Analysis

  • max time kernel
    85s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-ja-20210920
  • submitted
    14-10-2021 17:58

General

  • Target

    http://2.56.59.42/WW/file2.exe

  • Sample

    211014-wkla7aahar

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://gfdjgdfjgdhfbg.space/

http://gfhjdsghdfjg23.space/

http://gdfjgdfh4543nf.space/

http://fgdjgsdfghj4fds.space/

http://fgdgdjfgfdgdf.space/

http://fsdhjfsdhfsd.space/

http://fgdsjghdfghjdfhgd.space/

http://ryuesrseyth3.space/

http://fdsjkuhreyu4.space/

http://fdgjdfgehr4.space/

http://fgdgjhdfgdfjgd.space/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

3dde9cf1ea25ec8623cf240fe8d23e8d3fe465f0

Attributes
  • url4cnc

    http://telegatt.top/d1rolsavage

    http://telegka.top/d1rolsavage

    http://telegin.top/d1rolsavage

    https://t.me/d1rolsavage

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

41.4

Botnet

1041

C2

https://mas.to/@sslam

Attributes
  • profile_id

    1041

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" http://2.56.59.42/WW/file2.exe
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ec4f50,0x7fef6ec4f60,0x7fef6ec4f70
      2⤵
        PID:1252
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1260 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1544
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1168 /prefetch:2
        2⤵
          PID:1340
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1704 /prefetch:8
          2⤵
            PID:2020
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:1
            2⤵
              PID:976
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:1
              2⤵
                PID:1888
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2548 /prefetch:2
                2⤵
                  PID:1752
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3372 /prefetch:8
                  2⤵
                    PID:1400
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3376 /prefetch:8
                    2⤵
                      PID:1632
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3404 /prefetch:8
                      2⤵
                        PID:1784
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:1
                        2⤵
                          PID:1800
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4172 /prefetch:8
                          2⤵
                            PID:2064
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2100
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3444 /prefetch:8
                            2⤵
                              PID:2172
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3352 /prefetch:8
                              2⤵
                                PID:2164
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3424 /prefetch:8
                                2⤵
                                  PID:2248
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3568 /prefetch:8
                                  2⤵
                                    PID:2284
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2292
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3504 /prefetch:8
                                    2⤵
                                      PID:2300
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4284 /prefetch:8
                                      2⤵
                                        PID:2368
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4272 /prefetch:8
                                        2⤵
                                          PID:2404
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4188 /prefetch:8
                                          2⤵
                                            PID:2468
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4212 /prefetch:8
                                            2⤵
                                              PID:2476
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                                              2⤵
                                                PID:2608
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:1
                                                2⤵
                                                  PID:2692
                                              • C:\Users\Admin\Downloads\file2.exe
                                                "C:\Users\Admin\Downloads\file2.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • Checks BIOS information in registry
                                                • Checks whether UAC is enabled
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Checks SCSI registry key(s)
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: MapViewOfSection
                                                PID:2672
                                              • C:\Users\Admin\AppData\Local\Temp\D0B7.exe
                                                C:\Users\Admin\AppData\Local\Temp\D0B7.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:2812
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                  2⤵
                                                    PID:3052
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 472
                                                      3⤵
                                                      • Program crash
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2416
                                                • C:\Users\Admin\AppData\Local\Temp\D52B.exe
                                                  C:\Users\Admin\AppData\Local\Temp\D52B.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:2828
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                    2⤵
                                                      PID:2080
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 844
                                                        3⤵
                                                        • Program crash
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2396
                                                  • C:\Windows\SysWOW64\explorer.exe
                                                    C:\Windows\SysWOW64\explorer.exe
                                                    1⤵
                                                    • Accesses Microsoft Outlook profiles
                                                    • outlook_office_path
                                                    • outlook_win_path
                                                    PID:2844
                                                  • C:\Windows\explorer.exe
                                                    C:\Windows\explorer.exe
                                                    1⤵
                                                      PID:2888
                                                    • C:\Windows\SysWOW64\explorer.exe
                                                      C:\Windows\SysWOW64\explorer.exe
                                                      1⤵
                                                        PID:2996
                                                      • C:\Windows\system32\taskeng.exe
                                                        taskeng.exe {F01E0ED5-BD77-4DEC-8139-C3C957E98891} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
                                                        1⤵
                                                          PID:2116
                                                          • C:\Users\Admin\AppData\Roaming\waswdag
                                                            C:\Users\Admin\AppData\Roaming\waswdag
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Checks BIOS information in registry
                                                            • Checks whether UAC is enabled
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Checks SCSI registry key(s)
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:2228

                                                        Network

                                                        MITRE ATT&CK Matrix ATT&CK v6

                                                        Defense Evasion

                                                        Virtualization/Sandbox Evasion

                                                        1
                                                        T1497

                                                        Discovery

                                                        Query Registry

                                                        4
                                                        T1012

                                                        Virtualization/Sandbox Evasion

                                                        1
                                                        T1497

                                                        System Information Discovery

                                                        4
                                                        T1082

                                                        Peripheral Device Discovery

                                                        1
                                                        T1120

                                                        Collection

                                                        Email Collection

                                                        1
                                                        T1114

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                                                          MD5

                                                          b608d407fc15adea97c26936bc6f03f6

                                                          SHA1

                                                          953e7420801c76393902c0d6bb56148947e41571

                                                          SHA256

                                                          b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

                                                          SHA512

                                                          cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journal
                                                          MD5

                                                          d41d8cd98f00b204e9800998ecf8427e

                                                          SHA1

                                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                          SHA256

                                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                          SHA512

                                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Safe Browsing Cookies
                                                          MD5

                                                          1ff8950ff9c9c0e2ce1b5ca613e1b35b

                                                          SHA1

                                                          d3353cfa2a4335beb006998099e0b0b42dc90593

                                                          SHA256

                                                          77eb6cabb171b18e07249334d2f926e7627d5a8ef9fad7636498d7648607e827

                                                          SHA512

                                                          af850ab64c1c2bceecf02526afd1a12808a95b4a55d91d0d197f99e26382388060c46a61819daf925775f2f0c927984771d095ae60cf169db5b7c10226effe46

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Safe Browsing Cookies-journal
                                                          MD5

                                                          d41d8cd98f00b204e9800998ecf8427e

                                                          SHA1

                                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                          SHA256

                                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                          SHA512

                                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                          MD5

                                                          fc9d2b9676b20cff5d3cf0de358f09e7

                                                          SHA1

                                                          5c990a055d2988a80bf9aa497d0e957ef8e16553

                                                          SHA256

                                                          66d1f5d2e98e31376930da866bc4d8ae85de285370679cb47e70c489dfe0f628

                                                          SHA512

                                                          8c27ed2f8c90b289904eb7ec1936f7977085cc7f4f07d56a22a1c681b4d61a75470ce981aa3cff3939b47fae56f921e8f5e52852d0d1b7b9a7bb7ea8c7d6729b

                                                        • C:\Users\Admin\AppData\Local\Temp\D0B7.exe
                                                          MD5

                                                          3af9e4825401dad74fff57c4d18bf34d

                                                          SHA1

                                                          295602fb281d975ec2e1a9c87a6c1b1f18e24804

                                                          SHA256

                                                          8bac6bc101c07c7eaacab8e9ed0a82a342ebd3c15cfedb9f19ed2f6c0cf30b00

                                                          SHA512

                                                          bb1275edbd4597e8e110e01a15b77bc1acd4c32d5d24e50eb5cec093efe2fbf267cb14ef390b5e0c70e1f2e8a7b6a3de99ad1522e708782c7c520ba52b233b25

                                                        • C:\Users\Admin\AppData\Local\Temp\D52B.exe
                                                          MD5

                                                          b2a2ba8c53eb82a5a0391751b08b942a

                                                          SHA1

                                                          f550a770c0cfe6fb227b19e10cec457bb8b70a39

                                                          SHA256

                                                          ec68412e3d7d2e03fac2fd2b02ccb6050b9e2f0cbc19da5e8c54ed5fa343654e

                                                          SHA512

                                                          7eefd4fc4d62d5219cb2dee38de86dbfedb71bc9ebf0626c2ff7e45c6cc23402d3f2fd1bb7ad173b99d7e63d33261a2f6cc90e7d915ec17945e7713e380ebf2f

                                                        • C:\Users\Admin\AppData\Roaming\waswdag
                                                          MD5

                                                          d7b39bc9ed3a77410619bbad61243ae6

                                                          SHA1

                                                          d5e29c4b0eab182e511ef8b1513462cb5585c52b

                                                          SHA256

                                                          0d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0

                                                          SHA512

                                                          a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302

                                                        • C:\Users\Admin\AppData\Roaming\waswdag
                                                          MD5

                                                          d7b39bc9ed3a77410619bbad61243ae6

                                                          SHA1

                                                          d5e29c4b0eab182e511ef8b1513462cb5585c52b

                                                          SHA256

                                                          0d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0

                                                          SHA512

                                                          a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302

                                                        • C:\Users\Admin\Downloads\file2.exe
                                                          MD5

                                                          d7b39bc9ed3a77410619bbad61243ae6

                                                          SHA1

                                                          d5e29c4b0eab182e511ef8b1513462cb5585c52b

                                                          SHA256

                                                          0d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0

                                                          SHA512

                                                          a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302

                                                        • C:\Users\Admin\Downloads\file2.exe
                                                          MD5

                                                          d7b39bc9ed3a77410619bbad61243ae6

                                                          SHA1

                                                          d5e29c4b0eab182e511ef8b1513462cb5585c52b

                                                          SHA256

                                                          0d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0

                                                          SHA512

                                                          a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302

                                                        • \??\pipe\crashpad_1464_RILISXRYQPDRMSBS
                                                          MD5

                                                          d41d8cd98f00b204e9800998ecf8427e

                                                          SHA1

                                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                          SHA256

                                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                          SHA512

                                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                        • memory/1284-106-0x0000000004D30000-0x0000000004D46000-memory.dmp
                                                          Filesize

                                                          88KB

                                                        • memory/1284-56-0x0000000004CE0000-0x0000000004CF6000-memory.dmp
                                                          Filesize

                                                          88KB

                                                        • memory/2080-97-0x0000000000400000-0x00000000004D9000-memory.dmp
                                                          Filesize

                                                          868KB

                                                        • memory/2080-98-0x0000000000400000-0x00000000004D9000-memory.dmp
                                                          Filesize

                                                          868KB

                                                        • memory/2080-91-0x0000000000400000-0x00000000004D9000-memory.dmp
                                                          Filesize

                                                          868KB

                                                        • memory/2080-95-0x00000000004A18CD-mapping.dmp
                                                        • memory/2080-90-0x0000000000400000-0x00000000004D9000-memory.dmp
                                                          Filesize

                                                          868KB

                                                        • memory/2228-100-0x0000000000000000-mapping.dmp
                                                        • memory/2396-105-0x00000000002F0000-0x0000000000308000-memory.dmp
                                                          Filesize

                                                          96KB

                                                        • memory/2396-103-0x0000000000000000-mapping.dmp
                                                        • memory/2416-107-0x0000000000000000-mapping.dmp
                                                        • memory/2416-109-0x0000000000930000-0x0000000000948000-memory.dmp
                                                          Filesize

                                                          96KB

                                                        • memory/2672-55-0x0000000076481000-0x0000000076483000-memory.dmp
                                                          Filesize

                                                          8KB

                                                        • memory/2812-58-0x0000000000000000-mapping.dmp
                                                        • memory/2828-60-0x0000000000000000-mapping.dmp
                                                        • memory/2844-64-0x0000000075391000-0x0000000075393000-memory.dmp
                                                          Filesize

                                                          8KB

                                                        • memory/2844-62-0x0000000000000000-mapping.dmp
                                                        • memory/2844-71-0x0000000000160000-0x00000000001D4000-memory.dmp
                                                          Filesize

                                                          464KB

                                                        • memory/2844-72-0x00000000000F0000-0x000000000015B000-memory.dmp
                                                          Filesize

                                                          428KB

                                                        • memory/2888-74-0x0000000000060000-0x000000000006C000-memory.dmp
                                                          Filesize

                                                          48KB

                                                        • memory/2888-70-0x0000000000000000-mapping.dmp
                                                        • memory/2888-73-0x0000000000070000-0x0000000000077000-memory.dmp
                                                          Filesize

                                                          28KB

                                                        • memory/2996-78-0x00000000000F0000-0x0000000000112000-memory.dmp
                                                          Filesize

                                                          136KB

                                                        • memory/2996-77-0x0000000075221000-0x0000000075223000-memory.dmp
                                                          Filesize

                                                          8KB

                                                        • memory/2996-75-0x0000000000000000-mapping.dmp
                                                        • memory/2996-79-0x00000000000C0000-0x00000000000E7000-memory.dmp
                                                          Filesize

                                                          156KB

                                                        • memory/3052-88-0x0000000000400000-0x0000000000491000-memory.dmp
                                                          Filesize

                                                          580KB

                                                        • memory/3052-80-0x0000000000400000-0x0000000000491000-memory.dmp
                                                          Filesize

                                                          580KB

                                                        • memory/3052-81-0x0000000000400000-0x0000000000491000-memory.dmp
                                                          Filesize

                                                          580KB

                                                        • memory/3052-86-0x000000000043E9BE-mapping.dmp
                                                        • memory/3052-89-0x0000000000400000-0x0000000000491000-memory.dmp
                                                          Filesize

                                                          580KB