Analysis
-
max time kernel
98s -
max time network
123s -
platform
windows7_x64 -
resource
win7 -
submitted
25-06-2020 10:53
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe
-
Size
7.9MB
-
MD5
78632f99e8fd64fca5e8cf7ae613c674
-
SHA1
91ec27976c60b44a9807bf713ef97ad3ad92dd1b
-
SHA256
aeb1bfcef382789091e72e2d6cae6e471123d0e8e7a5f39c64abf5a3d9a4eaa8
-
SHA512
921b58d21fbef6484cb79d3b8cc5cdefd88f53317f9a1f9b667512b8ae09d7cea69bed20440b0887e38f1228b06f174b5cc5be927db99f51bf9f13daa45a3b64
Malware Config
Extracted
danabot
92.204.160.126
37.120.145.243
195.133.147.230
185.227.138.52
Signatures
-
Danabot x86 payload 6 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\dfgdfg.dll family_danabot \Users\Admin\AppData\Roaming\dfgdfg.dll family_danabot \Users\Admin\AppData\Roaming\dfgdfg.dll family_danabot \Users\Admin\AppData\Roaming\dfgdfg.dll family_danabot \Users\Admin\AppData\Roaming\dfgdfg.dll family_danabot \Users\Admin\AppData\Roaming\dfgdfg.dll family_danabot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 10 IoCs
Processes:
rundll32.exeflow pid process 37 596 rundll32.exe 38 596 rundll32.exe 39 596 rundll32.exe 40 596 rundll32.exe 41 596 rundll32.exe 42 596 rundll32.exe 43 596 rundll32.exe 44 596 rundll32.exe 45 596 rundll32.exe 46 596 rundll32.exe -
Executes dropped EXE 6 IoCs
Processes:
1_protected.exe2_protected.exedfgdfg.exetrhgdf.exerthgf.exeSmartClock.exepid process 1620 1_protected.exe 1532 2_protected.exe 1860 dfgdfg.exe 536 trhgdf.exe 1536 rthgf.exe 1476 SmartClock.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\rthgf.exe vmprotect C:\Users\Admin\AppData\Roaming\rthgf.exe vmprotect C:\Users\Admin\AppData\Roaming\rthgf.exe vmprotect \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe vmprotect \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe vmprotect C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe vmprotect C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
trhgdf.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion trhgdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion trhgdf.exe -
Drops startup file 1 IoCs
Processes:
rthgf.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk rthgf.exe -
Loads dropped DLL 13 IoCs
Processes:
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exeregsvr32.exerundll32.exerthgf.exepid process 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 752 regsvr32.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1536 rthgf.exe 1536 rthgf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\trhgdf.exe themida C:\Users\Admin\AppData\Roaming\trhgdf.exe themida C:\Users\Admin\AppData\Roaming\trhgdf.exe themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
trhgdf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA trhgdf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip-api.com 9 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe1_protected.exe2_protected.exetrhgdf.exepid process 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1620 1_protected.exe 1532 2_protected.exe 1620 1_protected.exe 1532 2_protected.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 536 trhgdf.exe 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
2_protected.exe1_protected.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2_protected.exe -
Delays execution with timeout.exe 4 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exepid process 860 timeout.exe 1768 timeout.exe 1676 timeout.exe 2024 timeout.exe -
Processes:
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 1476 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rthgf.exeSmartClock.exepid process 1536 rthgf.exe 1476 SmartClock.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
1_protected.exe2_protected.exepid process 1620 1_protected.exe 1532 2_protected.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe1_protected.exe2_protected.exepid process 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1620 1_protected.exe 1532 2_protected.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe1_protected.execmd.exe2_protected.execmd.exedfgdfg.exedescription pid process target process PID 1420 wrote to memory of 1620 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1_protected.exe PID 1420 wrote to memory of 1620 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1_protected.exe PID 1420 wrote to memory of 1620 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1_protected.exe PID 1420 wrote to memory of 1620 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1_protected.exe PID 1420 wrote to memory of 1620 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1_protected.exe PID 1420 wrote to memory of 1620 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1_protected.exe PID 1420 wrote to memory of 1620 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 1_protected.exe PID 1420 wrote to memory of 1532 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 2_protected.exe PID 1420 wrote to memory of 1532 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 2_protected.exe PID 1420 wrote to memory of 1532 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 2_protected.exe PID 1420 wrote to memory of 1532 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 2_protected.exe PID 1420 wrote to memory of 1532 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 2_protected.exe PID 1420 wrote to memory of 1532 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 2_protected.exe PID 1420 wrote to memory of 1532 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe 2_protected.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1620 wrote to memory of 1972 1620 1_protected.exe cmd.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1972 wrote to memory of 2024 1972 cmd.exe timeout.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1532 wrote to memory of 1496 1532 2_protected.exe cmd.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1496 wrote to memory of 860 1496 cmd.exe timeout.exe PID 1420 wrote to memory of 1860 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe dfgdfg.exe PID 1420 wrote to memory of 1860 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe dfgdfg.exe PID 1420 wrote to memory of 1860 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe dfgdfg.exe PID 1420 wrote to memory of 1860 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe dfgdfg.exe PID 1420 wrote to memory of 1860 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe dfgdfg.exe PID 1420 wrote to memory of 1860 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe dfgdfg.exe PID 1420 wrote to memory of 1860 1420 SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe dfgdfg.exe PID 1860 wrote to memory of 752 1860 dfgdfg.exe regsvr32.exe PID 1860 wrote to memory of 752 1860 dfgdfg.exe regsvr32.exe PID 1860 wrote to memory of 752 1860 dfgdfg.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\sde\1_protected.exeC:\ProgramData\sde\1_protected.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\EIKf23RV & timeout 2 & del /f /q "C:\ProgramData\sde\1_protected.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
-
C:\ProgramData\sde\2_protected.exeC:\ProgramData\sde\2_protected.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\NUpU62jUB & timeout 3 & del /f /q "C:\ProgramData\sde\2_protected.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\dfgdfg.exedfgdfg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Roaming\dfgdfg.dll f1 C:\Users\Admin\AppData\Roaming\dfgdfg.exe@18603⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Roaming\dfgdfg.dll,f04⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\trhgdf.exetrhgdf.exe2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\vuyahxnmkkwag & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\vuyahxnmkkwag & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\rthgf.exerthgf.exe2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\EIKf23RV\VJ6MYO~1.ZIPMD5
d6f3c5bd64f0a610dc90e7b3efcf4a91
SHA1a94cb18332571bf4c41878283f24c4f362ae5ebf
SHA2562f4c8a5dfd25f6f81d97d33b728c4adec880a4f9f8df4645d9e08c55cf38fc7e
SHA512591c753e078e8e84e636da8e28d5a8932e26774bbabdee0760f21a8dd0d063ff6645e97330cde73acb3754575c485251d226c5f6608b31187258f51c8817d662
-
C:\ProgramData\EIKf23RV\_Files\_INFOR~1.TXTMD5
a07ecc2af591f3856c3eea3a3099d922
SHA1bb1647a07bd696effa8f1b8b99fbacc95f21409f
SHA256e12bcd1c941514dd515c9cafb7508c60fca38fc7f0ce9006247ddac82cfa5d5b
SHA51225911931e3f0c69a043df512dbdd8ec3abb388b9886963b9cb953e30452f422598873979c13c5504c5872d229b87e393f2b0cdce6145e3ff237b2c4b745a751c
-
C:\ProgramData\EIKf23RV\_Files\_SCREE~1.JPEMD5
835bd88e318bbc65cbf60d77d33b5704
SHA101dfb2c15ab2a5b5a6c0507ba0cf47c426c64c84
SHA256777d576204cae31c182da29d24d1f35799d7647d618e16b8cce68e8cc1fc1f93
SHA5121abdbb10597b1b22e237500e5190cad58f0fb9d17552c65520c9d5c999e55994e5b6be51cb77dcf93a60595712a6e39798c6d7227b39412579a199d5389ba193
-
C:\ProgramData\NUpU62jUB\BJQMII~1.ZIPMD5
af3007e908f9c58e5cf439fdcf69981c
SHA10c866855035257f4475235e0013faeeeafa06ff9
SHA25644b1d653810843059f73984a39cb62aaf1ddee44a71ef8de0addbfcb03426f89
SHA512fdce08a5cebe364d7326761703c866dc013103fb4984a8a65e0e27d3b0f6fba8b04c2e7b2fc7ba75cdf7929446d122fc5823ad86e723502143db46e7d128e8bd
-
C:\ProgramData\NUpU62jUB\CHuCD.txtMD5
681e86c44d5f65b11eab4613008ac6fb
SHA18b404015c1281d4cf9fc5ad48bbbd6db16ccff4c
SHA2564513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d
SHA512fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0
-
C:\ProgramData\NUpU62jUB\files_\SCREEN~1.JPGMD5
f11d65b23b3b280d479daf092608cd8b
SHA1a89ab7ca8ecfb1ad0732cff2e3e0ac5e0ad98af2
SHA256079786920d9d6ed3d63ffbcbc4fdd2d2c5f401560c8a12fa178030698cfb3f55
SHA5125d348a5e35a87b056c7cbc0e0a86b229eabb09b349cf9d6203cea75cb450491b93effcd02376cdf822bba9a101951741771d3ce61f1d70579f4fc7cfdd5cd472
-
C:\ProgramData\NUpU62jUB\files_\SYSTEM~1.TXTMD5
4959d03161f2af9d33cdf3ba242a35fd
SHA1c1bf289fbfe2ec1533e2acd5beba0f0acfaaba06
SHA256a31f889943f12177de85287a8f34418dab2e3ed86125f0ca673f3ddb61623f81
SHA512c215c2499a2d176e81714bdcea831b035329ddbd9aaf84a09a8ee18272ff2d72c5a36e145f9240d31fd3c6e2f7f1a9855e2d4f8635f1acf848a777331c828607
-
C:\ProgramData\sde\1_protected.exeMD5
ebd99449d721ffc60e5d566a7edda104
SHA159b2a87108dedf9eb3eb3ed2d997fec1635111c9
SHA256a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409
SHA51213d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c
-
C:\ProgramData\sde\2_protected.exeMD5
1b18317fb169aa7d2e205e9cb3c49f78
SHA1f53a05a859aedb789c7268687378c353cbc3bca0
SHA25602f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf
SHA51253a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc
-
C:\ProgramData\vuyahxnmkkwag\46173476.txtMD5
a00950727569937544fcefaff57c2acd
SHA11db8cb9756c04fdf911a22d925b1e206a93419f2
SHA256f1fc5896844b87c715f3f68aed120fa261045618bb8df765d20b4b1c4891b495
SHA512a5700deb59919f6010782d00d639df70f4910f8169397122749a8b48efd46af1f8e1467643767750adaef4b45fb5819bae155f4530a66b7c3de66342cde98be5
-
C:\ProgramData\vuyahxnmkkwag\8372422.txtMD5
681e86c44d5f65b11eab4613008ac6fb
SHA18b404015c1281d4cf9fc5ad48bbbd6db16ccff4c
SHA2564513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d
SHA512fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0
-
C:\ProgramData\vuyahxnmkkwag\Files\_INFOR~1.TXTMD5
3dc3d62cfda0b0795c7be85bd086388d
SHA19cf5d54cefd565bac00e17e20c525d98eff3f764
SHA256e0422ca8d5420c4cfb236f4a0560d3dbe150b64f1ae298afba2ecf591c843940
SHA5127ead0b059d06704aacc1021cc57183a780646781f5d664a59f0685ffafea6a0c3a094fad766990c8e8c0dc2952ed87b6d04c55e02ea27a632187c24e24bb7598
-
C:\ProgramData\vuyahxnmkkwag\NL_202~1.ZIPMD5
06cec905820c65024f74d473627c7c3b
SHA1aa19234a0bc6990af59e9ec93efba68975987574
SHA256f5cd949c51b88a26f96123fa2c3816a3790501485704bb7c39c53551bffcfcd4
SHA512a299a405d1c437e4851e9965d8298c985f28d53635d3e917a7ef2c4191d04e97d587973d3909c37a1fde86493651bf38a8d7ed6c7932c4bd372b5d83eb4ccf69
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZQ107GEP\line[2].txtMD5
681e86c44d5f65b11eab4613008ac6fb
SHA18b404015c1281d4cf9fc5ad48bbbd6db16ccff4c
SHA2564513bce79a3e5dd52833962e18e28021052ce284504bc201cc7efaf627342d4d
SHA512fdfd791d3fc4150c4ed12792cabac523bfd6d1ab6483138a60fb20f8ecd87d553c37162f4f644ca3860fabc61bbaaeea4dafec0da4367175fe015c979e5d9ba0
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
91436878831b260b60df184b118205c8
SHA1fa919ca6674d35647b8fd05e0211237bcbb7ab12
SHA256b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b
SHA5122d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
91436878831b260b60df184b118205c8
SHA1fa919ca6674d35647b8fd05e0211237bcbb7ab12
SHA256b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b
SHA5122d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92
-
C:\Users\Admin\AppData\Roaming\dfgdfg.dllMD5
659d88b593d74a9349d410046689d8e5
SHA10467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e
SHA256fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f
SHA512e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc
-
C:\Users\Admin\AppData\Roaming\dfgdfg.exeMD5
353fe18a33234c1ded48bca20817bb62
SHA13dc722103283f685444094cb9fad1a1c6c369e94
SHA256373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4
SHA512b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee
-
C:\Users\Admin\AppData\Roaming\rthgf.exeMD5
91436878831b260b60df184b118205c8
SHA1fa919ca6674d35647b8fd05e0211237bcbb7ab12
SHA256b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b
SHA5122d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92
-
C:\Users\Admin\AppData\Roaming\rthgf.exeMD5
91436878831b260b60df184b118205c8
SHA1fa919ca6674d35647b8fd05e0211237bcbb7ab12
SHA256b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b
SHA5122d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92
-
C:\Users\Admin\AppData\Roaming\trhgdf.exeMD5
c3b2c6e54f963bc305e97638a0a109aa
SHA11d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8
SHA2567d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6
SHA512225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621
-
C:\Users\Admin\AppData\Roaming\trhgdf.exeMD5
c3b2c6e54f963bc305e97638a0a109aa
SHA11d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8
SHA2567d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6
SHA512225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621
-
\??\c:\programdata\sde\1_protected.exeMD5
ebd99449d721ffc60e5d566a7edda104
SHA159b2a87108dedf9eb3eb3ed2d997fec1635111c9
SHA256a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409
SHA51213d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c
-
\??\c:\programdata\sde\2_protected.exeMD5
1b18317fb169aa7d2e205e9cb3c49f78
SHA1f53a05a859aedb789c7268687378c353cbc3bca0
SHA25602f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf
SHA51253a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc
-
\ProgramData\sde\1_protected.exeMD5
ebd99449d721ffc60e5d566a7edda104
SHA159b2a87108dedf9eb3eb3ed2d997fec1635111c9
SHA256a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409
SHA51213d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c
-
\ProgramData\sde\2_protected.exeMD5
1b18317fb169aa7d2e205e9cb3c49f78
SHA1f53a05a859aedb789c7268687378c353cbc3bca0
SHA25602f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf
SHA51253a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc
-
\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
91436878831b260b60df184b118205c8
SHA1fa919ca6674d35647b8fd05e0211237bcbb7ab12
SHA256b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b
SHA5122d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92
-
\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
91436878831b260b60df184b118205c8
SHA1fa919ca6674d35647b8fd05e0211237bcbb7ab12
SHA256b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b
SHA5122d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92
-
\Users\Admin\AppData\Roaming\dfgdfg.dllMD5
659d88b593d74a9349d410046689d8e5
SHA10467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e
SHA256fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f
SHA512e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc
-
\Users\Admin\AppData\Roaming\dfgdfg.dllMD5
659d88b593d74a9349d410046689d8e5
SHA10467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e
SHA256fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f
SHA512e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc
-
\Users\Admin\AppData\Roaming\dfgdfg.dllMD5
659d88b593d74a9349d410046689d8e5
SHA10467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e
SHA256fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f
SHA512e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc
-
\Users\Admin\AppData\Roaming\dfgdfg.dllMD5
659d88b593d74a9349d410046689d8e5
SHA10467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e
SHA256fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f
SHA512e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc
-
\Users\Admin\AppData\Roaming\dfgdfg.dllMD5
659d88b593d74a9349d410046689d8e5
SHA10467f5ba5f21ac6ac618a7ac3a24e14cc99eef2e
SHA256fa23608138a370733034d40cdf40f994834a78ccd4bd8e69341d40963e2a270f
SHA512e09168b9ca47a60748c026f015b66464a53bcf09e43153c50ad6ea7b687964c01cb52b01d47b0864ac35af662dda721dd98ed925e1817f75a88f2012241531cc
-
\Users\Admin\AppData\Roaming\dfgdfg.exeMD5
353fe18a33234c1ded48bca20817bb62
SHA13dc722103283f685444094cb9fad1a1c6c369e94
SHA256373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4
SHA512b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee
-
\Users\Admin\AppData\Roaming\dfgdfg.exeMD5
353fe18a33234c1ded48bca20817bb62
SHA13dc722103283f685444094cb9fad1a1c6c369e94
SHA256373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4
SHA512b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee
-
\Users\Admin\AppData\Roaming\rthgf.exeMD5
91436878831b260b60df184b118205c8
SHA1fa919ca6674d35647b8fd05e0211237bcbb7ab12
SHA256b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b
SHA5122d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92
-
\Users\Admin\AppData\Roaming\trhgdf.exeMD5
c3b2c6e54f963bc305e97638a0a109aa
SHA11d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8
SHA2567d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6
SHA512225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621
-
memory/332-81-0x0000000000000000-mapping.dmp
-
memory/332-84-0x0000000000000000-mapping.dmp
-
memory/536-67-0x0000000000000000-mapping.dmp
-
memory/536-69-0x0000000000000000-mapping.dmp
-
memory/596-60-0x0000000000000000-mapping.dmp
-
memory/596-59-0x0000000000000000-mapping.dmp
-
memory/752-54-0x0000000000000000-mapping.dmp
-
memory/752-55-0x0000000000000000-mapping.dmp
-
memory/860-44-0x0000000000000000-mapping.dmp
-
memory/860-43-0x0000000000000000-mapping.dmp
-
memory/860-42-0x0000000000000000-mapping.dmp
-
memory/1220-73-0x0000000000000000-mapping.dmp
-
memory/1220-74-0x0000000000000000-mapping.dmp
-
memory/1420-0-0x0000000005500000-0x0000000005511000-memory.dmpFilesize
68KB
-
memory/1420-1-0x0000000005D00000-0x0000000005D11000-memory.dmpFilesize
68KB
-
memory/1476-99-0x0000000000000000-mapping.dmp
-
memory/1476-97-0x0000000000000000-mapping.dmp
-
memory/1496-33-0x0000000000000000-mapping.dmp
-
memory/1496-34-0x0000000000000000-mapping.dmp
-
memory/1496-35-0x0000000000000000-mapping.dmp
-
memory/1532-17-0x00000000046A0000-0x00000000046B1000-memory.dmpFilesize
68KB
-
memory/1532-12-0x0000000000000000-mapping.dmp
-
memory/1532-14-0x0000000000000000-mapping.dmp
-
memory/1532-16-0x00000000043E0000-0x00000000043F1000-memory.dmpFilesize
68KB
-
memory/1536-92-0x0000000000000000-mapping.dmp
-
memory/1536-90-0x0000000000000000-mapping.dmp
-
memory/1620-9-0x00000000044C0000-0x00000000044D1000-memory.dmpFilesize
68KB
-
memory/1620-6-0x0000000000000000-mapping.dmp
-
memory/1620-2-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/1620-4-0x0000000000000000-mapping.dmp
-
memory/1620-8-0x0000000004120000-0x0000000004131000-memory.dmpFilesize
68KB
-
memory/1676-86-0x0000000000000000-mapping.dmp
-
memory/1676-87-0x0000000000000000-mapping.dmp
-
memory/1768-82-0x0000000000000000-mapping.dmp
-
memory/1768-83-0x0000000000000000-mapping.dmp
-
memory/1860-51-0x0000000003D40000-0x0000000003FB7000-memory.dmpFilesize
2.5MB
-
memory/1860-50-0x0000000000000000-mapping.dmp
-
memory/1860-48-0x0000000000000000-mapping.dmp
-
memory/1860-52-0x0000000003FC0000-0x0000000003FD1000-memory.dmpFilesize
68KB
-
memory/1972-22-0x0000000000000000-mapping.dmp
-
memory/1972-20-0x0000000000000000-mapping.dmp
-
memory/1972-21-0x0000000000000000-mapping.dmp
-
memory/2024-30-0x0000000000000000-mapping.dmp
-
memory/2024-29-0x0000000000000000-mapping.dmp
-
memory/2024-28-0x0000000000000000-mapping.dmp