Analysis

  • max time kernel
    123s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    18-12-2021 10:37

General

  • Target

    6f6df17ecbcbdce8c857e85a368801a9.exe

  • Size

    383KB

  • MD5

    6f6df17ecbcbdce8c857e85a368801a9

  • SHA1

    03491534e6c3fc9627899be5f9d7b053da57dfab

  • SHA256

    23ae7c16bd46eb8cb7a8c34e6d903c0bb613628245a9471db6f31fd27b12e06d

  • SHA512

    57efc2bbaf4ff80022bd7bae17371ff894c6f73482e9c7d2f6c25b548a922f225396bce441348c06a8723e9922cb99e1628e7c5b98de22f8e50446af548403de

Malware Config

Extracted

Family

cryptbot

C2

sezdne62.top

morgwa06.top

Attributes
  • payload_url

    http://ekuwac17.top/download.php?file=boulle.exe

Extracted

Family

danabot

Botnet

4

C2

142.11.244.223:443

23.106.122.139:443

Attributes
  • embedded_hash

    0FA95F120D6EB149A5D48E36BC76879D

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f6df17ecbcbdce8c857e85a368801a9.exe
    "C:\Users\Admin\AppData\Local\Temp\6f6df17ecbcbdce8c857e85a368801a9.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
        "C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
          "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
          4⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          PID:2036
      • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
        "C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\Users\Admin\AppData\Local\Temp\ovrqiav.exe
          "C:\Users\Admin\AppData\Local\Temp\ovrqiav.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3620
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\OVRQIA~1.DLL,s C:\Users\Admin\AppData\Local\Temp\ovrqiav.exe
            5⤵
            • Loads dropped DLL
            PID:2268
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wodbexs.vbs"
          4⤵
            PID:2400
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\adkqraqkrobl.vbs"
            4⤵
            • Blocklisted process makes network request
            PID:2960
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6f6df17ecbcbdce8c857e85a368801a9.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3284
        • C:\Windows\SysWOW64\timeout.exe
          timeout 4
          3⤵
          • Delays execution with timeout.exe
          PID:1816

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
      MD5

      54e9306f95f32e50ccd58af19753d929

      SHA1

      eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

      SHA256

      45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

      SHA512

      8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
      MD5

      7e2fada5d2f5cc3aa089490a1e763a0a

      SHA1

      458c673516b9f05463c201cec75e20846e13e505

      SHA256

      22b76ac25067f0545b291d74a449bd9f5bee517b7d673217620b97cdcd03076b

      SHA512

      b88bf4dc9c5559186fe3678aaeb63b700a66157c8012a425c57644896589075adf5a0ea15e5e58ffe58e20fa91b488f4a0babf1c7ddf220fa5e1ae3184460a86

    • C:\Users\Admin\AppData\Local\Temp\File.exe
      MD5

      b07af9e0cae7f5541c447749a0ac2bfb

      SHA1

      5420cdb06b2482f38c63ddf85ca65a4f836c2c42

      SHA256

      1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e

      SHA512

      26b9dbf93f9bf554e34e86391b3a8c78da25d678d9b9e583f7a77d503da241974320722bfbd948abe640678aa9aaa643acbea471d5e1eb9ab7b1e406ce680a2c

    • C:\Users\Admin\AppData\Local\Temp\File.exe
      MD5

      b07af9e0cae7f5541c447749a0ac2bfb

      SHA1

      5420cdb06b2482f38c63ddf85ca65a4f836c2c42

      SHA256

      1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e

      SHA512

      26b9dbf93f9bf554e34e86391b3a8c78da25d678d9b9e583f7a77d503da241974320722bfbd948abe640678aa9aaa643acbea471d5e1eb9ab7b1e406ce680a2c

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\GRZKAO~1.ZIP
      MD5

      1215f2a45380a502fe009a2ad1aa8750

      SHA1

      94adeb2f13021cada19ff95e308a709c0a75039a

      SHA256

      e1b1930c9f34b57ce91d331316ddfb52055d68d47559b2176db3628342eed04b

      SHA512

      2b7ffc7c9e6bc76e71a6437d63f741aeec511980899317c10c725c8e01031277b6604a117441eed0473b493f3474816d3fe0a545082023aba2098720cb71e682

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\UCJDVH~1.ZIP
      MD5

      43ebf52e6cbc9df305c94c4e95049150

      SHA1

      bbe80ac8a717bbe2c2a7d3c939241074dd7f74f3

      SHA256

      e397d8d0206bf73daa36a4ed999b1680f9988506bfef4032d21071c6a82a0e87

      SHA512

      012f30eec6dc762310ea89bba83c39abd7d16a9ecf8e19b70b250823638cfd70a6b968e6b49c0f1314924b59a148d647404260a61a766831eb1ce9fa32ec1b7f

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\_Files\_Chrome\DEFAUL~1.BIN
      MD5

      f4b8e6e7ca32ed5ab1653cc327475cc0

      SHA1

      e7c30740b8cc28534d398ff4036e0cc6649619ce

      SHA256

      34abcff7dd7e3157dc78b58d9fc7ce57be556a550bcc6a2b2257c9b08107cbe2

      SHA512

      edc72a374b28b984d8d3ced5a27ddb1a91e843ab873f7b700eecea87c0dfea961359f7931ea127ee2b8edc2602968795c6b9f121622dffca23241736c44d8ae2

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\_Files\_Chrome\DEFAUL~1.DB
      MD5

      b608d407fc15adea97c26936bc6f03f6

      SHA1

      953e7420801c76393902c0d6bb56148947e41571

      SHA256

      b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

      SHA512

      cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\_Files\_Chrome\DEFAUL~2.DB
      MD5

      055c8c5c47424f3c2e7a6fc2ee904032

      SHA1

      5952781d22cff35d94861fac25d89a39af6d0a87

      SHA256

      531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

      SHA512

      c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\_Files\_Chrome\DEFAUL~3.DB
      MD5

      8ee018331e95a610680a789192a9d362

      SHA1

      e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

      SHA256

      94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

      SHA512

      4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\_Files\_Files\PushSkip.txt
      MD5

      477bfe325aaa3f930f27c0fc9d17ce60

      SHA1

      f2a2b9449320fa9ce3704d0704769e74f3174f1a

      SHA256

      952dee0fa431960103197bb940acdaba5d15e51a1fad9a291a6d8ac30f7f5649

      SHA512

      fa0e818becfd84c411e5037a476e79a613916e2a9aed7abe21dcbd276eab863057ff82364013e42ada4e8048e86c793f43a688a002b1c82413637768b7b5afcf

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\_Files\_INFOR~1.TXT
      MD5

      7b93c9186880a7ef1c755926268ad4cc

      SHA1

      615ee73d851fbed2af6d8334a1cdc3684c100da8

      SHA256

      73377b77a1def911d1de3547f3821b9bbf6b8b527a7215d7670aa0f79ae81282

      SHA512

      aaba22f062ac72b91b1b4808fbc5d894d5fd99a2f6c440aea8bb77c8306f75e1864e27f221c24dac0a61a58d563b20cb7ef972196bc9da9d5e39e4746ff9737a

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\_Files\_SCREE~1.JPE
      MD5

      25b02a9572cc8b138f727bdb83816c14

      SHA1

      07fcbb6f7bb7cf3cce4f64679b73561498f3c413

      SHA256

      f78e1b9b8cdbb0964777e2f7d5f1586559ef5d40263676036c26b9a1ad09611a

      SHA512

      41d3fb3a4cc1383fe87fae87607fd4d3f28380b95dcaa5be44bcd557bf285910d6211b70fbf61d8325e480ccbb76b228e95c48e522908af8c8c6dff6f05049c3

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\files_\SCREEN~1.JPG
      MD5

      25b02a9572cc8b138f727bdb83816c14

      SHA1

      07fcbb6f7bb7cf3cce4f64679b73561498f3c413

      SHA256

      f78e1b9b8cdbb0964777e2f7d5f1586559ef5d40263676036c26b9a1ad09611a

      SHA512

      41d3fb3a4cc1383fe87fae87607fd4d3f28380b95dcaa5be44bcd557bf285910d6211b70fbf61d8325e480ccbb76b228e95c48e522908af8c8c6dff6f05049c3

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\files_\SYSTEM~1.TXT
      MD5

      7b93c9186880a7ef1c755926268ad4cc

      SHA1

      615ee73d851fbed2af6d8334a1cdc3684c100da8

      SHA256

      73377b77a1def911d1de3547f3821b9bbf6b8b527a7215d7670aa0f79ae81282

      SHA512

      aaba22f062ac72b91b1b4808fbc5d894d5fd99a2f6c440aea8bb77c8306f75e1864e27f221c24dac0a61a58d563b20cb7ef972196bc9da9d5e39e4746ff9737a

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\files_\_Chrome\DEFAUL~1.BIN
      MD5

      f4b8e6e7ca32ed5ab1653cc327475cc0

      SHA1

      e7c30740b8cc28534d398ff4036e0cc6649619ce

      SHA256

      34abcff7dd7e3157dc78b58d9fc7ce57be556a550bcc6a2b2257c9b08107cbe2

      SHA512

      edc72a374b28b984d8d3ced5a27ddb1a91e843ab873f7b700eecea87c0dfea961359f7931ea127ee2b8edc2602968795c6b9f121622dffca23241736c44d8ae2

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\files_\_Chrome\DEFAUL~1.DB
      MD5

      b608d407fc15adea97c26936bc6f03f6

      SHA1

      953e7420801c76393902c0d6bb56148947e41571

      SHA256

      b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

      SHA512

      cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\files_\_Chrome\DEFAUL~2.DB
      MD5

      055c8c5c47424f3c2e7a6fc2ee904032

      SHA1

      5952781d22cff35d94861fac25d89a39af6d0a87

      SHA256

      531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

      SHA512

      c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\files_\_Chrome\DEFAUL~3.DB
      MD5

      8ee018331e95a610680a789192a9d362

      SHA1

      e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

      SHA256

      94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

      SHA512

      4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

    • C:\Users\Admin\AppData\Local\Temp\LfYfZsqfdPJCx\files_\files\PushSkip.txt
      MD5

      477bfe325aaa3f930f27c0fc9d17ce60

      SHA1

      f2a2b9449320fa9ce3704d0704769e74f3174f1a

      SHA256

      952dee0fa431960103197bb940acdaba5d15e51a1fad9a291a6d8ac30f7f5649

      SHA512

      fa0e818becfd84c411e5037a476e79a613916e2a9aed7abe21dcbd276eab863057ff82364013e42ada4e8048e86c793f43a688a002b1c82413637768b7b5afcf

    • C:\Users\Admin\AppData\Local\Temp\OVRQIA~1.DLL
      MD5

      8a3d8f78e751aa999b097cf0ef96b6de

      SHA1

      be0c75cc4233374a60babdc4beb99bf29ae1d39b

      SHA256

      f5978cc57271812435fcd7e9bed652be8a50377717cdf3c199205cfa726f6bb2

      SHA512

      952fd50efbf33c7aedfa8d88365ef8c880fa311f4874dba97463ff4b03a110fb6a27df4b7c7fb8df27d75974e690f5f3139b207c5101dea6631b7e633bf7b353

    • C:\Users\Admin\AppData\Local\Temp\adkqraqkrobl.vbs
      MD5

      f1f9549e916a3b3b2c3a573d4a3c257c

      SHA1

      cf92bdc9a437788c916373f3924cf820f02e5323

      SHA256

      569c86882c9ad18b89942a5f9da54afa5b63dfbd851758f96a6bb66d5ebae0fd

      SHA512

      83eb357eaab3ca02941b4ef2ded7ff2590a20ea1afefcc4b087cc9e1d133bdbec4ab16528d7e0daecc41901155a149d9dd4948d14aae5612c1d6575471f19e56

    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      60a8d5c07264b9058c28548dc18feafe

      SHA1

      e60f40321f2f194e2f2d2d860e11f2c6959e30b3

      SHA256

      528049ab9e8f2ce40419e1ded49dcfd676d65b4b744dbe2490cf1254bfe236ba

      SHA512

      e2ae2e8c00bf3c3d26fa26c0d0c35afd5375edbf90a442fb51f3f5b5bbd9e8c01bc158a19d512430d0be411295dc4489995e42b6af3f19baea1d90b1e6a38903

    • C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe
      MD5

      60a8d5c07264b9058c28548dc18feafe

      SHA1

      e60f40321f2f194e2f2d2d860e11f2c6959e30b3

      SHA256

      528049ab9e8f2ce40419e1ded49dcfd676d65b4b744dbe2490cf1254bfe236ba

      SHA512

      e2ae2e8c00bf3c3d26fa26c0d0c35afd5375edbf90a442fb51f3f5b5bbd9e8c01bc158a19d512430d0be411295dc4489995e42b6af3f19baea1d90b1e6a38903

    • C:\Users\Admin\AppData\Local\Temp\ovrqiav.exe
      MD5

      e30439253fcddef70e664b75590161ef

      SHA1

      422108f8b3c20d467f7d3f311e622b4c5f3ed6df

      SHA256

      98365896cc37bbd213f8e0f4b1d0d98581e7243c84d802eb4966abf276e2945a

      SHA512

      0005908ec2d4ae95cbd52c5185832c9f76bc2c75b677549b920e0329860d47be08dd4750160be261a6e3cfd7f52c206f358610fd862937fb062e8a285cf13d32

    • C:\Users\Admin\AppData\Local\Temp\ovrqiav.exe
      MD5

      e30439253fcddef70e664b75590161ef

      SHA1

      422108f8b3c20d467f7d3f311e622b4c5f3ed6df

      SHA256

      98365896cc37bbd213f8e0f4b1d0d98581e7243c84d802eb4966abf276e2945a

      SHA512

      0005908ec2d4ae95cbd52c5185832c9f76bc2c75b677549b920e0329860d47be08dd4750160be261a6e3cfd7f52c206f358610fd862937fb062e8a285cf13d32

    • C:\Users\Admin\AppData\Local\Temp\wodbexs.vbs
      MD5

      2f59afbeb6136a1fa9e4ef9b3af934c3

      SHA1

      f7469db21d4c7442109835d38582fcc7ef420b7f

      SHA256

      fe8174a8f72d6afd0c840dd7353be27dcff5c0e09a4578921f6c2cb8963dd479

      SHA512

      26bcdc35db11cb74bcb595ae277d7ebe5f6bb74ce44d59b34f871feb4f7ef10d5800e9dc1f819cdee74d4fddc7a862a6039a7c57092b30b91393958cfdaaf24c

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      8d013018cbd8e2de770f984633ad3dc2

      SHA1

      c435e2fddeb819dca3fbbac84dfbffdc9f134b40

      SHA256

      bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3

      SHA512

      c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15

    • \Users\Admin\AppData\Local\Temp\OVRQIA~1.DLL
      MD5

      8a3d8f78e751aa999b097cf0ef96b6de

      SHA1

      be0c75cc4233374a60babdc4beb99bf29ae1d39b

      SHA256

      f5978cc57271812435fcd7e9bed652be8a50377717cdf3c199205cfa726f6bb2

      SHA512

      952fd50efbf33c7aedfa8d88365ef8c880fa311f4874dba97463ff4b03a110fb6a27df4b7c7fb8df27d75974e690f5f3139b207c5101dea6631b7e633bf7b353

    • \Users\Admin\AppData\Local\Temp\OVRQIA~1.DLL
      MD5

      8a3d8f78e751aa999b097cf0ef96b6de

      SHA1

      be0c75cc4233374a60babdc4beb99bf29ae1d39b

      SHA256

      f5978cc57271812435fcd7e9bed652be8a50377717cdf3c199205cfa726f6bb2

      SHA512

      952fd50efbf33c7aedfa8d88365ef8c880fa311f4874dba97463ff4b03a110fb6a27df4b7c7fb8df27d75974e690f5f3139b207c5101dea6631b7e633bf7b353

    • \Users\Admin\AppData\Local\Temp\nsvDE4C.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/428-115-0x00000000007D6000-0x00000000007FC000-memory.dmp
      Filesize

      152KB

    • memory/428-116-0x00000000004F0000-0x000000000063A000-memory.dmp
      Filesize

      1.3MB

    • memory/428-117-0x0000000000400000-0x00000000004E1000-memory.dmp
      Filesize

      900KB

    • memory/1196-147-0x0000000000280000-0x0000000000947000-memory.dmp
      Filesize

      6.8MB

    • memory/1196-149-0x0000000000280000-0x0000000000947000-memory.dmp
      Filesize

      6.8MB

    • memory/1196-150-0x00000000777D0000-0x000000007795E000-memory.dmp
      Filesize

      1.6MB

    • memory/1196-143-0x0000000000000000-mapping.dmp
    • memory/1196-146-0x0000000000280000-0x0000000000947000-memory.dmp
      Filesize

      6.8MB

    • memory/1196-148-0x0000000000280000-0x0000000000947000-memory.dmp
      Filesize

      6.8MB

    • memory/1816-138-0x0000000000000000-mapping.dmp
    • memory/2036-167-0x0000000000D80000-0x00000000014D4000-memory.dmp
      Filesize

      7.3MB

    • memory/2036-168-0x0000000000D80000-0x00000000014D4000-memory.dmp
      Filesize

      7.3MB

    • memory/2036-164-0x0000000000000000-mapping.dmp
    • memory/2036-171-0x0000000000D80000-0x00000000014D4000-memory.dmp
      Filesize

      7.3MB

    • memory/2036-170-0x0000000000D80000-0x00000000014D4000-memory.dmp
      Filesize

      7.3MB

    • memory/2036-169-0x00000000777D0000-0x000000007795E000-memory.dmp
      Filesize

      1.6MB

    • memory/2268-180-0x0000000004110000-0x000000000438C000-memory.dmp
      Filesize

      2.5MB

    • memory/2268-176-0x0000000000000000-mapping.dmp
    • memory/2400-154-0x0000000000000000-mapping.dmp
    • memory/2740-159-0x0000000000A70000-0x00000000011C4000-memory.dmp
      Filesize

      7.3MB

    • memory/2740-158-0x0000000000A70000-0x00000000011C4000-memory.dmp
      Filesize

      7.3MB

    • memory/2740-160-0x00000000777D0000-0x000000007795E000-memory.dmp
      Filesize

      1.6MB

    • memory/2740-157-0x0000000000A70000-0x00000000011C4000-memory.dmp
      Filesize

      7.3MB

    • memory/2740-156-0x0000000000A70000-0x00000000011C4000-memory.dmp
      Filesize

      7.3MB

    • memory/2740-140-0x0000000000000000-mapping.dmp
    • memory/2960-172-0x0000000000000000-mapping.dmp
    • memory/3284-121-0x0000000000000000-mapping.dmp
    • memory/3620-151-0x0000000000000000-mapping.dmp
    • memory/3620-163-0x0000000000400000-0x000000000064D000-memory.dmp
      Filesize

      2.3MB

    • memory/3620-162-0x0000000002560000-0x0000000002706000-memory.dmp
      Filesize

      1.6MB

    • memory/3620-161-0x00000000023CB000-0x000000000255A000-memory.dmp
      Filesize

      1.6MB

    • memory/4004-118-0x0000000000000000-mapping.dmp