Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 23:09

General

  • Target

    63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N.exe

  • Size

    1.5MB

  • MD5

    0e5b3ecf966d69237ed141111fa27b8f

  • SHA1

    48059f1a5f4bb73e24d7ff80dcc068d7623ddc4a

  • SHA256

    247f07902013628a4d5caac424e0c89e7be33a74ae471e34b05c8f0719ed27dd

  • SHA512

    35489f20916daed3fdcb00903af13eb726ed557c72c160b40df31d4a2dc1f70931baf99e1c8a7c0ce4f64b98e224a96a3902b10b254bafe5ea15f4ea5bd03bbe

  • SSDEEP

    24576:8eaMajUi+6C+mDjn7gbkFaSH7Wu4mIWGE1Sy/fBEXTHhaTEEER71RM4I13GS:8eaj9bHmMbkBHVdGE1Sy/ujhaIh+1h

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 51 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 51 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N.exe
    "C:\Users\Admin\AppData\Local\Temp\63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mAE1l4hh4d.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:524
        • C:\Program Files (x86)\Microsoft.NET\RedistList\Registry.exe
          "C:\Program Files (x86)\Microsoft.NET\RedistList\Registry.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2568
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\DigitalLocker\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2648
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3132
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\DigitalLocker\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5116
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\Registry.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2900
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4956
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3392
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\TableTextService\wininit.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1784
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4416
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\TableTextService\wininit.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3312
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\dllhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4152
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2124
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3444
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\Registry.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1740
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\Registry.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4136
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Internet Explorer\MusNotification.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4544
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4436
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Internet Explorer\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:436
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N6" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4120
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5040
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N6" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\Media\Heritage\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3036
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Media\Heritage\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Windows\Media\Heritage\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2184
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Microsoft\Windows\OneSettings\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2220
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\Windows\OneSettings\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4728
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Microsoft\Windows\OneSettings\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4192
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\Windows\ShellExperiences\taskhostw.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:460
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3044
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellExperiences\taskhostw.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2308
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1564
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3408
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3352
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4168
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2632
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "MusNotificationM" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4580
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Mail\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3900
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2020
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Mail\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2432
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3552
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3992
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3092
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1068
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2816
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\SppExtComObj.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2168
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:796
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\SppExtComObj.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft.NET\RedistList\Registry.exe

      Filesize

      1.5MB

      MD5

      0e5b3ecf966d69237ed141111fa27b8f

      SHA1

      48059f1a5f4bb73e24d7ff80dcc068d7623ddc4a

      SHA256

      247f07902013628a4d5caac424e0c89e7be33a74ae471e34b05c8f0719ed27dd

      SHA512

      35489f20916daed3fdcb00903af13eb726ed557c72c160b40df31d4a2dc1f70931baf99e1c8a7c0ce4f64b98e224a96a3902b10b254bafe5ea15f4ea5bd03bbe

    • C:\Program Files\Uninstall Information\63289e02c0b42631262e362fe5718f68fe60efe6c3d38729a02715f312f61e17N.exe

      Filesize

      1.5MB

      MD5

      37f989a94b579e88adbe8f029b3a299a

      SHA1

      9694d5627bc15c25d8662549017581942c407e02

      SHA256

      6db11aebbeb14975b9eeb854d2b6f077bdf2972158d9ea76b2755a089625d996

      SHA512

      f34784dfbc14b64597e36b6c3377c6bc0ad133f5d1b150aadc9da10bd41375981218398e053776143b341f974685a8f7db95a61d5564e75add9950b786621a00

    • C:\ProgramData\Microsoft\Windows\OneSettings\csrss.exe

      Filesize

      1.5MB

      MD5

      90cda7b4b4e2d6d732c9cd2b28359dba

      SHA1

      8b86f5e0e14acebe84c11879dbccd1dc61e513df

      SHA256

      4884f1033ab66ae53c24eb526d675afc18f4c0113ab36bd21188258c2cf369b9

      SHA512

      b799afd6b35956f9dd42d95a78eb8551d9eeb1fbde88cf1f6dab23230550e891c3ebb749f604c00a946c798a668ef80caf8b0f787a2f26d33d081de4692babdd

    • C:\Recovery\WindowsRE\TextInputHost.exe

      Filesize

      1.5MB

      MD5

      6cd1e48780c891f90a768aaf9bfa4a5a

      SHA1

      a6362697e9cda9e57ef6a766843339f4726b6565

      SHA256

      f871ef3c0b5b416ef55298f1764569cf09fce9e4204212ea6bd17e70763987df

      SHA512

      953fd33cd789dcf11d4b57329e01957ae9931ec96a981ab725ef418c6b23b759f99f31a9aa2e14423e8be9c9a1541bd110453186b87c620124562e6970d1f5b2

    • C:\Users\Admin\AppData\Local\Temp\mAE1l4hh4d.bat

      Filesize

      225B

      MD5

      adade457e05197ee4290d82fcd37701a

      SHA1

      f9cbb3691222196ccb050ce5fbf7b1780c74855e

      SHA256

      6dbc4f71dc1e22bd8c41677ddfd2ea4e1a47cae6c15dbbea25e5c8bf2c3de1cc

      SHA512

      9169b53aa0dbfd920f455998c132019efa03f99613deb76dfafd930f913aed1934d30b4d9722da87359478db0bb628c065e831468b0ba2061b439ffc8f98e9a9

    • C:\Users\Public\AccountPictures\RuntimeBroker.exe

      Filesize

      1.5MB

      MD5

      915fab9c4d11dbb430c3033ee7e269bf

      SHA1

      aa88e8d0a81b4cf1cb26aac5268e4746797544bf

      SHA256

      9530cab3406f49376d77ac055c950fbf63f54158a24aa6f6f94c3a213f183037

      SHA512

      534b0b971e56b194c8df08fd608c55f90b79fd6089b286783d734dce659cd6aa6ca8d2414fcad4446ad4334b86b74d282b9552e517ff1544860aea9fa5578bca

    • C:\Windows\DigitalLocker\csrss.exe

      Filesize

      1.5MB

      MD5

      3238dd73360b873098307c74c288d5dc

      SHA1

      d275add09f6d48a85f5067dc5e135ce6f2501bbb

      SHA256

      eb94a13b9ddcc2bbd18ad1045d57d093d2184afefb0ae9c2d1a2ea6d32bb3d3b

      SHA512

      af289adf3925abf04a822c5ea3682f5bd5e8dfc0b7887209c47a6aec0393e85ec48aafcf536918bc9ab0fb7899b656384d4a13aac91b2cdef2a4aa9c3e71dc24

    • memory/2660-5-0x0000000002920000-0x0000000002928000-memory.dmp

      Filesize

      32KB

    • memory/2660-12-0x000000001B4C0000-0x000000001B4CC000-memory.dmp

      Filesize

      48KB

    • memory/2660-9-0x000000001B450000-0x000000001B458000-memory.dmp

      Filesize

      32KB

    • memory/2660-15-0x000000001BB70000-0x000000001BB7C000-memory.dmp

      Filesize

      48KB

    • memory/2660-17-0x000000001B4E0000-0x000000001B4EA000-memory.dmp

      Filesize

      40KB

    • memory/2660-20-0x00007FFB69300000-0x00007FFB69DC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2660-16-0x000000001B4D0000-0x000000001B4D8000-memory.dmp

      Filesize

      32KB

    • memory/2660-21-0x00007FFB69300000-0x00007FFB69DC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2660-14-0x000000001BB60000-0x000000001BB68000-memory.dmp

      Filesize

      32KB

    • memory/2660-13-0x000000001BB50000-0x000000001BB5E000-memory.dmp

      Filesize

      56KB

    • memory/2660-0-0x00007FFB69303000-0x00007FFB69305000-memory.dmp

      Filesize

      8KB

    • memory/2660-4-0x000000001B470000-0x000000001B4C0000-memory.dmp

      Filesize

      320KB

    • memory/2660-11-0x000000001B460000-0x000000001B468000-memory.dmp

      Filesize

      32KB

    • memory/2660-8-0x000000001B440000-0x000000001B450000-memory.dmp

      Filesize

      64KB

    • memory/2660-6-0x0000000002930000-0x0000000002940000-memory.dmp

      Filesize

      64KB

    • memory/2660-7-0x000000001B420000-0x000000001B436000-memory.dmp

      Filesize

      88KB

    • memory/2660-174-0x00007FFB69303000-0x00007FFB69305000-memory.dmp

      Filesize

      8KB

    • memory/2660-197-0x00007FFB69300000-0x00007FFB69DC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2660-3-0x0000000002900000-0x000000000291C000-memory.dmp

      Filesize

      112KB

    • memory/2660-222-0x00007FFB69300000-0x00007FFB69DC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2660-2-0x00007FFB69300000-0x00007FFB69DC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2660-264-0x00007FFB69300000-0x00007FFB69DC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2660-1-0x0000000000650000-0x00000000007DE000-memory.dmp

      Filesize

      1.6MB