Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    18-04-2021 13:02

General

  • Target

    78fec74ab13d666b840ddd6d1ed8153b.exe

  • Size

    3.2MB

  • MD5

    78fec74ab13d666b840ddd6d1ed8153b

  • SHA1

    fab833416df470be0208d6c81142cfc1ceedfba8

  • SHA256

    ecf100d294f5b6b63ebc4e1430f6a07b07e3899b0c447a536d7c53c51d711549

  • SHA512

    cddaac6f160cd85e71614882fca9ae7fec406ce464b08adc83415896edb192f9113cf33eab741849684b8210c929c79bb942a11c3509d385148db9e02f8821fa

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://perseus007.xyz/upload/

http://lambos1.xyz/upload/

http://cipluks.com/upload/

http://ragnar77.com/upload/

http://aslauk.com/upload/

http://qunersoo.xyz/upload /

http://hostunes.info/upload/

http://leonisdas.xyz/upload/

rc4.i32
rc4.i32

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 23 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 62 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies data under HKEY_USERS 30 IoCs
  • Modifies registry class 10 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • NTFS ADS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:468
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:872
        • C:\Windows\system32\wbem\WMIADAP.EXE
          wmiadap.exe /F /T /R
          3⤵
            PID:1996
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k SystemNetworkService
          2⤵
          • Drops file in System32 directory
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Modifies registry class
          PID:2148
      • C:\Users\Admin\AppData\Local\Temp\78fec74ab13d666b840ddd6d1ed8153b.exe
        "C:\Users\Admin\AppData\Local\Temp\78fec74ab13d666b840ddd6d1ed8153b.exe"
        1⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Users\Admin\AppData\Local\Temp\agdsk.exe
          "C:\Users\Admin\AppData\Local\Temp\agdsk.exe"
          2⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          PID:1068
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c taskkill /f /im chrome.exe
            3⤵
              PID:2908
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im chrome.exe
                4⤵
                • Kills process with taskkill
                PID:2984
          • C:\Users\Admin\AppData\Local\Temp\jg4_4jaa.exe
            "C:\Users\Admin\AppData\Local\Temp\jg4_4jaa.exe"
            2⤵
            • Executes dropped EXE
            PID:1240
          • C:\Users\Admin\AppData\Local\Temp\wf-game.exe
            "C:\Users\Admin\AppData\Local\Temp\wf-game.exe"
            2⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" "C:\Program Files\patch.dll",patch
              3⤵
              • Loads dropped DLL
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1544
          • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
            "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\ProgramData\2425828.exe
              "C:\ProgramData\2425828.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1592
            • C:\ProgramData\6878776.exe
              "C:\ProgramData\6878776.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              PID:1956
              • C:\ProgramData\Windows Host\Windows Host.exe
                "C:\ProgramData\Windows Host\Windows Host.exe"
                4⤵
                • Executes dropped EXE
                PID:2352
            • C:\ProgramData\835259.exe
              "C:\ProgramData\835259.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1704
              • C:\ProgramData\835259.exe
                "{path}"
                4⤵
                • Executes dropped EXE
                PID:3020
            • C:\ProgramData\8986445.exe
              "C:\ProgramData\8986445.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:1256
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c taskkill /im 8986445.exe /f & timeout /t 6 & del /f /q "C:\ProgramData\8986445.exe" & del C:\ProgramData\*.dll & exit
                4⤵
                  PID:2312
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /im 8986445.exe /f
                    5⤵
                    • Kills process with taskkill
                    PID:1000
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    5⤵
                    • Delays execution with timeout.exe
                    PID:2944
              • C:\ProgramData\245666.exe
                "C:\ProgramData\245666.exe"
                3⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                PID:856
            • C:\Users\Admin\AppData\Local\Temp\ujqb.exe
              "C:\Users\Admin\AppData\Local\Temp\ujqb.exe"
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks whether UAC is enabled
              PID:332
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\File.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX0\File.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2324
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  4⤵
                    PID:2528
              • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:1128
              • C:\Users\Admin\AppData\Local\Temp\pzyh.exe
                "C:\Users\Admin\AppData\Local\Temp\pzyh.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:1328
                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                  3⤵
                  • Executes dropped EXE
                  PID:1104
                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3060
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
              1⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1476
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:2
                2⤵
                • Modifies Internet Explorer settings
                • NTFS ADS
                • Suspicious use of SetWindowsHookEx
                PID:780
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:1061893 /prefetch:2
                2⤵
                • Modifies Internet Explorer settings
                • NTFS ADS
                • Suspicious use of SetWindowsHookEx
                PID:2564
            • C:\Users\Admin\AppData\Local\Temp\7AAC.exe
              C:\Users\Admin\AppData\Local\Temp\7AAC.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              PID:1576
              • C:\Windows\SysWOW64\icacls.exe
                icacls "C:\Users\Admin\AppData\Local\10756fb7-b897-47d0-bc15-0e401d39cdd9" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                2⤵
                • Modifies file permissions
                PID:1200
              • C:\Users\Admin\AppData\Local\Temp\7AAC.exe
                "C:\Users\Admin\AppData\Local\Temp\7AAC.exe" --Admin IsNotAutoStart IsNotTask
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1256
                • C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\updatewin1.exe
                  "C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\updatewin1.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:3048
                  • C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\updatewin1.exe
                    "C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\updatewin1.exe" --Admin
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2236
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
                      5⤵
                        PID:2124
                  • C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\updatewin2.exe
                    "C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\updatewin2.exe"
                    3⤵
                    • Drops file in Drivers directory
                    • Executes dropped EXE
                    PID:2340
                  • C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\5.exe
                    "C:\Users\Admin\AppData\Local\3b93786c-d541-42ba-818b-d77336f77160\5.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:2448

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Defense Evasion

              File Permissions Modification

              1
              T1222

              Modify Registry

              3
              T1112

              Install Root Certificate

              1
              T1130

              Credential Access

              Credentials in Files

              4
              T1081

              Discovery

              Query Registry

              3
              T1012

              System Information Discovery

              4
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              4
              T1005

              Command and Control

              Web Service

              1
              T1102

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\patch.dat
                MD5

                e0951976d9544f909a27f759bb3b7f85

                SHA1

                f85ab0b98b6b46d2c52a61ae57e6cc381049cd4a

                SHA256

                bb0c68cfd8555c4526f36a4a1aabff3ab9565cc1ca8535de1f99f6dcf60c6652

                SHA512

                023e61bd1ffab2e909e585a84f2c63fb4748ca118264ec6aac2335df1d286d84f2a97cc983a491af5834b07102951563d29613d2ecc71df1ca43c0e7554d9992

              • C:\Program Files\patch.dll
                MD5

                75ca86f2b605a5924edeb57b180620e7

                SHA1

                df2fda930efd40c2ae7c59533e5097bd631c3b47

                SHA256

                00cb52b80d015d1b692158ce9ca867b99b1ac82d9538090a09881b9edaa0c417

                SHA512

                d68b04f03d719506c418daa65d601d55a9319b84d5c53d16430a484a24f78d1237d14168fbc5c94221bf18ed40302cff7a2f02b05f7a0c3b95e870356d2cd63c

              • C:\ProgramData\2425828.exe
                MD5

                9205ee19b1ea5f48dd983684e10546a0

                SHA1

                021bfabbd083c61812afa886707e8070ad8a3d3a

                SHA256

                7ddbed47e65181f9d6e1a8ec920b11e18c6a6fa0b427f0e20d44a6f2a185c3fd

                SHA512

                aed731178cda766704aa1817eee122868e5b5c5dfd22c92ea9dd745e631e7aea9809be92ae9eb805db57cbbd417aeffc4e96ac739f8631d2f2e1eb19197d8b88

              • C:\ProgramData\2425828.exe
                MD5

                9205ee19b1ea5f48dd983684e10546a0

                SHA1

                021bfabbd083c61812afa886707e8070ad8a3d3a

                SHA256

                7ddbed47e65181f9d6e1a8ec920b11e18c6a6fa0b427f0e20d44a6f2a185c3fd

                SHA512

                aed731178cda766704aa1817eee122868e5b5c5dfd22c92ea9dd745e631e7aea9809be92ae9eb805db57cbbd417aeffc4e96ac739f8631d2f2e1eb19197d8b88

              • C:\ProgramData\245666.exe
                MD5

                81b01a0dca08c2435c3c6115dc005557

                SHA1

                f8f413340f7a65fa4d9e9da0216b55fc7488fedf

                SHA256

                04ae5a72970012019d724ae1be7ec0e3bbe7fb2ab0e42e69a596f040521e641f

                SHA512

                d161c86d9aafa361ec4ea33c0c5d428d9aa02a764fe8aa7d4d8247eeed89f4e60195834e1f8d54f1989891a0912ee1b1bd93115c4672453b4a3e79fc4f04116f

              • C:\ProgramData\245666.exe
                MD5

                81b01a0dca08c2435c3c6115dc005557

                SHA1

                f8f413340f7a65fa4d9e9da0216b55fc7488fedf

                SHA256

                04ae5a72970012019d724ae1be7ec0e3bbe7fb2ab0e42e69a596f040521e641f

                SHA512

                d161c86d9aafa361ec4ea33c0c5d428d9aa02a764fe8aa7d4d8247eeed89f4e60195834e1f8d54f1989891a0912ee1b1bd93115c4672453b4a3e79fc4f04116f

              • C:\ProgramData\6878776.exe
                MD5

                afb7dc87e6208b5747af8e7ab95f28bf

                SHA1

                af2e35b042efcc0c47d31e1747baca34e24a68c1

                SHA256

                a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

                SHA512

                8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

              • C:\ProgramData\6878776.exe
                MD5

                afb7dc87e6208b5747af8e7ab95f28bf

                SHA1

                af2e35b042efcc0c47d31e1747baca34e24a68c1

                SHA256

                a58c95de92eefb42ccff366ae9381c638d425673bd2860256b8263ef7a5609f1

                SHA512

                8448cbcdcc35ee0676a709e01ab0f87c6e11a1718b767f7f220ed559c0f30867b7cb8f82a9d0c3b3279cf00c35619189edac265e724d83811f49e2bea7daa1d0

              • C:\ProgramData\835259.exe
                MD5

                4fc7251966abd315a977a5aaf8d2f555

                SHA1

                c2dca39bc9bf7373ebcbed87e07d04a830082dd3

                SHA256

                9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

                SHA512

                6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

              • C:\ProgramData\835259.exe
                MD5

                4fc7251966abd315a977a5aaf8d2f555

                SHA1

                c2dca39bc9bf7373ebcbed87e07d04a830082dd3

                SHA256

                9c2f5c1550e1b229be3be5ba62760c24a03098feba2cee98d9aea2e42df980c8

                SHA512

                6336aa28f844f0c10b7acf9b0b795e7e8036e22d7c79656e4ebe96b4add3aead3f8e7ca1103aef601da2af3c9999012caf738b4d156f264a1c22c481792d5c18

              • C:\ProgramData\8986445.exe
                MD5

                f29b7c1d6b955ea134d7420b308abe41

                SHA1

                8cc9c4639d4239eaa82a8a98e330a73c9a3b56f8

                SHA256

                84efb4a57cf750a05b51d258b7bb55db608d2312ca126e3e111bc5e9f9402ef8

                SHA512

                d7ac0d88abd70e3035f3df22883c84bcd33fe710baaf33cc9d51cf8d8f4e7222078271270f3a7d5d7e635fc0319e0624297d23e421019ca166a2ee8fd98b2e49

              • C:\ProgramData\8986445.exe
                MD5

                f29b7c1d6b955ea134d7420b308abe41

                SHA1

                8cc9c4639d4239eaa82a8a98e330a73c9a3b56f8

                SHA256

                84efb4a57cf750a05b51d258b7bb55db608d2312ca126e3e111bc5e9f9402ef8

                SHA512

                d7ac0d88abd70e3035f3df22883c84bcd33fe710baaf33cc9d51cf8d8f4e7222078271270f3a7d5d7e635fc0319e0624297d23e421019ca166a2ee8fd98b2e49

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                MD5

                0c8d51a871c0f701b2b91f98abfcd0d5

                SHA1

                83e2779fa9cfeabf43559dec0212792385f5ed01

                SHA256

                2f54266e9204aa85a58dd837ba42704bccb32e9cefb916a4b1f08cee43d6d8fe

                SHA512

                927032a03bf94788ca42801dc315c964b4df4e571df7b0e776bfe4191998b86c48fd121c662cdf1f689dfe16b139abbc6e540b88fd3e6341a11a00ff8b62ab2c

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                MD5

                3d005818c30b81cefeaca7865222395b

                SHA1

                9d228c1042cd6546ef0db52c412df1f37f3413b7

                SHA256

                a89346fac7082a610e170bec876761d9cc514e5521a2bacd89dd0285026e0822

                SHA512

                19c0a7910a3952c06947e1340b1d500ca2f6ad97b523e28f00ce9fe5fee3a698f57b607b1eb0ab71758613a5157e60390a8810ea12dfd40a34ee8107675ba937

              • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
                MD5

                95b8301688985fa56510fc92cfa6e1ca

                SHA1

                16d68a7f32b148f2d39197500b1b0c342d8561c1

                SHA256

                9a2fd341a2811c1ce5b3fa198c52a3e9f074c6338dff3be017fb53dcd9f0ca88

                SHA512

                f75c037492f2741ce639d4b5536843e3224a359495ae18e9b881496bf7b9e7d8cf68cd9c7083e41c2fba0227396c4f210b6fbea3265669323230506099341c45

              • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
                MD5

                95b8301688985fa56510fc92cfa6e1ca

                SHA1

                16d68a7f32b148f2d39197500b1b0c342d8561c1

                SHA256

                9a2fd341a2811c1ce5b3fa198c52a3e9f074c6338dff3be017fb53dcd9f0ca88

                SHA512

                f75c037492f2741ce639d4b5536843e3224a359495ae18e9b881496bf7b9e7d8cf68cd9c7083e41c2fba0227396c4f210b6fbea3265669323230506099341c45

              • C:\Users\Admin\AppData\Local\Temp\Samk.url
                MD5

                3e02b06ed8f0cc9b6ac6a40aa3ebc728

                SHA1

                fb038ee5203be9736cbf55c78e4c0888185012ad

                SHA256

                c0cbd06f9659d71c08912f27e0499f32ed929785d5c5dc1fc46d07199f5a24ea

                SHA512

                44cbbaee576f978deaa5d8bd9e54560e4aa972dfdd6b68389e783e838e36f0903565b0e978cf8f4f20c8b231d3879d3552ebb7a8c4e89e36692291c7c3ffcf00

              • C:\Users\Admin\AppData\Local\Temp\agdsk.exe
                MD5

                618c39d0b0b20b2b5449ab2eae8e00a2

                SHA1

                8cb2c1556062e3352b24e7c05f32c65138cb71ac

                SHA256

                e8ba721c624ea94595a594790089702d36e024966bf2110bdf374ee2a292e375

                SHA512

                197a6e6e591d665f2b32ff7e4dd2fea5a1fa81f873d9295ed45617869a4802c24d2eb8c213f30a05b8739c609435493f7d672c5ba8362e009086294b1067555d

              • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                MD5

                7fee8223d6e4f82d6cd115a28f0b6d58

                SHA1

                1b89c25f25253df23426bd9ff6c9208f1202f58b

                SHA256

                a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                SHA512

                3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

              • C:\Users\Admin\AppData\Local\Temp\jg4_4jaa.exe
                MD5

                338921a2482dbb47a0ac6ba265179316

                SHA1

                8ec2d631aa5a52b7aa1c4c62b788e8dd35e20f49

                SHA256

                90c97549326a337f150c97dc59b7cad89176773cd71851423c2f8ae80472f518

                SHA512

                42b5fc41392b14365250ee832cedd86be590128d9fdf459d1fc8727f818910c86439e63de1b492fd16d695bc915c4a74187191b6be2f59de7470d521984e8f77

              • C:\Users\Admin\AppData\Local\Temp\jg4_4jaa.exe
                MD5

                338921a2482dbb47a0ac6ba265179316

                SHA1

                8ec2d631aa5a52b7aa1c4c62b788e8dd35e20f49

                SHA256

                90c97549326a337f150c97dc59b7cad89176773cd71851423c2f8ae80472f518

                SHA512

                42b5fc41392b14365250ee832cedd86be590128d9fdf459d1fc8727f818910c86439e63de1b492fd16d695bc915c4a74187191b6be2f59de7470d521984e8f77

              • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                MD5

                2f7cdfde7eb0692993eceb5c8a876cf1

                SHA1

                1624aba6e1564b2656fddb465ed9a55d77c4da0e

                SHA256

                0dee6602303700df3f5955aa1d8761c970d6dc6b803c5ad77114d9b61ae6c20b

                SHA512

                8ae2ec9f54113a7b7ebe4e1a7c1b70778341bb711e71a1990b22871aabef72cf29fcf6bb9a7c542ebb132caf3a34e1afc833722028c1e1dcb4e8d5fd7b362954

              • C:\Users\Admin\AppData\Local\Temp\pzyh.exe
                MD5

                8cbde3982249e20a6f564eb414f06fe4

                SHA1

                6d040b6c0f9d10b07f0b63797aa7bfabf0703925

                SHA256

                4a8a37d0010b2a946e9b202ea07d8b93a29a3ea9a56852678307076e10999c83

                SHA512

                d84863489b5fb2d17ee1df47de735a88d510bb8f5e378126243e34edb017d3ed82807c7dbd5cf6a977601f0e440be12e680679f1ce472619fd0ebbe9579c3e1b

              • C:\Users\Admin\AppData\Local\Temp\pzyh.exe
                MD5

                8cbde3982249e20a6f564eb414f06fe4

                SHA1

                6d040b6c0f9d10b07f0b63797aa7bfabf0703925

                SHA256

                4a8a37d0010b2a946e9b202ea07d8b93a29a3ea9a56852678307076e10999c83

                SHA512

                d84863489b5fb2d17ee1df47de735a88d510bb8f5e378126243e34edb017d3ed82807c7dbd5cf6a977601f0e440be12e680679f1ce472619fd0ebbe9579c3e1b

              • C:\Users\Admin\AppData\Local\Temp\ujqb.exe
                MD5

                db871ad34723eb55c6fcd7792ac67c2a

                SHA1

                f7a5895ddef594bcfa239b2db21d9b61c46658c9

                SHA256

                e8dfa205b67d6c3783ff622a86298c2a7f779dd5bd82d007d061674feadae847

                SHA512

                b3740804f82fa9bfdfdff81932ebf7f8809faf43a7f569522da11ac8e82efd3746800d40b4ddc097cb8bc056b7d54c7afec40b20bd6a2498803b773d9b31a26e

              • C:\Users\Admin\AppData\Local\Temp\ujqb.exe
                MD5

                db871ad34723eb55c6fcd7792ac67c2a

                SHA1

                f7a5895ddef594bcfa239b2db21d9b61c46658c9

                SHA256

                e8dfa205b67d6c3783ff622a86298c2a7f779dd5bd82d007d061674feadae847

                SHA512

                b3740804f82fa9bfdfdff81932ebf7f8809faf43a7f569522da11ac8e82efd3746800d40b4ddc097cb8bc056b7d54c7afec40b20bd6a2498803b773d9b31a26e

              • C:\Users\Admin\AppData\Local\Temp\wf-game.exe
                MD5

                5530c8bf2fddf2afc18b2defc14d3a74

                SHA1

                872b5a3d72b20f64fbe5e5ed1998ea749d0ef648

                SHA256

                6e052a1f2392408efc528e25591b417c14cb1ff6e96faa6ff26b61f61ebfca3c

                SHA512

                a388aa78aecb876d42823c2a06f10f873182eacd18c31ae52323014f635e13fab16b07b0752462ad02fd9cdbba47c269bbcf4dacb89be39f0352bc02ee09ae0b

              • C:\Users\Admin\AppData\Local\Temp\wf-game.exe
                MD5

                5530c8bf2fddf2afc18b2defc14d3a74

                SHA1

                872b5a3d72b20f64fbe5e5ed1998ea749d0ef648

                SHA256

                6e052a1f2392408efc528e25591b417c14cb1ff6e96faa6ff26b61f61ebfca3c

                SHA512

                a388aa78aecb876d42823c2a06f10f873182eacd18c31ae52323014f635e13fab16b07b0752462ad02fd9cdbba47c269bbcf4dacb89be39f0352bc02ee09ae0b

              • \Program Files\patch.dll
                MD5

                75ca86f2b605a5924edeb57b180620e7

                SHA1

                df2fda930efd40c2ae7c59533e5097bd631c3b47

                SHA256

                00cb52b80d015d1b692158ce9ca867b99b1ac82d9538090a09881b9edaa0c417

                SHA512

                d68b04f03d719506c418daa65d601d55a9319b84d5c53d16430a484a24f78d1237d14168fbc5c94221bf18ed40302cff7a2f02b05f7a0c3b95e870356d2cd63c

              • \Program Files\patch.dll
                MD5

                75ca86f2b605a5924edeb57b180620e7

                SHA1

                df2fda930efd40c2ae7c59533e5097bd631c3b47

                SHA256

                00cb52b80d015d1b692158ce9ca867b99b1ac82d9538090a09881b9edaa0c417

                SHA512

                d68b04f03d719506c418daa65d601d55a9319b84d5c53d16430a484a24f78d1237d14168fbc5c94221bf18ed40302cff7a2f02b05f7a0c3b95e870356d2cd63c

              • \Program Files\patch.dll
                MD5

                75ca86f2b605a5924edeb57b180620e7

                SHA1

                df2fda930efd40c2ae7c59533e5097bd631c3b47

                SHA256

                00cb52b80d015d1b692158ce9ca867b99b1ac82d9538090a09881b9edaa0c417

                SHA512

                d68b04f03d719506c418daa65d601d55a9319b84d5c53d16430a484a24f78d1237d14168fbc5c94221bf18ed40302cff7a2f02b05f7a0c3b95e870356d2cd63c

              • \Program Files\patch.dll
                MD5

                75ca86f2b605a5924edeb57b180620e7

                SHA1

                df2fda930efd40c2ae7c59533e5097bd631c3b47

                SHA256

                00cb52b80d015d1b692158ce9ca867b99b1ac82d9538090a09881b9edaa0c417

                SHA512

                d68b04f03d719506c418daa65d601d55a9319b84d5c53d16430a484a24f78d1237d14168fbc5c94221bf18ed40302cff7a2f02b05f7a0c3b95e870356d2cd63c

              • \Users\Admin\AppData\Local\Temp\CC4F.tmp
                MD5

                d124f55b9393c976963407dff51ffa79

                SHA1

                2c7bbedd79791bfb866898c85b504186db610b5d

                SHA256

                ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                SHA512

                278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

              • \Users\Admin\AppData\Local\Temp\KRSetp.exe
                MD5

                95b8301688985fa56510fc92cfa6e1ca

                SHA1

                16d68a7f32b148f2d39197500b1b0c342d8561c1

                SHA256

                9a2fd341a2811c1ce5b3fa198c52a3e9f074c6338dff3be017fb53dcd9f0ca88

                SHA512

                f75c037492f2741ce639d4b5536843e3224a359495ae18e9b881496bf7b9e7d8cf68cd9c7083e41c2fba0227396c4f210b6fbea3265669323230506099341c45

              • \Users\Admin\AppData\Local\Temp\KRSetp.exe
                MD5

                95b8301688985fa56510fc92cfa6e1ca

                SHA1

                16d68a7f32b148f2d39197500b1b0c342d8561c1

                SHA256

                9a2fd341a2811c1ce5b3fa198c52a3e9f074c6338dff3be017fb53dcd9f0ca88

                SHA512

                f75c037492f2741ce639d4b5536843e3224a359495ae18e9b881496bf7b9e7d8cf68cd9c7083e41c2fba0227396c4f210b6fbea3265669323230506099341c45

              • \Users\Admin\AppData\Local\Temp\KRSetp.exe
                MD5

                95b8301688985fa56510fc92cfa6e1ca

                SHA1

                16d68a7f32b148f2d39197500b1b0c342d8561c1

                SHA256

                9a2fd341a2811c1ce5b3fa198c52a3e9f074c6338dff3be017fb53dcd9f0ca88

                SHA512

                f75c037492f2741ce639d4b5536843e3224a359495ae18e9b881496bf7b9e7d8cf68cd9c7083e41c2fba0227396c4f210b6fbea3265669323230506099341c45

              • \Users\Admin\AppData\Local\Temp\KRSetp.exe
                MD5

                95b8301688985fa56510fc92cfa6e1ca

                SHA1

                16d68a7f32b148f2d39197500b1b0c342d8561c1

                SHA256

                9a2fd341a2811c1ce5b3fa198c52a3e9f074c6338dff3be017fb53dcd9f0ca88

                SHA512

                f75c037492f2741ce639d4b5536843e3224a359495ae18e9b881496bf7b9e7d8cf68cd9c7083e41c2fba0227396c4f210b6fbea3265669323230506099341c45

              • \Users\Admin\AppData\Local\Temp\KRSetp.exe
                MD5

                95b8301688985fa56510fc92cfa6e1ca

                SHA1

                16d68a7f32b148f2d39197500b1b0c342d8561c1

                SHA256

                9a2fd341a2811c1ce5b3fa198c52a3e9f074c6338dff3be017fb53dcd9f0ca88

                SHA512

                f75c037492f2741ce639d4b5536843e3224a359495ae18e9b881496bf7b9e7d8cf68cd9c7083e41c2fba0227396c4f210b6fbea3265669323230506099341c45

              • \Users\Admin\AppData\Local\Temp\agdsk.exe
                MD5

                618c39d0b0b20b2b5449ab2eae8e00a2

                SHA1

                8cb2c1556062e3352b24e7c05f32c65138cb71ac

                SHA256

                e8ba721c624ea94595a594790089702d36e024966bf2110bdf374ee2a292e375

                SHA512

                197a6e6e591d665f2b32ff7e4dd2fea5a1fa81f873d9295ed45617869a4802c24d2eb8c213f30a05b8739c609435493f7d672c5ba8362e009086294b1067555d

              • \Users\Admin\AppData\Local\Temp\agdsk.exe
                MD5

                618c39d0b0b20b2b5449ab2eae8e00a2

                SHA1

                8cb2c1556062e3352b24e7c05f32c65138cb71ac

                SHA256

                e8ba721c624ea94595a594790089702d36e024966bf2110bdf374ee2a292e375

                SHA512

                197a6e6e591d665f2b32ff7e4dd2fea5a1fa81f873d9295ed45617869a4802c24d2eb8c213f30a05b8739c609435493f7d672c5ba8362e009086294b1067555d

              • \Users\Admin\AppData\Local\Temp\agdsk.exe
                MD5

                618c39d0b0b20b2b5449ab2eae8e00a2

                SHA1

                8cb2c1556062e3352b24e7c05f32c65138cb71ac

                SHA256

                e8ba721c624ea94595a594790089702d36e024966bf2110bdf374ee2a292e375

                SHA512

                197a6e6e591d665f2b32ff7e4dd2fea5a1fa81f873d9295ed45617869a4802c24d2eb8c213f30a05b8739c609435493f7d672c5ba8362e009086294b1067555d

              • \Users\Admin\AppData\Local\Temp\agdsk.exe
                MD5

                618c39d0b0b20b2b5449ab2eae8e00a2

                SHA1

                8cb2c1556062e3352b24e7c05f32c65138cb71ac

                SHA256

                e8ba721c624ea94595a594790089702d36e024966bf2110bdf374ee2a292e375

                SHA512

                197a6e6e591d665f2b32ff7e4dd2fea5a1fa81f873d9295ed45617869a4802c24d2eb8c213f30a05b8739c609435493f7d672c5ba8362e009086294b1067555d

              • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                MD5

                7fee8223d6e4f82d6cd115a28f0b6d58

                SHA1

                1b89c25f25253df23426bd9ff6c9208f1202f58b

                SHA256

                a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                SHA512

                3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

              • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                MD5

                7fee8223d6e4f82d6cd115a28f0b6d58

                SHA1

                1b89c25f25253df23426bd9ff6c9208f1202f58b

                SHA256

                a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                SHA512

                3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

              • \Users\Admin\AppData\Local\Temp\jg4_4jaa.exe
                MD5

                338921a2482dbb47a0ac6ba265179316

                SHA1

                8ec2d631aa5a52b7aa1c4c62b788e8dd35e20f49

                SHA256

                90c97549326a337f150c97dc59b7cad89176773cd71851423c2f8ae80472f518

                SHA512

                42b5fc41392b14365250ee832cedd86be590128d9fdf459d1fc8727f818910c86439e63de1b492fd16d695bc915c4a74187191b6be2f59de7470d521984e8f77

              • \Users\Admin\AppData\Local\Temp\jg4_4jaa.exe
                MD5

                338921a2482dbb47a0ac6ba265179316

                SHA1

                8ec2d631aa5a52b7aa1c4c62b788e8dd35e20f49

                SHA256

                90c97549326a337f150c97dc59b7cad89176773cd71851423c2f8ae80472f518

                SHA512

                42b5fc41392b14365250ee832cedd86be590128d9fdf459d1fc8727f818910c86439e63de1b492fd16d695bc915c4a74187191b6be2f59de7470d521984e8f77

              • \Users\Admin\AppData\Local\Temp\jg4_4jaa.exe
                MD5

                338921a2482dbb47a0ac6ba265179316

                SHA1

                8ec2d631aa5a52b7aa1c4c62b788e8dd35e20f49

                SHA256

                90c97549326a337f150c97dc59b7cad89176773cd71851423c2f8ae80472f518

                SHA512

                42b5fc41392b14365250ee832cedd86be590128d9fdf459d1fc8727f818910c86439e63de1b492fd16d695bc915c4a74187191b6be2f59de7470d521984e8f77

              • \Users\Admin\AppData\Local\Temp\jg4_4jaa.exe
                MD5

                338921a2482dbb47a0ac6ba265179316

                SHA1

                8ec2d631aa5a52b7aa1c4c62b788e8dd35e20f49

                SHA256

                90c97549326a337f150c97dc59b7cad89176773cd71851423c2f8ae80472f518

                SHA512

                42b5fc41392b14365250ee832cedd86be590128d9fdf459d1fc8727f818910c86439e63de1b492fd16d695bc915c4a74187191b6be2f59de7470d521984e8f77

              • \Users\Admin\AppData\Local\Temp\pub2.exe
                MD5

                2f7cdfde7eb0692993eceb5c8a876cf1

                SHA1

                1624aba6e1564b2656fddb465ed9a55d77c4da0e

                SHA256

                0dee6602303700df3f5955aa1d8761c970d6dc6b803c5ad77114d9b61ae6c20b

                SHA512

                8ae2ec9f54113a7b7ebe4e1a7c1b70778341bb711e71a1990b22871aabef72cf29fcf6bb9a7c542ebb132caf3a34e1afc833722028c1e1dcb4e8d5fd7b362954

              • \Users\Admin\AppData\Local\Temp\pub2.exe
                MD5

                2f7cdfde7eb0692993eceb5c8a876cf1

                SHA1

                1624aba6e1564b2656fddb465ed9a55d77c4da0e

                SHA256

                0dee6602303700df3f5955aa1d8761c970d6dc6b803c5ad77114d9b61ae6c20b

                SHA512

                8ae2ec9f54113a7b7ebe4e1a7c1b70778341bb711e71a1990b22871aabef72cf29fcf6bb9a7c542ebb132caf3a34e1afc833722028c1e1dcb4e8d5fd7b362954

              • \Users\Admin\AppData\Local\Temp\pub2.exe
                MD5

                2f7cdfde7eb0692993eceb5c8a876cf1

                SHA1

                1624aba6e1564b2656fddb465ed9a55d77c4da0e

                SHA256

                0dee6602303700df3f5955aa1d8761c970d6dc6b803c5ad77114d9b61ae6c20b

                SHA512

                8ae2ec9f54113a7b7ebe4e1a7c1b70778341bb711e71a1990b22871aabef72cf29fcf6bb9a7c542ebb132caf3a34e1afc833722028c1e1dcb4e8d5fd7b362954

              • \Users\Admin\AppData\Local\Temp\pub2.exe
                MD5

                2f7cdfde7eb0692993eceb5c8a876cf1

                SHA1

                1624aba6e1564b2656fddb465ed9a55d77c4da0e

                SHA256

                0dee6602303700df3f5955aa1d8761c970d6dc6b803c5ad77114d9b61ae6c20b

                SHA512

                8ae2ec9f54113a7b7ebe4e1a7c1b70778341bb711e71a1990b22871aabef72cf29fcf6bb9a7c542ebb132caf3a34e1afc833722028c1e1dcb4e8d5fd7b362954

              • \Users\Admin\AppData\Local\Temp\pub2.exe
                MD5

                2f7cdfde7eb0692993eceb5c8a876cf1

                SHA1

                1624aba6e1564b2656fddb465ed9a55d77c4da0e

                SHA256

                0dee6602303700df3f5955aa1d8761c970d6dc6b803c5ad77114d9b61ae6c20b

                SHA512

                8ae2ec9f54113a7b7ebe4e1a7c1b70778341bb711e71a1990b22871aabef72cf29fcf6bb9a7c542ebb132caf3a34e1afc833722028c1e1dcb4e8d5fd7b362954

              • \Users\Admin\AppData\Local\Temp\pzyh.exe
                MD5

                8cbde3982249e20a6f564eb414f06fe4

                SHA1

                6d040b6c0f9d10b07f0b63797aa7bfabf0703925

                SHA256

                4a8a37d0010b2a946e9b202ea07d8b93a29a3ea9a56852678307076e10999c83

                SHA512

                d84863489b5fb2d17ee1df47de735a88d510bb8f5e378126243e34edb017d3ed82807c7dbd5cf6a977601f0e440be12e680679f1ce472619fd0ebbe9579c3e1b

              • \Users\Admin\AppData\Local\Temp\pzyh.exe
                MD5

                8cbde3982249e20a6f564eb414f06fe4

                SHA1

                6d040b6c0f9d10b07f0b63797aa7bfabf0703925

                SHA256

                4a8a37d0010b2a946e9b202ea07d8b93a29a3ea9a56852678307076e10999c83

                SHA512

                d84863489b5fb2d17ee1df47de735a88d510bb8f5e378126243e34edb017d3ed82807c7dbd5cf6a977601f0e440be12e680679f1ce472619fd0ebbe9579c3e1b

              • \Users\Admin\AppData\Local\Temp\pzyh.exe
                MD5

                8cbde3982249e20a6f564eb414f06fe4

                SHA1

                6d040b6c0f9d10b07f0b63797aa7bfabf0703925

                SHA256

                4a8a37d0010b2a946e9b202ea07d8b93a29a3ea9a56852678307076e10999c83

                SHA512

                d84863489b5fb2d17ee1df47de735a88d510bb8f5e378126243e34edb017d3ed82807c7dbd5cf6a977601f0e440be12e680679f1ce472619fd0ebbe9579c3e1b

              • \Users\Admin\AppData\Local\Temp\ujqb.exe
                MD5

                db871ad34723eb55c6fcd7792ac67c2a

                SHA1

                f7a5895ddef594bcfa239b2db21d9b61c46658c9

                SHA256

                e8dfa205b67d6c3783ff622a86298c2a7f779dd5bd82d007d061674feadae847

                SHA512

                b3740804f82fa9bfdfdff81932ebf7f8809faf43a7f569522da11ac8e82efd3746800d40b4ddc097cb8bc056b7d54c7afec40b20bd6a2498803b773d9b31a26e

              • \Users\Admin\AppData\Local\Temp\ujqb.exe
                MD5

                db871ad34723eb55c6fcd7792ac67c2a

                SHA1

                f7a5895ddef594bcfa239b2db21d9b61c46658c9

                SHA256

                e8dfa205b67d6c3783ff622a86298c2a7f779dd5bd82d007d061674feadae847

                SHA512

                b3740804f82fa9bfdfdff81932ebf7f8809faf43a7f569522da11ac8e82efd3746800d40b4ddc097cb8bc056b7d54c7afec40b20bd6a2498803b773d9b31a26e

              • \Users\Admin\AppData\Local\Temp\ujqb.exe
                MD5

                db871ad34723eb55c6fcd7792ac67c2a

                SHA1

                f7a5895ddef594bcfa239b2db21d9b61c46658c9

                SHA256

                e8dfa205b67d6c3783ff622a86298c2a7f779dd5bd82d007d061674feadae847

                SHA512

                b3740804f82fa9bfdfdff81932ebf7f8809faf43a7f569522da11ac8e82efd3746800d40b4ddc097cb8bc056b7d54c7afec40b20bd6a2498803b773d9b31a26e

              • \Users\Admin\AppData\Local\Temp\wf-game.exe
                MD5

                5530c8bf2fddf2afc18b2defc14d3a74

                SHA1

                872b5a3d72b20f64fbe5e5ed1998ea749d0ef648

                SHA256

                6e052a1f2392408efc528e25591b417c14cb1ff6e96faa6ff26b61f61ebfca3c

                SHA512

                a388aa78aecb876d42823c2a06f10f873182eacd18c31ae52323014f635e13fab16b07b0752462ad02fd9cdbba47c269bbcf4dacb89be39f0352bc02ee09ae0b

              • \Users\Admin\AppData\Local\Temp\wf-game.exe
                MD5

                5530c8bf2fddf2afc18b2defc14d3a74

                SHA1

                872b5a3d72b20f64fbe5e5ed1998ea749d0ef648

                SHA256

                6e052a1f2392408efc528e25591b417c14cb1ff6e96faa6ff26b61f61ebfca3c

                SHA512

                a388aa78aecb876d42823c2a06f10f873182eacd18c31ae52323014f635e13fab16b07b0752462ad02fd9cdbba47c269bbcf4dacb89be39f0352bc02ee09ae0b

              • \Users\Admin\AppData\Local\Temp\wf-game.exe
                MD5

                5530c8bf2fddf2afc18b2defc14d3a74

                SHA1

                872b5a3d72b20f64fbe5e5ed1998ea749d0ef648

                SHA256

                6e052a1f2392408efc528e25591b417c14cb1ff6e96faa6ff26b61f61ebfca3c

                SHA512

                a388aa78aecb876d42823c2a06f10f873182eacd18c31ae52323014f635e13fab16b07b0752462ad02fd9cdbba47c269bbcf4dacb89be39f0352bc02ee09ae0b

              • \Users\Admin\AppData\Local\Temp\wf-game.exe
                MD5

                5530c8bf2fddf2afc18b2defc14d3a74

                SHA1

                872b5a3d72b20f64fbe5e5ed1998ea749d0ef648

                SHA256

                6e052a1f2392408efc528e25591b417c14cb1ff6e96faa6ff26b61f61ebfca3c

                SHA512

                a388aa78aecb876d42823c2a06f10f873182eacd18c31ae52323014f635e13fab16b07b0752462ad02fd9cdbba47c269bbcf4dacb89be39f0352bc02ee09ae0b

              • \Users\Admin\AppData\Local\Temp\wf-game.exe
                MD5

                5530c8bf2fddf2afc18b2defc14d3a74

                SHA1

                872b5a3d72b20f64fbe5e5ed1998ea749d0ef648

                SHA256

                6e052a1f2392408efc528e25591b417c14cb1ff6e96faa6ff26b61f61ebfca3c

                SHA512

                a388aa78aecb876d42823c2a06f10f873182eacd18c31ae52323014f635e13fab16b07b0752462ad02fd9cdbba47c269bbcf4dacb89be39f0352bc02ee09ae0b

              • memory/332-134-0x0000000000000000-mapping.dmp
              • memory/780-109-0x0000000000000000-mapping.dmp
              • memory/856-174-0x0000000001000000-0x0000000001001000-memory.dmp
                Filesize

                4KB

              • memory/856-182-0x0000000000F30000-0x0000000000F6A000-memory.dmp
                Filesize

                232KB

              • memory/856-128-0x0000000000000000-mapping.dmp
              • memory/856-164-0x0000000001170000-0x0000000001171000-memory.dmp
                Filesize

                4KB

              • memory/856-169-0x0000000000460000-0x0000000000461000-memory.dmp
                Filesize

                4KB

              • memory/856-184-0x0000000000490000-0x0000000000491000-memory.dmp
                Filesize

                4KB

              • memory/872-175-0x0000000002670000-0x00000000026D7000-memory.dmp
                Filesize

                412KB

              • memory/872-172-0x0000000000320000-0x0000000000364000-memory.dmp
                Filesize

                272KB

              • memory/1000-205-0x0000000000000000-mapping.dmp
              • memory/1068-65-0x0000000000000000-mapping.dmp
              • memory/1104-155-0x0000000000000000-mapping.dmp
              • memory/1128-161-0x0000000000400000-0x0000000000A16000-memory.dmp
                Filesize

                6.1MB

              • memory/1128-157-0x0000000000220000-0x0000000000229000-memory.dmp
                Filesize

                36KB

              • memory/1128-141-0x0000000000000000-mapping.dmp
              • memory/1200-226-0x0000000000000000-mapping.dmp
              • memory/1208-201-0x0000000004030000-0x0000000004046000-memory.dmp
                Filesize

                88KB

              • memory/1240-72-0x0000000000000000-mapping.dmp
              • memory/1256-230-0x0000000000400000-0x0000000002C36000-memory.dmp
                Filesize

                40.2MB

              • memory/1256-227-0x0000000000000000-mapping.dmp
              • memory/1256-156-0x0000000000220000-0x00000000002B4000-memory.dmp
                Filesize

                592KB

              • memory/1256-160-0x0000000000400000-0x00000000004C1000-memory.dmp
                Filesize

                772KB

              • memory/1256-126-0x0000000000000000-mapping.dmp
              • memory/1328-146-0x0000000000000000-mapping.dmp
              • memory/1544-107-0x0000000000180000-0x00000000001BA000-memory.dmp
                Filesize

                232KB

              • memory/1544-108-0x0000000000250000-0x00000000002A6000-memory.dmp
                Filesize

                344KB

              • memory/1544-97-0x0000000000000000-mapping.dmp
              • memory/1576-225-0x0000000000400000-0x0000000002C36000-memory.dmp
                Filesize

                40.2MB

              • memory/1576-224-0x0000000004550000-0x000000000466A000-memory.dmp
                Filesize

                1.1MB

              • memory/1576-222-0x0000000000000000-mapping.dmp
              • memory/1592-116-0x00000000003A0000-0x00000000003A1000-memory.dmp
                Filesize

                4KB

              • memory/1592-110-0x0000000000000000-mapping.dmp
              • memory/1592-120-0x00000000006A0000-0x00000000006D3000-memory.dmp
                Filesize

                204KB

              • memory/1592-121-0x0000000000970000-0x0000000000971000-memory.dmp
                Filesize

                4KB

              • memory/1592-113-0x0000000000F00000-0x0000000000F01000-memory.dmp
                Filesize

                4KB

              • memory/1592-115-0x0000000000350000-0x0000000000351000-memory.dmp
                Filesize

                4KB

              • memory/1704-163-0x0000000000C70000-0x0000000000C71000-memory.dmp
                Filesize

                4KB

              • memory/1704-200-0x0000000000650000-0x0000000000655000-memory.dmp
                Filesize

                20KB

              • memory/1704-216-0x00000000042B0000-0x00000000042F2000-memory.dmp
                Filesize

                264KB

              • memory/1704-215-0x00000000052F0000-0x000000000537D000-memory.dmp
                Filesize

                564KB

              • memory/1704-122-0x0000000000000000-mapping.dmp
              • memory/1704-177-0x0000000000A00000-0x0000000000A01000-memory.dmp
                Filesize

                4KB

              • memory/1712-98-0x00000000003E0000-0x0000000000400000-memory.dmp
                Filesize

                128KB

              • memory/1712-96-0x000000001AF40000-0x000000001AF42000-memory.dmp
                Filesize

                8KB

              • memory/1712-95-0x0000000000240000-0x0000000000241000-memory.dmp
                Filesize

                4KB

              • memory/1712-92-0x0000000000D50000-0x0000000000D51000-memory.dmp
                Filesize

                4KB

              • memory/1712-89-0x0000000000000000-mapping.dmp
              • memory/1712-99-0x0000000000250000-0x0000000000251000-memory.dmp
                Filesize

                4KB

              • memory/1820-60-0x0000000076641000-0x0000000076643000-memory.dmp
                Filesize

                8KB

              • memory/1956-171-0x00000000004A0000-0x00000000004A1000-memory.dmp
                Filesize

                4KB

              • memory/1956-162-0x0000000001130000-0x0000000001131000-memory.dmp
                Filesize

                4KB

              • memory/1956-178-0x00000000047E0000-0x00000000047E1000-memory.dmp
                Filesize

                4KB

              • memory/1956-117-0x0000000000000000-mapping.dmp
              • memory/1956-179-0x00000000004B0000-0x00000000004B1000-memory.dmp
                Filesize

                4KB

              • memory/1956-176-0x00000000004D0000-0x00000000004E2000-memory.dmp
                Filesize

                72KB

              • memory/1968-80-0x0000000000000000-mapping.dmp
              • memory/2124-247-0x0000000005360000-0x0000000005361000-memory.dmp
                Filesize

                4KB

              • memory/2124-242-0x0000000004900000-0x0000000004901000-memory.dmp
                Filesize

                4KB

              • memory/2124-235-0x0000000000000000-mapping.dmp
              • memory/2124-241-0x0000000000A70000-0x0000000000A71000-memory.dmp
                Filesize

                4KB

              • memory/2124-243-0x00000000048C0000-0x00000000048C1000-memory.dmp
                Filesize

                4KB

              • memory/2124-245-0x00000000048C2000-0x00000000048C3000-memory.dmp
                Filesize

                4KB

              • memory/2124-246-0x00000000046C0000-0x00000000046C1000-memory.dmp
                Filesize

                4KB

              • memory/2148-173-0x00000000FF7F246C-mapping.dmp
              • memory/2148-207-0x0000000002AC0000-0x0000000002BC5000-memory.dmp
                Filesize

                1.0MB

              • memory/2148-193-0x0000000000460000-0x00000000004C7000-memory.dmp
                Filesize

                412KB

              • memory/2236-233-0x0000000000000000-mapping.dmp
              • memory/2236-237-0x0000000000400000-0x000000000044D000-memory.dmp
                Filesize

                308KB

              • memory/2312-204-0x0000000000000000-mapping.dmp
              • memory/2324-208-0x0000000000430000-0x000000000043B000-memory.dmp
                Filesize

                44KB

              • memory/2324-195-0x0000000004C80000-0x0000000004C81000-memory.dmp
                Filesize

                4KB

              • memory/2324-188-0x00000000010C0000-0x00000000010C1000-memory.dmp
                Filesize

                4KB

              • memory/2324-186-0x0000000000000000-mapping.dmp
              • memory/2340-239-0x0000000000000000-mapping.dmp
              • memory/2340-244-0x0000000000400000-0x000000000044D000-memory.dmp
                Filesize

                308KB

              • memory/2352-187-0x0000000000880000-0x0000000000881000-memory.dmp
                Filesize

                4KB

              • memory/2352-185-0x0000000000000000-mapping.dmp
              • memory/2352-196-0x0000000004980000-0x0000000004981000-memory.dmp
                Filesize

                4KB

              • memory/2448-248-0x0000000000000000-mapping.dmp
              • memory/2528-209-0x0000000000400000-0x000000000041C000-memory.dmp
                Filesize

                112KB

              • memory/2528-210-0x00000000004163C6-mapping.dmp
              • memory/2528-211-0x0000000000400000-0x000000000041C000-memory.dmp
                Filesize

                112KB

              • memory/2528-214-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
                Filesize

                4KB

              • memory/2564-213-0x0000000000000000-mapping.dmp
              • memory/2908-198-0x0000000000000000-mapping.dmp
              • memory/2944-206-0x0000000000000000-mapping.dmp
              • memory/2984-199-0x0000000000000000-mapping.dmp
              • memory/3020-221-0x0000000004D70000-0x0000000004D71000-memory.dmp
                Filesize

                4KB

              • memory/3020-219-0x0000000000400000-0x000000000041C000-memory.dmp
                Filesize

                112KB

              • memory/3020-218-0x00000000004163CA-mapping.dmp
              • memory/3020-217-0x0000000000400000-0x000000000041C000-memory.dmp
                Filesize

                112KB

              • memory/3048-236-0x0000000000400000-0x000000000044D000-memory.dmp
                Filesize

                308KB

              • memory/3048-231-0x0000000000000000-mapping.dmp
              • memory/3060-202-0x0000000000000000-mapping.dmp