Analysis

  • max time kernel
    104s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    25-06-2020 10:53

General

  • Target

    SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe

  • Size

    7.9MB

  • MD5

    78632f99e8fd64fca5e8cf7ae613c674

  • SHA1

    91ec27976c60b44a9807bf713ef97ad3ad92dd1b

  • SHA256

    aeb1bfcef382789091e72e2d6cae6e471123d0e8e7a5f39c64abf5a3d9a4eaa8

  • SHA512

    921b58d21fbef6484cb79d3b8cc5cdefd88f53317f9a1f9b667512b8ae09d7cea69bed20440b0887e38f1228b06f174b5cc5be927db99f51bf9f13daa45a3b64

Malware Config

Extracted

Family

danabot

C2

92.204.160.126

37.120.145.243

195.133.147.230

185.227.138.52

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 4 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 10 IoCs
  • Executes dropped EXE 6 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\ProgramData\sde\1_protected.exe
      C:\ProgramData\sde\1_protected.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\yCwpGVx & timeout 2 & del /f /q "C:\ProgramData\sde\1_protected.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\timeout.exe
          timeout 2
          4⤵
          • Delays execution with timeout.exe
          PID:1136
    • C:\ProgramData\sde\2_protected.exe
      C:\ProgramData\sde\2_protected.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\aOueKWGp & timeout 3 & del /f /q "C:\ProgramData\sde\2_protected.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3692
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1244
    • C:\Users\Admin\AppData\Roaming\dfgdfg.exe
      dfgdfg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Roaming\dfgdfg.dll f1 C:\Users\Admin\AppData\Roaming\dfgdfg.exe@3960
        3⤵
        • Loads dropped DLL
        PID:1336
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Roaming\dfgdfg.dll,f0
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:3556
    • C:\Users\Admin\AppData\Roaming\trhgdf.exe
      trhgdf.exe
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:3908
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\saomoqqy & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"
        3⤵
          PID:752
          • C:\Windows\SysWOW64\timeout.exe
            timeout 2
            4⤵
            • Delays execution with timeout.exe
            PID:1288
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\saomoqqy & timeout 2 & del /f /q "C:\Users\Admin\AppData\Roaming\trhgdf.exe"
          3⤵
            PID:3768
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              4⤵
              • Delays execution with timeout.exe
              PID:3648
        • C:\Users\Admin\AppData\Roaming\rthgf.exe
          rthgf.exe
          2⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          PID:1616
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            PID:1328
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding
        1⤵
          PID:696

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Virtualization/Sandbox Evasion

        1
        T1497

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        Query Registry

        4
        T1012

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        4
        T1082

        Collection

        Data from Local System

        2
        T1005

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\aOueKWGp\28GLL1~1.ZIP
          MD5

          399c372f36991a8027d87c791a61c04c

          SHA1

          019149d5752f1c9812df21ed94655d1156cb26f6

          SHA256

          5b6ec7b66a2ef244f57941d1c09b37110824403e3516793dbc1bdd2c74d2e78e

          SHA512

          35e94e688351c1cb7385ec962e742640e1afd5f8488f3d3585482b3817d6072cc508b41d2e91622b2001362d8024e627cb6c23f50d05450d3195b7900f9189f6

        • C:\ProgramData\aOueKWGp\files_\SCREEN~1.JPG
          MD5

          ec2817513965dedcb802c8550c80473a

          SHA1

          dcde4f68c95988fe49bac39b246acc782de99c53

          SHA256

          0a917e78f1f6c90a35a5a8bbc87bc4cd7acb21e6d4614294c747ea05f4fc0758

          SHA512

          205dbd50d68cc07b0a03ecaea922fe47b1807cf8be362b1811dc918e893e57b9619442398e3e812d19fdd6b16c15df63dc0e0e62e318d67bc389d9770c58cf57

        • C:\ProgramData\aOueKWGp\files_\SYSTEM~1.TXT
          MD5

          dc1b31aaa1418801f000d77eff1923f5

          SHA1

          ec3c8423d219491b1343e4a2bc9ebe73db27da68

          SHA256

          2e9687109f783cb450067545c48f7795ec87ec473b976191dc290aa42450d81b

          SHA512

          de86d487fcc16617efbf42db15acc0f27eea18e02a0c80f12261b911acaef4d0b107bc8b46ec974d45702a2d86b124be4aa23644ced62d5ae0f0d9ece1eda3c2

        • C:\ProgramData\aOueKWGp\files_\files\OutClose.txt
          MD5

          ab2a6fc940b8599ba74ede77778b5ef8

          SHA1

          6ace505f0119478d47b2b96160dbed6862e5eaec

          SHA256

          e4f36a3bef23f575d48b93a0f5caea918cfe161eaae1ab918c279bc4e79ca7c9

          SHA512

          bda73bbf2deeaca30afe168b85ee56bd59ce6638c34299b5b4c99fd885a4478b6dbd5e0fa50085f11c4869d7262facd1da3fb5ff75f1e5fac9aef78173225846

        • C:\ProgramData\aOueKWGp\wYiRl1lh.txt
          MD5

          550cc6486c1ac1d65c8f1b14517a8294

          SHA1

          6f7b60b1f5b90ac815ab56c78cd7a5de05311fe1

          SHA256

          176bf49d4a7f854a30e1fb19acc33650ad5531a95bba23a9b7108b0129d15e9b

          SHA512

          eb29aefebe6d2ce5d06082c9ea8750de5cf5141e51ecc39457362bd4e8c1ec0313801f805b8b7ef6eaaf24d3e6b5d3ed2912216728ed5308165c00b17dc6f726

        • C:\ProgramData\saomoqqy\46173476.txt
          MD5

          73e2860b8c1017479c401332137b5a78

          SHA1

          9a4d70f9ae834d55fb674b85691d42c8c14ef606

          SHA256

          34b71110b2f25c75b371fb01f6d8f4afd540eac782e4da0451a71cf36cd0620b

          SHA512

          6077383e29a14180198236e045d10c96b535b5834583215541af2ba2b0214f5e78f097386d73ef9d49b894cd0208b3647f692310f1695f6c1740b3d177d2bfa9

        • C:\ProgramData\saomoqqy\8372422.txt
          MD5

          550cc6486c1ac1d65c8f1b14517a8294

          SHA1

          6f7b60b1f5b90ac815ab56c78cd7a5de05311fe1

          SHA256

          176bf49d4a7f854a30e1fb19acc33650ad5531a95bba23a9b7108b0129d15e9b

          SHA512

          eb29aefebe6d2ce5d06082c9ea8750de5cf5141e51ecc39457362bd4e8c1ec0313801f805b8b7ef6eaaf24d3e6b5d3ed2912216728ed5308165c00b17dc6f726

        • C:\ProgramData\saomoqqy\Files\_INFOR~1.TXT
          MD5

          3998cab6503e24da5060688f505d3ba7

          SHA1

          1e75fb1ef647dc418d6bfe501a27d410246d106b

          SHA256

          090362750cca7a81a9694f8a4ef666d284161f051ff784f8db12ddc01db587dc

          SHA512

          5b76645a89166774fbeab8c780e20dfc970f7eefba85265433821fb8c950d8c4c5a03bd3d868563a1074acac253411225a81b1e99778ce3b222576578ea6c0d8

        • C:\ProgramData\saomoqqy\NL_202~1.ZIP
          MD5

          95d9dda900a869f96b50b26b994ea63e

          SHA1

          302654919c231fa27085cce34e33f11a6a877313

          SHA256

          0220c3655520d78d54f438a4eb3833c21b0b26a970a3a10c61b745dfccb95477

          SHA512

          14841490aacf65160f5fb8793173a791c86431da19e9b30a5940d03ccf47f20c658ab4e1b3f4341927ff8927d1e068be02475af8a9e2fd665a56743a7baa4064

        • C:\ProgramData\sde\1_protected.exe
          MD5

          ebd99449d721ffc60e5d566a7edda104

          SHA1

          59b2a87108dedf9eb3eb3ed2d997fec1635111c9

          SHA256

          a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409

          SHA512

          13d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c

        • C:\ProgramData\sde\1_protected.exe
          MD5

          ebd99449d721ffc60e5d566a7edda104

          SHA1

          59b2a87108dedf9eb3eb3ed2d997fec1635111c9

          SHA256

          a274b98eeda10f7eaee7d756e48fa653b921432ee397440b38f2bb427c401409

          SHA512

          13d257d543e06fc799d8f550118ddce80b6ca68c58fb9900f4e8c36015dfa2cfd64cf6ec8b6db31e2d5dac331728ab26a716b5c9144c6add305ea286b9c4d92c

        • C:\ProgramData\sde\2_protected.exe
          MD5

          1b18317fb169aa7d2e205e9cb3c49f78

          SHA1

          f53a05a859aedb789c7268687378c353cbc3bca0

          SHA256

          02f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf

          SHA512

          53a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc

        • C:\ProgramData\sde\2_protected.exe
          MD5

          1b18317fb169aa7d2e205e9cb3c49f78

          SHA1

          f53a05a859aedb789c7268687378c353cbc3bca0

          SHA256

          02f7ce46e8163577dc2d3a1639d552fa9b758235e6c7540cc02b2d888672f0cf

          SHA512

          53a3e66c364a3f7734bbbc016dd3e9f87c8285ab4a173227db92a1565e76fca965ae8d8219c6ae916acd54d03e2a64b6472c877ef1c58ad82f59e8b37e76aafc

        • C:\ProgramData\yCwpGVx\7FWWSW~1.ZIP
          MD5

          6c9a2124833c88e3311c531a0dab4f28

          SHA1

          d76c45f240185ffcc37c5e163aa9aae9e2d0be02

          SHA256

          a8033219d7c1e9c94796e780525d162c83e36c3091b1186fdd71cf5d92d1b229

          SHA512

          0ff8772d38e103215b613ef097ee80980e1015ef068302a4a72295c27fda0ac6376e03bdd0f2d0cb20b0352581f8b632e262074192b744ad00cf7590412ac3a0

        • C:\ProgramData\yCwpGVx\_Files\_Files\OutClose.txt
          MD5

          ab2a6fc940b8599ba74ede77778b5ef8

          SHA1

          6ace505f0119478d47b2b96160dbed6862e5eaec

          SHA256

          e4f36a3bef23f575d48b93a0f5caea918cfe161eaae1ab918c279bc4e79ca7c9

          SHA512

          bda73bbf2deeaca30afe168b85ee56bd59ce6638c34299b5b4c99fd885a4478b6dbd5e0fa50085f11c4869d7262facd1da3fb5ff75f1e5fac9aef78173225846

        • C:\ProgramData\yCwpGVx\_Files\_INFOR~1.TXT
          MD5

          ce33210901db29890f02e1bf00012327

          SHA1

          17681b0b9cb534de457903f60af7cdfbb07126fd

          SHA256

          17f8e957425f85de70a5d073f048871b7aa513cf5f60bdcc6cdb1ff2a095f84c

          SHA512

          2a9471923602c300186daf50ced084df75a611f6e138f3a02656af61d3c2ddca02ab79e230b46cf18807c368eb03ead95efd50e62175284c7405a03577caa247

        • C:\ProgramData\yCwpGVx\_Files\_SCREE~1.JPE
          MD5

          3342e6f7222042107bc2ac2196b61256

          SHA1

          2d0d6330b64413a1774059375f535efccce26de9

          SHA256

          26dcae80ad6f22d50e87876d4f676171d1b5726f5038631341e0e8e3d1a48d05

          SHA512

          d354a0e5f374559b4ae0b227a1e25815a7d1d22466ca7197976f7d8e5e76e3a56aa1ff388388b2964c67961fd3cf626fe783c296c14cc44db8123970c7a8d8ec

        • C:\ProgramData\yCwpGVx\rH7PAxiU.txt
          MD5

          550cc6486c1ac1d65c8f1b14517a8294

          SHA1

          6f7b60b1f5b90ac815ab56c78cd7a5de05311fe1

          SHA256

          176bf49d4a7f854a30e1fb19acc33650ad5531a95bba23a9b7108b0129d15e9b

          SHA512

          eb29aefebe6d2ce5d06082c9ea8750de5cf5141e51ecc39457362bd4e8c1ec0313801f805b8b7ef6eaaf24d3e6b5d3ed2912216728ed5308165c00b17dc6f726

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4FFTI156\line[1].txt
          MD5

          550cc6486c1ac1d65c8f1b14517a8294

          SHA1

          6f7b60b1f5b90ac815ab56c78cd7a5de05311fe1

          SHA256

          176bf49d4a7f854a30e1fb19acc33650ad5531a95bba23a9b7108b0129d15e9b

          SHA512

          eb29aefebe6d2ce5d06082c9ea8750de5cf5141e51ecc39457362bd4e8c1ec0313801f805b8b7ef6eaaf24d3e6b5d3ed2912216728ed5308165c00b17dc6f726

        • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
          MD5

          91436878831b260b60df184b118205c8

          SHA1

          fa919ca6674d35647b8fd05e0211237bcbb7ab12

          SHA256

          b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

          SHA512

          2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

        • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
          MD5

          91436878831b260b60df184b118205c8

          SHA1

          fa919ca6674d35647b8fd05e0211237bcbb7ab12

          SHA256

          b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

          SHA512

          2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

        • C:\Users\Admin\AppData\Roaming\dfgdfg.dll
          MD5

          872f43427a22d22bceec47e632828589

          SHA1

          2f2ce208cb5c9c5d83de36425552fe25ff1682de

          SHA256

          424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

          SHA512

          c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

        • C:\Users\Admin\AppData\Roaming\dfgdfg.exe
          MD5

          353fe18a33234c1ded48bca20817bb62

          SHA1

          3dc722103283f685444094cb9fad1a1c6c369e94

          SHA256

          373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4

          SHA512

          b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee

        • C:\Users\Admin\AppData\Roaming\dfgdfg.exe
          MD5

          353fe18a33234c1ded48bca20817bb62

          SHA1

          3dc722103283f685444094cb9fad1a1c6c369e94

          SHA256

          373f114c758f7331607f9cb1e68de2709272b5f51e17a400bfb649af53714de4

          SHA512

          b8a23a437195e2615065eeeab5c4c69ca1af7085d4665c185475681b1b74936907b23c62bdcb1d3564b2100c76ff4cad225d3630ce70fa9854c3a6aa238228ee

        • C:\Users\Admin\AppData\Roaming\rthgf.exe
          MD5

          91436878831b260b60df184b118205c8

          SHA1

          fa919ca6674d35647b8fd05e0211237bcbb7ab12

          SHA256

          b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

          SHA512

          2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

        • C:\Users\Admin\AppData\Roaming\rthgf.exe
          MD5

          91436878831b260b60df184b118205c8

          SHA1

          fa919ca6674d35647b8fd05e0211237bcbb7ab12

          SHA256

          b2483bd1d27200966088043f9288cc01c53ae998a159391e03bb9863e17a6c9b

          SHA512

          2d4154b0a6edcfbc3fd1b2fc434a521ca0ff777c76770ddb8dc000673739e979c87404b55567d04714a22867363df391865ff471a3132c9eb44533b4300e7c92

        • C:\Users\Admin\AppData\Roaming\trhgdf.exe
          MD5

          c3b2c6e54f963bc305e97638a0a109aa

          SHA1

          1d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8

          SHA256

          7d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6

          SHA512

          225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621

        • C:\Users\Admin\AppData\Roaming\trhgdf.exe
          MD5

          c3b2c6e54f963bc305e97638a0a109aa

          SHA1

          1d423ca5f65b2fe0148e4ddaac9a3f52b13f6cf8

          SHA256

          7d62a5bfbc4f4fb9a63cfc8d4c041d41f4d91e2fb94e899a9f26503f6008e1c6

          SHA512

          225bf5fff846e1e9355e2a5888fc3bd55a20fafef27c12d5b4b94be99cc836077187b2f69164c083c65cc688757fcb3882809f66265ecccc075f65dfd9983621

        • \Users\Admin\AppData\Roaming\dfgdfg.dll
          MD5

          872f43427a22d22bceec47e632828589

          SHA1

          2f2ce208cb5c9c5d83de36425552fe25ff1682de

          SHA256

          424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

          SHA512

          c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

        • \Users\Admin\AppData\Roaming\dfgdfg.dll
          MD5

          872f43427a22d22bceec47e632828589

          SHA1

          2f2ce208cb5c9c5d83de36425552fe25ff1682de

          SHA256

          424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

          SHA512

          c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

        • \Users\Admin\AppData\Roaming\dfgdfg.dll
          MD5

          872f43427a22d22bceec47e632828589

          SHA1

          2f2ce208cb5c9c5d83de36425552fe25ff1682de

          SHA256

          424ee5f1bd26e38f9abe250044766d6c8a656c790d112400b472a0411bc81d61

          SHA512

          c35e78fa738b16ed949f6733106b356b7d34d7ab92f59f0829e7d6a1e23b65feadc8266b9aae908fa063d0a8178da3455b2284eb92a8814c3e484be7ece56b6a

        • memory/428-1-0x0000000007870000-0x0000000007871000-memory.dmp
          Filesize

          4KB

        • memory/428-0-0x0000000007070000-0x0000000007071000-memory.dmp
          Filesize

          4KB

        • memory/752-63-0x0000000000000000-mapping.dmp
        • memory/752-64-0x0000000000000000-mapping.dmp
        • memory/804-2-0x0000000000000000-mapping.dmp
        • memory/804-5-0x0000000000000000-mapping.dmp
        • memory/804-6-0x0000000004380000-0x0000000004381000-memory.dmp
          Filesize

          4KB

        • memory/804-7-0x0000000004580000-0x0000000004581000-memory.dmp
          Filesize

          4KB

        • memory/1108-12-0x0000000004700000-0x0000000004701000-memory.dmp
          Filesize

          4KB

        • memory/1108-11-0x0000000000000000-mapping.dmp
        • memory/1108-8-0x0000000000000000-mapping.dmp
        • memory/1108-13-0x0000000004900000-0x0000000004901000-memory.dmp
          Filesize

          4KB

        • memory/1136-38-0x0000000000000000-mapping.dmp
        • memory/1136-39-0x0000000000000000-mapping.dmp
        • memory/1136-41-0x0000000000000000-mapping.dmp
        • memory/1244-40-0x0000000000000000-mapping.dmp
        • memory/1244-37-0x0000000000000000-mapping.dmp
        • memory/1244-42-0x0000000000000000-mapping.dmp
        • memory/1288-70-0x0000000000000000-mapping.dmp
        • memory/1288-69-0x0000000000000000-mapping.dmp
        • memory/1328-60-0x0000000000000000-mapping.dmp
        • memory/1328-57-0x0000000000000000-mapping.dmp
        • memory/1336-52-0x0000000000000000-mapping.dmp
        • memory/1336-47-0x0000000000000000-mapping.dmp
        • memory/1556-27-0x0000000000000000-mapping.dmp
        • memory/1556-26-0x0000000000000000-mapping.dmp
        • memory/1556-23-0x0000000000000000-mapping.dmp
        • memory/1616-50-0x0000000000000000-mapping.dmp
        • memory/1616-48-0x0000000000000000-mapping.dmp
        • memory/3556-56-0x0000000000000000-mapping.dmp
        • memory/3556-58-0x0000000000000000-mapping.dmp
        • memory/3648-73-0x0000000000000000-mapping.dmp
        • memory/3648-74-0x0000000000000000-mapping.dmp
        • memory/3692-19-0x0000000000000000-mapping.dmp
        • memory/3692-20-0x0000000000000000-mapping.dmp
        • memory/3692-22-0x0000000000000000-mapping.dmp
        • memory/3768-71-0x0000000000000000-mapping.dmp
        • memory/3768-72-0x0000000000000000-mapping.dmp
        • memory/3908-43-0x0000000000000000-mapping.dmp
        • memory/3908-46-0x0000000000000000-mapping.dmp
        • memory/3960-17-0x0000000000000000-mapping.dmp
        • memory/3960-14-0x0000000000000000-mapping.dmp
        • memory/3960-31-0x0000000004630000-0x0000000004631000-memory.dmp
          Filesize

          4KB