Analysis

  • max time kernel
    79s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    25-06-2020 12:40

General

  • Target

    SecuriteInfo.com.Win32.Packed.Enigma.EY.26758.exe

  • Size

    7.9MB

  • MD5

    bb9d11be90b38cb1c6c7f2f47f217700

  • SHA1

    56fa215a2bb79c4be249fc5a795cde3d22235c64

  • SHA256

    991c4166a2246ca5ae9186a1e747f5eb767fdbd304dbfa1c5f4a2019cb6b4aec

  • SHA512

    e4ee782a68a124046249e35036207b71cee8b9601bd43b34813644dee340d6871b024548ae932ddec845de5da218230ef20b2ddd2db0f94fe14378debb28ddd2

Malware Config

Extracted

Family

danabot

C2

92.204.160.126

37.120.145.243

195.133.147.230

185.227.138.52

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 4 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 10 IoCs
  • Executes dropped EXE 6 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.26758.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.26758.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\ProgramData\sde\2_protected.exe
      C:\ProgramData\sde\2_protected.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\Bg7pgU0lulU & timeout 3 & del /f /q "C:\ProgramData\sde\2_protected.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:808
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1692
    • C:\ProgramData\sde\1_protected.exe
      C:\ProgramData\sde\1_protected.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\Jt6fiTJD2Rus & timeout 2 & del /f /q "C:\ProgramData\sde\1_protected.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Windows\SysWOW64\timeout.exe
          timeout 2
          4⤵
          • Delays execution with timeout.exe
          PID:3696
    • C:\Users\Admin\AppData\Roaming\dfgdfg.exe
      dfgdfg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Roaming\dfgdfg.dll f1 C:\Users\Admin\AppData\Roaming\dfgdfg.exe@1816
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Roaming\dfgdfg.dll,f0
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:2844
    • C:\Users\Admin\AppData\Roaming\trhgdf.exe
      trhgdf.exe
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:3600
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\pohmnrdhm & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"
        3⤵
          PID:3688
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            4⤵
            • Delays execution with timeout.exe
            PID:1572
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\pohmnrdhm & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"
          3⤵
            PID:3772
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              4⤵
              • Delays execution with timeout.exe
              PID:2536
        • C:\Users\Admin\AppData\Roaming\rthgf.exe
          rthgf.exe
          2⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          PID:508
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            PID:856

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Bg7pgU0lulU\O12HEU~1.ZIP

        MD5

        46e1a29210efd14586e60b384dc87849

        SHA1

        f15843873703f304c5845906690cb054aaf0975b

        SHA256

        ab9a43ec559c45bf3b59d78fabd1ab81641ebbd2f3bd9f39ce85bbdff1107106

        SHA512

        4b0f7d085f7712cb625a747c909099646d3c57566f11ca099a6606138b2740f90a56cc4459d567da7de094d10e55ae0f47798e7fbd913fa1a66f8969347ede1d

      • C:\ProgramData\Bg7pgU0lulU\QxjHJ7x5.txt

        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\ProgramData\Bg7pgU0lulU\files_\SCREEN~1.JPG

        MD5

        e0d4267ccb7c633575705f7beadfd19c

        SHA1

        419df15bb07fdb354101e3f4f94058f6ad5d9ca9

        SHA256

        59005e9eaf769b40997c538e75000cf268ae48e629322beff46f40c1d2b831af

        SHA512

        f50ea0e3f652353bd09609ce6119bd5acaff76d3a3f07370c6237a9453b9d32d2a030fa491b2a9304f953d35aab139fb7b8ef96697443575581ab42042063040

      • C:\ProgramData\Bg7pgU0lulU\files_\SYSTEM~1.TXT

        MD5

        4f36fe615a084dcc92cd878f8b8ad94e

        SHA1

        050c777f9a6b6b06e1ab92da12e2cf0de53b6290

        SHA256

        a17fd75f955f3684ba0a6189a14f3730863b617e79a77968262892e7ed12c740

        SHA512

        0b742a8d7aa277c324d042582813055bf2c378d60c6b1d3763868403a310b06b438d9b1c5bdd63ee1abb37b7b80ba0bfdf56f72647b7cec5d29005e2a91913f5

      • C:\ProgramData\Bg7pgU0lulU\files_\files\FINDME~1.TXT

        MD5

        44d6595480659ba94f6ba15d2f8f9385

        SHA1

        104088d28a9fbc3da36d66e4e4147f2e06a57070

        SHA256

        b0ec291bf18332e8d8a8620decbec13365c0a63d8b4d5bb46936a5fb9e5b7837

        SHA512

        dc3b82a06097aeb91b6a2712a206d0b9e081e0a379c5fbf55e7fd28fe6e2dcc233fc7c7d1438b0fb0f7885e13a1e6e52439cff8996f209d5a2a17a8e4601f970

      • C:\ProgramData\Jt6fiTJD2Rus\J1YGXDTU.txt

        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\ProgramData\Jt6fiTJD2Rus\QFTMPF~1.ZIP

        MD5

        d97a5806fc9b7e93f6a69af1f52f4d4f

        SHA1

        e23baaeba2a3df9498d6936c4764e2b8bc017abe

        SHA256

        3873543b0367fbb1a976f604923f83edcb7a8f18a0aa73e752344aa830753430

        SHA512

        16fe9ac290b708dc3e00c238572daa959039b4d6fac9f4396b0690d0612783b3980cf1c86101840bf83b21d4da406a3c3f38787129fd705f30c40105c2ecdab3

      • C:\ProgramData\Jt6fiTJD2Rus\_Files\_Files\FINDME~1.TXT

        MD5

        44d6595480659ba94f6ba15d2f8f9385

        SHA1

        104088d28a9fbc3da36d66e4e4147f2e06a57070

        SHA256

        b0ec291bf18332e8d8a8620decbec13365c0a63d8b4d5bb46936a5fb9e5b7837

        SHA512

        dc3b82a06097aeb91b6a2712a206d0b9e081e0a379c5fbf55e7fd28fe6e2dcc233fc7c7d1438b0fb0f7885e13a1e6e52439cff8996f209d5a2a17a8e4601f970

      • C:\ProgramData\Jt6fiTJD2Rus\_Files\_INFOR~1.TXT

        MD5

        9455f3aa89fa4c4b3bb54e857ff5aeee

        SHA1

        7b67e76509ee3ea491ab5328f237f75d8992acd5

        SHA256

        b18d3cd356002d87fea3ba9c82430c2472b936530fb2cb620c8857b0d3beff1c

        SHA512

        d674ae8296e89236ac5ac0fef2c358e40463bcbf703c45954ac543975ec071af72709c19b719b9d068004dcd9ef91f11da1acd75515b56311dbd4532baac0e1c

      • C:\ProgramData\Jt6fiTJD2Rus\_Files\_SCREE~1.JPE

        MD5

        b86b8ec4757fb38e3585bc5d2f578516

        SHA1

        4ae0709ba095ba4ab3ba49c19d3c03c32bbc8565

        SHA256

        16bd0caa29bfdaefb19c267e50eeab3f5324351de05cf5b8ec067ebb77dfc999

        SHA512

        375bef0910dd52b4dc2a94e21af8bff028c26f5c043e1107dbbd13abbe3d7b94adf3f7c9ead80ba33c0ce724d6c6f90ef7b20018edbdd35b0beae65233235581

      • C:\ProgramData\pohmnrdhm\46173476.txt

        MD5

        47bce43d8ae10cb701a13f5719c7c174

        SHA1

        2f1f7218b7397de63342222b3c4f8413098a7cfd

        SHA256

        1de834ddad17d80ade3ee9723fc5c0d3c5eab681cb61761024d30b521ade1ae7

        SHA512

        ecb3ca5b63163ae8e076aaf392fec20cb88fbce786cc3fbebff6d83a51c2acc803658656abe6cbfdac589a261d502d52dabea43e0783638aff92cd8e1428ae81

      • C:\ProgramData\pohmnrdhm\8372422.txt

        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\ProgramData\pohmnrdhm\Files\_INFOR~1.TXT

        MD5

        cc9641bb56d2b347bf69109857dc4f27

        SHA1

        5bf25494e31f6a3178eba714435b994fce33dd8c

        SHA256

        45323d64402a6d298039f84c548a674a8ff0e22de5c74ace124590f2955f2a5c

        SHA512

        c4fa73b93565fdfcf11548a8e8b065f7ca2ea9a00cb414e9e044731d41932a8ec4b5f1f9f815585f1d5fed163735d64a4181103169dd1d6be3e3c1a23b6fcc0b

      • C:\ProgramData\pohmnrdhm\NL_202~1.ZIP

        MD5

        deef8ca907211396438934ee86ee67b4

        SHA1

        b9a5ce89c17d98e09cf5293b7eefcbcf32c3764e

        SHA256

        e63dc92556f11d265884c25b437f430f3a65d77506e6ef73ab938043f69b4495

        SHA512

        2a55eb7d7e02de4f8729cb50a4ae80eb08adabadd10863bfcac1e52e49a7403ce83b4911512ae768f5349d402347eb2c5379e4fcab0af63af2a2a0cc298b4a8a

      • C:\ProgramData\sde\1_protected.exe

        MD5

        1887257c14d72580b92289ffe15b7d8b

        SHA1

        9f44d369e54a2ab0db1738d4b37ae55b87af1862

        SHA256

        94e865d2ce53f3b70fa0cd2e34532f039950d624cabda9cd2554334d62322748

        SHA512

        f513b38aa0b5a45b05bda8552509c7d70ffec444f267cf7b5b42474a8cb4de6251ff7aca305cda94ab00e60f6deaab90e4ff3ae2cc7d80929f30586771517109

      • C:\ProgramData\sde\1_protected.exe

        MD5

        1887257c14d72580b92289ffe15b7d8b

        SHA1

        9f44d369e54a2ab0db1738d4b37ae55b87af1862

        SHA256

        94e865d2ce53f3b70fa0cd2e34532f039950d624cabda9cd2554334d62322748

        SHA512

        f513b38aa0b5a45b05bda8552509c7d70ffec444f267cf7b5b42474a8cb4de6251ff7aca305cda94ab00e60f6deaab90e4ff3ae2cc7d80929f30586771517109

      • C:\ProgramData\sde\2_protected.exe

        MD5

        620881c13a66b6d1925c05967b4794ec

        SHA1

        9c529c1a8a6e6d82999fdb33571357fcfc48c7aa

        SHA256

        591e4046ac85b8a909e6f607a21609b9469018156d4282268b1e15ac23b642f7

        SHA512

        9df9659bacee196d26d6142154272d64f76a015d8d1f9b66c620660de424144f69f10280cb13254cfd9b2a716833fb755875ad7f0db92ac88f55db2bd020022d

      • C:\ProgramData\sde\2_protected.exe

        MD5

        620881c13a66b6d1925c05967b4794ec

        SHA1

        9c529c1a8a6e6d82999fdb33571357fcfc48c7aa

        SHA256

        591e4046ac85b8a909e6f607a21609b9469018156d4282268b1e15ac23b642f7

        SHA512

        9df9659bacee196d26d6142154272d64f76a015d8d1f9b66c620660de424144f69f10280cb13254cfd9b2a716833fb755875ad7f0db92ac88f55db2bd020022d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7ITI1NQU\line[1].txt

        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P0JNR0O6\line[1].txt

        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\dfgdfg.dll

        MD5

        872f43427a22d22bceec47e632828589

        SHA1

        2f2ce208cb5c9c5d83de36425552fe25ff1682de

        SHA256

        424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

        SHA512

        c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

      • C:\Users\Admin\AppData\Roaming\dfgdfg.exe

        MD5

        b7724938b0f7998c2396d1dbde441402

        SHA1

        bb1000f234546c5cc373c02a3494ba66e18e20da

        SHA256

        e139136e5bbb361c7fcc988fd5f4cb7c23c359df82aebc977a8ad4286d7808c1

        SHA512

        5854a203f4e7e66fcbc5680a67630043ab0eec822d05de4529e71f14ee2c878fd03b9560423976945a7aa0db6f83ee3d0b33b2eab68779c4f3ead825ede59e56

      • C:\Users\Admin\AppData\Roaming\dfgdfg.exe

        MD5

        b7724938b0f7998c2396d1dbde441402

        SHA1

        bb1000f234546c5cc373c02a3494ba66e18e20da

        SHA256

        e139136e5bbb361c7fcc988fd5f4cb7c23c359df82aebc977a8ad4286d7808c1

        SHA512

        5854a203f4e7e66fcbc5680a67630043ab0eec822d05de4529e71f14ee2c878fd03b9560423976945a7aa0db6f83ee3d0b33b2eab68779c4f3ead825ede59e56

      • C:\Users\Admin\AppData\Roaming\rthgf.exe

        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\rthgf.exe

        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\trhgdf.exe

        MD5

        c3b2c6e54f963bc305e97638a0a109aa

        SHA1

        1d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8

        SHA256

        7d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6

        SHA512

        225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621

      • C:\Users\Admin\AppData\Roaming\trhgdf.exe

        MD5

        c3b2c6e54f963bc305e97638a0a109aa

        SHA1

        1d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8

        SHA256

        7d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6

        SHA512

        225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621

      • \Users\Admin\AppData\Roaming\dfgdfg.dll

        MD5

        872f43427a22d22bceec47e632828589

        SHA1

        2f2ce208cb5c9c5d83de36425552fe25ff1682de

        SHA256

        424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

        SHA512

        c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

      • \Users\Admin\AppData\Roaming\dfgdfg.dll

        MD5

        872f43427a22d22bceec47e632828589

        SHA1

        2f2ce208cb5c9c5d83de36425552fe25ff1682de

        SHA256

        424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

        SHA512

        c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

      • \Users\Admin\AppData\Roaming\dfgdfg.dll

        MD5

        872f43427a22d22bceec47e632828589

        SHA1

        2f2ce208cb5c9c5d83de36425552fe25ff1682de

        SHA256

        424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

        SHA512

        c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

      • memory/508-55-0x0000000000000000-mapping.dmp

      • memory/508-57-0x0000000000000000-mapping.dmp

      • memory/748-8-0x0000000000000000-mapping.dmp

      • memory/748-12-0x0000000004C20000-0x0000000004C21000-memory.dmp

        Filesize

        4KB

      • memory/748-13-0x0000000004E20000-0x0000000004E21000-memory.dmp

        Filesize

        4KB

      • memory/748-11-0x0000000000000000-mapping.dmp

      • memory/808-14-0x0000000000000000-mapping.dmp

      • memory/808-15-0x0000000000000000-mapping.dmp

      • memory/808-16-0x0000000000000000-mapping.dmp

      • memory/856-59-0x0000000000000000-mapping.dmp

      • memory/856-61-0x0000000000000000-mapping.dmp

      • memory/1444-26-0x0000000000000000-mapping.dmp

      • memory/1444-27-0x0000000000000000-mapping.dmp

      • memory/1444-28-0x0000000000000000-mapping.dmp

      • memory/1572-70-0x0000000000000000-mapping.dmp

      • memory/1572-71-0x0000000000000000-mapping.dmp

      • memory/1692-24-0x0000000000000000-mapping.dmp

      • memory/1692-22-0x0000000000000000-mapping.dmp

      • memory/1692-23-0x0000000000000000-mapping.dmp

      • memory/1816-42-0x00000000045A0000-0x00000000045A1000-memory.dmp

        Filesize

        4KB

      • memory/1816-40-0x0000000000000000-mapping.dmp

      • memory/1816-37-0x0000000000000000-mapping.dmp

      • memory/2536-74-0x0000000000000000-mapping.dmp

      • memory/2536-75-0x0000000000000000-mapping.dmp

      • memory/2544-44-0x0000000000000000-mapping.dmp

      • memory/2544-43-0x0000000000000000-mapping.dmp

      • memory/2844-48-0x0000000000000000-mapping.dmp

      • memory/2844-49-0x0000000000000000-mapping.dmp

      • memory/2964-2-0x0000000000000000-mapping.dmp

      • memory/2964-6-0x0000000005130000-0x0000000005131000-memory.dmp

        Filesize

        4KB

      • memory/2964-7-0x0000000005330000-0x0000000005331000-memory.dmp

        Filesize

        4KB

      • memory/2964-5-0x0000000000000000-mapping.dmp

      • memory/3600-54-0x0000000000000000-mapping.dmp

      • memory/3600-51-0x0000000000000000-mapping.dmp

      • memory/3688-65-0x0000000000000000-mapping.dmp

      • memory/3688-64-0x0000000000000000-mapping.dmp

      • memory/3696-36-0x0000000000000000-mapping.dmp

      • memory/3696-35-0x0000000000000000-mapping.dmp

      • memory/3696-34-0x0000000000000000-mapping.dmp

      • memory/3772-72-0x0000000000000000-mapping.dmp

      • memory/3772-73-0x0000000000000000-mapping.dmp

      • memory/3880-0-0x0000000006880000-0x0000000006881000-memory.dmp

        Filesize

        4KB

      • memory/3880-1-0x0000000007080000-0x0000000007081000-memory.dmp

        Filesize

        4KB