SHA256

        d777e6f157d0484878c59046c40eccc39e3648dfcdfad01a8d2ce00ee5562568

        SHA512

        ead0d1a1a2ab4d77232b4dbc7ea02418f0b3fe8c493fe05544607823875051f8d9314358fac2b67f7f0734a2117dd2b5f20e655cd8fca59c36d2729a03098819

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_90CA53BF93380499933443132F1E0073

        Filesize

        540B

        MD5

        31385a19f09e58ed5bb0cd2b2dc8e0f8

        SHA1

        3fb926e50d7d24857db1f544cdfe73b85b5afdd9

        SHA256

        aac56d1f135bfd93bba5d282ec6bd1e977e330930e53a28866824f66b3ac9e8b

        SHA512

        9364fb09f10af9bc98ce60578880b2fe6ccca395213a8e37b7da77c52ba4b0b5eaf93ef6b95e776e7005a6bed0446823bdca0d7ad350f4d6a28a43635cadb52c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

        Filesize

        536B

        MD5

        da3484cdf0a04dc464087b17c3d1415d

        SHA1

        0fe79de99fb00d23ebe5d2b780523017130830c8

        SHA256

        68081120ca2dd0730ecf4b34dc189b5dd1067197370000dd81363ac18d066627

        SHA512

        85cd2b50ee3bb4e67f7363720e25c763673634c00005287327d9cdae61dbaa635f4579ab8083b82203b4545573facf8536d76e5214537bc575204ae2d78d0acd

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files.cab

        Filesize

        1.9MB

        MD5

        2da958fa004e187531a36126d231228b

        SHA1

        0b329c9a68e2087d83152a6f664a1ed74e2345ef

        SHA256

        7e4576b5e4c4084eb7b552727dcf9e7271afc1157b232d526343dee78e903fac

        SHA512

        b6ed388ca54cd360c0f6e8b451d95667e943bfc06f509b89692b6ab855dcdc8ba11341143265a191b5d1e5868b75bf2963e3ca600c0cad0dc44c8ca44cd5f9ef

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Autoit3.exe

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Autoit3.exe

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\EMCOMSI.pbproj

        Filesize

        28KB

        MD5

        2d190d00ca9f4a0da4ea26e6da13307e

        SHA1

        72cfa041994c30b527cc7f1cf6f4f5877edb35b9

        SHA256

        7c22e0a9afe2f9f4724711c456a049a113cc600d55167598be17ba1ab5124025

        SHA512

        e16e6bc6e164a40efc47d6cdb7ddd2bcbffe4760c8ad1eec21dcba2d1d3f61d688b26e89d454c24b89847d26aaf824fdb5b9b18a7ae85612c1e3a255021ec5e5

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerIE.DLL

        Filesize

        535KB

        MD5

        93a3fd2229bd75fa37383eed3096434a

        SHA1

        97014c406a5e176ace0c9eb3bb33a32da1a96132

        SHA256

        271a19dfff6a57778d61ea0d6bd85eefa46309f0233716dedc3013bd0a4f988f

        SHA512

        4fce694dadb65ee2f758fdac73bc465874cb4c30afd470055e3e55e587be9af31216587aeb16f74630f20dbb070bfde0dc4137ba036a29d2a12acc63e8648296

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerIE.dll

        Filesize

        535KB

        MD5

        93a3fd2229bd75fa37383eed3096434a

        SHA1

        97014c406a5e176ace0c9eb3bb33a32da1a96132

        SHA256

        271a19dfff6a57778d61ea0d6bd85eefa46309f0233716dedc3013bd0a4f988f

        SHA512

        4fce694dadb65ee2f758fdac73bc465874cb4c30afd470055e3e55e587be9af31216587aeb16f74630f20dbb070bfde0dc4137ba036a29d2a12acc63e8648296

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.dll

        Filesize

        92KB

        MD5

        760aa6f15db378dda44f262e1349e28d

        SHA1

        9bb9a0caa54e8b2560245430f33985996b2d40f3

        SHA256

        ee04957d0010ca2134c4770b434b2fdec08a25400b474dd51f47d5d1dc8d574b

        SHA512

        c6cf081dc189d88c85d01832f5cb09ff42c1264d7d4c548a336a33b97ec0b0b24aeb25076fd24db7db2f7a7ced6eccc67d26497352f7eeb1d29bb9c0a59abce6

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe

        Filesize

        500KB

        MD5

        c790ebfcb6a34953a371e32c9174fe46

        SHA1

        3ead08d8bbdb3afd851877cb50507b77ae18a4d8

        SHA256

        fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

        SHA512

        74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe

        Filesize

        500KB

        MD5

        c790ebfcb6a34953a371e32c9174fe46

        SHA1

        3ead08d8bbdb3afd851877cb50507b77ae18a4d8

        SHA256

        fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

        SHA512

        74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Languages\KSLangCHT.dll

        Filesize

        14KB

        MD5

        07e327539ff319611d858a4c9575ed02

        SHA1

        53d74091a51d96bb9b946a06803e16d3a9139df6

        SHA256

        d4afb96b37351ebbe9763fe0110a0859e62f6a065abfa840af5454505b3cd80e

        SHA512

        906a346bb8f5842a81a1b5f4fc54b71d9db9c390bcdc2dfbaf723eb40ad247c456fccc7a0fd77130c666dd80d2821de1e3487ad62528405a3ec86e503202bc67

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Languages\KSLangJPN.dll

        Filesize

        14KB

        MD5

        bc5feb50bc7a25e4c08e3bcd8d2bc1c5

        SHA1

        fb703a62a503ce8a697e8d8c648f6c09408b2f53

        SHA256

        d52120ab6b006b1f5bda114129d78b7d11ff33e707c3e689cd6bc15dca836da9

        SHA512

        84699f9de5079fa6c89430d81c76cc89ffd73cc7a9ae2f1a6e5a92bbdb2db5de9461436fb134ce8ff5074b1eea7e56a72432e0e6595d9e141a44f0290e124214

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\QFXUpdateService.exe

        Filesize

        768KB

        MD5

        4ed21ae3ae981538ab61f199d4477b92

        SHA1

        d7266d30270bce21dffb62ed7f2e47fee9890fc2

        SHA256

        7053dae7f3d11cee5b0ca0363320104857c73aad6a0f2f9af398c2f4e607a95b

        SHA512

        f4768e7ccc73d5ae8f9da526875b12f571c36ba7c7c9d08aa1a455926a34560f11598f677242c5513ed750a384bd9b1107b57975487603f49e6c16eea92bcbdb

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\ReadMe.txt

        Filesize

        13KB

        MD5

        06a5df751eb0765e69bfb15e12f4c665

        SHA1

        7394bf7df2dda47bf8d55bfbc880d2a2316054ac

        SHA256

        8b9d97c137459a495936af47f5140fe75f795728a30e9ec3d8ac9c1cb2e5c65f

        SHA512

        aabd6aa18646192bd49e5343e0129e696b1e003a16e8205fd36aa863be9c97aadf9ac67bba96629d21ea5921e89ce6a401e74d9347aa77468f3854dc64e20558

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Sounds\Error.wav

        Filesize

        35KB

        MD5

        efad8c5d6cc6cae180ebe01ce3a60c88

        SHA1

        614839975c1f07161f3c26ba2af08ae910b21c61

        SHA256

        acad74b9bb57809e1b35bc06f357941986ebdc547ba33fc618f07e6e7bdc49bd

        SHA512

        d404752e05ee803958a21b7fcadc0782ba36ea42eba84eae42eca6360df71822bc705eea6ef2caaa82e2fdcc518ba1cd94c04cc7e7e7739d32eb29dbffd2f51a

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Sounds\Success.wav

        Filesize

        66KB

        MD5

        fd8177d61c8dd032dd262bf979d852f6

        SHA1

        ac64e21b7c80e996bcb369b6023bec4191568a52

        SHA256

        8dae19fc9c722a7fb169f37b5881e74551a8d3b8b43ec6f52b6d5d46e885ed6c

        SHA512

        39e75172a2b410eb25de87f06c57e1c583493f1885a39f2a410ce6437cc8e9d400a3e8e695cdcec63752840096637a16c1d875e43ce1c40e43553f16337ff835

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Uninstall.exe

        Filesize

        72KB

        MD5

        eff839d29dbb06677a85117d036e29c6

        SHA1

        473823c718f3db95d27f14b783e68c08f13caded

        SHA256

        1b5cb8035b18d06b5219f2e7d30200ca343c0ce6763962c7c41534aecc2b1c80

        SHA512

        cb4fb2b054e3430df934cd30be220e13c2f86bf2dbc6e2a46d59fa4f7d9c6feca9cbc44fb1cc49bfae7aa39623d26d8f4510fa9a0584a1f64110cae87117aff3

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\getting_started.html

        Filesize

        1KB

        MD5

        da033601ee343eaa7f5d609a854b4baa

        SHA1

        e279b127a9ce7582a626c29dd02a0b88ff10d966

        SHA256

        e4312722cf4e6e179f7c50e8fcc618d583a38ba71046aee2d67090d7a37ee5da

        SHA512

        b6c53aabc3c1c41d639f5877dc81dbf05145c8feb4101e20afd45dbafdc5f2af90394dda3c26836a34d4382135fbdcc899795a58a40d3974fcaff7f4f8002a9d

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\keyscrambler.ico

        Filesize

        39KB

        MD5

        fde5504bbf7620aca9f3850511c13a45

        SHA1

        484382ecc232cedc1651fba5f9311e9164f43369

        SHA256

        932409eb2abfc31f2dd218240de70a150359ea8ab09fcceb1f076b9a17c844b7

        SHA512

        6d67be9398fcc2b85fe4fd7357f37d6cfc1d3e548f713319080707c750b66d2b1e631c79a7e745c56b1a72be91735156e3989eff8d0b84c3442c0fa548c2a6b4

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\keyscrambler.sys

        Filesize

        225KB

        MD5

        9baf5236d65a36ed2c388cf04108ab9f

        SHA1

        f5e28edea04a00b5e8806130cd2736336c6e3792

        SHA256

        9e79960a40797c11a007d9c8e6a4bce721baf603f5d651f5485eb5481c717b12

        SHA512

        1fc899c37e628adbe05a53812e6106332de7dbef83ce72094dd228067eefa71d09abe55d250b35d93f7454b9596073de95af6700e543c17bb5d43e7de0fcac1b

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\khxkfahy

        Filesize

        1.7MB

        MD5

        5ca038d7313d4c75caa753768a74a964

        SHA1

        36240306043e5cba34cfc2d37df5c3094d8814cc

        SHA256

        dadf197a0c895829a3ee6023d86121ecbd51e7fd420c6d7041328e973f9696db

        SHA512

        c700138e67722d919f70eb6064a8b474020570b83c569b3fabed4fa65f6ee5d0901be110e652c1721706f3e4bd04a59667530672e9bdb25b941f56a6ecb05649

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\kmoypyh

        Filesize

        8B

        MD5

        fa5afe7115c40b879572ed0a36fb4c5d

        SHA1

        df6cea3f6b9a090d43af2dc051433569fb4beedb

        SHA256

        d3a3819fe3a7e55723fbbb07c0cd01d3f80da0222e3c95e2fc59b51cc779f1e4

        SHA512

        254bd412bb3a4e9625016550e90efda95729f34e462b987aeeaa2072c191e03eb03231ee7be5af61b18b91bab88abe4ce81af3d3aad9f2d13442f6ace52fd815

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\license.htm

        Filesize

        6KB

        MD5

        fbe23ef8575dd46ea36f06dd627e94ab

        SHA1

        d80929568026e2d1db891742331229f1fd0c7e34

        SHA256

        104c6948b760b0dc6fb80f9283a7978229e8be4bab316fe5fa883dccc18dc8ab

        SHA512

        caba58d22a835c2a9a0c420129631add230ebbb16edc36b45766348f5c7d5e5c9f8dc2edd71622f8876f8777d3c797a3e6dd2da7ea1a743cbca73d1e4ad27d20

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\project.xml

        Filesize

        1KB

        MD5

        189dc774be74d9453606a7a80cd730e6

        SHA1

        1a70d362b8bd78cdfe7949f3438b346fe8c69adb

        SHA256

        3af50be8a1086fff8726686340b4a3883125406f20ac0f72396363891ecc26c6

        SHA512

        68679076938165c6bb669d5ac7fbe979ae34611b6eda3030eea5361872993c7922a705185ac4016e221ccd6220f8af31e0d3821241d410bbfe744e6c29588a9e

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\script.au3

        Filesize

        772KB

        MD5

        deca2eb22764d5ce745ee5e766e97e76

        SHA1

        36d440b64a659af334b6ab64915cb1153ad8af26

        SHA256

        ddde64230135e567a4190ef23d0bf1cd897e8f144464b95b49fbc34fc7b4fd45

        SHA512

        5bbc6934b82aba3b6a4d3cd19134de8008318c8059512102747c44c98c173e09d04eb0d50ea575b6d1b606531e0686be4f1fab6389bc69db758a58498d4f5d8c

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\msiwrapper.ini

        Filesize

        1KB

        MD5

        c636a7443a1573a4aefbe07cf441a853

        SHA1

        55a280ca0351a03fb85f72ce9e552a26dd7875d0

        SHA256

        f60837e04fc248f275377339f0017eedeae03a802e153c00ba57665fa1242413

        SHA512

        032ff7bb80e267bdaa4531994f935935389794a230eba5ce805a8e358804f74387243565bec043814526c0b35a3d4baaa9e32c5973b95ff4bd3570fa80767429

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\msiwrapper.ini

        Filesize

        1KB

        MD5

        e9d54c8003d3e67e965ed5c68fef52e9

        SHA1

        e84a539c7289ab69de4b0b40b8a4653891d954c0

        SHA256

        390b69ded68b350b6a868d71b83e8603c1dd97b34be58f436eb90b7e5f648f7a

        SHA512

        b5425d2bc2ed40fa6e56df6bec79dd491fbd7def5ccc48d2499441ff3cb8436ff8503b9ad55bfd039037963d7f69c42525dae26578d1a1f448796dbc927f23a5

      • C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\msiwrapper.ini

        Filesize

        1KB

        MD5

        e9d54c8003d3e67e965ed5c68fef52e9

        SHA1

        e84a539c7289ab69de4b0b40b8a4653891d954c0

        SHA256

        390b69ded68b350b6a868d71b83e8603c1dd97b34be58f436eb90b7e5f648f7a

        SHA512

        b5425d2bc2ed40fa6e56df6bec79dd491fbd7def5ccc48d2499441ff3cb8436ff8503b9ad55bfd039037963d7f69c42525dae26578d1a1f448796dbc927f23a5

      • C:\Windows\Installer\MSI2DAB.tmp

        Filesize

        208KB

        MD5

        d82b3fb861129c5d71f0cd2874f97216

        SHA1

        f3fe341d79224126e950d2691d574d147102b18d

        SHA256

        107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

        SHA512

        244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

      • C:\Windows\Installer\MSI2DAB.tmp

        Filesize

        208KB

        MD5

        d82b3fb861129c5d71f0cd2874f97216

        SHA1

        f3fe341d79224126e950d2691d574d147102b18d

        SHA256

        107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

        SHA512

        244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

      • C:\Windows\Installer\MSI890C.tmp

        Filesize

        208KB

        MD5

        d82b3fb861129c5d71f0cd2874f97216

        SHA1

        f3fe341d79224126e950d2691d574d147102b18d

        SHA256

        107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

        SHA512

        244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

      • C:\Windows\Installer\MSI890C.tmp

        Filesize

        208KB

        MD5

        d82b3fb861129c5d71f0cd2874f97216

        SHA1

        f3fe341d79224126e950d2691d574d147102b18d

        SHA256

        107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

        SHA512

        244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.0MB

        MD5

        3a80a155430bf778e799a6e19219f364

        SHA1

        083b8167c6425a58eaa77adb7f877ebf432079d4

        SHA256

        6abd47598a68a614eea60862d40179e46f20d8b1fca68018765e1715be1e4bd9

        SHA512

        e9860a94b0c49b1a03b18b4948a7237b35cec1a0c144ce482821c52049c790ad27742b017e192ca1fca88995f493c5f47e3dad60bffc83791ac98b1159deb8df

      • \??\Volume{6ada6bfc-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6cb351c9-ec83-45ac-8c94-d7524c955121}_OnDiskSnapshotProp

        Filesize

        5KB

        MD5

        4b94653180f88c9f2f93b5137f7f58f9

        SHA1

        235925a95774c841d9e4cc75db838e783c525ee4

        SHA256

        c89ee1ed4a76f6ef2ea8b13a4fca3806285a4a6872e8b0d90d981287db0c3400

        SHA512

        dac0bb3612de0be479011f8c26300a6a3ba10d8efd68147d5dfb17364aaeab97bfc31b5d521db1c2bf19d636dbbf81b531b57a70f5ca26d26bceb4aba88313bb

      • \??\c:\temp\dbddfae.au3

        Filesize

        772KB

        MD5

        deca2eb22764d5ce745ee5e766e97e76

        SHA1

        36d440b64a659af334b6ab64915cb1153ad8af26

        SHA256

        ddde64230135e567a4190ef23d0bf1cd897e8f144464b95b49fbc34fc7b4fd45

        SHA512

        5bbc6934b82aba3b6a4d3cd19134de8008318c8059512102747c44c98c173e09d04eb0d50ea575b6d1b606531e0686be4f1fab6389bc69db758a58498d4f5d8c

      • \??\c:\temp\gcaafbe

        Filesize

        4B

        MD5

        a25fd467ae764a9aa6e73b3fdc32621b

        SHA1

        537752d97ca815e192b4b6bad39e49bdd4bb5c65

        SHA256

        62daebd0cac2638e51df18f2251413fa04930809c26b4a676a20cdc83e75a080

        SHA512

        c20d52ebaae8f227bb8357b96d5c03e994cd685a04781176159d5727fa517aefd289bb92db286044ce29dfe80c47f5dfdabbade91487d567fdedf069f18e9a17

      • memory/756-1410-0x0000000010490000-0x0000000010510000-memory.dmp

        Filesize

        512KB

      • memory/756-1402-0x0000000010490000-0x0000000010510000-memory.dmp

        Filesize

        512KB

      • memory/756-799-0x0000000000D00000-0x0000000000D01000-memory.dmp

        Filesize

        4KB

      • memory/756-798-0x0000000001020000-0x0000000001021000-memory.dmp

        Filesize

        4KB

      • memory/824-153-0x00000000032F0000-0x0000000003990000-memory.dmp

        Filesize

        6.6MB

      • memory/824-147-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/824-159-0x0000000003B40000-0x0000000003C35000-memory.dmp

        Filesize

        980KB

      • memory/824-154-0x0000000003B40000-0x0000000003C35000-memory.dmp

        Filesize

        980KB

      • memory/824-156-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1400-213-0x00000000043F0000-0x00000000045D2000-memory.dmp

        Filesize

        1.9MB

      • memory/1400-164-0x00000000043F0000-0x00000000045D2000-memory.dmp

        Filesize

        1.9MB

      • memory/1400-208-0x0000000001090000-0x0000000001490000-memory.dmp

        Filesize

        4.0MB

      • memory/1400-1271-0x00000000043F0000-0x00000000045D2000-memory.dmp

        Filesize

        1.9MB

      • memory/1400-183-0x00000000043F0000-0x00000000045D2000-memory.dmp

        Filesize

        1.9MB

      • memory/1400-162-0x0000000001090000-0x0000000001490000-memory.dmp

        Filesize

        4.0MB

      • memory/1400-163-0x0000000003BB0000-0x0000000003CA5000-memory.dmp

        Filesize

        980KB

      • memory/4684-787-0x0000000010410000-0x0000000010490000-memory.dmp

        Filesize

        512KB

      • memory/4684-824-0x0000000010410000-0x0000000010490000-memory.dmp

        Filesize

        512KB

      • memory/4684-186-0x0000000000400000-0x0000000000401000-memory.dmp

        Filesize

        4KB

      • memory/4684-185-0x0000000000140000-0x0000000000141000-memory.dmp

        Filesize

        4KB