Analysis

  • max time kernel
    50s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-10-2023 14:36

General

  • Target

    p_terminal_x86_install.msi

  • Size

    2.2MB

  • MD5

    40804163b8e3cb4cfb6dc6984a1e228f

  • SHA1

    41f971c1cbb03545225fa7816708bfb322fbba95

  • SHA256

    be69add1213202bc7a038a2cfb2cf8ece07eeaaf163c2e17873c54d303e3abfa

  • SHA512

    e1e751f0e82e464ab084222ba662aa9d756e4c99a60322dc52c39a216ceb68d94599c90fb98368ea3eb392a2ca8670bf449fb347855c7446db1045c3553d3c38

  • SSDEEP

    49152:hpUPh/aSZVfoL5/esFPZPEN5YYCusbwy19m3zca16l+:hpg/NHAosF6N5YYubNjCM+

Malware Config

Extracted

Family

darkgate

Botnet

ioeooow8ur

C2

http://178.236.247.102

Attributes
  • alternative_c2_port

    9999

  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    27850

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    true

  • crypter_dll

    false

  • crypter_rawstub

    false

  • crypto_key

    tBtKaLevvIIJyE

  • internal_mutex

    cbdKcC

  • minimum_disk

    50

  • minimum_ram

    4096

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    ioeooow8ur

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • NSIS installer 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
      PID:3792
      • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"
        2⤵
          PID:5424
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\p_terminal_x86_install.msi
        1⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3572
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:2992
          • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe
            "C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops startup file
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2952
        • C:\Windows\system32\msiexec.exe
          C:\Windows\system32\msiexec.exe /V
          1⤵
          • Enumerates connected drives
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3740
          • C:\Windows\system32\srtasks.exe
            C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1680
          • C:\Windows\syswow64\MsiExec.exe
            C:\Windows\syswow64\MsiExec.exe -Embedding BDC32D96503A5A8FF39E496E83A2AA6A
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:5076
            • C:\Windows\SysWOW64\ICACLS.EXE
              "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
              3⤵
              • Modifies file permissions
              PID:4332
            • C:\Windows\SysWOW64\EXPAND.EXE
              "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
              3⤵
              • Drops file in Windows directory
              PID:4092
            • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerLogon.exe
              "C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerLogon.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of WriteProcessMemory
              PID:3724
              • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Autoit3.exe
                "C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Autoit3.exe" C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\script.au3
                4⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:404
            • C:\Windows\SysWOW64\ICACLS.EXE
              "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\." /SETINTEGRITYLEVEL (CI)(OI)LOW
              3⤵
              • Modifies file permissions
              PID:3680
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:3632

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\hddfhke\decdccd\aebdggh

          Filesize

          135B

          MD5

          ab197c2ece69daf8832635d26b2e4e08

          SHA1

          5fe160da30e77933f105d40e63e3d7e06086f2ac

          SHA256

          1b5c52a6149e8baf61a672574bea50afa0002ba5239634f92dc58da70151a514

          SHA512

          6a6237b47d1d1684572d4e00406cae2fd82e3a7536104adef51370b225fb32becd3cab3631e87f234549425b7d139bdc58e0b170829cafa95efbadf44337b48c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_90CA53BF93380499933443132F1E0073

          Filesize

          1KB

          MD5

          875d21db9b501a2b7478211e019cd95d

          SHA1

          a39f3f5a4de5d31593a53d28e4a1e17a2dbb034a

          SHA256

          31eae043f822a8f9d93e35c319856f98dd293a5053592b22ee7ce3a7e732f026

          SHA512

          61de2c5afbc6ff89e790f6ecbfb4ff3767d7965141813fc704dd6b247a4f8f6d372b70ceef70908b1b8eab2d7aec12de33e96bc50512f5859ac141d20cddbf1d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

          Filesize

          1KB

          MD5

          3c65b57ec3f852695e28e4c3497d13ed

          SHA1

          b03372194392a72b345205956e9209f31eed2a02

          SHA256

          ac5e2b9b517508b5bc4bae6aaca5e78be9f881887334a47bd9ee0a99bf1ca38f

          SHA512

          b826d25859a59efe9d9a7830dfcdb007925f5db7bae63da796883411c9a0c9197ad0521653b4465c65630641c1fec23177c5a6c84faf3163a9a016edbdb576e4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_90CA53BF93380499933443132F1E0073

          Filesize

          540B

          MD5

          9d734462e84f657b9ac4ca8b79d7ca06

          SHA1

          30093f48e082e59aebb1657bcd3f4141d60b936e

          SHA256

          c991245b0b640ec6c038e64bc73608d06671c4eee4a2234b4df0e928c2674dc6

          SHA512

          45e976e064e696ee2470b3b507bfa1bd63ca8c009cedcbf5251c964b1861dc927f7af9d55c6d8beda755ef11ebdc5abacf4f6ff7b28940b57264b937757ebd0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

          Filesize

          536B

          MD5

          d1a5393c1584dd144a7b1890ab39cbc4

          SHA1

          6cb6c4ad350fd41f1ed73fb372b18e2ecf5a698c

          SHA256

          232e89252ba66e946dbc1149a6df18d9b8320dc3962fbe0382b021a87118c5a8

          SHA512

          d051d1f75334254bf9ba196f4f606908f0bf061bb6eab4d8340dacfd3e5343243f535fc2f5681afd72c39d40021be440259ac21c9b34e0101a1a322a92a1b278

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files.cab

          Filesize

          1.9MB

          MD5

          13a7c70d662f83aec639881aa9abe54d

          SHA1

          3b10a2e499b368d274f6e3a2d93bc48d81d74307

          SHA256

          f7007063a4c457c8f3646c5dd48fe90f0cf16cf257d50048eec7ea99f0410e32

          SHA512

          0b16dafdc50aff712b0c8550a0268e690b3e8cae2ab8c0d1969ea4717d296d7ea7839da0180d7acafd1279d077a18a956f139d595e0c21b3206bd80ba914b937

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Autoit3.exe

          Filesize

          872KB

          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Autoit3.exe

          Filesize

          872KB

          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\EMCOMSI.pbproj

          Filesize

          28KB

          MD5

          2d190d00ca9f4a0da4ea26e6da13307e

          SHA1

          72cfa041994c30b527cc7f1cf6f4f5877edb35b9

          SHA256

          7c22e0a9afe2f9f4724711c456a049a113cc600d55167598be17ba1ab5124025

          SHA512

          e16e6bc6e164a40efc47d6cdb7ddd2bcbffe4760c8ad1eec21dcba2d1d3f61d688b26e89d454c24b89847d26aaf824fdb5b9b18a7ae85612c1e3a255021ec5e5

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerIE.DLL

          Filesize

          535KB

          MD5

          50ef3b54ac9f90677632f72c797126b4

          SHA1

          f4195b1cc0327835ac68e10dcaa560a300a05ce9

          SHA256

          ea16cb51139082c0b10ae0c1f5565c2ff27b753b947752aed9f8867b5ed58755

          SHA512

          ee56be4366dfe505cff335a2a035638c9d85bf7761a40032072a2773ea903bb3127d3f0a6ffd04ea6e8a1666ecaef5ed55e65d422e92715c9475eb7b1271f07d

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerIE.dll

          Filesize

          535KB

          MD5

          50ef3b54ac9f90677632f72c797126b4

          SHA1

          f4195b1cc0327835ac68e10dcaa560a300a05ce9

          SHA256

          ea16cb51139082c0b10ae0c1f5565c2ff27b753b947752aed9f8867b5ed58755

          SHA512

          ee56be4366dfe505cff335a2a035638c9d85bf7761a40032072a2773ea903bb3127d3f0a6ffd04ea6e8a1666ecaef5ed55e65d422e92715c9475eb7b1271f07d

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerIE.dll

          Filesize

          535KB

          MD5

          50ef3b54ac9f90677632f72c797126b4

          SHA1

          f4195b1cc0327835ac68e10dcaa560a300a05ce9

          SHA256

          ea16cb51139082c0b10ae0c1f5565c2ff27b753b947752aed9f8867b5ed58755

          SHA512

          ee56be4366dfe505cff335a2a035638c9d85bf7761a40032072a2773ea903bb3127d3f0a6ffd04ea6e8a1666ecaef5ed55e65d422e92715c9475eb7b1271f07d

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerLogon.dll

          Filesize

          92KB

          MD5

          760aa6f15db378dda44f262e1349e28d

          SHA1

          9bb9a0caa54e8b2560245430f33985996b2d40f3

          SHA256

          ee04957d0010ca2134c4770b434b2fdec08a25400b474dd51f47d5d1dc8d574b

          SHA512

          c6cf081dc189d88c85d01832f5cb09ff42c1264d7d4c548a336a33b97ec0b0b24aeb25076fd24db7db2f7a7ced6eccc67d26497352f7eeb1d29bb9c0a59abce6

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerLogon.exe

          Filesize

          500KB

          MD5

          c790ebfcb6a34953a371e32c9174fe46

          SHA1

          3ead08d8bbdb3afd851877cb50507b77ae18a4d8

          SHA256

          fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

          SHA512

          74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\KeyScramblerLogon.exe

          Filesize

          500KB

          MD5

          c790ebfcb6a34953a371e32c9174fe46

          SHA1

          3ead08d8bbdb3afd851877cb50507b77ae18a4d8

          SHA256

          fa7ad2f45128120bccc33f996f87a81faa2e9c1236666dd69b943a755f332eb1

          SHA512

          74e3ab12b2a2d5c45c5248dd2225bfbcf237a01ef94fdca3fe99cfde11bd7d0ccd25dd7f26bd283997d951f4df7e8f4b35f9475a32bdb854d6cc8867b2c45554

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Languages\KSLangCHT.dll

          Filesize

          14KB

          MD5

          07e327539ff319611d858a4c9575ed02

          SHA1

          53d74091a51d96bb9b946a06803e16d3a9139df6

          SHA256

          d4afb96b37351ebbe9763fe0110a0859e62f6a065abfa840af5454505b3cd80e

          SHA512

          906a346bb8f5842a81a1b5f4fc54b71d9db9c390bcdc2dfbaf723eb40ad247c456fccc7a0fd77130c666dd80d2821de1e3487ad62528405a3ec86e503202bc67

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Languages\KSLangJPN.dll

          Filesize

          14KB

          MD5

          bc5feb50bc7a25e4c08e3bcd8d2bc1c5

          SHA1

          fb703a62a503ce8a697e8d8c648f6c09408b2f53

          SHA256

          d52120ab6b006b1f5bda114129d78b7d11ff33e707c3e689cd6bc15dca836da9

          SHA512

          84699f9de5079fa6c89430d81c76cc89ffd73cc7a9ae2f1a6e5a92bbdb2db5de9461436fb134ce8ff5074b1eea7e56a72432e0e6595d9e141a44f0290e124214

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\QFXUpdateService.exe

          Filesize

          768KB

          MD5

          4ed21ae3ae981538ab61f199d4477b92

          SHA1

          d7266d30270bce21dffb62ed7f2e47fee9890fc2

          SHA256

          7053dae7f3d11cee5b0ca0363320104857c73aad6a0f2f9af398c2f4e607a95b

          SHA512

          f4768e7ccc73d5ae8f9da526875b12f571c36ba7c7c9d08aa1a455926a34560f11598f677242c5513ed750a384bd9b1107b57975487603f49e6c16eea92bcbdb

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\ReadMe.txt

          Filesize

          13KB

          MD5

          06a5df751eb0765e69bfb15e12f4c665

          SHA1

          7394bf7df2dda47bf8d55bfbc880d2a2316054ac

          SHA256

          8b9d97c137459a495936af47f5140fe75f795728a30e9ec3d8ac9c1cb2e5c65f

          SHA512

          aabd6aa18646192bd49e5343e0129e696b1e003a16e8205fd36aa863be9c97aadf9ac67bba96629d21ea5921e89ce6a401e74d9347aa77468f3854dc64e20558

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Sounds\Error.wav

          Filesize

          35KB

          MD5

          efad8c5d6cc6cae180ebe01ce3a60c88

          SHA1

          614839975c1f07161f3c26ba2af08ae910b21c61

          SHA256

          acad74b9bb57809e1b35bc06f357941986ebdc547ba33fc618f07e6e7bdc49bd

          SHA512

          d404752e05ee803958a21b7fcadc0782ba36ea42eba84eae42eca6360df71822bc705eea6ef2caaa82e2fdcc518ba1cd94c04cc7e7e7739d32eb29dbffd2f51a

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Sounds\Success.wav

          Filesize

          66KB

          MD5

          fd8177d61c8dd032dd262bf979d852f6

          SHA1

          ac64e21b7c80e996bcb369b6023bec4191568a52

          SHA256

          8dae19fc9c722a7fb169f37b5881e74551a8d3b8b43ec6f52b6d5d46e885ed6c

          SHA512

          39e75172a2b410eb25de87f06c57e1c583493f1885a39f2a410ce6437cc8e9d400a3e8e695cdcec63752840096637a16c1d875e43ce1c40e43553f16337ff835

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\Uninstall.exe

          Filesize

          72KB

          MD5

          eff839d29dbb06677a85117d036e29c6

          SHA1

          473823c718f3db95d27f14b783e68c08f13caded

          SHA256

          1b5cb8035b18d06b5219f2e7d30200ca343c0ce6763962c7c41534aecc2b1c80

          SHA512

          cb4fb2b054e3430df934cd30be220e13c2f86bf2dbc6e2a46d59fa4f7d9c6feca9cbc44fb1cc49bfae7aa39623d26d8f4510fa9a0584a1f64110cae87117aff3

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\easqvgvm

          Filesize

          1.8MB

          MD5

          306b7d7cb7f625223c8730f50ec85edf

          SHA1

          229f89edb9e1794882e11568c943787429e8cac8

          SHA256

          d6887921e0dc160a622b0566b86ef3bf87cf2796b7660cfdfd0e302a035e7b4c

          SHA512

          3475bb647089ff652a90624312052917dfd3ecaf073a491c057af37fa115eb63ec8e916070187310b4d9696d72853ca6376d8ddc65ff576a4ef4dcecfda1d88f

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\getting_started.html

          Filesize

          1KB

          MD5

          da033601ee343eaa7f5d609a854b4baa

          SHA1

          e279b127a9ce7582a626c29dd02a0b88ff10d966

          SHA256

          e4312722cf4e6e179f7c50e8fcc618d583a38ba71046aee2d67090d7a37ee5da

          SHA512

          b6c53aabc3c1c41d639f5877dc81dbf05145c8feb4101e20afd45dbafdc5f2af90394dda3c26836a34d4382135fbdcc899795a58a40d3974fcaff7f4f8002a9d

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\keyscrambler.ico

          Filesize

          39KB

          MD5

          fde5504bbf7620aca9f3850511c13a45

          SHA1

          484382ecc232cedc1651fba5f9311e9164f43369

          SHA256

          932409eb2abfc31f2dd218240de70a150359ea8ab09fcceb1f076b9a17c844b7

          SHA512

          6d67be9398fcc2b85fe4fd7357f37d6cfc1d3e548f713319080707c750b66d2b1e631c79a7e745c56b1a72be91735156e3989eff8d0b84c3442c0fa548c2a6b4

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\keyscrambler.sys

          Filesize

          225KB

          MD5

          9baf5236d65a36ed2c388cf04108ab9f

          SHA1

          f5e28edea04a00b5e8806130cd2736336c6e3792

          SHA256

          9e79960a40797c11a007d9c8e6a4bce721baf603f5d651f5485eb5481c717b12

          SHA512

          1fc899c37e628adbe05a53812e6106332de7dbef83ce72094dd228067eefa71d09abe55d250b35d93f7454b9596073de95af6700e543c17bb5d43e7de0fcac1b

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\license.htm

          Filesize

          6KB

          MD5

          fbe23ef8575dd46ea36f06dd627e94ab

          SHA1

          d80929568026e2d1db891742331229f1fd0c7e34

          SHA256

          104c6948b760b0dc6fb80f9283a7978229e8be4bab316fe5fa883dccc18dc8ab

          SHA512

          caba58d22a835c2a9a0c420129631add230ebbb16edc36b45766348f5c7d5e5c9f8dc2edd71622f8876f8777d3c797a3e6dd2da7ea1a743cbca73d1e4ad27d20

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\project.xml

          Filesize

          1KB

          MD5

          189dc774be74d9453606a7a80cd730e6

          SHA1

          1a70d362b8bd78cdfe7949f3438b346fe8c69adb

          SHA256

          3af50be8a1086fff8726686340b4a3883125406f20ac0f72396363891ecc26c6

          SHA512

          68679076938165c6bb669d5ac7fbe979ae34611b6eda3030eea5361872993c7922a705185ac4016e221ccd6220f8af31e0d3821241d410bbfe744e6c29588a9e

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\script.au3

          Filesize

          921KB

          MD5

          07635b3f8a24f950159abc1459500de4

          SHA1

          a27bd83122bd4fc70b398fa564240f68771fd3a5

          SHA256

          1571f02b9f471e3ad77c8042cbe509920e0d4fd2ae7e3d79e69289955b035066

          SHA512

          bb9bcdb07d5f792f2266411f8370ffbf46614774e6b22427ff1dee131a1cfac9b4685bc375691b71c18dd5f621c1644ddb3d70d1b01f3a17a5b6fcf4abb28126

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\files\symbnlb

          Filesize

          8B

          MD5

          8ba3039d9f1ffb901efab50057252658

          SHA1

          ea72613037f67be08c835017b35799e58ad4fdd8

          SHA256

          22f1de41df782e77dc6590f1b7e788ca4f8b3a013b05a93b0546483e43445aaf

          SHA512

          019dc28eb97100b1c474bf4cf0b6ab089170b87113a9fbb2af1a10b2e9609df172056c7a7801b354571e7dc8465de5b766c5b318715fbc0bd36b1ef4e90fdff0

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\msiwrapper.ini

          Filesize

          1KB

          MD5

          4e433314dbc8db6b6706a82c2c8e23a3

          SHA1

          14db422f1a9b26c016ba7005baa69e18f3c25a41

          SHA256

          3e9dfbf028f78a95335f911fb42109e52761f2d8574cd457f843ce3f13006927

          SHA512

          7dd61aa309bb8b9b8a551b7f3fb5822016e110cbe19e78494f051ac28a9a227653c98a9b9c761a52a7b5728619db1701760d385a3635a2681779444c7c9ed8fe

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\msiwrapper.ini

          Filesize

          458B

          MD5

          ed5001222ac2301aff395702fa94734c

          SHA1

          cd1cff8f58d3cf99b4f9d506379b505281c9e0c8

          SHA256

          b8d80f20235ac8765a8f3d9221fff17c07712a08dfb897616eca17fb7b743022

          SHA512

          8a2cba60dda9b1e613469f3ca721e3c95700d4daaa00718de6dff7fe72a0292e1f0862d95c96d22f9340e588f2f18aebe3f82a305fb4cd0ca43136a3f8f97b50

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\msiwrapper.ini

          Filesize

          1KB

          MD5

          0ad7c3bbcf27c8398fb98c80f7060631

          SHA1

          4e75596bc59d6392ef761cef0432d37ea8f7cabd

          SHA256

          2d561ceee52d8cd3e4042c4183329f2c9b46d20b4828ed10fd80553a42166bdc

          SHA512

          29de299091f39c0472d86675ded1de6e5a0ddcd0f6484d7410f3ead803629b9e2ae9945d34873195f7c4e997d0c737cb01d818b3d5cbc3dd97cb79ce2b3294c5

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\msiwrapper.ini

          Filesize

          1KB

          MD5

          51961ae41682cce6b9cb0367c8e1c797

          SHA1

          971145118b82492ff36a358a296e9ab0354c8590

          SHA256

          7982fa58d95c1d52e829af658b1ae9b048976ac3493c272c5455589e83ef567c

          SHA512

          fd462438bd23084915a115c3fde528cff268c1dbd18e507a9bc045d330078e4d9e4f613ec6c9990c22cc632780c126d487171435693ae3a262745fb7ee8cbe02

        • C:\Users\Admin\AppData\Local\Temp\MW-dc4b37c6-88da-4089-81f1-51c4b41474d5\msiwrapper.ini

          Filesize

          1KB

          MD5

          51961ae41682cce6b9cb0367c8e1c797

          SHA1

          971145118b82492ff36a358a296e9ab0354c8590

          SHA256

          7982fa58d95c1d52e829af658b1ae9b048976ac3493c272c5455589e83ef567c

          SHA512

          fd462438bd23084915a115c3fde528cff268c1dbd18e507a9bc045d330078e4d9e4f613ec6c9990c22cc632780c126d487171435693ae3a262745fb7ee8cbe02

        • C:\Windows\Installer\MSI6D3.tmp

          Filesize

          208KB

          MD5

          d82b3fb861129c5d71f0cd2874f97216

          SHA1

          f3fe341d79224126e950d2691d574d147102b18d

          SHA256

          107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

          SHA512

          244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

        • C:\Windows\Installer\MSI6D3.tmp

          Filesize

          208KB

          MD5

          d82b3fb861129c5d71f0cd2874f97216

          SHA1

          f3fe341d79224126e950d2691d574d147102b18d

          SHA256

          107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

          SHA512

          244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

        • C:\Windows\Installer\MSIE0AB.tmp

          Filesize

          208KB

          MD5

          d82b3fb861129c5d71f0cd2874f97216

          SHA1

          f3fe341d79224126e950d2691d574d147102b18d

          SHA256

          107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

          SHA512

          244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

        • C:\Windows\Installer\MSIE0AB.tmp

          Filesize

          208KB

          MD5

          d82b3fb861129c5d71f0cd2874f97216

          SHA1

          f3fe341d79224126e950d2691d574d147102b18d

          SHA256

          107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

          SHA512

          244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          23.0MB

          MD5

          57948ef89a3891676d6bff0ee905758e

          SHA1

          6c75eba32529066ad4ee755e9c5239907c800782

          SHA256

          b66dbf0ab0b3111007f3fc33c1236780e51d6845544da86a8bcd66ce7f99fd0e

          SHA512

          bf6df5c5cb8f4bda6af76231338d3919ed59386c04bc4567e5e1f0c3491589085343478cbe9582e699dc1f1f2f8bc0693d8408d6cda235bb1ae395c19c9f95f0

        • \??\Volume{6adb8c10-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{07ed544a-660a-4dbc-8644-e4edf5ef59cb}_OnDiskSnapshotProp

          Filesize

          5KB

          MD5

          aad4a7ba25b4bbc09735023be2900462

          SHA1

          8798df2f8a10b6c3bdfcf285d26e1a0b76a78dec

          SHA256

          6d0106b07cca4dcbdfae10848f02555e4d5d775c2b53d1474d17ebe30d814069

          SHA512

          1ca57165506344613af906363c6566634d4191564bdca8d23db962db092a0e2b0d5b692863f6ee197bf54391c3d059a55992ab6330d757741a3f22b8c3c11134

        • \??\c:\temp\hacdbdc.au3

          Filesize

          921KB

          MD5

          07635b3f8a24f950159abc1459500de4

          SHA1

          a27bd83122bd4fc70b398fa564240f68771fd3a5

          SHA256

          1571f02b9f471e3ad77c8042cbe509920e0d4fd2ae7e3d79e69289955b035066

          SHA512

          bb9bcdb07d5f792f2266411f8370ffbf46614774e6b22427ff1dee131a1cfac9b4685bc375691b71c18dd5f621c1644ddb3d70d1b01f3a17a5b6fcf4abb28126

        • memory/404-185-0x0000000004270000-0x0000000004633000-memory.dmp

          Filesize

          3.8MB

        • memory/404-206-0x0000000004270000-0x0000000004633000-memory.dmp

          Filesize

          3.8MB

        • memory/404-173-0x0000000003980000-0x0000000003A75000-memory.dmp

          Filesize

          980KB

        • memory/404-175-0x0000000004270000-0x0000000004633000-memory.dmp

          Filesize

          3.8MB

        • memory/404-787-0x0000000004270000-0x0000000004633000-memory.dmp

          Filesize

          3.8MB

        • memory/404-172-0x0000000000C60000-0x0000000001060000-memory.dmp

          Filesize

          4.0MB

        • memory/404-198-0x0000000000C60000-0x0000000001060000-memory.dmp

          Filesize

          4.0MB

        • memory/404-201-0x0000000003980000-0x0000000003A75000-memory.dmp

          Filesize

          980KB

        • memory/2952-773-0x0000000010410000-0x0000000010490000-memory.dmp

          Filesize

          512KB

        • memory/2952-187-0x0000000000630000-0x0000000000631000-memory.dmp

          Filesize

          4KB

        • memory/2952-188-0x0000000000310000-0x0000000000311000-memory.dmp

          Filesize

          4KB

        • memory/3724-150-0x0000000003BB0000-0x0000000003CA5000-memory.dmp

          Filesize

          980KB

        • memory/3724-138-0x00000000010F0000-0x0000000001180000-memory.dmp

          Filesize

          576KB

        • memory/3724-145-0x0000000003BB0000-0x0000000003CA5000-memory.dmp

          Filesize

          980KB

        • memory/3724-144-0x00000000031B0000-0x00000000038E0000-memory.dmp

          Filesize

          7.2MB

        • memory/3724-148-0x00000000010F0000-0x0000000001180000-memory.dmp

          Filesize

          576KB

        • memory/5424-793-0x0000000000130000-0x0000000000131000-memory.dmp

          Filesize

          4KB

        • memory/5424-794-0x00000000001F0000-0x00000000001F1000-memory.dmp

          Filesize

          4KB