Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-03-2021 13:54
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe
-
Size
9KB
-
MD5
f8372b779001bb5a6c401c657ee514ed
-
SHA1
a053936768d122d397326eb905d7e49b14dd4a88
-
SHA256
2c2d88dbff1f9196148cc3c7501d4c45b05ef51887651b3bcdbb111fcc7a2ba2
-
SHA512
ecf6af25303e73dc5aba38861a871ed473db3f20f2f43f160a08e014c81910b0439f516401758540151abe148b59afb86b9e59eb4452f3c52a90b01666c84c0c
Malware Config
Extracted
raccoon
c46f13f8aadc028907d65c627fd9163161661f6c
-
url4cnc
https://telete.in/capibar
Extracted
raccoon
2ce901d964b370c5ccda7e4d68354ba040db8218
-
url4cnc
https://telete.in/tomarsjsmith3
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 15 IoCs
Processes:
inXz692BB7iMhOEXryRQDO4J.exe02115431061.exe02115431061.exe83206830240.exe02115431061.exeUTAFs3TXHaFyVbWwGZONIQlN.exeRhuZWgzmPkb6yRgohtTyNirG.exesOm8QnNmldowDPs0hokSAUGM.exePMd7C9iDrwyLI3Akkdiv9Z7z.exerQAZbxmIYewqk3gHkal4qPq4.exeShoNkaAL7dwOsJPQlQS20JJJ.exeRFOSIq8OzgcFVe0MjNvBGs96.exeGSRuiO3v6Xr5a6qjT7gmqupd.exeUTAFs3TXHaFyVbWwGZONIQlN.exeShoNkaAL7dwOsJPQlQS20JJJ.exepid process 344 inXz692BB7iMhOEXryRQDO4J.exe 2076 02115431061.exe 2120 02115431061.exe 2180 83206830240.exe 2328 02115431061.exe 2476 UTAFs3TXHaFyVbWwGZONIQlN.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2464 sOm8QnNmldowDPs0hokSAUGM.exe 2536 PMd7C9iDrwyLI3Akkdiv9Z7z.exe 2588 rQAZbxmIYewqk3gHkal4qPq4.exe 2608 ShoNkaAL7dwOsJPQlQS20JJJ.exe 2628 RFOSIq8OzgcFVe0MjNvBGs96.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2700 UTAFs3TXHaFyVbWwGZONIQlN.exe 2784 ShoNkaAL7dwOsJPQlQS20JJJ.exe -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 35 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.execmd.exe02115431061.execmd.exe02115431061.exeUTAFs3TXHaFyVbWwGZONIQlN.exeRhuZWgzmPkb6yRgohtTyNirG.exeGSRuiO3v6Xr5a6qjT7gmqupd.exeWerFault.exepid process 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1436 cmd.exe 1436 cmd.exe 2076 02115431061.exe 2136 cmd.exe 2136 cmd.exe 2120 02115431061.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe 2700 UTAFs3TXHaFyVbWwGZONIQlN.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 6920 WerFault.exe 6920 WerFault.exe 6920 WerFault.exe 6920 WerFault.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zmcm1ZZLJm6qqt7OkmNVVJRlDpwngb2P = "C:\\Users\\Admin\\Documents\\Ln1EpcY3RqCLePNmhr8j95Ps.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\EOMugK6e3AQz2DdS0VWAPLF7Mv1hPaW4 = "C:\\Users\\Admin\\Documents\\CEo18WJRb6LsXFFucDnuFHJ9.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\OQQB2ay7PcJS6MlE9gDKK3YRyorS6gCI = "C:\\Users\\Admin\\Documents\\czKfvebbQCrwm1nZCa55rTqU.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\HfJ4lznU8SZhEox1wdGo5gu2faXiFj8o = "C:\\Users\\Admin\\Documents\\ojCpupQFI6jde0siRvFk89w7.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\2yaTTbgGDUkNOPoIHRd1eAyim5PQMvmK = "C:\\Users\\Admin\\Documents\\JvVrQillB3ANIhQ95VeeA9CM.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\QmqRWKD6hE6Ykj2eLxNMhUXhDZx0Jwba = "C:\\Users\\Admin\\Documents\\cUoGctyDobcrNUBj5xTypBnN.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\x4ikAo2TLJ2jpkxcXerN0OARhDBZdKFz = "C:\\Users\\Admin\\Documents\\viiYPSpF4OH9UGOtBB5wZ5FW.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\pcM7kle1Qdj9aOMKK6XHhYGeoxzgfv69 = "C:\\Users\\Admin\\Documents\\8scWeiXO8aQRPgZrJ968E9Iu.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\H2V6898xrRcTSyNyCCmnr2L7vbnm0b2W = "C:\\Users\\Admin\\Documents\\GPkKRM225LepODFsbBHLrtql.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\R2g0tBJJO6DqlLKMq0IwxUpVg3th8q1X = "C:\\Users\\Admin\\Documents\\UoIV7wSG4c0pPgdHVWtzH6Xd.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\zlDTN3vpv2z1eU3TPliJ6n0rpBYR8eG6 = "C:\\Users\\Admin\\Documents\\WhbjdgBiWz1Y0ZyII284YaVL.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\U52PIxfbf5agRO0DbP4eECxv1qCVpEvI = "C:\\Users\\Admin\\Documents\\UPS4FaBAUrINMzKagMWekL0k.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\jH4NujPYCfxBAdxauq5Lx6yFWG1TcpZ9 = "C:\\Users\\Admin\\Documents\\ZVqlmV15ftzwWGzgNof7vZgV.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\f20NjVw46wNM7ujUvZ1kbjq1reLV8Anm = "C:\\Users\\Admin\\Documents\\HRhoNa33LkNKwGxeKLYfheeE.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\I2GbU3JKQW38rHohJbLqVCZA1fUth5ee = "C:\\Users\\Admin\\Documents\\NYNObUypCO9DLvNTnD4U7sit.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\UuNkNu1NUK4yDZkmPO8SyQbwrK41PL2P = "C:\\Users\\Admin\\Documents\\Y3N0uvFqRerDtqpQc4tyUIZU.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\12IcA8M3LlWyNoQLR2Py0JiUl7ezFTDw = "C:\\Users\\Admin\\Documents\\msoo7Tz02MdVrF9GaYRs7zll.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\YeCmyJJAtHhjfIc0ED9AqlcFLujEeX3l = "C:\\Users\\Admin\\Documents\\dkIOhH4kD5fb5bOwYFasN2eQ.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\PbnA5TzAQMeQJpeFkIJi6AyFVxNnYvk0 = "C:\\Users\\Admin\\Documents\\RKXK1BjUx6S7Ios3mKcF6bZU.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\alpbsgMO2UKDZio8vYyqEFL16DdCvYmh = "C:\\Users\\Admin\\Documents\\Drp64fR05nDgdQLe5iDUngaL.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZbAohoUJF41xnTVj928qg34YYQ9XcAFN = "C:\\Users\\Admin\\Documents\\1Tzn4OUigVksLzCFAfLPBoxz.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\zak3RLwIYEurlo3ccB2AMFIxOMPOOix4 = "C:\\Users\\Admin\\Documents\\42jbIgg4C6xeUT2S5GoRS9BP.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\sSEUZA4MuUPgJYjd3qb7c8p4NorBuNwL = "C:\\Users\\Admin\\Documents\\3hb47vzrVVdyCXm6xt5PsstX.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\L1YWAY9D6s20ULGEBPW287Nk1KYpUQJd = "C:\\Users\\Admin\\Documents\\KjRV3q8tfbujP2Qb8l5ycrA4.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\1fAZ7moOY0RtgWkVzr4M7l5EdSpzFgEv = "C:\\Users\\Admin\\Documents\\8OUj0ls7OkBzgRelQgpIfNRF.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\LDR8DLcf58bYCGxAtUdBEL3C0QmObXYv = "C:\\Users\\Admin\\Documents\\nZLZxlwqvOwSPcAqhqza82vk.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cb37ibMJe2agXEn0ITnJrp7SEdkhD3Fq = "C:\\Users\\Admin\\Documents\\G9E986EGCSRoJ3zD6yLLLZR3.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ek2F0pFlwtyNHGxBvCDjeqzvxrWt0N4j = "C:\\Users\\Admin\\Documents\\rK6gDHilFHKQcTq2KUC1wILW.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\w619olKt7pPLSb2ZukrTpBpbgAv03HrB = "C:\\Users\\Admin\\Documents\\PiWuYfrGsgi267Ejq1uVENsI.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\CO33cXPo37fIyxBS1sgNLrZEEQanEnDp = "C:\\Users\\Admin\\Documents\\SuwvFaFwp1FaXpx8Sru3mnfQ.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\pT5x1CeQB0PSpyDM4OwrCQhQD97Siwqr = "C:\\Users\\Admin\\Documents\\MDQMp7kmUd1juBsIHvMQ5eMW.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\CltRiEjcKxA8lQCCpius3GGb6zXlRQ5G = "C:\\Users\\Admin\\Documents\\kbT9XUhSOyyRA8HvgfynbdSL.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\rMHGxFyJEgtPbLvW16QL9zItLaISgaiG = "C:\\Users\\Admin\\Documents\\mJ7uetZNZk8w1a3PHg3Jygb2.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzAdX7wbWSkoh0ccjYPZliy8XZjh5e9k = "C:\\Users\\Admin\\Documents\\LVAJfgx56tf5f5Lc4fEaPlZ2.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\FMhmHXsOpMnr1iyKHJWyPWH0CFrwqAwo = "C:\\Users\\Admin\\Documents\\jjChXNlZ5CFcTIKGJKaDo48g.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\RKGKEdYzXOmuVQIENjwmCMbpprQYsgdR = "C:\\Users\\Admin\\Documents\\zEBuivPhRwXKpbYYLYP54hQW.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\CysCVDniH5ogOwokydSqCl4Pb25Upwti = "C:\\Users\\Admin\\Documents\\IQwvJdCVEq7QkVd00DMPzjGM.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\r3M30jPd0zqEqYQXUM4Kjl7BwP5QV84T = "C:\\Users\\Admin\\Documents\\n6Ck0Zn3plZqzOsW0fGhCUpo.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\5yf3cZbe7lxdE13T7LVTTFgBjhVCFFe8 = "C:\\Users\\Admin\\Documents\\nOoHULc4jB52ns8Z4MwpipdB.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zio8N4h8sBezjDq7kqHaDj21EfVw2a5Q = "C:\\Users\\Admin\\Documents\\UMFc2zRNjsIfUqqcaXAgNDZf.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\3xdB2CO3YTRYtyx7o4zQgxXIV34lzYLB = "C:\\Users\\Admin\\Documents\\B6u0SIrL02shUvjVZuTbW9Y6.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\VMxnhy36K4d5ttpYC2BALXKqfc1nGsAv = "C:\\Users\\Admin\\Documents\\Koj6gY30CPaHc9pTqE0EoZNu.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\igSIQakgYDAn1tF10KBb4vBUcXTeFb6C = "C:\\Users\\Admin\\Documents\\3hF2pImJviklufP9mhewc1Wu.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\7RvxMdHsmD8fYuZuQdOWmli0shxCUPmo = "C:\\Users\\Admin\\Documents\\CejaA12EXq6eclMmzD4OQX3N.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\DnVdS4GOOv0UvHeSBYsiyyLVaYSmxWYX = "C:\\Users\\Admin\\Documents\\XN7lUi2HuioLhttZ6RoRdAgD.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\dy4P8C2WTUO2xN0mcjQWdwTAM4ybJcje = "C:\\Users\\Admin\\Documents\\qusH9GUmP1neMow8cY0HxMXb.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\nnjY16fsOQGQoleUQLiN1wrPzXOwGEeF = "C:\\Users\\Admin\\Documents\\HXVCTaih9u47TpgW9rdOmCuJ.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\eMp2gV2yZv0raKLEajWTvThQHsd0laec = "C:\\Users\\Admin\\Documents\\LtOxf9EDCbo7TDJ00kp3ssYL.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\vlvYxlJcPjIS7vq4nB3xO1fwidr6J5zQ = "C:\\Users\\Admin\\Documents\\kaa9XO8ze5AUgIaBDmZE9Tjo.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\owa1qOyRPcJT8iiU8XScUpsGqhOtM14h = "C:\\Users\\Admin\\Documents\\5Nx7ZmgczE2zaAAsRPuEXXM5.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\8sb44u63nxmpkmRPB2Qxw19Thr9zZO7X = "C:\\Users\\Admin\\Documents\\um7iGbGZHpYP9HzHC7SdmW2Q.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\rRyYuFLJ0sExNs3NrlGNocFc1aR1QW9I = "C:\\Users\\Admin\\Documents\\XAqUATOJ75HbEL1CtWhc2Pdr.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\uZhv6HaWiYF68IzMQzvfXtBuVegGpH3K = "C:\\Users\\Admin\\Documents\\ea2kxkEXgne6XY1eHKGcrUY2.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\FFKOLMKMfaiyvVHFCfKPZy22Am0yTxAZ = "C:\\Users\\Admin\\Documents\\YYqs7j5dWjuoSYOfG6rKD8vT.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\K7hSLtgcdAAr1dRF1jTsiFftl1vf8ACX = "C:\\Users\\Admin\\Documents\\9Pv4KDjiRcl7VascESy14ltu.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\SvkMFJ1vxwrRbLj1BN1xgSHUZ23ZSNua = "C:\\Users\\Admin\\Documents\\29kIgwpOFW60vEreyJHRecGO.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\6fcyiB52PrtIpx4QRVbntaOAaeAIPgb2 = "C:\\Users\\Admin\\Documents\\PRbn6H9kEsWOFZbbtHY6RW19.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\gUvkujzlxUJAfV1vn7OZ4eUFMJcHa2OW = "C:\\Users\\Admin\\Documents\\pLJgT0W7UKHsub3JbEe8KSUT.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Oa1uO3AFms41m5iihAWk8UyjlOQAd9lS = "C:\\Users\\Admin\\Documents\\OVzXa0wTtLbKxubxlacFF5cL.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\5KGeNW3UIMgOKIPTxGiK49oONn62KIqt = "C:\\Users\\Admin\\Documents\\NL5Y1e9ZNtWaNNaRjju73e2i.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\wQkfaZDhn1PIQQi2fyHO9E4JoDJvP9r7 = "C:\\Users\\Admin\\Documents\\FtnPg5ZBNyLjtkoQ9gclnHgw.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\k40xHaYF0XU0Ys2HHJUoh49yy41WYV0G = "C:\\Users\\Admin\\Documents\\gRBxew42dZcOAD2jCrLMnZTP.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctRAesC9mbzO2vTWeVMoFAkfZ1ZksMVH = "C:\\Users\\Admin\\Documents\\CeKuxohVSkFQdQ8CGq3DZ555.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\yyaHvtzb2B6eaxMe7UJAPNEvflVhX3Zi = "C:\\Users\\Admin\\Documents\\2YswBUXcbopoCOmOzqsTaTnZ.exe" SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
02115431061.exe02115431061.exeUTAFs3TXHaFyVbWwGZONIQlN.exeShoNkaAL7dwOsJPQlQS20JJJ.exedescription pid process target process PID 2076 set thread context of 2120 2076 02115431061.exe 02115431061.exe PID 2120 set thread context of 2328 2120 02115431061.exe 02115431061.exe PID 2476 set thread context of 2700 2476 UTAFs3TXHaFyVbWwGZONIQlN.exe UTAFs3TXHaFyVbWwGZONIQlN.exe PID 2608 set thread context of 2784 2608 ShoNkaAL7dwOsJPQlQS20JJJ.exe ShoNkaAL7dwOsJPQlQS20JJJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6920 2328 WerFault.exe 02115431061.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
UTAFs3TXHaFyVbWwGZONIQlN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UTAFs3TXHaFyVbWwGZONIQlN.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UTAFs3TXHaFyVbWwGZONIQlN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UTAFs3TXHaFyVbWwGZONIQlN.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
83206830240.exeRhuZWgzmPkb6yRgohtTyNirG.exeGSRuiO3v6Xr5a6qjT7gmqupd.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 83206830240.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RhuZWgzmPkb6yRgohtTyNirG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RhuZWgzmPkb6yRgohtTyNirG.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GSRuiO3v6Xr5a6qjT7gmqupd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GSRuiO3v6Xr5a6qjT7gmqupd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 83206830240.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2520 timeout.exe 2644 timeout.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 2252 taskkill.exe 944 taskkill.exe 872 taskkill.exe -
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exeinXz692BB7iMhOEXryRQDO4J.exe02115431061.exeGSRuiO3v6Xr5a6qjT7gmqupd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 inXz692BB7iMhOEXryRQDO4J.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 02115431061.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 GSRuiO3v6Xr5a6qjT7gmqupd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 inXz692BB7iMhOEXryRQDO4J.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 02115431061.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 GSRuiO3v6Xr5a6qjT7gmqupd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
RhuZWgzmPkb6yRgohtTyNirG.exeGSRuiO3v6Xr5a6qjT7gmqupd.exepid process 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 2484 RhuZWgzmPkb6yRgohtTyNirG.exe 2660 GSRuiO3v6Xr5a6qjT7gmqupd.exe 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exepid process 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
rQAZbxmIYewqk3gHkal4qPq4.exePMd7C9iDrwyLI3Akkdiv9Z7z.exepid process 2588 rQAZbxmIYewqk3gHkal4qPq4.exe 2588 rQAZbxmIYewqk3gHkal4qPq4.exe 2588 rQAZbxmIYewqk3gHkal4qPq4.exe 2536 PMd7C9iDrwyLI3Akkdiv9Z7z.exe 2536 PMd7C9iDrwyLI3Akkdiv9Z7z.exe 2536 PMd7C9iDrwyLI3Akkdiv9Z7z.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
UTAFs3TXHaFyVbWwGZONIQlN.exepid process 2700 UTAFs3TXHaFyVbWwGZONIQlN.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exetaskkill.exerQAZbxmIYewqk3gHkal4qPq4.exetaskkill.exetaskkill.exePMd7C9iDrwyLI3Akkdiv9Z7z.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeLoadDriverPrivilege 2588 rQAZbxmIYewqk3gHkal4qPq4.exe Token: SeLoadDriverPrivilege 2588 rQAZbxmIYewqk3gHkal4qPq4.exe Token: SeLoadDriverPrivilege 2588 rQAZbxmIYewqk3gHkal4qPq4.exe Token: SeDebugPrivilege 872 taskkill.exe Token: SeDebugPrivilege 944 taskkill.exe Token: SeLoadDriverPrivilege 2536 PMd7C9iDrwyLI3Akkdiv9Z7z.exe Token: SeLoadDriverPrivilege 2536 PMd7C9iDrwyLI3Akkdiv9Z7z.exe Token: SeLoadDriverPrivilege 2536 PMd7C9iDrwyLI3Akkdiv9Z7z.exe Token: SeDebugPrivilege 6920 WerFault.exe Token: SeShutdownPrivilege 1272 -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
pid process 1272 1272 1272 1272 1272 1272 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1272 1272 1272 1272 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exeinXz692BB7iMhOEXryRQDO4J.execmd.exe02115431061.execmd.execmd.exe02115431061.exedescription pid process target process PID 1632 wrote to memory of 344 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe inXz692BB7iMhOEXryRQDO4J.exe PID 1632 wrote to memory of 344 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe inXz692BB7iMhOEXryRQDO4J.exe PID 1632 wrote to memory of 344 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe inXz692BB7iMhOEXryRQDO4J.exe PID 1632 wrote to memory of 344 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe inXz692BB7iMhOEXryRQDO4J.exe PID 344 wrote to memory of 1436 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 1436 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 1436 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 1436 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 1436 wrote to memory of 2076 1436 cmd.exe 02115431061.exe PID 1436 wrote to memory of 2076 1436 cmd.exe 02115431061.exe PID 1436 wrote to memory of 2076 1436 cmd.exe 02115431061.exe PID 1436 wrote to memory of 2076 1436 cmd.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 2076 wrote to memory of 2120 2076 02115431061.exe 02115431061.exe PID 344 wrote to memory of 2136 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 2136 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 2136 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 2136 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 2136 wrote to memory of 2180 2136 cmd.exe 83206830240.exe PID 2136 wrote to memory of 2180 2136 cmd.exe 83206830240.exe PID 2136 wrote to memory of 2180 2136 cmd.exe 83206830240.exe PID 2136 wrote to memory of 2180 2136 cmd.exe 83206830240.exe PID 344 wrote to memory of 2208 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 2208 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 2208 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 344 wrote to memory of 2208 344 inXz692BB7iMhOEXryRQDO4J.exe cmd.exe PID 2208 wrote to memory of 2252 2208 cmd.exe taskkill.exe PID 2208 wrote to memory of 2252 2208 cmd.exe taskkill.exe PID 2208 wrote to memory of 2252 2208 cmd.exe taskkill.exe PID 2208 wrote to memory of 2252 2208 cmd.exe taskkill.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 2120 wrote to memory of 2328 2120 02115431061.exe 02115431061.exe PID 1632 wrote to memory of 2484 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe RhuZWgzmPkb6yRgohtTyNirG.exe PID 1632 wrote to memory of 2484 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe RhuZWgzmPkb6yRgohtTyNirG.exe PID 1632 wrote to memory of 2484 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe RhuZWgzmPkb6yRgohtTyNirG.exe PID 1632 wrote to memory of 2484 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe RhuZWgzmPkb6yRgohtTyNirG.exe PID 1632 wrote to memory of 2464 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe sOm8QnNmldowDPs0hokSAUGM.exe PID 1632 wrote to memory of 2464 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe sOm8QnNmldowDPs0hokSAUGM.exe PID 1632 wrote to memory of 2464 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe sOm8QnNmldowDPs0hokSAUGM.exe PID 1632 wrote to memory of 2464 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe sOm8QnNmldowDPs0hokSAUGM.exe PID 1632 wrote to memory of 2476 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe UTAFs3TXHaFyVbWwGZONIQlN.exe PID 1632 wrote to memory of 2476 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe UTAFs3TXHaFyVbWwGZONIQlN.exe PID 1632 wrote to memory of 2476 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe UTAFs3TXHaFyVbWwGZONIQlN.exe PID 1632 wrote to memory of 2476 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe UTAFs3TXHaFyVbWwGZONIQlN.exe PID 1632 wrote to memory of 2536 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe PMd7C9iDrwyLI3Akkdiv9Z7z.exe PID 1632 wrote to memory of 2536 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe PMd7C9iDrwyLI3Akkdiv9Z7z.exe PID 1632 wrote to memory of 2536 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe PMd7C9iDrwyLI3Akkdiv9Z7z.exe PID 1632 wrote to memory of 2536 1632 SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe PMd7C9iDrwyLI3Akkdiv9Z7z.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen12.46475.27996.20501.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\inXz692BB7iMhOEXryRQDO4J.exe"C:\Users\Admin\Documents\inXz692BB7iMhOEXryRQDO4J.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exe"C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exe"C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exe"C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 9287⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\83206830240.exe" /mix3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\83206830240.exe"C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\83206830240.exe" /mix4⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "inXz692BB7iMhOEXryRQDO4J.exe" /f & erase "C:\Users\Admin\Documents\inXz692BB7iMhOEXryRQDO4J.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "inXz692BB7iMhOEXryRQDO4J.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\sOm8QnNmldowDPs0hokSAUGM.exe"C:\Users\Admin\Documents\sOm8QnNmldowDPs0hokSAUGM.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exe"C:\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exe"C:\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Documents\RhuZWgzmPkb6yRgohtTyNirG.exe"C:\Users\Admin\Documents\RhuZWgzmPkb6yRgohtTyNirG.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RhuZWgzmPkb6yRgohtTyNirG.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\RhuZWgzmPkb6yRgohtTyNirG.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im RhuZWgzmPkb6yRgohtTyNirG.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\PMd7C9iDrwyLI3Akkdiv9Z7z.exe"C:\Users\Admin\Documents\PMd7C9iDrwyLI3Akkdiv9Z7z.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\rQAZbxmIYewqk3gHkal4qPq4.exe"C:\Users\Admin\Documents\rQAZbxmIYewqk3gHkal4qPq4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\RFOSIq8OzgcFVe0MjNvBGs96.exe"C:\Users\Admin\Documents\RFOSIq8OzgcFVe0MjNvBGs96.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exe"C:\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exe"C:\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\GSRuiO3v6Xr5a6qjT7gmqupd.exe"C:\Users\Admin\Documents\GSRuiO3v6Xr5a6qjT7gmqupd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im GSRuiO3v6Xr5a6qjT7gmqupd.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\GSRuiO3v6Xr5a6qjT7gmqupd.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im GSRuiO3v6Xr5a6qjT7gmqupd.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\MSVCP140.dllMD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\ProgramData\freebl3.dllMD5
ef2834ac4ee7d6724f255beaf527e635
SHA15be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
SHA512c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2
-
C:\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
C:\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
C:\ProgramData\msvcp140.dllMD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\ProgramData\softokn3.dllMD5
a2ee53de9167bf0d6c019303b7ca84e5
SHA12a3c737fa1157e8483815e98b666408a18c0db42
SHA25643536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083
SHA51245b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8
-
C:\ProgramData\vcruntime140.dllMD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
61a03d15cf62612f50b74867090dbe79
SHA115228f34067b4b107e917bebaf17cc7c3c1280a8
SHA256f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d
SHA5125fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CMD5
d198af56058bb3a2227e1bec36bb8a12
SHA12b28fefef4328d7812b9bce1559173ac781ee47f
SHA2565fe41103a82edb8acea6117c888c7cce1677f00dad0bfba9b907eeac6e41884d
SHA5123bf2e8007e8a2cd6ea15f6c7e5b4355a4026e72c6c205db68bff530087353919d881e8414992d894b04cd2970363b6707d94c53990946abcae730949570b312f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
7c16079c63b8e66a71aa823d43362321
SHA153bf1b5b8b3c303d8df2687f1a619f9112fe2107
SHA256f1a759f5ce6a2ec27253d4f9236bcda74dcc64b3fd877f1981a89e4d48ebe68d
SHA5129a0353b92e4424130ea04fc4d22a7f2a2c56ee8976a76fc326e372c464284e48ada012087c784703e680e61360ecdaaf2ecb928f3169fba00284b0fd717fe2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
9a8cdc844bf142904947579e28edc7bb
SHA1044b60d480c9a5f63e2ebb5445c3702dcd536897
SHA256c5ede57af501c7885a4f9b7f2d45e3c2f865f2ea68468f133dfd20b7eda6c309
SHA512466afed1d2d5d40f3a78e69a84549be421e3c5e8e5a4b069f024e40babc60939250e1040aac91b84b44bfcfd2a09ae2d03ae14262d7ffe746ea552b32e865605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
9a8cdc844bf142904947579e28edc7bb
SHA1044b60d480c9a5f63e2ebb5445c3702dcd536897
SHA256c5ede57af501c7885a4f9b7f2d45e3c2f865f2ea68468f133dfd20b7eda6c309
SHA512466afed1d2d5d40f3a78e69a84549be421e3c5e8e5a4b069f024e40babc60939250e1040aac91b84b44bfcfd2a09ae2d03ae14262d7ffe746ea552b32e865605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
9a8cdc844bf142904947579e28edc7bb
SHA1044b60d480c9a5f63e2ebb5445c3702dcd536897
SHA256c5ede57af501c7885a4f9b7f2d45e3c2f865f2ea68468f133dfd20b7eda6c309
SHA512466afed1d2d5d40f3a78e69a84549be421e3c5e8e5a4b069f024e40babc60939250e1040aac91b84b44bfcfd2a09ae2d03ae14262d7ffe746ea552b32e865605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CMD5
84dc4a4006ac4999bfdbdf1dab2f91cd
SHA118fca86b29ded8b99c966232856dbe700ac07ee6
SHA256de1f4c8f9c4cf336e53456c3271e6bef736adb636edaf943838f90aa1642b3c0
SHA512a76efe0947cbd8e05d335b005bb6a7fc00d8a149507c486fcbbf271b5065fc8b9dade853094e762f246178d85670d19420f6e13b35ce038e27461eff813741e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\mozglue[1].dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\vcruntime140[1].dllMD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O1R1CL99\freebl3[1].dllMD5
ef2834ac4ee7d6724f255beaf527e635
SHA15be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
SHA512c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O1R1CL99\msvcp140[1].dllMD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OMGUDWI7\softokn3[1].dllMD5
a2ee53de9167bf0d6c019303b7ca84e5
SHA12a3c737fa1157e8483815e98b666408a18c0db42
SHA25643536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083
SHA51245b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\83206830240.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\83206830240.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
C:\Users\Admin\Documents\GSRuiO3v6Xr5a6qjT7gmqupd.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
C:\Users\Admin\Documents\PMd7C9iDrwyLI3Akkdiv9Z7z.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\RFOSIq8OzgcFVe0MjNvBGs96.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
C:\Users\Admin\Documents\RhuZWgzmPkb6yRgohtTyNirG.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
C:\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
C:\Users\Admin\Documents\inXz692BB7iMhOEXryRQDO4J.exeMD5
cc2b897a91d0e189e081473ee554e37d
SHA13dfe8c741dd26370d36cbd102f7bde77a2d81d0e
SHA256b0f0ac24292740006b0b9b5144ef4a94c38ea71065b643bd1d847b3fb3015c47
SHA5128d8215a7c7da32d5343a36edcd7e84138557a5a3724b8ff263ca319dbfef1e5b4e512a11d5a51f3a63259ba9d41e9db2abeb20c2bad88c76b7ed0285eafd830d
-
C:\Users\Admin\Documents\inXz692BB7iMhOEXryRQDO4J.exeMD5
cc2b897a91d0e189e081473ee554e37d
SHA13dfe8c741dd26370d36cbd102f7bde77a2d81d0e
SHA256b0f0ac24292740006b0b9b5144ef4a94c38ea71065b643bd1d847b3fb3015c47
SHA5128d8215a7c7da32d5343a36edcd7e84138557a5a3724b8ff263ca319dbfef1e5b4e512a11d5a51f3a63259ba9d41e9db2abeb20c2bad88c76b7ed0285eafd830d
-
C:\Users\Admin\Documents\rQAZbxmIYewqk3gHkal4qPq4.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
C:\Users\Admin\Documents\sOm8QnNmldowDPs0hokSAUGM.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\Users\Admin\AppData\Local\Temp\4DD3.tmpMD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\02115431061.exeMD5
1204fd2475463856ee1e4b7e8bbc8a97
SHA19808fdb378aefed2bd85edf544dda0dd1c3ca90e
SHA2568c2b2f56415981557ec7e2f321decb4cc3e7514d7e1007370e082ada9fae702c
SHA512dad6ba60d8463d27754a61061826c14c107953ae8ac4727dfab59c2702bdd2c9806cf910bb10853b563924a3c40d51976292595e6d359b297c383e0cb1e45c3f
-
\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\83206830240.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
\Users\Admin\AppData\Local\Temp\{cBlI-UX6Xk-mQ3s-56IkG}\83206830240.exeMD5
6f5b1279d943e548259d62f00650044a
SHA1367d5ff6ee971fcac30cf8b453eea8f47a936264
SHA256118f24dab3dce4a5ae6e3ab078551cbc628b475abeeafa07a5972622aaa38812
SHA51275e655e6df832bccafca641f0af62165da644a92ce3055d30b12b2dd0d241df4b43ea4de4429e3719b9e7f198882c5a0b3f44ab45900797d41787fdaf60988fe
-
\Users\Admin\Documents\GSRuiO3v6Xr5a6qjT7gmqupd.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
\Users\Admin\Documents\GSRuiO3v6Xr5a6qjT7gmqupd.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
\Users\Admin\Documents\PMd7C9iDrwyLI3Akkdiv9Z7z.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
\Users\Admin\Documents\RFOSIq8OzgcFVe0MjNvBGs96.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
\Users\Admin\Documents\RFOSIq8OzgcFVe0MjNvBGs96.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
\Users\Admin\Documents\RhuZWgzmPkb6yRgohtTyNirG.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
\Users\Admin\Documents\RhuZWgzmPkb6yRgohtTyNirG.exeMD5
2c5431a47044915c3af281683f374c95
SHA10a228dfe15afb1f6a0c9a615a557f96ddb3d2b96
SHA25602b6aee180e967f7564c8f4f85f2ad17350c4c66fb258ff5b23546bd0a5d6373
SHA512849c8f3cfe5e485d1e0e29bc30dc9ee3f79425a1b8cca99b851e0b5246c9cf22c7abcb7a915167283b6c700e45c6ba1c491de8f293b9977f1cc87a3b69317bcd
-
\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
\Users\Admin\Documents\ShoNkaAL7dwOsJPQlQS20JJJ.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
\Users\Admin\Documents\UTAFs3TXHaFyVbWwGZONIQlN.exeMD5
75bbf2de2dd263e691848bc21ae2f59c
SHA1e1ebeaa19f0d9686cc0c6b3c1b2b17623b735907
SHA2562842be254d65905d77ed5a1878b918cfc7b2bf0eaf3ca1bd07972758d7c2c414
SHA5123d0bc28892ea52c48c621f1b4604218091af4beac59a8f2a0d799f26e0cd9c5d04f4386b71ac698af80d6204a0fb941d352de315f620564dc74247badb9512be
-
\Users\Admin\Documents\inXz692BB7iMhOEXryRQDO4J.exeMD5
cc2b897a91d0e189e081473ee554e37d
SHA13dfe8c741dd26370d36cbd102f7bde77a2d81d0e
SHA256b0f0ac24292740006b0b9b5144ef4a94c38ea71065b643bd1d847b3fb3015c47
SHA5128d8215a7c7da32d5343a36edcd7e84138557a5a3724b8ff263ca319dbfef1e5b4e512a11d5a51f3a63259ba9d41e9db2abeb20c2bad88c76b7ed0285eafd830d
-
\Users\Admin\Documents\inXz692BB7iMhOEXryRQDO4J.exeMD5
cc2b897a91d0e189e081473ee554e37d
SHA13dfe8c741dd26370d36cbd102f7bde77a2d81d0e
SHA256b0f0ac24292740006b0b9b5144ef4a94c38ea71065b643bd1d847b3fb3015c47
SHA5128d8215a7c7da32d5343a36edcd7e84138557a5a3724b8ff263ca319dbfef1e5b4e512a11d5a51f3a63259ba9d41e9db2abeb20c2bad88c76b7ed0285eafd830d
-
\Users\Admin\Documents\rQAZbxmIYewqk3gHkal4qPq4.exeMD5
f0bc65a05ad0a598375cfcd88cebf2f7
SHA1a293f92d4f7377b31e06ee0377d4f8069d923938
SHA256cfce285cacd32aaa2b142c7cb7c23643a8d57825daaa51ea69df4d61ff3a819f
SHA512b24ded01b55a90781a7a14e39b8ab9e44816e5fae8fd8a212ef89c42cf5f53876586af5653fb992579fe5d7ecfaae3b83e3f5a153d2f2cabf2b5a011bd9ae873
-
\Users\Admin\Documents\sOm8QnNmldowDPs0hokSAUGM.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
\Users\Admin\Documents\sOm8QnNmldowDPs0hokSAUGM.exeMD5
becdeb62e5a3beb6a24157d7e417bd6d
SHA1fcf81b0600f892a481f95b745ea04f085c814a44
SHA2566641d02af929defb1d8c283f82e56b4f8fc289a8ec963b98f08676bd30ca29ba
SHA5124038d204060ff6585a359685bfb2ba52bd02d25ce239051410a895be88f07febbbae2e8eb2ee3592bb8a24c6fce35b76dce4268a01df09f2feb13f6a71a27a90
-
memory/344-8-0x0000000000000000-mapping.dmp
-
memory/344-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/344-12-0x0000000000220000-0x000000000024D000-memory.dmpFilesize
180KB
-
memory/344-11-0x0000000076341000-0x0000000076343000-memory.dmpFilesize
8KB
-
memory/344-10-0x0000000000CE0000-0x0000000000CF1000-memory.dmpFilesize
68KB
-
memory/872-153-0x0000000000000000-mapping.dmp
-
memory/944-154-0x0000000000000000-mapping.dmp
-
memory/1272-150-0x0000000002980000-0x0000000002997000-memory.dmpFilesize
92KB
-
memory/1436-15-0x0000000000000000-mapping.dmp
-
memory/1632-2-0x00000000745C0000-0x0000000074CAE000-memory.dmpFilesize
6.9MB
-
memory/1632-5-0x0000000004A10000-0x0000000004A11000-memory.dmpFilesize
4KB
-
memory/1632-3-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/1688-14-0x000007FEF7B10000-0x000007FEF7D8A000-memory.dmpFilesize
2.5MB
-
memory/2076-36-0x0000000000C20000-0x0000000000CF4000-memory.dmpFilesize
848KB
-
memory/2076-19-0x0000000000000000-mapping.dmp
-
memory/2076-21-0x0000000000D40000-0x0000000000D51000-memory.dmpFilesize
68KB
-
memory/2076-22-0x0000000000B40000-0x0000000000C19000-memory.dmpFilesize
868KB
-
memory/2076-23-0x0000000000400000-0x00000000008D0000-memory.dmpFilesize
4.8MB
-
memory/2076-24-0x0000000000F10000-0x0000000000F21000-memory.dmpFilesize
68KB
-
memory/2120-37-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/2120-39-0x0000000002F80000-0x0000000002F91000-memory.dmpFilesize
68KB
-
memory/2120-47-0x0000000003130000-0x0000000003141000-memory.dmpFilesize
68KB
-
memory/2120-40-0x0000000002B80000-0x0000000002C2C000-memory.dmpFilesize
688KB
-
memory/2120-49-0x0000000002DF0000-0x0000000002E9C000-memory.dmpFilesize
688KB
-
memory/2120-26-0x0000000000400000-0x0000000002B75000-memory.dmpFilesize
39.5MB
-
memory/2120-28-0x0000000000401F10-mapping.dmp
-
memory/2120-41-0x0000000000400000-0x00000000008A2000-memory.dmpFilesize
4.6MB
-
memory/2136-27-0x0000000000000000-mapping.dmp
-
memory/2180-46-0x0000000000400000-0x00000000004E3000-memory.dmpFilesize
908KB
-
memory/2180-42-0x0000000000E10000-0x0000000000E21000-memory.dmpFilesize
68KB
-
memory/2180-33-0x0000000000000000-mapping.dmp
-
memory/2180-45-0x00000000008B0000-0x000000000098F000-memory.dmpFilesize
892KB
-
memory/2188-151-0x0000000000000000-mapping.dmp
-
memory/2208-35-0x0000000000000000-mapping.dmp
-
memory/2252-38-0x0000000000000000-mapping.dmp
-
memory/2328-60-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/2328-53-0x0000000002F90000-0x0000000002FA1000-memory.dmpFilesize
68KB
-
memory/2328-51-0x0000000000403B90-mapping.dmp
-
memory/2328-58-0x0000000002B50000-0x0000000002BE1000-memory.dmpFilesize
580KB
-
memory/2328-50-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/2328-54-0x0000000000400000-0x0000000002B44000-memory.dmpFilesize
39.3MB
-
memory/2328-56-0x0000000000220000-0x00000000002AD000-memory.dmpFilesize
564KB
-
memory/2328-59-0x0000000000400000-0x0000000002B2D000-memory.dmpFilesize
39.2MB
-
memory/2372-152-0x0000000000000000-mapping.dmp
-
memory/2464-105-0x0000000000CE0000-0x0000000000CF1000-memory.dmpFilesize
68KB
-
memory/2464-113-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/2464-109-0x0000000000220000-0x00000000002B1000-memory.dmpFilesize
580KB
-
memory/2464-67-0x0000000000000000-mapping.dmp
-
memory/2476-93-0x0000000000AE0000-0x0000000000AF1000-memory.dmpFilesize
68KB
-
memory/2476-69-0x0000000000000000-mapping.dmp
-
memory/2476-95-0x0000000000020000-0x000000000002D000-memory.dmpFilesize
52KB
-
memory/2484-65-0x0000000000000000-mapping.dmp
-
memory/2484-103-0x0000000000AC0000-0x0000000000AD1000-memory.dmpFilesize
68KB
-
memory/2484-126-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/2520-155-0x0000000000000000-mapping.dmp
-
memory/2536-157-0x00000000023C0000-0x0000000002836000-memory.dmpFilesize
4.5MB
-
memory/2536-73-0x0000000000000000-mapping.dmp
-
memory/2536-158-0x0000000002CC0000-0x00000000035CF000-memory.dmpFilesize
9.1MB
-
memory/2536-159-0x0000000002CC0000-0x00000000035CF000-memory.dmpFilesize
9.1MB
-
memory/2588-99-0x0000000002D10000-0x000000000361F000-memory.dmpFilesize
9.1MB
-
memory/2588-97-0x0000000002410000-0x0000000002886000-memory.dmpFilesize
4.5MB
-
memory/2588-77-0x0000000000000000-mapping.dmp
-
memory/2588-128-0x0000000002D10000-0x000000000361F000-memory.dmpFilesize
9.1MB
-
memory/2608-81-0x0000000000000000-mapping.dmp
-
memory/2608-102-0x0000000000A40000-0x0000000000A51000-memory.dmpFilesize
68KB
-
memory/2628-117-0x0000000000B80000-0x0000000000B91000-memory.dmpFilesize
68KB
-
memory/2628-84-0x0000000000000000-mapping.dmp
-
memory/2644-156-0x0000000000000000-mapping.dmp
-
memory/2660-116-0x0000000000220000-0x00000000002B6000-memory.dmpFilesize
600KB
-
memory/2660-112-0x0000000000B60000-0x0000000000B71000-memory.dmpFilesize
68KB
-
memory/2660-91-0x0000000000000000-mapping.dmp
-
memory/2700-98-0x0000000000402A38-mapping.dmp
-
memory/2700-96-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2784-114-0x0000000000402A38-mapping.dmp
-
memory/6920-160-0x0000000000000000-mapping.dmp
-
memory/6920-161-0x0000000001F20000-0x0000000001F31000-memory.dmpFilesize
68KB
-
memory/6920-162-0x0000000001F20000-0x0000000001F31000-memory.dmpFilesize
68KB
-
memory/6920-165-0x0000000000440000-0x0000000000441000-memory.dmpFilesize
4KB