Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 23:41

General

  • Target

    winscp_ver_6.1.1.msi

  • Size

    2.2MB

  • MD5

    eb6c9dd67ac627ad54d1d9d98f6b779b

  • SHA1

    253d0ec6919bffc194e1574806e3c8b1a7e7fcfc

  • SHA256

    510af6dd87757c71cf084db4d924f5c7b6ff8cdfffc5084b98256b42078bcd5f

  • SHA512

    9ba437b075964d45f1f48f5fdfae4259d7480dfbc511ca567d054c0ec5c56df4a90867ed00d1955d2686100a12ad91c11136c7a657d85146578fe9251e094bc0

  • SSDEEP

    49152:ypUPhpzVy45pV1KnCx9HYMLEnYnHzIEdsvtyOABCRv4hMh:ypgpzVhpTKnC/4MLEizIbtUBCRv4q

Malware Config

Extracted

Family

darkgate

Botnet

ioeooow8ur

C2

http://178.236.247.102

Attributes
  • alternative_c2_port

    9999

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    27850

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    RjRZGzBFKKciHs

  • internal_mutex

    cbdKcC

  • minimum_disk

    50

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ioeooow8ur

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • NSIS installer 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\winscp_ver_6.1.1.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:744
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C7C0F529C9AA2E43BADF81F832B7DF4E
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2456
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:3016
      • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Autoit3.exe
          "C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Autoit3.exe" C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:1600
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        PID:1080
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1008
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004CC" "00000000000005BC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3D9CA329938CB0832E04D1061ED9F885

    Filesize

    1KB

    MD5

    e6eb41ad6404317af8a18b64f98c2bcf

    SHA1

    c10bb76ad4ee815242406a1e3e1117ffec743d4f

    SHA256

    cd0e144dd10bac221fe2fb901058d16450a0578b3c47c770908f2e9ada28ef12

    SHA512

    43135378751b208498f7f041bdfb431fe22bf52c842c36dc687c878c192a8969c41d37faef142de3048bc8bb89b2691e8984f94efb9611a6e9b71ef4213d7a9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    959B

    MD5

    d5e98140c51869fc462c8975620faa78

    SHA1

    07e032e020b72c3f192f0628a2593a19a70f069e

    SHA256

    5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e

    SHA512

    9bd164cc4b9ef07386762d3775c6d9528b82d4a9dc508c3040104b8d41cfec52eb0b7e6f8dc47c5021ce2fe3ca542c4ae2b54fd02d76b0eabd9724484621a105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    1KB

    MD5

    e94fb54871208c00df70f708ac47085b

    SHA1

    4efc31460c619ecae59c1bce2c008036d94c84b8

    SHA256

    7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

    SHA512

    2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3D9CA329938CB0832E04D1061ED9F885

    Filesize

    276B

    MD5

    343e62f14ed0ff7216a4f7045b8b3930

    SHA1

    c23e0e205f01a66ae14b29f30d81b506c348dac8

    SHA256

    96a1c2ecfd607a1aa192b0fc3fde8fb403352267932383d459eab68dceb91277

    SHA512

    44fce63f6d8723e834a87b5135f84ff130c77b74ca29a89f352b9da0707cf913554069eb0ae09053c37f0119bc9ec51c01d2a6fd8cc18eb781a509d2447da5cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    192B

    MD5

    2950396b3028da71a4d372bd2d68e68e

    SHA1

    942c5e69bc230c0a034c48f4f74293620ceee15d

    SHA256

    57d7aef59f4597e724b597e2eb9e693c9b0afafb356b0a67f8fb8ba33efc9374

    SHA512

    a5022c5367ac0aa7c90fd43ab97024f6de3a76545470cda925ccea1a4c330f6fc7abefa08fe1bd38801c35d77385bebc7c8cae620ce25ea216c55a5a8d42f6a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddb2a67bb9e0e46f3f708965f6460eeb

    SHA1

    4c28d92fdfbf6bbe7852587b08a8c75bf8915576

    SHA256

    06e5d645ed27063a608e49d105a51a72b2447e943c5cf104da37f7e3dd510105

    SHA512

    96814ff96d3409fc7d41552a7b6b6ce7dbf9ced1596484ec4a6805b9c99e93794232dd46152acebea9ca810e8e2f0cde3bd5fc9188022b8e1a14c9ff38c2b036

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    264B

    MD5

    f84ccb62e03a5e73e17916976b06324b

    SHA1

    d39f00a6e34e5a8bcf267e2a6147e19bcaeda64d

    SHA256

    dfc57508d493c63465e7edbe418e5f61b42e06f8b8e388fb176be6a819718da2

    SHA512

    99005f30e28b97992c26f7200c3bccb9e72d20c606039990a20f0b194fa1c2689874d437d53e5023925363541efaf2faa1c8bece78627706592be65cc014564f

  • C:\Users\Admin\AppData\Local\Temp\Cab33FE.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files.cab

    Filesize

    1.9MB

    MD5

    6374e57090a340047962b08a822a7ee0

    SHA1

    5ebc82cce2a0551ed89aa15e8981a3a281ddb510

    SHA256

    b9eabc270f756512d043a34e46f23f9cc6c599c4de38b6dae4e1f673bcf3d335

    SHA512

    8e0abf786d32e6e9784bb1892575f993ddd703de385c6c15a160617dd601733aa830ad61bbb04bb92b0555d73a2d6ae3c8d841f86c987fe27df93ce4f515be43

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\EMCOMSI.pbproj

    Filesize

    28KB

    MD5

    2d190d00ca9f4a0da4ea26e6da13307e

    SHA1

    72cfa041994c30b527cc7f1cf6f4f5877edb35b9

    SHA256

    7c22e0a9afe2f9f4724711c456a049a113cc600d55167598be17ba1ab5124025

    SHA512

    e16e6bc6e164a40efc47d6cdb7ddd2bcbffe4760c8ad1eec21dcba2d1d3f61d688b26e89d454c24b89847d26aaf824fdb5b9b18a7ae85612c1e3a255021ec5e5

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerIE.DLL

    Filesize

    535KB

    MD5

    85dd61ec4125ba45a136a5b40b7250de

    SHA1

    11b62716042d0552cba90ec3b04845750ed83e06

    SHA256

    9a74f605370ec682ff056e54e5e514c23fe1d2ca41f697a36ab2456f424479c6

    SHA512

    fd935077c5d627b11214452a92e54edce8fd89d04d0bbe282e89a3dc7f458caf75125f26e72009bf487e1e59cc48474cd40e1ce319b8bdf30e6ef107eb023c1a

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.dll

    Filesize

    92KB

    MD5

    760aa6f15db378dda44f262e1349e28d

    SHA1

    9bb9a0caa54e8b2560245430f33985996b2d40f3

    SHA256

    ee04957d0010ca2134c4770b434b2fdec08a25400b474dd51f47d5d1dc8d574b

    SHA512

    c6cf081dc189d88c85d01832f5cb09ff42c1264d7d4c548a336a33b97ec0b0b24aeb25076fd24db7db2f7a7ced6eccc67d26497352f7eeb1d29bb9c0a59abce6

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe

    Filesize

    500KB

    MD5

    c790ebfcb6a34953a371e32c9174fe46

    SHA1

    3ead08d8bbdb3afd851877cb50507b77ae18a4d8

    SHA256

    fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

    SHA512

    74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe

    Filesize

    500KB

    MD5

    c790ebfcb6a34953a371e32c9174fe46

    SHA1

    3ead08d8bbdb3afd851877cb50507b77ae18a4d8

    SHA256

    fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

    SHA512

    74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Languages\KSLangCHT.dll

    Filesize

    14KB

    MD5

    07e327539ff319611d858a4c9575ed02

    SHA1

    53d74091a51d96bb9b946a06803e16d3a9139df6

    SHA256

    d4afb96b37351ebbe9763fe0110a0859e62f6a065abfa840af5454505b3cd80e

    SHA512

    906a346bb8f5842a81a1b5f4fc54b71d9db9c390bcdc2dfbaf723eb40ad247c456fccc7a0fd77130c666dd80d2821de1e3487ad62528405a3ec86e503202bc67

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Languages\KSLangJPN.dll

    Filesize

    14KB

    MD5

    bc5feb50bc7a25e4c08e3bcd8d2bc1c5

    SHA1

    fb703a62a503ce8a697e8d8c648f6c09408b2f53

    SHA256

    d52120ab6b006b1f5bda114129d78b7d11ff33e707c3e689cd6bc15dca836da9

    SHA512

    84699f9de5079fa6c89430d81c76cc89ffd73cc7a9ae2f1a6e5a92bbdb2db5de9461436fb134ce8ff5074b1eea7e56a72432e0e6595d9e141a44f0290e124214

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\QFXUpdateService.exe

    Filesize

    768KB

    MD5

    4ed21ae3ae981538ab61f199d4477b92

    SHA1

    d7266d30270bce21dffb62ed7f2e47fee9890fc2

    SHA256

    7053dae7f3d11cee5b0ca0363320104857c73aad6a0f2f9af398c2f4e607a95b

    SHA512

    f4768e7ccc73d5ae8f9da526875b12f571c36ba7c7c9d08aa1a455926a34560f11598f677242c5513ed750a384bd9b1107b57975487603f49e6c16eea92bcbdb

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\ReadMe.txt

    Filesize

    13KB

    MD5

    06a5df751eb0765e69bfb15e12f4c665

    SHA1

    7394bf7df2dda47bf8d55bfbc880d2a2316054ac

    SHA256

    8b9d97c137459a495936af47f5140fe75f795728a30e9ec3d8ac9c1cb2e5c65f

    SHA512

    aabd6aa18646192bd49e5343e0129e696b1e003a16e8205fd36aa863be9c97aadf9ac67bba96629d21ea5921e89ce6a401e74d9347aa77468f3854dc64e20558

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Sounds\Error.wav

    Filesize

    35KB

    MD5

    efad8c5d6cc6cae180ebe01ce3a60c88

    SHA1

    614839975c1f07161f3c26ba2af08ae910b21c61

    SHA256

    acad74b9bb57809e1b35bc06f357941986ebdc547ba33fc618f07e6e7bdc49bd

    SHA512

    d404752e05ee803958a21b7fcadc0782ba36ea42eba84eae42eca6360df71822bc705eea6ef2caaa82e2fdcc518ba1cd94c04cc7e7e7739d32eb29dbffd2f51a

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Sounds\Success.wav

    Filesize

    66KB

    MD5

    fd8177d61c8dd032dd262bf979d852f6

    SHA1

    ac64e21b7c80e996bcb369b6023bec4191568a52

    SHA256

    8dae19fc9c722a7fb169f37b5881e74551a8d3b8b43ec6f52b6d5d46e885ed6c

    SHA512

    39e75172a2b410eb25de87f06c57e1c583493f1885a39f2a410ce6437cc8e9d400a3e8e695cdcec63752840096637a16c1d875e43ce1c40e43553f16337ff835

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Uninstall.exe

    Filesize

    72KB

    MD5

    eff839d29dbb06677a85117d036e29c6

    SHA1

    473823c718f3db95d27f14b783e68c08f13caded

    SHA256

    1b5cb8035b18d06b5219f2e7d30200ca343c0ce6763962c7c41534aecc2b1c80

    SHA512

    cb4fb2b054e3430df934cd30be220e13c2f86bf2dbc6e2a46d59fa4f7d9c6feca9cbc44fb1cc49bfae7aa39623d26d8f4510fa9a0584a1f64110cae87117aff3

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\dovnsofg

    Filesize

    1.8MB

    MD5

    ce0baa21adf46c7255218d5132516d48

    SHA1

    fbf33659e32651e34cf29f8fc31fde28bdfe9ec5

    SHA256

    3d74052bd69614f113b811ba6acb6e91c4806206374fd7c68ceb9ca013d2d8c6

    SHA512

    b2004787b666116f819d78a1465f1f8418cee817271b94dbdb3512bca8845647bdbee72ce70a5675d871e34063dbbb94092d784f12f95e46b2a110332b321b32

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\getting_started.html

    Filesize

    1KB

    MD5

    da033601ee343eaa7f5d609a854b4baa

    SHA1

    e279b127a9ce7582a626c29dd02a0b88ff10d966

    SHA256

    e4312722cf4e6e179f7c50e8fcc618d583a38ba71046aee2d67090d7a37ee5da

    SHA512

    b6c53aabc3c1c41d639f5877dc81dbf05145c8feb4101e20afd45dbafdc5f2af90394dda3c26836a34d4382135fbdcc899795a58a40d3974fcaff7f4f8002a9d

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\ilwjlhe

    Filesize

    8B

    MD5

    e5cacaac83e54c922eecccfeba630570

    SHA1

    bbb016ee23db1b7547ab0cbb0db8b2d6d2817502

    SHA256

    82b6974b2ac2f589827e5cfe7861272425075d0fa2ca429e3fcb17434a18a2e2

    SHA512

    b8ec7350977c915734c85344c08cc9cc4ba2ced39e2816fc23ff900933b3828b748bff54356c7d34e3720cf128c0ee4cfa74598c071167b4e4840b631261e5f9

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\keyscrambler.ico

    Filesize

    39KB

    MD5

    fde5504bbf7620aca9f3850511c13a45

    SHA1

    484382ecc232cedc1651fba5f9311e9164f43369

    SHA256

    932409eb2abfc31f2dd218240de70a150359ea8ab09fcceb1f076b9a17c844b7

    SHA512

    6d67be9398fcc2b85fe4fd7357f37d6cfc1d3e548f713319080707c750b66d2b1e631c79a7e745c56b1a72be91735156e3989eff8d0b84c3442c0fa548c2a6b4

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\keyscrambler.sys

    Filesize

    225KB

    MD5

    9baf5236d65a36ed2c388cf04108ab9f

    SHA1

    f5e28edea04a00b5e8806130cd2736336c6e3792

    SHA256

    9e79960a40797c11a007d9c8e6a4bce721baf603f5d651f5485eb5481c717b12

    SHA512

    1fc899c37e628adbe05a53812e6106332de7dbef83ce72094dd228067eefa71d09abe55d250b35d93f7454b9596073de95af6700e543c17bb5d43e7de0fcac1b

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\license.htm

    Filesize

    6KB

    MD5

    fbe23ef8575dd46ea36f06dd627e94ab

    SHA1

    d80929568026e2d1db891742331229f1fd0c7e34

    SHA256

    104c6948b760b0dc6fb80f9283a7978229e8be4bab316fe5fa883dccc18dc8ab

    SHA512

    caba58d22a835c2a9a0c420129631add230ebbb16edc36b45766348f5c7d5e5c9f8dc2edd71622f8876f8777d3c797a3e6dd2da7ea1a743cbca73d1e4ad27d20

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\project.xml

    Filesize

    1KB

    MD5

    189dc774be74d9453606a7a80cd730e6

    SHA1

    1a70d362b8bd78cdfe7949f3438b346fe8c69adb

    SHA256

    3af50be8a1086fff8726686340b4a3883125406f20ac0f72396363891ecc26c6

    SHA512

    68679076938165c6bb669d5ac7fbe979ae34611b6eda3030eea5361872993c7922a705185ac4016e221ccd6220f8af31e0d3821241d410bbfe744e6c29588a9e

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\script.au3

    Filesize

    923KB

    MD5

    d92075b54be976df517365e5e0095035

    SHA1

    c8ae12874c7d29a7bd27028663aa1806e95e5868

    SHA256

    b32496316b452bfd67c51ca0aa66f842fe0bb786cf456fa307f143672c605d68

    SHA512

    c4d2bcffbf535711e3e0dfca089a6aae66cae8acca49b51a52a714533c42c058a7ba39cfc8f10acc1bacd99e69420f30024708ef0171321f3578e9c50cf8a14b

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\msiwrapper.ini

    Filesize

    396B

    MD5

    f0b0d97e134d4971cf788ecaa53cf5c7

    SHA1

    cd17ceb8665eee9d8a8fca59e18a4c08ac38ba26

    SHA256

    b3e0fc4d08e06cb6b31d8c3b53a9f9983bc2afb98fd601b87953a9af8e38112a

    SHA512

    a9c4ccadf1aa4845b8ef99438baa96f4eff70b6026b45ed539709c458d978bea6e04f51d7d6ae3b11938fcc541ac2758a56d095fd12a93d0ee5ccb659abe3e2c

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\msiwrapper.ini

    Filesize

    1KB

    MD5

    c4b807abcc97a8cc97c7fb80fce00ee9

    SHA1

    fe7792c6ac75d0763082904a7d34b51e22dafd82

    SHA256

    08a562fe1f057e0862c5f0200b40c07b660401e230b0697cf5f80082425ef846

    SHA512

    cf00abb80d13fec4636ff81c67dae859c6455527d09714ac6ef01634082553fe949570075939f9b14bb31589dad1aef0e2c826ad57cbc25b396e8754363955eb

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\msiwrapper.ini

    Filesize

    1KB

    MD5

    c4b807abcc97a8cc97c7fb80fce00ee9

    SHA1

    fe7792c6ac75d0763082904a7d34b51e22dafd82

    SHA256

    08a562fe1f057e0862c5f0200b40c07b660401e230b0697cf5f80082425ef846

    SHA512

    cf00abb80d13fec4636ff81c67dae859c6455527d09714ac6ef01634082553fe949570075939f9b14bb31589dad1aef0e2c826ad57cbc25b396e8754363955eb

  • C:\Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\msiwrapper.ini

    Filesize

    1KB

    MD5

    02326b4c554cab9ab900900b3be58d2f

    SHA1

    69a81a632c28ed0ba248f9a0c1a016ac32077fe5

    SHA256

    f1c104c5b8cb1371791ec4de740a6a8ce1c18ab98e0aea34e5093cc11e1c64de

    SHA512

    0e3fae14649958dc4537e38366123716f7c060c9772f0d8e8a119927d9a195d5bc5ce4463fc5a5128d4db4f57266aa06185bd3989fa4ecc8063619c9c73f26e9

  • C:\Users\Admin\AppData\Local\Temp\Tar3410.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Windows\Installer\MSIC585.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSIDAEB.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • \Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerIE.dll

    Filesize

    535KB

    MD5

    85dd61ec4125ba45a136a5b40b7250de

    SHA1

    11b62716042d0552cba90ec3b04845750ed83e06

    SHA256

    9a74f605370ec682ff056e54e5e514c23fe1d2ca41f697a36ab2456f424479c6

    SHA512

    fd935077c5d627b11214452a92e54edce8fd89d04d0bbe282e89a3dc7f458caf75125f26e72009bf487e1e59cc48474cd40e1ce319b8bdf30e6ef107eb023c1a

  • \Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe

    Filesize

    500KB

    MD5

    c790ebfcb6a34953a371e32c9174fe46

    SHA1

    3ead08d8bbdb3afd851877cb50507b77ae18a4d8

    SHA256

    fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

    SHA512

    74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

  • \Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe

    Filesize

    500KB

    MD5

    c790ebfcb6a34953a371e32c9174fe46

    SHA1

    3ead08d8bbdb3afd851877cb50507b77ae18a4d8

    SHA256

    fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

    SHA512

    74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

  • \Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe

    Filesize

    500KB

    MD5

    c790ebfcb6a34953a371e32c9174fe46

    SHA1

    3ead08d8bbdb3afd851877cb50507b77ae18a4d8

    SHA256

    fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

    SHA512

    74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

  • \Users\Admin\AppData\Local\Temp\MW-c23f6810-1c64-44d0-9fc0-fda1d8b3f023\files\KeyScramblerLogon.exe

    Filesize

    500KB

    MD5

    c790ebfcb6a34953a371e32c9174fe46

    SHA1

    3ead08d8bbdb3afd851877cb50507b77ae18a4d8

    SHA256

    fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

    SHA512

    74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

  • \Windows\Installer\MSIC585.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • \Windows\Installer\MSIDAEB.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • memory/1600-453-0x0000000002960000-0x0000000002A55000-memory.dmp

    Filesize

    980KB

  • memory/1600-454-0x0000000003280000-0x0000000003642000-memory.dmp

    Filesize

    3.8MB

  • memory/1600-452-0x0000000002960000-0x0000000002A55000-memory.dmp

    Filesize

    980KB

  • memory/1600-451-0x0000000000AC0000-0x0000000000EC0000-memory.dmp

    Filesize

    4.0MB

  • memory/1600-479-0x0000000003280000-0x0000000003642000-memory.dmp

    Filesize

    3.8MB

  • memory/1800-449-0x0000000002D00000-0x0000000002DF5000-memory.dmp

    Filesize

    980KB

  • memory/1800-447-0x00000000002B0000-0x0000000000340000-memory.dmp

    Filesize

    576KB

  • memory/1800-440-0x0000000002D00000-0x0000000002DF5000-memory.dmp

    Filesize

    980KB

  • memory/1800-439-0x00000000023F0000-0x0000000002B30000-memory.dmp

    Filesize

    7.2MB

  • memory/1800-435-0x00000000002B0000-0x0000000000340000-memory.dmp

    Filesize

    576KB