Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 14:31

General

  • Target

    caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5.exe

  • Size

    1.8MB

  • MD5

    5a226562cbae5759a91657b795290183

  • SHA1

    c04ac12b8b3f5d82848f001629ce9f7d79ea0acd

  • SHA256

    caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5

  • SHA512

    5d3722efd71281f0b6588ae318b667fb015a7f0cd8969a8e7b2bceb6025531d277fe6ec629433fbc365d4ef10dc98eca3be1e1c4a3656236a0c3d93df5bbb818

  • SSDEEP

    24576:DhjQ5we0Q2YfXWE/vnH4F64+u+a2Y/ROC8vddNbRhr5Cv+ST:DhjI0WXxnH+64+tUROCuHbPcz

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 48 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 6 IoCs
  • DCRat payload 9 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5.exe
    "C:\Users\Admin\AppData\Local\Temp\caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2816
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7Ce65nyUjn.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4952
      • C:\Windows\system32\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
          PID:440
        • C:\Program Files\Windows Portable Devices\RuntimeBroker.exe
          "C:\Program Files\Windows Portable Devices\RuntimeBroker.exe"
          3⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:2784
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5016
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2832
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3800
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Windows\Setup\fontdrvhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2768
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Setup\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3912
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Windows\Setup\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5044
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\upfc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2732
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4280
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4020
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5096
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3924
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3412
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Windows\en-US\dwm.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1924
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\en-US\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1768
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Windows\en-US\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2132
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fontdrvhost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:100
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4388
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fontdrvhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2284
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\1.3.36.371\winlogon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1420
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\1.3.36.371\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1704
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Google\Update\1.3.36.371\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4780
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1156
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:752
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1872
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Windows\ShellComponents\sihost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3388
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\ShellComponents\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3960
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Windows\ShellComponents\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4484
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\Windows\Setup\State\TextInputHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2076
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Windows\Setup\State\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:5092
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Windows\Setup\State\TextInputHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3856
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\sysmon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2164
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\it-IT\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4968
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Photo Viewer\it-IT\sysmon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:432
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:764
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1000
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3740
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Uninstall Information\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3636
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1140
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:964
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1712
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3372
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\Idle.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3092
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:916
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\Idle.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1268
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3508
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3448
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4576
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:312
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:2448

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fontdrvhost.exe

        Filesize

        1.8MB

        MD5

        0a435953aea90916617c7e702ca82bc9

        SHA1

        484e5f6f51b5069c19f31731b064ce4eee0cec57

        SHA256

        5cebb6895780b2f1d27fc7b48a79cca6ffa67b14d7ddc60764690909506f1a6c

        SHA512

        529ae949a8c22424bace56606cb7a0b63ab791d1d1158ca16afc29dd3758c5405c571088e3dc36d582adb396da7539565fd59eaabe01bffe666dade0f5b75fca

      • C:\Program Files\Uninstall Information\csrss.exe

        Filesize

        1.8MB

        MD5

        45ff8bf74c8a0579a7b345a5e0508ae2

        SHA1

        d6138b022be16dc736e7489603393faf28126fc3

        SHA256

        66de2e94a3c7f67e053b352e6d4211d21d36f0e17932b401fa4d4c0e60ed7f91

        SHA512

        75980283f7c9095c89abcd60df90666d812ebea4deffb083dc81419370c02325f2037d99ea8e51d910be5032dc37e6df472bb6386481e786c12ba8a2f9b60ad0

      • C:\Program Files\Windows Photo Viewer\it-IT\RCXD18F.tmp

        Filesize

        1.8MB

        MD5

        394b5812f0305b10c75229c4b5a3b07c

        SHA1

        12f15f3699ecc8de3f06e498b16ae6c2fe24892e

        SHA256

        6600fb721928ef6b5f2af62c4b6b5dcd8b10618ebd5fcdcb7071ed8ccb44ccf0

        SHA512

        d267663277c7ed92fd480ade3f17d3451ca96869bcb74905e074f7b830f3abe681ee9a61f46054685732430d45ec2107d988c6ab3048e34cd554818ff09c1a4a

      • C:\Recovery\WindowsRE\backgroundTaskHost.exe

        Filesize

        1.8MB

        MD5

        4743a749bda96b3d48d4a5df8ec631cc

        SHA1

        69012a2cb3da50946f6077eb31166c5c7a449afd

        SHA256

        3130804dad7ae8a1a034795cb540ccc6e72e76e9fe9b058033fa56ac739d9c03

        SHA512

        6c0c4309bba78e6de09ca63b7ea8402c1986002de6e55141965b98f14242d178fc0e47a3d6f0133379aba21b6914630a234985bb05d41775db63f8a61bb87113

      • C:\Users\Admin\AppData\Local\Temp\7Ce65nyUjn.bat

        Filesize

        224B

        MD5

        0161164bfb6efcead2312fcc86ba500a

        SHA1

        0d1c5091f2c95d37fa186f99db5a8be829cf173a

        SHA256

        b3c012b9f1d48b836ff5f15a65e8aae3f7cd58d0f81d8727388022ed6577f3ec

        SHA512

        ea56f3360516af221f382be259ef4a4559be46d46723d5862042d6d3fb2daa212931fee7bf033ba707395dcf4a2b697e33bb5bdf76abefdc4164aeed07fe8f90

      • C:\Users\Default\Idle.exe

        Filesize

        1.8MB

        MD5

        8042a4a2dd63bebb26d5e9a7f454dceb

        SHA1

        30bf1afc988d73edb9986978ccf58debaed5975e

        SHA256

        408bf8313fe5340f8b1965996d54c78f07edbf9e19ba265a28cfa2abb8107111

        SHA512

        576e2b737fdf5e794a7f13e75de127bd52c15b06e244a189ee15523929051835abe13034df626119dffd88861861cadc6ce240930182c4eb95b8cb75a5dc6df8

      • C:\Windows\Setup\RCXBAF8.tmp

        Filesize

        1.8MB

        MD5

        237714003ce750bc43dd9ab4ac290ae9

        SHA1

        a6f4fc8f747cf11632c3cfb23c654be6130477db

        SHA256

        b05e8e88e709a7e7f5b63634244fa9a453883a7c3e13051bc2fd059e1fe8cab1

        SHA512

        f54ae0c4157237d65f6c6d88bc08873e2e1950d098aca7c476796d1728bea087000d3f87bfe806ac5be7ac0a9e6475020c9bb289aa1fbf1771c3f97d6d732ad2

      • C:\Windows\en-US\dwm.exe

        Filesize

        1.8MB

        MD5

        5a226562cbae5759a91657b795290183

        SHA1

        c04ac12b8b3f5d82848f001629ce9f7d79ea0acd

        SHA256

        caf3aedf8d9e38c09ba4368107b617451b25889fa4f26218e2c27090e8ea8ae5

        SHA512

        5d3722efd71281f0b6588ae318b667fb015a7f0cd8969a8e7b2bceb6025531d277fe6ec629433fbc365d4ef10dc98eca3be1e1c4a3656236a0c3d93df5bbb818

      • memory/2784-244-0x000000001EF00000-0x000000001F0C2000-memory.dmp

        Filesize

        1.8MB

      • memory/2784-243-0x0000000000F10000-0x00000000010EC000-memory.dmp

        Filesize

        1.9MB

      • memory/2816-9-0x0000000002760000-0x000000000276A000-memory.dmp

        Filesize

        40KB

      • memory/2816-23-0x000000001B3A0000-0x000000001B3A8000-memory.dmp

        Filesize

        32KB

      • memory/2816-12-0x00000000027F0000-0x0000000002802000-memory.dmp

        Filesize

        72KB

      • memory/2816-13-0x000000001BEF0000-0x000000001C418000-memory.dmp

        Filesize

        5.2MB

      • memory/2816-14-0x0000000002820000-0x000000000282C000-memory.dmp

        Filesize

        48KB

      • memory/2816-15-0x0000000002830000-0x0000000002838000-memory.dmp

        Filesize

        32KB

      • memory/2816-16-0x0000000002840000-0x000000000284C000-memory.dmp

        Filesize

        48KB

      • memory/2816-17-0x0000000002850000-0x0000000002858000-memory.dmp

        Filesize

        32KB

      • memory/2816-18-0x000000001B340000-0x000000001B34C000-memory.dmp

        Filesize

        48KB

      • memory/2816-19-0x000000001B360000-0x000000001B36E000-memory.dmp

        Filesize

        56KB

      • memory/2816-21-0x000000001B380000-0x000000001B38E000-memory.dmp

        Filesize

        56KB

      • memory/2816-20-0x000000001B370000-0x000000001B378000-memory.dmp

        Filesize

        32KB

      • memory/2816-22-0x000000001B390000-0x000000001B39C000-memory.dmp

        Filesize

        48KB

      • memory/2816-11-0x00000000027D0000-0x00000000027D8000-memory.dmp

        Filesize

        32KB

      • memory/2816-10-0x00000000027C0000-0x00000000027CC000-memory.dmp

        Filesize

        48KB

      • memory/2816-0-0x00007FFC7BC93000-0x00007FFC7BC95000-memory.dmp

        Filesize

        8KB

      • memory/2816-8-0x0000000002740000-0x0000000002756000-memory.dmp

        Filesize

        88KB

      • memory/2816-6-0x0000000002720000-0x0000000002728000-memory.dmp

        Filesize

        32KB

      • memory/2816-185-0x00007FFC7BC93000-0x00007FFC7BC95000-memory.dmp

        Filesize

        8KB

      • memory/2816-208-0x00007FFC7BC90000-0x00007FFC7C751000-memory.dmp

        Filesize

        10.8MB

      • memory/2816-7-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/2816-5-0x0000000002770000-0x00000000027C0000-memory.dmp

        Filesize

        320KB

      • memory/2816-4-0x0000000002700000-0x000000000271C000-memory.dmp

        Filesize

        112KB

      • memory/2816-238-0x00007FFC7BC90000-0x00007FFC7C751000-memory.dmp

        Filesize

        10.8MB

      • memory/2816-3-0x00000000026F0000-0x00000000026FE000-memory.dmp

        Filesize

        56KB

      • memory/2816-2-0x00007FFC7BC90000-0x00007FFC7C751000-memory.dmp

        Filesize

        10.8MB

      • memory/2816-1-0x0000000000410000-0x00000000005EC000-memory.dmp

        Filesize

        1.9MB