Analysis

  • max time kernel
    98s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    25-06-2020 10:53

General

  • Target

    SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe

  • Size

    7.9MB

  • MD5

    78632f99e8fd64fca5e8cf7ae613c674

  • SHA1

    91ec27976c60b44a9807bf713ef97ad3ad92dd1b

  • SHA256

    aeb1bfcef382789091e72e2d6cae6e471123d0e8e7a5f39c64abf5a3d9a4eaa8

  • SHA512

    921b58d21fbef6484cb79d3b8cc5cdefd88f53317f9a1f9b667512b8ae09d7cea69bed20440b0887e38f1228b06f174b5cc5be927db99f51bf9f13daa45a3b64

Malware Config

Extracted

Family

danabot

C2

92.204.160.126

37.120.145.243

195.133.147.230

185.227.138.52

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 6 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 10 IoCs
  • Executes dropped EXE 6 IoCs
  • VMProtect packed file 7 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\ProgramData\sde\1_protected.exe
      C:\ProgramData\sde\1_protected.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\EIKf23RV & timeout 2 & del /f /q "C:\ProgramData\sde\1_protected.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Windows\SysWOW64\timeout.exe
          timeout 2
          4⤵
          • Delays execution with timeout.exe
          PID:2024
    • C:\ProgramData\sde\2_protected.exe
      C:\ProgramData\sde\2_protected.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\NUpU62jUB & timeout 3 & del /f /q "C:\ProgramData\sde\2_protected.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:860
    • C:\Users\Admin\AppData\Roaming\dfgdfg.exe
      dfgdfg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Roaming\dfgdfg.dll f1 C:\Users\Admin\AppData\Roaming\dfgdfg.exe@1860
        3⤵
        • Loads dropped DLL
        PID:752
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Roaming\dfgdfg.dll,f0
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:596
    • C:\Users\Admin\AppData\Roaming\trhgdf.exe
      trhgdf.exe
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:536
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\vuyahxnmkkwag & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"
        3⤵
          PID:1220
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            4⤵
            • Delays execution with timeout.exe
            PID:1768
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\vuyahxnmkkwag & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"
          3⤵
            PID:332
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              4⤵
              • Delays execution with timeout.exe
              PID:1676
        • C:\Users\Admin\AppData\Roaming\rthgf.exe
          rthgf.exe
          2⤵
          • Executes dropped EXE
          • Drops startup file
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1536
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            PID:1476

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Virtualization/Sandbox Evasion

      1
      T1497

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      4
      T1012

      Virtualization/Sandbox Evasion

      1
      T1497

      System Information Discovery

      4
      T1082

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\EIKf23RV\VJ6MYO~1.ZIP
        MD5

        d6f3c5bd64f0a610dc90e7b3efcf4a91

        SHA1

        a94cb18332571bf4c41878283f24c4f362ae5ebf

        SHA256

        2f4c8a5dfd25f6f81d97d33b728c4adec880a4f9f8df4645d9e08c55cf38fc7e

        SHA512

        591c753e078e8e84e636da8e28d5a8932e26774bbabdee0760f21a8dd0d063ff6645e97330cde73acb3754575c485251d226c5f6608b31187258f51c8817d662

      • C:\ProgramData\EIKf23RV\_Files\_INFOR~1.TXT
        MD5

        a07ecc2af591f3856c3eea3a3099d922

        SHA1

        bb1647a07bd696effa8f1b8b99fbacc95f21409f

        SHA256

        e12bcd1c941514dd515c9cafb7508c60fca38fc7f0ce9006247ddac82cfa5d5b

        SHA512

        25911931e3f0c69a043df512dbdd8ec3abb388b9886963b9cb953e30452f422598873979c13c5504c5872d229b87e393f2b0cdce6145e3ff237b2c4b745a751c

      • C:\ProgramData\EIKf23RV\_Files\_SCREE~1.JPE
        MD5

        835bd88e318bbc65cbf60d77d33b5704

        SHA1

        01dfb2c15ab2a5b5a6c0507ba0cf47c426c64c84

        SHA256

        777d576204cae31c182da29d24d1f35799d7647d618e16b8cce68e8cc1fc1f93

        SHA512

        1abdbb10597b1b22e237500e5190cad58f0fb9d17552c65520c9d5c999e55994e5b6be51cb77dcf93a60595712a6e39798c6d7227b39412579a199d5389ba193

      • C:\ProgramData\NUpU62jUB\BJQMII~1.ZIP
        MD5

        af3007e908f9c58e5cf439fdcf69981c

        SHA1

        0c866855035257f4475235e0013faeeeafa06ff9

        SHA256

        44b1d653810843059f73984a39cb62aaf1ddee44a71ef8de0addbfcb03426f89

        SHA512

        fdce08a5cebe364d7326761703c866dc013103fb4984a8a65e0e27d3b0f6fba8b04c2e7b2fc7ba75cdf7929446d122fc5823ad86e723502143db46e7d128e8bd

      • C:\ProgramData\NUpU62jUB\CHuCD.txt
        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\ProgramData\NUpU62jUB\files_\SCREEN~1.JPG
        MD5

        f11d65b23b3b280d479daf092608cd8b

        SHA1

        a89ab7ca8ecfb1ad0732cff2e3e0ac5e0ad98af2

        SHA256

        079786920d9d6ed3d63ffbcbc4fdd2d2c5f401560c8a12fa178030698cfb3f55

        SHA512

        5d348a5e35a87b056c7cbc0e0a86b229eabb09b349cf9d6203cea75cb450491b93effcd02376cdf822bba9a101951741771d3ce61f1d70579f4fc7cfdd5cd472

      • C:\ProgramData\NUpU62jUB\files_\SYSTEM~1.TXT
        MD5

        4959d03161f2af9d33cdf3ba242a35fd

        SHA1

        c1bf289fbfe2ec1533e2acd5beba0f0acfaaba06

        SHA256

        a31f889943f12177de85287a8f34418dab2e3ed86125f0ca673f3ddb61623f81

        SHA512

        c215c2499a2d176e81714bdcea831b035329ddbd9aaf84a09a8ee18272ff2d72c5a36e145f9240d31fd3c6e2f7f1a9855e2d4f8635f1acf848a777331c828607

      • C:\ProgramData\sde\1_protected.exe
        MD5

        ebd99449d721ffc60e5d566a7edda104

        SHA1

        59b2a87108dedf9eb3eb3ed2d997fec1635111c9

        SHA256

        a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409

        SHA512

        13d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c

      • C:\ProgramData\sde\2_protected.exe
        MD5

        1b18317fb169aa7d2e205e9cb3c49f78

        SHA1

        f53a05a859aedb789c7268687378c353cbc3bca0

        SHA256

        02f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf

        SHA512

        53a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc

      • C:\ProgramData\vuyahxnmkkwag\46173476.txt
        MD5

        a00950727569937544fcefaff57c2acd

        SHA1

        1db8cb9756c04fdf911a22d925b1e206a93419f2

        SHA256

        f1fc5896844b87c715f3f68aed120fa261045618bb8df765d20b4b1c4891b495

        SHA512

        a5700deb59919f6010782d00d639df70f4910f8169397122749a8b48efd46af1f8e1467643767750adaef4b45fb5819bae155f4530a66b7c3de66342cde98be5

      • C:\ProgramData\vuyahxnmkkwag\8372422.txt
        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\ProgramData\vuyahxnmkkwag\Files\_INFOR~1.TXT
        MD5

        3dc3d62cfda0b0795c7be85bd086388d

        SHA1

        9cf5d54cefd565bac00e17e20c525d98eff3f764

        SHA256

        e0422ca8d5420c4cfb236f4a0560d3dbe150b64f1ae298afba2ecf591c843940

        SHA512

        7ead0b059d06704aacc1021cc57183a780646781f5d664a59f0685ffafea6a0c3a094fad766990c8e8c0dc2952ed87b6d04c55e02ea27a632187c24e24bb7598

      • C:\ProgramData\vuyahxnmkkwag\NL_202~1.ZIP
        MD5

        06cec905820c65024f74d473627c7c3b

        SHA1

        aa19234a0bc6990af59e9ec93efba68975987574

        SHA256

        f5cd949c51b88a26f96123fa2c3816a3790501485704bb7c39c53551bffcfcd4

        SHA512

        a299a405d1c437e4851e9965d8298c985f28d53635d3e917a7ef2c4191d04e97d587973d3909c37a1fde86493651bf38a8d7ed6c7932c4bd372b5d83eb4ccf69

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZQ107GEP\line[2].txt
        MD5

        681e86c44d5f65b11eab4613008ac6fb

        SHA1

        8b404015c1281d4cf9fc5ad48bbbd6db16ccff4c

        SHA256

        4513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d

        SHA512

        fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\dfgdfg.dll
        MD5

        659d88b593d74a9349d410046689d8e5

        SHA1

        0467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e

        SHA256

        fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f

        SHA512

        e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc

      • C:\Users\Admin\AppData\Roaming\dfgdfg.exe
        MD5

        353fe18a33234c1ded48bca20817bb62

        SHA1

        3dc722103283f685444094cb9fad1a1c6c369e94

        SHA256

        373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4

        SHA512

        b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee

      • C:\Users\Admin\AppData\Roaming\rthgf.exe
        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\rthgf.exe
        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • C:\Users\Admin\AppData\Roaming\trhgdf.exe
        MD5

        c3b2c6e54f963bc305e97638a0a109aa

        SHA1

        1d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8

        SHA256

        7d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6

        SHA512

        225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621

      • C:\Users\Admin\AppData\Roaming\trhgdf.exe
        MD5

        c3b2c6e54f963bc305e97638a0a109aa

        SHA1

        1d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8

        SHA256

        7d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6

        SHA512

        225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621

      • \??\c:\programdata\sde\1_protected.exe
        MD5

        ebd99449d721ffc60e5d566a7edda104

        SHA1

        59b2a87108dedf9eb3eb3ed2d997fec1635111c9

        SHA256

        a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409

        SHA512

        13d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c

      • \??\c:\programdata\sde\2_protected.exe
        MD5

        1b18317fb169aa7d2e205e9cb3c49f78

        SHA1

        f53a05a859aedb789c7268687378c353cbc3bca0

        SHA256

        02f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf

        SHA512

        53a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc

      • \ProgramData\sde\1_protected.exe
        MD5

        ebd99449d721ffc60e5d566a7edda104

        SHA1

        59b2a87108dedf9eb3eb3ed2d997fec1635111c9

        SHA256

        a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409

        SHA512

        13d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c

      • \ProgramData\sde\2_protected.exe
        MD5

        1b18317fb169aa7d2e205e9cb3c49f78

        SHA1

        f53a05a859aedb789c7268687378c353cbc3bca0

        SHA256

        02f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf

        SHA512

        53a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • \Users\Admin\AppData\Roaming\dfgdfg.dll
        MD5

        659d88b593d74a9349d410046689d8e5

        SHA1

        0467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e

        SHA256

        fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f

        SHA512

        e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc

      • \Users\Admin\AppData\Roaming\dfgdfg.dll
        MD5

        659d88b593d74a9349d410046689d8e5

        SHA1

        0467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e

        SHA256

        fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f

        SHA512

        e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc

      • \Users\Admin\AppData\Roaming\dfgdfg.dll
        MD5

        659d88b593d74a9349d410046689d8e5

        SHA1

        0467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e

        SHA256

        fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f

        SHA512

        e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc

      • \Users\Admin\AppData\Roaming\dfgdfg.dll
        MD5

        659d88b593d74a9349d410046689d8e5

        SHA1

        0467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e

        SHA256

        fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f

        SHA512

        e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc

      • \Users\Admin\AppData\Roaming\dfgdfg.dll
        MD5

        659d88b593d74a9349d410046689d8e5

        SHA1

        0467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e

        SHA256

        fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f

        SHA512

        e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc

      • \Users\Admin\AppData\Roaming\dfgdfg.exe
        MD5

        353fe18a33234c1ded48bca20817bb62

        SHA1

        3dc722103283f685444094cb9fad1a1c6c369e94

        SHA256

        373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4

        SHA512

        b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee

      • \Users\Admin\AppData\Roaming\dfgdfg.exe
        MD5

        353fe18a33234c1ded48bca20817bb62

        SHA1

        3dc722103283f685444094cb9fad1a1c6c369e94

        SHA256

        373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4

        SHA512

        b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee

      • \Users\Admin\AppData\Roaming\rthgf.exe
        MD5

        91436878831b260b60df184b118205c8

        SHA1

        fa919ca6674d35647b8fd05e0211237bcbb7ab12

        SHA256

        b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

        SHA512

        2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

      • \Users\Admin\AppData\Roaming\trhgdf.exe
        MD5

        c3b2c6e54f963bc305e97638a0a109aa

        SHA1

        1d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8

        SHA256

        7d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6

        SHA512

        225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621

      • memory/332-81-0x0000000000000000-mapping.dmp
      • memory/332-84-0x0000000000000000-mapping.dmp
      • memory/536-67-0x0000000000000000-mapping.dmp
      • memory/536-69-0x0000000000000000-mapping.dmp
      • memory/596-60-0x0000000000000000-mapping.dmp
      • memory/596-59-0x0000000000000000-mapping.dmp
      • memory/752-54-0x0000000000000000-mapping.dmp
      • memory/752-55-0x0000000000000000-mapping.dmp
      • memory/860-44-0x0000000000000000-mapping.dmp
      • memory/860-43-0x0000000000000000-mapping.dmp
      • memory/860-42-0x0000000000000000-mapping.dmp
      • memory/1220-73-0x0000000000000000-mapping.dmp
      • memory/1220-74-0x0000000000000000-mapping.dmp
      • memory/1420-0-0x0000000005500000-0x0000000005511000-memory.dmp
        Filesize

        68KB

      • memory/1420-1-0x0000000005D00000-0x0000000005D11000-memory.dmp
        Filesize

        68KB

      • memory/1476-99-0x0000000000000000-mapping.dmp
      • memory/1476-97-0x0000000000000000-mapping.dmp
      • memory/1496-33-0x0000000000000000-mapping.dmp
      • memory/1496-34-0x0000000000000000-mapping.dmp
      • memory/1496-35-0x0000000000000000-mapping.dmp
      • memory/1532-17-0x00000000046A0000-0x00000000046B1000-memory.dmp
        Filesize

        68KB

      • memory/1532-12-0x0000000000000000-mapping.dmp
      • memory/1532-14-0x0000000000000000-mapping.dmp
      • memory/1532-16-0x00000000043E0000-0x00000000043F1000-memory.dmp
        Filesize

        68KB

      • memory/1536-92-0x0000000000000000-mapping.dmp
      • memory/1536-90-0x0000000000000000-mapping.dmp
      • memory/1620-9-0x00000000044C0000-0x00000000044D1000-memory.dmp
        Filesize

        68KB

      • memory/1620-6-0x0000000000000000-mapping.dmp
      • memory/1620-2-0x00000000000E0000-0x00000000000E1000-memory.dmp
        Filesize

        4KB

      • memory/1620-4-0x0000000000000000-mapping.dmp
      • memory/1620-8-0x0000000004120000-0x0000000004131000-memory.dmp
        Filesize

        68KB

      • memory/1676-86-0x0000000000000000-mapping.dmp
      • memory/1676-87-0x0000000000000000-mapping.dmp
      • memory/1768-82-0x0000000000000000-mapping.dmp
      • memory/1768-83-0x0000000000000000-mapping.dmp
      • memory/1860-51-0x0000000003D40000-0x0000000003FB7000-memory.dmp
        Filesize

        2.5MB

      • memory/1860-50-0x0000000000000000-mapping.dmp
      • memory/1860-48-0x0000000000000000-mapping.dmp
      • memory/1860-52-0x0000000003FC0000-0x0000000003FD1000-memory.dmp
        Filesize

        68KB

      • memory/1972-22-0x0000000000000000-mapping.dmp
      • memory/1972-20-0x0000000000000000-mapping.dmp
      • memory/1972-21-0x0000000000000000-mapping.dmp
      • memory/2024-30-0x0000000000000000-mapping.dmp
      • memory/2024-29-0x0000000000000000-mapping.dmp
      • memory/2024-28-0x0000000000000000-mapping.dmp