Analysis
-
max time kernel
171s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 21:48
Static task
static1
Behavioral task
behavioral1
Sample
a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadebmsi_JC.msi
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadebmsi_JC.msi
Resource
win10v2004-20230915-en
General
-
Target
a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadebmsi_JC.msi
-
Size
2.2MB
-
MD5
7996ed8cc6479124c941ab5d136e4841
-
SHA1
092bd61e92aa0745af69e777f341ea7184c3d743
-
SHA256
a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadeb
-
SHA512
bf7270402f3cf4111a0a64d6bf29145ab9bc9c32ea4e5272d49beaf4d178a1bec540fa28935d36bbb0fc783fe42746f450e6c4e7a19ecc5317c4fbc097a0fb6d
-
SSDEEP
49152:NpUPhaTtpSD6TmY7GBXGBr4wBlBLr1GAtrlc+jjK0I7SfBx1jDbKg5A+:NpgktID6dFBrJBLrY+rmR1s3L
Malware Config
Extracted
darkgate
ioeooow8ur
http://178.236.247.102
-
alternative_c2_port
9999
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
27850
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
true
-
crypter_dll
false
-
crypter_rawstub
false
-
crypto_key
xXOZBnzVWHqoqB
-
internal_mutex
cbdKcC
-
minimum_disk
50
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ioeooow8ur
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1400 created 2344 1400 Autoit3.exe 54 PID 4684 created 3548 4684 TabTip32.exe 16 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\egbcbhd.lnk TabTip32.exe -
Executes dropped EXE 2 IoCs
pid Process 824 KeyScramblerLogon.exe 1400 Autoit3.exe -
Loads dropped DLL 3 IoCs
pid Process 4172 MsiExec.exe 824 KeyScramblerLogon.exe 4172 MsiExec.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2436 ICACLS.EXE 3132 ICACLS.EXE -
Blocklisted process makes network request 3 IoCs
flow pid Process 5 4424 msiexec.exe 7 4424 msiexec.exe 13 4424 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e59865d.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI890C.tmp msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log EXPAND.EXE File created C:\Windows\Installer\e59865d.msi msiexec.exe File created C:\Windows\Installer\SourceHash{489E3AC3-61B8-4645-AFF3-2168E6F726F2} msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\Installer\MSI2D9A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2DAB.tmp msiexec.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023226-178.dat nsis_installer_1 behavioral2/files/0x0006000000023226-178.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TabTip32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 KeyScramblerLogon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString KeyScramblerLogon.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TabTip32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TabTip32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TabTip32.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS KeyScramblerLogon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer KeyScramblerLogon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName KeyScramblerLogon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion KeyScramblerLogon.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3204 msiexec.exe 3204 msiexec.exe 1400 Autoit3.exe 1400 Autoit3.exe 1400 Autoit3.exe 1400 Autoit3.exe 4684 TabTip32.exe 4684 TabTip32.exe 4684 TabTip32.exe 4684 TabTip32.exe 756 TabTip32.exe 756 TabTip32.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeShutdownPrivilege 4424 msiexec.exe Token: SeIncreaseQuotaPrivilege 4424 msiexec.exe Token: SeSecurityPrivilege 3204 msiexec.exe Token: SeCreateTokenPrivilege 4424 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4424 msiexec.exe Token: SeLockMemoryPrivilege 4424 msiexec.exe Token: SeIncreaseQuotaPrivilege 4424 msiexec.exe Token: SeMachineAccountPrivilege 4424 msiexec.exe Token: SeTcbPrivilege 4424 msiexec.exe Token: SeSecurityPrivilege 4424 msiexec.exe Token: SeTakeOwnershipPrivilege 4424 msiexec.exe Token: SeLoadDriverPrivilege 4424 msiexec.exe Token: SeSystemProfilePrivilege 4424 msiexec.exe Token: SeSystemtimePrivilege 4424 msiexec.exe Token: SeProfSingleProcessPrivilege 4424 msiexec.exe Token: SeIncBasePriorityPrivilege 4424 msiexec.exe Token: SeCreatePagefilePrivilege 4424 msiexec.exe Token: SeCreatePermanentPrivilege 4424 msiexec.exe Token: SeBackupPrivilege 4424 msiexec.exe Token: SeRestorePrivilege 4424 msiexec.exe Token: SeShutdownPrivilege 4424 msiexec.exe Token: SeDebugPrivilege 4424 msiexec.exe Token: SeAuditPrivilege 4424 msiexec.exe Token: SeSystemEnvironmentPrivilege 4424 msiexec.exe Token: SeChangeNotifyPrivilege 4424 msiexec.exe Token: SeRemoteShutdownPrivilege 4424 msiexec.exe Token: SeUndockPrivilege 4424 msiexec.exe Token: SeSyncAgentPrivilege 4424 msiexec.exe Token: SeEnableDelegationPrivilege 4424 msiexec.exe Token: SeManageVolumePrivilege 4424 msiexec.exe Token: SeImpersonatePrivilege 4424 msiexec.exe Token: SeCreateGlobalPrivilege 4424 msiexec.exe Token: SeBackupPrivilege 764 vssvc.exe Token: SeRestorePrivilege 764 vssvc.exe Token: SeAuditPrivilege 764 vssvc.exe Token: SeBackupPrivilege 3204 msiexec.exe Token: SeRestorePrivilege 3204 msiexec.exe Token: SeRestorePrivilege 3204 msiexec.exe Token: SeTakeOwnershipPrivilege 3204 msiexec.exe Token: SeRestorePrivilege 3204 msiexec.exe Token: SeTakeOwnershipPrivilege 3204 msiexec.exe Token: SeBackupPrivilege 2544 srtasks.exe Token: SeRestorePrivilege 2544 srtasks.exe Token: SeSecurityPrivilege 2544 srtasks.exe Token: SeTakeOwnershipPrivilege 2544 srtasks.exe Token: SeBackupPrivilege 2544 srtasks.exe Token: SeRestorePrivilege 2544 srtasks.exe Token: SeSecurityPrivilege 2544 srtasks.exe Token: SeTakeOwnershipPrivilege 2544 srtasks.exe Token: SeRestorePrivilege 3204 msiexec.exe Token: SeTakeOwnershipPrivilege 3204 msiexec.exe Token: SeRestorePrivilege 3204 msiexec.exe Token: SeTakeOwnershipPrivilege 3204 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4424 msiexec.exe 4424 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 2544 3204 msiexec.exe 98 PID 3204 wrote to memory of 2544 3204 msiexec.exe 98 PID 3204 wrote to memory of 4172 3204 msiexec.exe 100 PID 3204 wrote to memory of 4172 3204 msiexec.exe 100 PID 3204 wrote to memory of 4172 3204 msiexec.exe 100 PID 4172 wrote to memory of 3132 4172 MsiExec.exe 101 PID 4172 wrote to memory of 3132 4172 MsiExec.exe 101 PID 4172 wrote to memory of 3132 4172 MsiExec.exe 101 PID 4172 wrote to memory of 956 4172 MsiExec.exe 103 PID 4172 wrote to memory of 956 4172 MsiExec.exe 103 PID 4172 wrote to memory of 956 4172 MsiExec.exe 103 PID 4172 wrote to memory of 824 4172 MsiExec.exe 105 PID 4172 wrote to memory of 824 4172 MsiExec.exe 105 PID 4172 wrote to memory of 824 4172 MsiExec.exe 105 PID 824 wrote to memory of 1400 824 KeyScramblerLogon.exe 106 PID 824 wrote to memory of 1400 824 KeyScramblerLogon.exe 106 PID 824 wrote to memory of 1400 824 KeyScramblerLogon.exe 106 PID 4172 wrote to memory of 2436 4172 MsiExec.exe 108 PID 4172 wrote to memory of 2436 4172 MsiExec.exe 108 PID 4172 wrote to memory of 2436 4172 MsiExec.exe 108 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 PID 1400 wrote to memory of 4684 1400 Autoit3.exe 109 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3548
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:756
-
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\a9ee4f3dcb9ae9ef57d9677a899d5f1c011dcb17275e95baf87a869f4f3dadebmsi_JC.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2344
-
C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3C6FDEE5EC31FDB088B2C4BF6DDFB67B2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:3132
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe"C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Autoit3.exe"C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Autoit3.exe" C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\script.au34⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400
-
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
PID:2436
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD558797e33ebdcedf6565639b2d503b730
SHA12df156a2251b3e2edd21f31ef86751f77918bb05
SHA25673c77cead6692bf59d4718138ebf0ee40d908c9fdd6a0c43391e202fbdd42e09
SHA51217ebd7fbeb7ca63e2f259ac79b7eedf8e5d0aa1e07d14a27282217c4151e36c5dbbd64b1c7368565f4bad5917e45e0130f213e8b6c1d593d6393bb33a785de4c
-
Filesize
135B
MD558797e33ebdcedf6565639b2d503b730
SHA12df156a2251b3e2edd21f31ef86751f77918bb05
SHA25673c77cead6692bf59d4718138ebf0ee40d908c9fdd6a0c43391e202fbdd42e09
SHA51217ebd7fbeb7ca63e2f259ac79b7eedf8e5d0aa1e07d14a27282217c4151e36c5dbbd64b1c7368565f4bad5917e45e0130f213e8b6c1d593d6393bb33a785de4c
-
Filesize
783KB
MD554d2b083dfd042469b41fe03adbf28ad
SHA142257f789576c40ef61d77d0e920b01e5c2370f6
SHA256ca8cf6a787e653a0352ae8fc2290f0557765503c862909ce5580c3fb7fa57b46
SHA5127f399603d8da86f7f21d034d5802260d5ab258e401401d61b5226edc24e2529635331b0bb64558ca5231eb9c5e66c35e5a018c2733bded4e8f8b6d62496f7871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_90CA53BF93380499933443132F1E0073
Filesize1KB
MD58c4d3f5706d748937cc85456457d75a6
SHA18852bca10232f592730b08e440d7ec69698fe590
SHA256b5d55f3c57e53be2ea341db778cb181879ad51f98867df1ba68ec35471bdba67
SHA51218f9ba0d3d60e5a4c8017a0495eef51942207abd9b83fba51e026c7a163fd6907d70c1f6756acb5aa533cdae67af685a21719c92fc5bfa0b5d70811f114f091a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize1KB
MD58e9720460ecac671b8997fb034bef388
SHA139d3b2ff183ca8fa3983588cdc3786fae2e50dd3
SHA256d777e6f157d0484878c59046c40eccc39e3648dfcdfad01a8d2ce00ee5562568
SHA512ead0d1a1a2ab4d77232b4dbc7ea02418f0b3fe8c493fe05544607823875051f8d9314358fac2b67f7f0734a2117dd2b5f20e655cd8fca59c36d2729a03098819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_90CA53BF93380499933443132F1E0073
Filesize540B
MD531385a19f09e58ed5bb0cd2b2dc8e0f8
SHA13fb926e50d7d24857db1f544cdfe73b85b5afdd9
SHA256aac56d1f135bfd93bba5d282ec6bd1e977e330930e53a28866824f66b3ac9e8b
SHA5129364fb09f10af9bc98ce60578880b2fe6ccca395213a8e37b7da77c52ba4b0b5eaf93ef6b95e776e7005a6bed0446823bdca0d7ad350f4d6a28a43635cadb52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize536B
MD5da3484cdf0a04dc464087b17c3d1415d
SHA10fe79de99fb00d23ebe5d2b780523017130830c8
SHA25668081120ca2dd0730ecf4b34dc189b5dd1067197370000dd81363ac18d066627
SHA51285cd2b50ee3bb4e67f7363720e25c763673634c00005287327d9cdae61dbaa635f4579ab8083b82203b4545573facf8536d76e5214537bc575204ae2d78d0acd
-
Filesize
1.9MB
MD52da958fa004e187531a36126d231228b
SHA10b329c9a68e2087d83152a6f664a1ed74e2345ef
SHA2567e4576b5e4c4084eb7b552727dcf9e7271afc1157b232d526343dee78e903fac
SHA512b6ed388ca54cd360c0f6e8b451d95667e943bfc06f509b89692b6ab855dcdc8ba11341143265a191b5d1e5868b75bf2963e3ca600c0cad0dc44c8ca44cd5f9ef
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
28KB
MD52d190d00ca9f4a0da4ea26e6da13307e
SHA172cfa041994c30b527cc7f1cf6f4f5877edb35b9
SHA2567c22e0a9afe2f9f4724711c456a049a113cc600d55167598be17ba1ab5124025
SHA512e16e6bc6e164a40efc47d6cdb7ddd2bcbffe4760c8ad1eec21dcba2d1d3f61d688b26e89d454c24b89847d26aaf824fdb5b9b18a7ae85612c1e3a255021ec5e5
-
Filesize
535KB
MD593a3fd2229bd75fa37383eed3096434a
SHA197014c406a5e176ace0c9eb3bb33a32da1a96132
SHA256271a19dfff6a57778d61ea0d6bd85eefa46309f0233716dedc3013bd0a4f988f
SHA5124fce694dadb65ee2f758fdac73bc465874cb4c30afd470055e3e55e587be9af31216587aeb16f74630f20dbb070bfde0dc4137ba036a29d2a12acc63e8648296
-
Filesize
535KB
MD593a3fd2229bd75fa37383eed3096434a
SHA197014c406a5e176ace0c9eb3bb33a32da1a96132
SHA256271a19dfff6a57778d61ea0d6bd85eefa46309f0233716dedc3013bd0a4f988f
SHA5124fce694dadb65ee2f758fdac73bc465874cb4c30afd470055e3e55e587be9af31216587aeb16f74630f20dbb070bfde0dc4137ba036a29d2a12acc63e8648296
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.dll
Filesize92KB
MD5760aa6f15db378dda44f262e1349e28d
SHA19bb9a0caa54e8b2560245430f33985996b2d40f3
SHA256ee04957d0010ca2134c4770b434b2fdec08a25400b474dd51f47d5d1dc8d574b
SHA512c6cf081dc189d88c85d01832f5cb09ff42c1264d7d4c548a336a33b97ec0b0b24aeb25076fd24db7db2f7a7ced6eccc67d26497352f7eeb1d29bb9c0a59abce6
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe
Filesize500KB
MD5c790ebfcb6a34953a371e32c9174fe46
SHA13ead08d8bbdb3afd851877cb50507b77ae18a4d8
SHA256fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1
SHA51274e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\KeyScramblerLogon.exe
Filesize500KB
MD5c790ebfcb6a34953a371e32c9174fe46
SHA13ead08d8bbdb3afd851877cb50507b77ae18a4d8
SHA256fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1
SHA51274e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Languages\KSLangCHT.dll
Filesize14KB
MD507e327539ff319611d858a4c9575ed02
SHA153d74091a51d96bb9b946a06803e16d3a9139df6
SHA256d4afb96b37351ebbe9763fe0110a0859e62f6a065abfa840af5454505b3cd80e
SHA512906a346bb8f5842a81a1b5f4fc54b71d9db9c390bcdc2dfbaf723eb40ad247c456fccc7a0fd77130c666dd80d2821de1e3487ad62528405a3ec86e503202bc67
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\Languages\KSLangJPN.dll
Filesize14KB
MD5bc5feb50bc7a25e4c08e3bcd8d2bc1c5
SHA1fb703a62a503ce8a697e8d8c648f6c09408b2f53
SHA256d52120ab6b006b1f5bda114129d78b7d11ff33e707c3e689cd6bc15dca836da9
SHA51284699f9de5079fa6c89430d81c76cc89ffd73cc7a9ae2f1a6e5a92bbdb2db5de9461436fb134ce8ff5074b1eea7e56a72432e0e6595d9e141a44f0290e124214
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\QFXUpdateService.exe
Filesize768KB
MD54ed21ae3ae981538ab61f199d4477b92
SHA1d7266d30270bce21dffb62ed7f2e47fee9890fc2
SHA2567053dae7f3d11cee5b0ca0363320104857c73aad6a0f2f9af398c2f4e607a95b
SHA512f4768e7ccc73d5ae8f9da526875b12f571c36ba7c7c9d08aa1a455926a34560f11598f677242c5513ed750a384bd9b1107b57975487603f49e6c16eea92bcbdb
-
Filesize
13KB
MD506a5df751eb0765e69bfb15e12f4c665
SHA17394bf7df2dda47bf8d55bfbc880d2a2316054ac
SHA2568b9d97c137459a495936af47f5140fe75f795728a30e9ec3d8ac9c1cb2e5c65f
SHA512aabd6aa18646192bd49e5343e0129e696b1e003a16e8205fd36aa863be9c97aadf9ac67bba96629d21ea5921e89ce6a401e74d9347aa77468f3854dc64e20558
-
Filesize
35KB
MD5efad8c5d6cc6cae180ebe01ce3a60c88
SHA1614839975c1f07161f3c26ba2af08ae910b21c61
SHA256acad74b9bb57809e1b35bc06f357941986ebdc547ba33fc618f07e6e7bdc49bd
SHA512d404752e05ee803958a21b7fcadc0782ba36ea42eba84eae42eca6360df71822bc705eea6ef2caaa82e2fdcc518ba1cd94c04cc7e7e7739d32eb29dbffd2f51a
-
Filesize
66KB
MD5fd8177d61c8dd032dd262bf979d852f6
SHA1ac64e21b7c80e996bcb369b6023bec4191568a52
SHA2568dae19fc9c722a7fb169f37b5881e74551a8d3b8b43ec6f52b6d5d46e885ed6c
SHA51239e75172a2b410eb25de87f06c57e1c583493f1885a39f2a410ce6437cc8e9d400a3e8e695cdcec63752840096637a16c1d875e43ce1c40e43553f16337ff835
-
Filesize
72KB
MD5eff839d29dbb06677a85117d036e29c6
SHA1473823c718f3db95d27f14b783e68c08f13caded
SHA2561b5cb8035b18d06b5219f2e7d30200ca343c0ce6763962c7c41534aecc2b1c80
SHA512cb4fb2b054e3430df934cd30be220e13c2f86bf2dbc6e2a46d59fa4f7d9c6feca9cbc44fb1cc49bfae7aa39623d26d8f4510fa9a0584a1f64110cae87117aff3
-
C:\Users\Admin\AppData\Local\Temp\MW-9d38831f-f38f-4473-9265-dc3b149a9ac2\files\getting_started.html
Filesize1KB
MD5da033601ee343eaa7f5d609a854b4baa
SHA1e279b127a9ce7582a626c29dd02a0b88ff10d966
SHA256e4312722cf4e6e179f7c50e8fcc618d583a38ba71046aee2d67090d7a37ee5da
SHA512b6c53aabc3c1c41d639f5877dc81dbf05145c8feb4101e20afd45dbafdc5f2af90394dda3c26836a34d4382135fbdcc899795a58a40d3974fcaff7f4f8002a9d
-
Filesize
39KB
MD5fde5504bbf7620aca9f3850511c13a45
SHA1484382ecc232cedc1651fba5f9311e9164f43369
SHA256932409eb2abfc31f2dd218240de70a150359ea8ab09fcceb1f076b9a17c844b7
SHA5126d67be9398fcc2b85fe4fd7357f37d6cfc1d3e548f713319080707c750b66d2b1e631c79a7e745c56b1a72be91735156e3989eff8d0b84c3442c0fa548c2a6b4
-
Filesize
225KB
MD59baf5236d65a36ed2c388cf04108ab9f
SHA1f5e28edea04a00b5e8806130cd2736336c6e3792
SHA2569e79960a40797c11a007d9c8e6a4bce721baf603f5d651f5485eb5481c717b12
SHA5121fc899c37e628adbe05a53812e6106332de7dbef83ce72094dd228067eefa71d09abe55d250b35d93f7454b9596073de95af6700e543c17bb5d43e7de0fcac1b
-
Filesize
1.7MB
MD55ca038d7313d4c75caa753768a74a964
SHA136240306043e5cba34cfc2d37df5c3094d8814cc
SHA256dadf197a0c895829a3ee6023d86121ecbd51e7fd420c6d7041328e973f9696db
SHA512c700138e67722d919f70eb6064a8b474020570b83c569b3fabed4fa65f6ee5d0901be110e652c1721706f3e4bd04a59667530672e9bdb25b941f56a6ecb05649
-
Filesize
8B
MD5fa5afe7115c40b879572ed0a36fb4c5d
SHA1df6cea3f6b9a090d43af2dc051433569fb4beedb
SHA256d3a3819fe3a7e55723fbbb07c0cd01d3f80da0222e3c95e2fc59b51cc779f1e4
SHA512254bd412bb3a4e9625016550e90efda95729f34e462b987aeeaa2072c191e03eb03231ee7be5af61b18b91bab88abe4ce81af3d3aad9f2d13442f6ace52fd815
-
Filesize
6KB
MD5fbe23ef8575dd46ea36f06dd627e94ab
SHA1d80929568026e2d1db891742331229f1fd0c7e34
SHA256104c6948b760b0dc6fb80f9283a7978229e8be4bab316fe5fa883dccc18dc8ab
SHA512caba58d22a835c2a9a0c420129631add230ebbb16edc36b45766348f5c7d5e5c9f8dc2edd71622f8876f8777d3c797a3e6dd2da7ea1a743cbca73d1e4ad27d20
-
Filesize
1KB
MD5189dc774be74d9453606a7a80cd730e6
SHA11a70d362b8bd78cdfe7949f3438b346fe8c69adb
SHA2563af50be8a1086fff8726686340b4a3883125406f20ac0f72396363891ecc26c6
SHA51268679076938165c6bb669d5ac7fbe979ae34611b6eda3030eea5361872993c7922a705185ac4016e221ccd6220f8af31e0d3821241d410bbfe744e6c29588a9e
-
Filesize
772KB
MD5deca2eb22764d5ce745ee5e766e97e76
SHA136d440b64a659af334b6ab64915cb1153ad8af26
SHA256ddde64230135e567a4190ef23d0bf1cd897e8f144464b95b49fbc34fc7b4fd45
SHA5125bbc6934b82aba3b6a4d3cd19134de8008318c8059512102747c44c98c173e09d04eb0d50ea575b6d1b606531e0686be4f1fab6389bc69db758a58498d4f5d8c
-
Filesize
1KB
MD5c636a7443a1573a4aefbe07cf441a853
SHA155a280ca0351a03fb85f72ce9e552a26dd7875d0
SHA256f60837e04fc248f275377339f0017eedeae03a802e153c00ba57665fa1242413
SHA512032ff7bb80e267bdaa4531994f935935389794a230eba5ce805a8e358804f74387243565bec043814526c0b35a3d4baaa9e32c5973b95ff4bd3570fa80767429
-
Filesize
1KB
MD5e9d54c8003d3e67e965ed5c68fef52e9
SHA1e84a539c7289ab69de4b0b40b8a4653891d954c0
SHA256390b69ded68b350b6a868d71b83e8603c1dd97b34be58f436eb90b7e5f648f7a
SHA512b5425d2bc2ed40fa6e56df6bec79dd491fbd7def5ccc48d2499441ff3cb8436ff8503b9ad55bfd039037963d7f69c42525dae26578d1a1f448796dbc927f23a5
-
Filesize
1KB
MD5e9d54c8003d3e67e965ed5c68fef52e9
SHA1e84a539c7289ab69de4b0b40b8a4653891d954c0
SHA256390b69ded68b350b6a868d71b83e8603c1dd97b34be58f436eb90b7e5f648f7a
SHA512b5425d2bc2ed40fa6e56df6bec79dd491fbd7def5ccc48d2499441ff3cb8436ff8503b9ad55bfd039037963d7f69c42525dae26578d1a1f448796dbc927f23a5
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
23.0MB
MD53a80a155430bf778e799a6e19219f364
SHA1083b8167c6425a58eaa77adb7f877ebf432079d4
SHA2566abd47598a68a614eea60862d40179e46f20d8b1fca68018765e1715be1e4bd9
SHA512e9860a94b0c49b1a03b18b4948a7237b35cec1a0c144ce482821c52049c790ad27742b017e192ca1fca88995f493c5f47e3dad60bffc83791ac98b1159deb8df
-
\??\Volume{6ada6bfc-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6cb351c9-ec83-45ac-8c94-d7524c955121}_OnDiskSnapshotProp
Filesize5KB
MD54b94653180f88c9f2f93b5137f7f58f9
SHA1235925a95774c841d9e4cc75db838e783c525ee4
SHA256c89ee1ed4a76f6ef2ea8b13a4fca3806285a4a6872e8b0d90d981287db0c3400
SHA512dac0bb3612de0be479011f8c26300a6a3ba10d8efd68147d5dfb17364aaeab97bfc31b5d521db1c2bf19d636dbbf81b531b57a70f5ca26d26bceb4aba88313bb
-
Filesize
772KB
MD5deca2eb22764d5ce745ee5e766e97e76
SHA136d440b64a659af334b6ab64915cb1153ad8af26
SHA256ddde64230135e567a4190ef23d0bf1cd897e8f144464b95b49fbc34fc7b4fd45
SHA5125bbc6934b82aba3b6a4d3cd19134de8008318c8059512102747c44c98c173e09d04eb0d50ea575b6d1b606531e0686be4f1fab6389bc69db758a58498d4f5d8c
-
Filesize
4B
MD5a25fd467ae764a9aa6e73b3fdc32621b
SHA1537752d97ca815e192b4b6bad39e49bdd4bb5c65
SHA25662daebd0cac2638e51df18f2251413fa04930809c26b4a676a20cdc83e75a080
SHA512c20d52ebaae8f227bb8357b96d5c03e994cd685a04781176159d5727fa517aefd289bb92db286044ce29dfe80c47f5dfdabbade91487d567fdedf069f18e9a17