Analysis

  • max time kernel
    6s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 12:54

General

  • Target

    abed42f95a78af86615234f9b1f0a3eb.exe

  • Size

    10.5MB

  • MD5

    abed42f95a78af86615234f9b1f0a3eb

  • SHA1

    7bcbeb1fa69be231e175548350af088c3188c6cf

  • SHA256

    6a0d05477e23fc1152067fc51d50a044bccf0e0a0654dbae1864df792400e935

  • SHA512

    d92ef10db67d5c9cb0f88e28dc96daabdec064a006bb833d715e68a357323a9fb9b424c9eb5623ddb9bc896e041525d0d26667982bfed9facb813fee3a6bb974

  • SSDEEP

    196608:Ta6gt5+l8xzTcQnBWxqRj0oeYW/uROmZq670LFx50EgKIZNjR07iM1s4N:+64dTXnBwe+2r5sOEgKClwfX

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot1909916945:AAH0pLjSkBmQT4Vr_17-JSMoF4Lt_xOH9N8/sendMessage?chat_id=1640241476

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • XMRig Miner payload 13 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abed42f95a78af86615234f9b1f0a3eb.exe
    "C:\Users\Admin\AppData\Local\Temp\abed42f95a78af86615234f9b1f0a3eb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\Intilizate.exe
      "C:\Users\Admin\AppData\Local\Temp\Intilizate.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
    • C:\Users\Admin\AppData\Local\Temp\SystemPropertiesAdvance.exe
      "C:\Users\Admin\AppData\Local\Temp\SystemPropertiesAdvance.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2240
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Fv5MIOe3kM.bat"
        3⤵
          PID:3912
          • C:\Windows\system32\chcp.com
            chcp 65001
            4⤵
              PID:4248
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              4⤵
                PID:3732
              • C:\Users\Admin\AppData\Local\Temp\HashModule\Intilizate.exe
                "C:\Users\Admin\AppData\Local\Temp\HashModule\Intilizate.exe"
                4⤵
                  PID:1824
            • C:\Users\Admin\AppData\Local\Temp\WindowsInternal.exe
              "C:\Users\Admin\AppData\Local\Temp\WindowsInternal.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2260
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsInternal" /tr '"C:\Users\Admin\AppData\Roaming\WindowsInternal.exe"' & exit
                3⤵
                  PID:4504
                • C:\Users\Admin\AppData\Roaming\WindowsInternal.exe
                  "C:\Users\Admin\AppData\Roaming\WindowsInternal.exe"
                  3⤵
                    PID:3320
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsInternal" /tr '"C:\Users\Admin\AppData\Roaming\WindowsInternal.exe"' & exit
                      4⤵
                        PID:4280
                        • C:\Windows\system32\schtasks.exe
                          schtasks /create /f /sc onlogon /rl highest /tn "WindowsInternal" /tr '"C:\Users\Admin\AppData\Roaming\WindowsInternal.exe"'
                          5⤵
                          • Creates scheduled task(s)
                          PID:3180
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
                        4⤵
                          PID:3664
                    • C:\Users\Admin\AppData\Local\Temp\WindscribeLauncher.exe
                      "C:\Users\Admin\AppData\Local\Temp\WindscribeLauncher.exe"
                      2⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:3948
                    • C:\Users\Admin\AppData\Local\Temp\HashModule.exe
                      "C:\Users\Admin\AppData\Local\Temp\HashModule.exe"
                      2⤵
                        PID:3980
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Internalprosecc" /tr '"C:\Users\Admin\AppData\Roaming\Internalprosecc.exe"' & exit
                          3⤵
                            PID:4524
                            • C:\Windows\system32\schtasks.exe
                              schtasks /create /f /sc onlogon /rl highest /tn "Internalprosecc" /tr '"C:\Users\Admin\AppData\Roaming\Internalprosecc.exe"'
                              4⤵
                              • Creates scheduled task(s)
                              PID:3988
                          • C:\Users\Admin\AppData\Roaming\Internalprosecc.exe
                            "C:\Users\Admin\AppData\Roaming\Internalprosecc.exe"
                            3⤵
                              PID:4840
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Internalprosecc" /tr '"C:\Users\Admin\AppData\Roaming\Internalprosecc.exe"' & exit
                                4⤵
                                  PID:3984
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /f /sc onlogon /rl highest /tn "Internalprosecc" /tr '"C:\Users\Admin\AppData\Roaming\Internalprosecc.exe"'
                                    5⤵
                                    • Creates scheduled task(s)
                                    PID:2788
                                • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                                  4⤵
                                    PID:4424
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=mine.bmpool.org:6004 --user=6031730 --pass=nixwaree --cpu-max-threads-hint=40 --cinit-idle-wait=1 --cinit-idle-cpu=80 --cinit-stealth
                                    4⤵
                                      PID:1952
                              • C:\Windows\system32\schtasks.exe
                                schtasks /create /f /sc onlogon /rl highest /tn "WindowsInternal" /tr '"C:\Users\Admin\AppData\Roaming\WindowsInternal.exe"'
                                1⤵
                                • Creates scheduled task(s)
                                PID:4252
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\ThumbnailExtractionHost\dllhost.exe'" /rl HIGHEST /f
                                1⤵
                                • Creates scheduled task(s)
                                PID:3136
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "Intilizate" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\HashModule\Intilizate.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:4312
                              • C:\Windows\system32\schtasks.exe
                                schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\InputApp\TextInputHost.exe'" /rl HIGHEST /f
                                1⤵
                                • Process spawned unexpected child process
                                • Creates scheduled task(s)
                                PID:4976

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WindowsInternal.exe.log

                                Filesize

                                539B

                                MD5

                                b245679121623b152bea5562c173ba11

                                SHA1

                                47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

                                SHA256

                                73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

                                SHA512

                                75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

                              • C:\Users\Admin\AppData\Local\Temp\Fv5MIOe3kM.bat

                                Filesize

                                275B

                                MD5

                                2eed2910a6321756219d1f03b60c5357

                                SHA1

                                b7cd897af0af28d9e83975ebf165da4d1250c084

                                SHA256

                                e212de902c6c549a424c18635fd6bbf15d6989b1a7a4386fc618fa75e4b16648

                                SHA512

                                55299ecea34cdf7ed87a77c210688933d5c8ab29013f9b9d003126bbce77890d45579953d118dea6fb3987cf08af7a5762d6ee9fcc74d210a8c701b6365f4ed2

                              • C:\Users\Admin\AppData\Local\Temp\HashModule.exe

                                Filesize

                                1.2MB

                                MD5

                                f669b4e80ae260fc20de4084265f929d

                                SHA1

                                d7895cf2ef083fed01eec57c55140ee4b17e7876

                                SHA256

                                198d2ae7c96fe0d829c5cc0ec557053888252eb2814bde3081d8968f7e769cb5

                                SHA512

                                0e569901de4876c05472e1d83160bda63d6e5e2ef66efc7e82829e48918c839dbed4bdac79782361b2423308ce5645fb420bbb25057367bab6f8288bcef21822

                              • C:\Users\Admin\AppData\Local\Temp\HashModule.exe

                                Filesize

                                1.1MB

                                MD5

                                3bdfd23ecc856f3675b0621530e7bcd9

                                SHA1

                                ff7bc7603d41eae4397f055b5a7dc9c905c5d749

                                SHA256

                                d2a6512bb01e0397e6f763714a8ac6a6ddbe7db47f822b450f4cbe6532100bf1

                                SHA512

                                b2424622ed2cd71984db01e3e317bfd59a562c74008caaea15832a30fa84d1b6d8bdcf4b0e8709c9292827cc567336314ddf018d29fad0caa52ce4270cb6c992

                              • C:\Users\Admin\AppData\Local\Temp\HashModule.exe

                                Filesize

                                1.1MB

                                MD5

                                4620da7b8dc2b42256d81397c05750a3

                                SHA1

                                73256e491686be9e4b7811aa8e78df3636e0a3b5

                                SHA256

                                e83622e985d488f0941dc7f2e96140fbbbfc5d828ecb92afbadc3e39b6315bba

                                SHA512

                                8784f274b72f714d5c42918205ad85e8cae53d3654db3a8882d5f7a6058a59cea03630aae324dcc6d7ddf889c2ad8460cddf1d92ba3a51752f250526ec3a5744

                              • C:\Users\Admin\AppData\Local\Temp\Intilizate.exe

                                Filesize

                                3.0MB

                                MD5

                                2239480c190e1c36dee5b1f0792ba716

                                SHA1

                                39b795cceb59a2252840eef1e023f7b03552d7a3

                                SHA256

                                431570030820826977e5dafa00701ad39c42ed0d75f950d3a22b84275b6c19fb

                                SHA512

                                191a5e76ffabddb86ca6c67954cb095788a8b53453bf51ee7bba459890ca1ddeaf9726bdc9a5450452f2095f75774ae278313f5ba30ffac55836781229b672bf

                              • C:\Users\Admin\AppData\Local\Temp\Intilizate.exe

                                Filesize

                                2.0MB

                                MD5

                                5cfebeb07b938ada1d0978787361c3af

                                SHA1

                                a403b09d3c2e305101e9878ebf2539dabf629567

                                SHA256

                                dd0a208cf2e9c064f2ec85e0767a13b223ed4df895b3dd61a9e2410df88afa3b

                                SHA512

                                4db37a3fac7784f2fdcc80ed1a41493d7017c2573882a984a67c6ba701843c3817515061088bbf57c88255ae62a33b5210b688a8e8eb482f0a047c84ddf0aeb7

                              • C:\Users\Admin\AppData\Local\Temp\Intilizate.exe

                                Filesize

                                2.6MB

                                MD5

                                c0dba0505f5ddd1835a925ee5a5973c0

                                SHA1

                                583c0dfdf1c44c9902c9b6e16fdc8784c591d88c

                                SHA256

                                119fea91207a212147f678a54ba7622d92960c6a76f16096b192f906a776069b

                                SHA512

                                064a099c56ad9db94a401e31b19419404949f2237960c4af9f20d3cb01fd3383574b54e579975f90f0f9ee66e8281b21f93bfc8ed3faa423a5f28240dae1281d

                              • C:\Users\Admin\AppData\Local\Temp\SystemPropertiesAdvance.exe

                                Filesize

                                585KB

                                MD5

                                1b942194465c8ebe8db0f98539d3ea63

                                SHA1

                                f59928ba65b4a718cb05a40696f191db75c3b949

                                SHA256

                                2ef3c48dcc895ea8fd3476f43a87ec6a3a38d648db26fa6a3e48d3042c2c081a

                                SHA512

                                f5874a852296f6973923cccc41f231df5f684914449503e54b80cf5e187f64401c8e328e7e28cf712458a733b8695ddc31d29195d1cd5bb062f21539bb8bbfae

                              • C:\Users\Admin\AppData\Local\Temp\WindowsInternal.exe

                                Filesize

                                768KB

                                MD5

                                b02fbd3c9975c63c3e4ced8d561e7c9f

                                SHA1

                                ebe2fd53d41da6752ab703eb3513ae05d4833799

                                SHA256

                                e50101f375efbb98b3501d5f522da76e5c5cc8e9b9ab0679d899e9016c96343b

                                SHA512

                                c84c3ff1b295996d060697e7dd28e3f54479d82e1a78c74bf84013945230881f0f04cf441a9da172f2b33d003a4052437c61970d5c58494256e58357d26381a2

                              • C:\Users\Admin\AppData\Local\Temp\WindowsInternal.exe

                                Filesize

                                1.9MB

                                MD5

                                f75d7830a24c0a57ec219ce89caf8010

                                SHA1

                                33da4ffe018b1b46adb431b60f4588de1aaa4618

                                SHA256

                                7a2c45c3489dbeb25b8232f2f28c2a0bd93b1953b98e568ca1e75620bbea2a6d

                                SHA512

                                4f1a4c885ee1d452b90539276e24575005c6fcb340a580af89e85eab60c34a7f6d444a25270541a99d37a22d1fb2cba5e81dd0eee1961d254ce5fcd2ad1b3e68

                              • C:\Users\Admin\AppData\Local\Temp\WindowsInternal.exe

                                Filesize

                                1.8MB

                                MD5

                                7bf11130e938b9a9ddcb0b98210648d6

                                SHA1

                                a5bcaf17067599f4cdec1611c7621be051d51084

                                SHA256

                                79b707254cfb4c962ad8fe1bd8a4b4644bb037f32a18e71299cfd1d7883e9a5c

                                SHA512

                                d5661ffd7044b39259b9032f2e2bb02a5a664952edfefa9bde709f621f23808732817aa0645673e689c345dd62a5a4c7ef52c33a1060a00fa4e05a6d725cf1b0

                              • C:\Users\Admin\AppData\Local\Temp\WindscribeLauncher.exe

                                Filesize

                                1.5MB

                                MD5

                                26dc0ed39805c4342bfc260d66d6c591

                                SHA1

                                c4e433e607d87d5736c202e9704dc75244a2dc30

                                SHA256

                                f009803fd07b2694b2ebb878731294071075d890fe8696b066d7471c67a1bf3a

                                SHA512

                                600a11072d17c4c8030eab453eebd679f96dd3a4b1d4b6e9d691f9e13f8c8da25e87e7354430304e794a6a0380317d91312e056e72c68e659cd3f7a84b02017d

                              • C:\Users\Admin\AppData\Local\Temp\WindscribeLauncher.exe

                                Filesize

                                832KB

                                MD5

                                5b6cd71f4a527939fced9cff0d5c2872

                                SHA1

                                ab1ff07986c5f5d2e96024765bbcbe70566519d6

                                SHA256

                                2455aaf8df19fd975249b21041532a0927650315bb1155b0d844db10bcb0348e

                                SHA512

                                20be40f0d3b74ede206f855ddfdb806576fa72e7f4ed98fe952cda24f898e58a6f43aa7e522132b230c0092cd4eb0e53b0319857665e15693cd281943903e76b

                              • C:\Users\Admin\AppData\Local\Temp\WindscribeLauncher.exe

                                Filesize

                                896KB

                                MD5

                                67c01ab000880ba283ab09a4aa90bcfb

                                SHA1

                                e32928279a0fe25a21397594117a97a0d0274e84

                                SHA256

                                5bb6a5e5b887f2d7521fb8d5de7132b53b0478b7bc05fe4fbc170e454c8e306a

                                SHA512

                                2c9bfdb90a41de1daa1a89b60ca9be3f4ba1ecb7c9beb216afe092f24a49ee1065f90b399d7ad0c0e857a5f47e483670f512109298b8496584ea7bd53b438380

                              • C:\Users\Admin\AppData\Roaming\Internalprosecc.exe

                                Filesize

                                768KB

                                MD5

                                459f580df42f50eb92e2435ae0c146f5

                                SHA1

                                a3a5dfb673153c2855b95c40daf0101e32207806

                                SHA256

                                3e9b782d0f189ca0e828c23510c458e53df9353414957736aed385cc45ac3919

                                SHA512

                                643d01f9c12e414a0ab5e76e8f9af0308a6f22eaf443fd6276faff3b397bec9acc27dcca59aa248bc27fad1e751ff0ac11a0e74b12993f4f64963441f7ecf49d

                              • C:\Users\Admin\AppData\Roaming\Internalprosecc.exe

                                Filesize

                                896KB

                                MD5

                                4f7c3beea6e0fe8f525fe809ab3ca70a

                                SHA1

                                197de24ddba99beb029db025045f1e1a6252863d

                                SHA256

                                2cfeb0121eba83f2ebd8debc33499389b4629d7085415572d23db7a4235d44e4

                                SHA512

                                89550d1f8e3e4cc412cf112a35a4addd6db6ebe3d24ae929ea9d7dc32bdb796f67959b35908cc920884d4b8dd09d338b938320782b999a81d1d3ab10e0b03aeb

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                                Filesize

                                7KB

                                MD5

                                5f734ed938c8984c0e5426968b113e9e

                                SHA1

                                46ac5c9a3a00a58f6030ff4cc5025fa3252eda1d

                                SHA256

                                4f6f892557c9ae1813cb0824a0babcad4dc71dc5d534d5100df26d9cee03322d

                                SHA512

                                f6e4eaf862f4194fdf93225688403aa0f3d85bd875450b0cf5654b1afaef3f5230b794c5894289ab73cf8e7c827fa86cba8d2c0584d8ee365a977c8f303c3772

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe

                                Filesize

                                8KB

                                MD5

                                535dcc91e97292c6d78a5a936e25ee02

                                SHA1

                                535828103f018d4755cb0effc8af7668892940c9

                                SHA256

                                6a9d9122b72ce1c077a04553cdd9b2a57caab68e4dff2d6f56d50f42bc88470e

                                SHA512

                                972e7722b496c1ce7bebf144090c715eb12402eaa6ab90389222e8834afe253454a2de4182f08445e51027f6674a6f0264367b1505aef727da5765801d8c9ee5

                              • C:\Users\Admin\AppData\Roaming\NJyJuRFyPDBXSZVGV.Admin\Browsers\Firefox\Bookmarks.txt

                                Filesize

                                105B

                                MD5

                                2e9d094dda5cdc3ce6519f75943a4ff4

                                SHA1

                                5d989b4ac8b699781681fe75ed9ef98191a5096c

                                SHA256

                                c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                SHA512

                                d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                              • C:\Users\Admin\AppData\Roaming\NJyJuRFyPDBXSZVGV.Admin\Process.txt

                                Filesize

                                1KB

                                MD5

                                c15273aef00d5201c214d1d28339eebf

                                SHA1

                                be5703a4f24f247a5e575fdf743cfcb434e7ea2e

                                SHA256

                                a0c0a8db1b19fd8cee53873192623700ccba66df7d0e8677e29f3c54c690242d

                                SHA512

                                a6d4b1aa0b0e8a8f4edc8d9ca65a5972eebedfb84bf1e5305900d7fd83a0e7dcdfccdd1b5d38c21111d4f52270e70d783ede276be4886b96a6bc3c05bf7c455d

                              • C:\Users\Admin\AppData\Roaming\WindowsInternal.exe

                                Filesize

                                1.1MB

                                MD5

                                96ddf695917b698a0a0a132763e024f7

                                SHA1

                                dcb488b2c34cb3435b0d3f0beb6025452c371f22

                                SHA256

                                a88091843726f20fdf8b683edbe9c43d77d881d1a6c5fc2bf8c778e08405f982

                                SHA512

                                6f49774ac26680c7c3f7be1e30d7ffb9a7e242959f237079ce3c666d2683032144e8a7a1e02142f1568e73eb6b943da549a253465115a3f2e59794aff1737bb2

                              • memory/1824-357-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1952-342-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-346-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-360-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-356-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-343-0x0000000002D40000-0x0000000002D60000-memory.dmp

                                Filesize

                                128KB

                              • memory/1952-347-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-359-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-340-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-348-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-349-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-350-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-351-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-338-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/1952-361-0x0000000140000000-0x0000000140758000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/2240-306-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2240-79-0x0000000002BC0000-0x0000000002BD0000-memory.dmp

                                Filesize

                                64KB

                              • memory/2240-53-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2240-49-0x0000000000A70000-0x0000000000B08000-memory.dmp

                                Filesize

                                608KB

                              • memory/2260-73-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2260-265-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2260-61-0x0000000003180000-0x0000000003192000-memory.dmp

                                Filesize

                                72KB

                              • memory/2260-58-0x000000001C490000-0x000000001C67A000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2260-78-0x000000001C480000-0x000000001C490000-memory.dmp

                                Filesize

                                64KB

                              • memory/2260-48-0x00000000005A0000-0x000000000078C000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2584-62-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-55-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-345-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-344-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-82-0x0000000005C30000-0x00000000061D4000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/2584-86-0x0000000005580000-0x0000000005612000-memory.dmp

                                Filesize

                                584KB

                              • memory/2584-333-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-336-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-98-0x0000000005C10000-0x0000000005C1A000-memory.dmp

                                Filesize

                                40KB

                              • memory/2584-80-0x0000000077B24000-0x0000000077B26000-memory.dmp

                                Filesize

                                8KB

                              • memory/2584-67-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-74-0x0000000000230000-0x0000000000A46000-memory.dmp

                                Filesize

                                8.1MB

                              • memory/2584-66-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-63-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-337-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-330-0x0000000000230000-0x0000000000A46000-memory.dmp

                                Filesize

                                8.1MB

                              • memory/2584-335-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-334-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-60-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/2584-77-0x0000000000230000-0x0000000000A46000-memory.dmp

                                Filesize

                                8.1MB

                              • memory/2584-27-0x0000000000230000-0x0000000000A46000-memory.dmp

                                Filesize

                                8.1MB

                              • memory/2584-57-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3320-308-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3320-264-0x000000001BFE0000-0x000000001BFF0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3320-263-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3664-304-0x0000000001290000-0x00000000012A0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3664-300-0x0000000000460000-0x0000000000466000-memory.dmp

                                Filesize

                                24KB

                              • memory/3664-303-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3948-69-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-99-0x0000000000E50000-0x00000000016AE000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3948-59-0x0000000000E50000-0x00000000016AE000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3948-68-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-329-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-70-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-72-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-71-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-83-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-84-0x0000000077840000-0x0000000077930000-memory.dmp

                                Filesize

                                960KB

                              • memory/3948-262-0x0000000008490000-0x00000000084F6000-memory.dmp

                                Filesize

                                408KB

                              • memory/3948-332-0x0000000000E50000-0x00000000016AE000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3948-81-0x0000000000E50000-0x00000000016AE000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3980-97-0x0000000000E30000-0x0000000001032000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/3980-100-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3980-101-0x000000001CFF0000-0x000000001D1F2000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/3980-146-0x000000001CBE0000-0x000000001CBF0000-memory.dmp

                                Filesize

                                64KB

                              • memory/3980-299-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4424-325-0x00000000007B0000-0x00000000007B6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4424-328-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4424-331-0x000000001C400000-0x000000001C410000-memory.dmp

                                Filesize

                                64KB

                              • memory/4840-341-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4840-301-0x00007FFB4EE70000-0x00007FFB4F931000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4840-305-0x000000001C550000-0x000000001C560000-memory.dmp

                                Filesize

                                64KB