Analysis

  • max time kernel
    195s
  • max time network
    192s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    27-12-2024 15:11

General

  • Target

    https://github.com/daedalus/NanoCore/archive/refs/heads/master.zip

Malware Config

Extracted

Family

darkcomet

Botnet

IDMAN

C2

arrivals.ddns.net:2323

Mutex

DC_MUTEX-391X2ZJ

Attributes
  • InstallPath

    MSDCSC\IDMAN.exe

  • gencode

    CUWbhGwmWBMb

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    IDMAN

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 15 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 17 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 13 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/daedalus/NanoCore/archive/refs/heads/master.zip
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffedafacc40,0x7ffedafacc4c,0x7ffedafacc58
      2⤵
        PID:3024
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1828 /prefetch:2
        2⤵
          PID:1244
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2068 /prefetch:3
          2⤵
            PID:1872
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2500 /prefetch:8
            2⤵
              PID:4800
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3148 /prefetch:1
              2⤵
                PID:2524
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3172 /prefetch:1
                2⤵
                  PID:60
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4792,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4756 /prefetch:8
                  2⤵
                    PID:3076
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4920,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4456 /prefetch:8
                    2⤵
                      PID:888
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5232,i,4781897013705771381,12623254440657576479,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3832 /prefetch:8
                      2⤵
                        PID:3000
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:4568
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:3316
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:3516
                          • C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe
                            "C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe"
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:472
                            • C:\Users\Admin\AppData\Roaming\CRACKED.EXE
                              "C:\Users\Admin\AppData\Roaming\CRACKED.EXE"
                              2⤵
                              • Modifies WinLogon for persistence
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:948
                              • C:\Users\Admin\AppData\Roaming\MSDCSC\IDMAN.exe
                                "C:\Users\Admin\AppData\Roaming\MSDCSC\IDMAN.exe"
                                3⤵
                                • Modifies firewall policy service
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of SetWindowsHookEx
                                PID:4104
                                • C:\Windows\SysWOW64\notepad.exe
                                  notepad
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1116
                            • C:\Users\Admin\AppData\Roaming\NANOCORE.EXE
                              "C:\Users\Admin\AppData\Roaming\NANOCORE.EXE"
                              2⤵
                              • Executes dropped EXE
                              PID:4268
                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                dw20.exe -x -s 1104
                                3⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                PID:872
                          • C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe
                            "C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe"
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:1716
                            • C:\Users\Admin\AppData\Roaming\CRACKED.EXE
                              "C:\Users\Admin\AppData\Roaming\CRACKED.EXE"
                              2⤵
                              • Modifies firewall policy service
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4156
                            • C:\Users\Admin\AppData\Roaming\NANOCORE.EXE
                              "C:\Users\Admin\AppData\Roaming\NANOCORE.EXE"
                              2⤵
                              • Executes dropped EXE
                              PID:2408
                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                dw20.exe -x -s 1104
                                3⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                PID:4440
                          • C:\Windows\system32\taskmgr.exe
                            "C:\Windows\system32\taskmgr.exe" /4
                            1⤵
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:3744
                          • C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe
                            "C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe"
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:2304
                            • C:\Users\Admin\AppData\Roaming\CRACKED.EXE
                              "C:\Users\Admin\AppData\Roaming\CRACKED.EXE"
                              2⤵
                              • Modifies firewall policy service
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:1068
                            • C:\Users\Admin\AppData\Roaming\NANOCORE.EXE
                              "C:\Users\Admin\AppData\Roaming\NANOCORE.EXE"
                              2⤵
                              • Executes dropped EXE
                              PID:3816
                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                dw20.exe -x -s 1076
                                3⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                PID:4260
                          • C:\Windows\system32\NOTEPAD.EXE
                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\Crack by Guardia.txt
                            1⤵
                              PID:1048
                            • C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore Plugin Compiler.exe
                              "C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore Plugin Compiler.exe"
                              1⤵
                                PID:2504
                              • C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe
                                "C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe"
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:1000
                                • C:\Users\Admin\AppData\Roaming\CRACKED.EXE
                                  "C:\Users\Admin\AppData\Roaming\CRACKED.EXE"
                                  2⤵
                                  • Modifies firewall policy service
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4152
                                • C:\Users\Admin\AppData\Roaming\NANOCORE.EXE
                                  "C:\Users\Admin\AppData\Roaming\NANOCORE.EXE"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:3116
                                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                    dw20.exe -x -s 1164
                                    3⤵
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    PID:4000
                              • C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe
                                "C:\Users\Admin\Downloads\NanoCore-master\NanoCore-master\sample\NanoCore.exe"
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:2528
                                • C:\Users\Admin\AppData\Roaming\CRACKED.EXE
                                  "C:\Users\Admin\AppData\Roaming\CRACKED.EXE"
                                  2⤵
                                  • Modifies firewall policy service
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3724
                                • C:\Users\Admin\AppData\Roaming\NANOCORE.EXE
                                  "C:\Users\Admin\AppData\Roaming\NANOCORE.EXE"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:4968
                                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                    dw20.exe -x -s 1096
                                    3⤵
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    PID:3000
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
                                1⤵
                                  PID:4784

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\887ca230-8d2f-43d6-b17d-a499212be41b.tmp

                                  Filesize

                                  8KB

                                  MD5

                                  d1a6780038f82b1e32f5a4a6518ed5d8

                                  SHA1

                                  bdb522846b58a966d9b71d236e4a4a2cdc5055f1

                                  SHA256

                                  acdb65abd1bfa532c1286eca5f969132726e7678f3a17540bffddf1d31dbffef

                                  SHA512

                                  afb461a26f3d4cd88b30812b0fb1fbd94f5785c951711a649a3261d414d952f86328a2628bddcc50c042270980b561ae6cc95811afd4039d77259e222646cc88

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                  Filesize

                                  649B

                                  MD5

                                  c358c1d830832759412b596569f7539e

                                  SHA1

                                  3a4af1bf23c4ab7a10d8d17ae888429995463e48

                                  SHA256

                                  a1de3e8a77c14aa12952780e06aa4fee2bfa5d06701e31ced831203583c65ea0

                                  SHA512

                                  dff5e06d0725a52a286802477e81c33f1ce9c3fbd6e919de2642a7a9ca5f509ed5fc789094e5a64c5ff9aee0751f36da48cd07711cffc1ab7cbf55a0a6d228b0

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  4a28c0e66cb5ee30bf59a339d15459dc

                                  SHA1

                                  9438d17dbd1650d2a541eb79dcc55fc6951e02d9

                                  SHA256

                                  12d4c6e02d14dfd6827c205bc944f12c8f2b4b0ee84633f09e8d37f1be5914bc

                                  SHA512

                                  c4a6c0dc2d0b39f087fe3d6f537a587dd22356d72f521883d9ff4d80e7513e450ea6e5eb809c47c7221f0d5db7efcc9e564e4676e89174a6a276d514b88a3923

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  63b5b99c24d15b3da3f3098e2aeba030

                                  SHA1

                                  a77b5048dbefb479cc5201e96b54f4b11c25aaa3

                                  SHA256

                                  b68e13052f0435709011c5e3e317e9f988e8b13d74fbdbf3e8344c16fec2f275

                                  SHA512

                                  34a5c45202fdbf24d69bd8d888ae6a8a829033425b029029bbf4c5be2d660164b7c56b888beb74c16a03dae9e9b8de7c550c64e7c9915081745d0d740497c8a2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  691B

                                  MD5

                                  39516dcf114f4839b9ef58b057c7d0ca

                                  SHA1

                                  60d7da8a1477f61109d75b02f6c1cd79c68e2083

                                  SHA256

                                  ad375d3d78aa1229081e589d86133291219cb919aec3847347ad2b3b67dc29c4

                                  SHA512

                                  7da283a89b026b0a28d7081788aae7bbca35b0e25a46d52ea219936a367dc60515a024b333aec4c452ba2a07ac5377894e29110574aa00a572a0bf3b0513c432

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  b476ba185c62c327a32099de1884e951

                                  SHA1

                                  cd3ab5ea5599c8fb961dd7fe6dde4c4091034cb1

                                  SHA256

                                  5dc689e4b2d86868a78d5351ed53158c24ee8ac065dd6d6a6f0b034ab1ee7746

                                  SHA512

                                  7587227ec197d6a685b2b1a740018285985b0bd02b4bda4caaf66d56246c7af43c22d251fb9a04e5cbc1111237d9c52209694968750cccfa268cc3c3f56eccf6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  f6a6ab11e667909824d14fdfdf505875

                                  SHA1

                                  088831a69dc4999dec4ce5b08e0791efad0da8ef

                                  SHA256

                                  7b2aa6e2b1add530fbb8e4aee72c43f6f21c94e28e8b925a5101cf00a9fa80f6

                                  SHA512

                                  0fcba0e82ef4d700e489aa783cea0743d017d3dda9f7b9e89c5c23ecc1cf9d4b5517206c67d3e162383758eead5d8ae3a202daa6e839fe07f534cca287230eed

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  8b15f9ed2fd004f4e456d430d32df8be

                                  SHA1

                                  3044552f793bc2f9ddec6411af7afe8b2151983f

                                  SHA256

                                  6de63e7329b325d90653e9fa42e2e7c0c6c0b89e2f33b92e7cff8d921188cf86

                                  SHA512

                                  b451f3c1b55971075911737bc9d4e9f3317693d8f90349627ab3a96fb863fe40a86f9d39112250826ef0172b28fa2e146d2d39721a329e45cff9693252ecfb46

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  143687338a979b04debe7044c715328f

                                  SHA1

                                  f92664c0dbc517aaec9b67ab56c4601557abfa6a

                                  SHA256

                                  3142b90c1c13d60fa24191cceaec3190c122f2ef251ada66e9fd6ab7382e28a2

                                  SHA512

                                  7b31b4d3dab831aa91d1f58c74d705a33a4aa015789dea126c8c04b7f906acf735b49ffa9763bbac9eef462b3ad368dd5a554eb31c3f69f3670ca5f757d2edec

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  8ed7e3da813e36d9289445fce63046c5

                                  SHA1

                                  d5a189d4402589bac6e6ffff9e3bd926d18f0c52

                                  SHA256

                                  8fec29ccc716a14e52066694d67cfadb7ba24bed3dee7719398a025e045a2c28

                                  SHA512

                                  baf440be1bc3f2c8e9b7fbd27803500629852fa4728ad79dd1426869cb20e78ec6e59aca73f0278bbfb9f9b661f0f775a3c770e2304fdd668f08bd7ab753d66d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  b2cb5e72424a67b2d6bc539e80b385e0

                                  SHA1

                                  d069b656810e00373ba627bef4f591b3eae9bae1

                                  SHA256

                                  dbf93fd974cc48122a9d3d34bc6bb9fff9212c405b1934bdc061b562fe7c3e83

                                  SHA512

                                  57f7dad55159ce8915b1b62c58a7b04ea5cd777a06c3e99ce307b779391b6793782b6ed25db44a79414986fe578beca5bf8c3f6b8a0694efb97d587b43fb4b3c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  aaa7e00be8edd9368c59dc435cd3ca16

                                  SHA1

                                  3aacafd33fd49a19d197e324f4e6e3d19dfe2882

                                  SHA256

                                  6beb03f8485f23d660de6fadbbd0e68fcd385f76f017ecc6d1e64b15782e8f5d

                                  SHA512

                                  89b42fc539a8dd08cea702f83958ebb5c7aaff43854158ee2bf0b26b9f2cde0de27c9ec86ead9485f643ea877578a1fd53b6fa43cd8e459870d4d40633404fe1

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  73a4d6658446438f52ce6f8ca24712eb

                                  SHA1

                                  3c98c421d906022b431d8724e7973677f5a19aac

                                  SHA256

                                  de3e79df41db1a8a4aca2009c3c5271ed3f58f2d1015bd3c1b280d01c54ee4ee

                                  SHA512

                                  c1d3dcc583dd504a9479443ee5a9c71933182b98e85f54fbdfc3768e052100be89d04d520256e1931f03633ee6ff828292cb54709a8ce3e51ad3d4e3537c83bf

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  94715951e1e83e3902a3a72941f24b3e

                                  SHA1

                                  776948578a568d8670254ca19b70d83645c125a1

                                  SHA256

                                  a9323a4483289f3ad5fd959d6b5f802846da68095f93a2eca86fc43b5348b6c1

                                  SHA512

                                  55a0d32b29535a35824c36d9bd7d4f7f8547117ad8ac0d8d0e11073d7d363e4a524311d12b78200ddfb5f8b2cc4fd5d45ecdf297c59d69963eb5dbdf88c38ab3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  29c4acd5254f082caff8a36b621d37aa

                                  SHA1

                                  2651f7f354470a7dcabd33b215de75a4910b154a

                                  SHA256

                                  2c6d1f514a654f31a842dc233fd83c939ffc03d201f6bfa80602edca383feb34

                                  SHA512

                                  1cf2240ce9f3b8a709478dc11287a9089aaf3752631599113984558ee45daca338be7d124ff316de2b734657013afe232ec08692feb47bbc817e68f39e051e1d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  47d274843bd5548d5a78cdec5269de63

                                  SHA1

                                  1398ae9970cf498aa428dde2612a025333896058

                                  SHA256

                                  450b8eafa79962296da73ee25df1753bc87bf23b9e2c936bb0631d90079f08f9

                                  SHA512

                                  21753e3d0d856dbe5aab0ab7ea11f30c3d54c26ee0104b086c7084d9e97df447a903349fb571bcaf3bc509b1f3e8d778a875d1e08f292a4f7a27ee619f2bb269

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  9a81380e397e819baf352984e4999ec4

                                  SHA1

                                  1afbfd813c922efa20e2b643bb2d9adbcdaf4e53

                                  SHA256

                                  2ae3d0b1b748b0029493245c7501c64ce28209088b697f05c74f112f0cba884d

                                  SHA512

                                  7c297b91073c6c92e045beae00515c5cae1fe6ec5b7a1b0daac89a6a929de5e469c33e3a471250e270afe5cecaf38b139394c188e7ac95bdf9d3e5c59fd9fc58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  232KB

                                  MD5

                                  fce7201f471109a604546c853b6539f8

                                  SHA1

                                  dd141ed033b81bb3f28b23faca4055e9a1f2ab86

                                  SHA256

                                  760c115f4c1c1748b57824c5f890b54e163483835aff99785898b1653df82f2a

                                  SHA512

                                  da7591caad841d463be2725aae75d3bb78d0851b5eeabf62e74db605f7ac50bba28f206f511bddccbe73a9b02815beb79c04818a53a3bbb51d06e355c9ea7efc

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  232KB

                                  MD5

                                  abdaa9161f943fe4e189e85637b5b32b

                                  SHA1

                                  645c0a552466f2fcd0e7585407581dcce8177acd

                                  SHA256

                                  3ba36b5d2bfa55cf361dd812cb94cd58de5f7bbf139c915af8100c3cd9023448

                                  SHA512

                                  4b0b079261c63eba9593adbcae0e1ec01dd0fab40c7e15edf226f38f892aac8426473cc9f6a6308d25364c50e67c527a063cd6230d0e1bdbcf7b1f86a5b8ce76

                                • C:\Users\Admin\AppData\Roaming\CRACKED.EXE

                                  Filesize

                                  659KB

                                  MD5

                                  94c5b3199414b8fca9f134724acdd88e

                                  SHA1

                                  6c95291364476fc10c4e343120225dae72d11233

                                  SHA256

                                  dacd09444e389359d406450312e5fe66a2eb62c5c03948c8e7890303a43ee536

                                  SHA512

                                  5fdbaf9ede009cbfdb13a92ba5c409b1a590b1bc1ddccec45c551deb5e7b7f9ecc57ed0dd1a66c7a38666bd5eb2cab9fc52a18056a5e676c292bab871aa343e1

                                • C:\Users\Admin\AppData\Roaming\NANOCORE.EXE

                                  Filesize

                                  403KB

                                  MD5

                                  d902fb22b92a7455eeac95712e9c2179

                                  SHA1

                                  8e4e0d0965055517c1ddef8442cf74c4f3d700af

                                  SHA256

                                  58f962401b52e043325cec66d88ad73032165cd0b8c3de1ec95292d83416b81f

                                  SHA512

                                  d097b22e30c20322c30f464dabf5bffeedc3e3728b82911db5f3ba79735915a3bb0fbc4bce65a153f665dc5e04ba93b6000d4230f8610bd17dbe3d625dff4269

                                • C:\Users\Admin\Downloads\NanoCore-master.zip.crdownload

                                  Filesize

                                  3.0MB

                                  MD5

                                  4f1255d0e897c466f337d9707a55c218

                                  SHA1

                                  69bbae2a275f5cf245f7537d7d62e0f941428f13

                                  SHA256

                                  110c0ac80f4d6a7e73183cf5a98f83440943afe69abca9a572ca4a4e54de7d13

                                  SHA512

                                  0bd0f4d536d215e5d73a1791399e91a0bc18182488df3e87ff29b66b9d6232b06b766582cb5e66723d7ddcd7b2593fc25eaddfa0aadbdd02d2a23ec4c366729b

                                • memory/948-97-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/1068-246-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/1116-93-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3724-367-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/3744-172-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-174-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-173-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-171-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-170-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-175-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-176-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-165-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-166-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3744-164-0x0000023F32E30000-0x0000023F32E31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4104-263-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-128-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-217-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-188-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-253-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-186-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-392-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-207-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-274-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-286-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-109-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-296-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-391-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-306-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-313-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4104-380-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4152-351-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4156-157-0x0000000000400000-0x00000000004B2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/4268-94-0x000000001BC30000-0x000000001BCCC000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/4268-95-0x000000001B100000-0x000000001B108000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/4268-92-0x000000001B610000-0x000000001BADE000-memory.dmp

                                  Filesize

                                  4.8MB

                                • memory/4268-96-0x000000001BEE0000-0x000000001BF2C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/4268-90-0x000000001B030000-0x000000001B0D6000-memory.dmp

                                  Filesize

                                  664KB