Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    08-01-2022 14:29

General

  • Target

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe

  • Size

    267KB

  • MD5

    c9e9f943d27b1c7e6f13b7e0d90736c8

  • SHA1

    f7eea14657a9630011a3c68f5dad67bf2621d183

  • SHA256

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29

  • SHA512

    fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

10da56e7e71e97bdc1f36eb76813bbc3231de7e4

Attributes
  • url4cnc

    http://194.180.174.53/capibar

    http://91.219.236.18/capibar

    http://194.180.174.41/capibar

    http://91.219.236.148/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Arkei Stealer Payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe
    "C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe
      "C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3956
  • C:\Users\Admin\AppData\Local\Temp\F703.exe
    C:\Users\Admin\AppData\Local\Temp\F703.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\F703.exe
      C:\Users\Admin\AppData\Local\Temp\F703.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:2740
  • C:\Users\Admin\AppData\Local\Temp\1644.exe
    C:\Users\Admin\AppData\Local\Temp\1644.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1588
  • C:\Users\Admin\AppData\Local\Temp\3631.exe
    C:\Users\Admin\AppData\Local\Temp\3631.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3631.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:2940
  • C:\Users\Admin\AppData\Roaming\wdgiseg
    C:\Users\Admin\AppData\Roaming\wdgiseg
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Roaming\wdgiseg
      C:\Users\Admin\AppData\Roaming\wdgiseg
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1396
  • C:\Users\Admin\AppData\Local\Temp\496C.exe
    C:\Users\Admin\AppData\Local\Temp\496C.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\496C.exe
      C:\Users\Admin\AppData\Local\Temp\496C.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2304
  • C:\Users\Admin\AppData\Local\Temp\B99C.exe
    C:\Users\Admin\AppData\Local\Temp\B99C.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B99C.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:3092
  • C:\Users\Admin\AppData\Local\Temp\CF86.exe
    C:\Users\Admin\AppData\Local\Temp\CF86.exe
    1⤵
    • Executes dropped EXE
    PID:2772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 1188
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3264
  • C:\Users\Admin\AppData\Local\Temp\FBE6.exe
    C:\Users\Admin\AppData\Local\Temp\FBE6.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:668
  • C:\Users\Admin\AppData\Local\Temp\D0E.exe
    C:\Users\Admin\AppData\Local\Temp\D0E.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Users\Admin\AppData\Local\Temp\dllhost.exe
      "C:\Users\Admin\AppData\Local\Temp\dllhost.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2232
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2232 -s 1464
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1252
  • C:\Users\Admin\AppData\Local\Temp\18A8.exe
    C:\Users\Admin\AppData\Local\Temp\18A8.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3728
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3728 -s 1812
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:952
  • C:\Users\Admin\AppData\Local\Temp\224D.exe
    C:\Users\Admin\AppData\Local\Temp\224D.exe
    1⤵
    • Executes dropped EXE
    PID:836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 400
      2⤵
      • Drops file in Windows directory
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2892

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\496C.exe.log
    MD5

    41fbed686f5700fc29aaccf83e8ba7fd

    SHA1

    5271bc29538f11e42a3b600c8dc727186e912456

    SHA256

    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

    SHA512

    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

  • C:\Users\Admin\AppData\Local\Temp\1644.exe
    MD5

    1f935bfff0f8128972bc69625e5b2a6c

    SHA1

    18db55c519bbe14311662a06faeecc97566e2afd

    SHA256

    2bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d

    SHA512

    2c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d

  • C:\Users\Admin\AppData\Local\Temp\1644.exe
    MD5

    1f935bfff0f8128972bc69625e5b2a6c

    SHA1

    18db55c519bbe14311662a06faeecc97566e2afd

    SHA256

    2bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d

    SHA512

    2c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d

  • C:\Users\Admin\AppData\Local\Temp\18A8.exe
    MD5

    a14bb1b40237f948bdd1db8ebbe3c5ef

    SHA1

    241074187e57642d16ddd08ed940eafee6f21314

    SHA256

    51e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e

    SHA512

    1851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab

  • C:\Users\Admin\AppData\Local\Temp\18A8.exe
    MD5

    a14bb1b40237f948bdd1db8ebbe3c5ef

    SHA1

    241074187e57642d16ddd08ed940eafee6f21314

    SHA256

    51e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e

    SHA512

    1851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab

  • C:\Users\Admin\AppData\Local\Temp\224D.exe
    MD5

    2f08733bdd7dc332033f3965362020dd

    SHA1

    d369719f0cdecb3f65fe86d3f24d85c27ed919ed

    SHA256

    66805bc10196803d9ff93e819a7ecc84867607d8342b01fd614abc58b332a545

    SHA512

    87a582d0fe780385f0cdf59b2c52145b644cb69045751ab23e974cd0d7db5cca6188e44bd41536f84be92a72ba4eaa5c5a2ac228393a251441dee7d0ff047d38

  • C:\Users\Admin\AppData\Local\Temp\224D.exe
    MD5

    2f08733bdd7dc332033f3965362020dd

    SHA1

    d369719f0cdecb3f65fe86d3f24d85c27ed919ed

    SHA256

    66805bc10196803d9ff93e819a7ecc84867607d8342b01fd614abc58b332a545

    SHA512

    87a582d0fe780385f0cdf59b2c52145b644cb69045751ab23e974cd0d7db5cca6188e44bd41536f84be92a72ba4eaa5c5a2ac228393a251441dee7d0ff047d38

  • C:\Users\Admin\AppData\Local\Temp\3631.exe
    MD5

    8665189d8bffdd7f0ccc67b66df5d11b

    SHA1

    5c1bfde2bf91f594fe373a4aa510848422b8c264

    SHA256

    1388e957020a3909ddc6a9570326c868ecc12a6e39f6029e1cf8b2c342e1fea9

    SHA512

    9617b6d98c9124d2c1e2e554be4de61bc0aadfd1cc0c577a2dc7a500d4f22d7dd1e81b45c208388fccf316858b18a6763a3e78c9a797bbba889d27ba6c341149

  • C:\Users\Admin\AppData\Local\Temp\3631.exe
    MD5

    8665189d8bffdd7f0ccc67b66df5d11b

    SHA1

    5c1bfde2bf91f594fe373a4aa510848422b8c264

    SHA256

    1388e957020a3909ddc6a9570326c868ecc12a6e39f6029e1cf8b2c342e1fea9

    SHA512

    9617b6d98c9124d2c1e2e554be4de61bc0aadfd1cc0c577a2dc7a500d4f22d7dd1e81b45c208388fccf316858b18a6763a3e78c9a797bbba889d27ba6c341149

  • C:\Users\Admin\AppData\Local\Temp\496C.exe
    MD5

    9c40df5e45e0c3095f7b920664a902d3

    SHA1

    795049f091e0d3a31e7b9c1091bd62bed71fb62e

    SHA256

    7afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b

    SHA512

    7c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb

  • C:\Users\Admin\AppData\Local\Temp\496C.exe
    MD5

    9c40df5e45e0c3095f7b920664a902d3

    SHA1

    795049f091e0d3a31e7b9c1091bd62bed71fb62e

    SHA256

    7afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b

    SHA512

    7c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb

  • C:\Users\Admin\AppData\Local\Temp\496C.exe
    MD5

    9c40df5e45e0c3095f7b920664a902d3

    SHA1

    795049f091e0d3a31e7b9c1091bd62bed71fb62e

    SHA256

    7afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b

    SHA512

    7c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb

  • C:\Users\Admin\AppData\Local\Temp\B99C.exe
    MD5

    8da8a8243f31492604ca9d893d877388

    SHA1

    d4bdfb1a7873cc2f81928712ac0e0a6a00c7592b

    SHA256

    af01a7c85a964816f29a90703ab0db0e4afda17e5ab4842a0d7f353284f17646

    SHA512

    c4a5b67278b5fc1700b45e21000db911176929998fe3f624511763c6a3092e48da30de651b30b94297f14f1c0edec8e295c9ac5bf98e55be51cacd2ae457cbdf

  • C:\Users\Admin\AppData\Local\Temp\B99C.exe
    MD5

    8da8a8243f31492604ca9d893d877388

    SHA1

    d4bdfb1a7873cc2f81928712ac0e0a6a00c7592b

    SHA256

    af01a7c85a964816f29a90703ab0db0e4afda17e5ab4842a0d7f353284f17646

    SHA512

    c4a5b67278b5fc1700b45e21000db911176929998fe3f624511763c6a3092e48da30de651b30b94297f14f1c0edec8e295c9ac5bf98e55be51cacd2ae457cbdf

  • C:\Users\Admin\AppData\Local\Temp\CF86.exe
    MD5

    c085684db882063c21f18d251679b0cc

    SHA1

    2b5e71123abdb276913e4438ad89f4ed1616950a

    SHA256

    cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470

    SHA512

    8158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7

  • C:\Users\Admin\AppData\Local\Temp\CF86.exe
    MD5

    c085684db882063c21f18d251679b0cc

    SHA1

    2b5e71123abdb276913e4438ad89f4ed1616950a

    SHA256

    cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470

    SHA512

    8158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7

  • C:\Users\Admin\AppData\Local\Temp\D0E.exe
    MD5

    a14bb1b40237f948bdd1db8ebbe3c5ef

    SHA1

    241074187e57642d16ddd08ed940eafee6f21314

    SHA256

    51e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e

    SHA512

    1851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab

  • C:\Users\Admin\AppData\Local\Temp\D0E.exe
    MD5

    a14bb1b40237f948bdd1db8ebbe3c5ef

    SHA1

    241074187e57642d16ddd08ed940eafee6f21314

    SHA256

    51e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e

    SHA512

    1851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab

  • C:\Users\Admin\AppData\Local\Temp\F703.exe
    MD5

    c9e9f943d27b1c7e6f13b7e0d90736c8

    SHA1

    f7eea14657a9630011a3c68f5dad67bf2621d183

    SHA256

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29

    SHA512

    fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb

  • C:\Users\Admin\AppData\Local\Temp\F703.exe
    MD5

    c9e9f943d27b1c7e6f13b7e0d90736c8

    SHA1

    f7eea14657a9630011a3c68f5dad67bf2621d183

    SHA256

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29

    SHA512

    fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb

  • C:\Users\Admin\AppData\Local\Temp\F703.exe
    MD5

    c9e9f943d27b1c7e6f13b7e0d90736c8

    SHA1

    f7eea14657a9630011a3c68f5dad67bf2621d183

    SHA256

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29

    SHA512

    fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb

  • C:\Users\Admin\AppData\Local\Temp\FBE6.exe
    MD5

    63eb415c553b5c2204f1bb46213b10c4

    SHA1

    340e4b38773bf186749b0055c2ab3696efb61718

    SHA256

    0e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023

    SHA512

    92fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b

  • C:\Users\Admin\AppData\Local\Temp\FBE6.exe
    MD5

    63eb415c553b5c2204f1bb46213b10c4

    SHA1

    340e4b38773bf186749b0055c2ab3696efb61718

    SHA256

    0e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023

    SHA512

    92fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b

  • C:\Users\Admin\AppData\Local\Temp\dllhost.exe
    MD5

    7f34900d68ed5d0cbf791e0f445bcdca

    SHA1

    3dd65dd03120e099270c94f7ececf4aa51dc805b

    SHA256

    e122401c4ab2e6e74fe004d53177e7950b3a12226335bb217337b2a237e6f791

    SHA512

    1a73af71a04e750509d40f5c79fcf58ff0058c49d51b1e4f433b35a76a0774fc350e89089544727c67a394d61312a81c29cd19fe639ee4cffab40b27160d1ca5

  • C:\Users\Admin\AppData\Local\Temp\dllhost.exe
    MD5

    7f34900d68ed5d0cbf791e0f445bcdca

    SHA1

    3dd65dd03120e099270c94f7ececf4aa51dc805b

    SHA256

    e122401c4ab2e6e74fe004d53177e7950b3a12226335bb217337b2a237e6f791

    SHA512

    1a73af71a04e750509d40f5c79fcf58ff0058c49d51b1e4f433b35a76a0774fc350e89089544727c67a394d61312a81c29cd19fe639ee4cffab40b27160d1ca5

  • C:\Users\Admin\AppData\Roaming\wdgiseg
    MD5

    c9e9f943d27b1c7e6f13b7e0d90736c8

    SHA1

    f7eea14657a9630011a3c68f5dad67bf2621d183

    SHA256

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29

    SHA512

    fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb

  • C:\Users\Admin\AppData\Roaming\wdgiseg
    MD5

    c9e9f943d27b1c7e6f13b7e0d90736c8

    SHA1

    f7eea14657a9630011a3c68f5dad67bf2621d183

    SHA256

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29

    SHA512

    fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb

  • C:\Users\Admin\AppData\Roaming\wdgiseg
    MD5

    c9e9f943d27b1c7e6f13b7e0d90736c8

    SHA1

    f7eea14657a9630011a3c68f5dad67bf2621d183

    SHA256

    07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29

    SHA512

    fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb

  • \ProgramData\mozglue.dll
    MD5

    8f73c08a9660691143661bf7332c3c27

    SHA1

    37fa65dd737c50fda710fdbde89e51374d0c204a

    SHA256

    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

    SHA512

    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

  • \ProgramData\mozglue.dll
    MD5

    8f73c08a9660691143661bf7332c3c27

    SHA1

    37fa65dd737c50fda710fdbde89e51374d0c204a

    SHA256

    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

    SHA512

    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

  • \ProgramData\nss3.dll
    MD5

    bfac4e3c5908856ba17d41edcd455a51

    SHA1

    8eec7e888767aa9e4cca8ff246eb2aacb9170428

    SHA256

    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

    SHA512

    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

  • \ProgramData\nss3.dll
    MD5

    bfac4e3c5908856ba17d41edcd455a51

    SHA1

    8eec7e888767aa9e4cca8ff246eb2aacb9170428

    SHA256

    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

    SHA512

    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

  • \ProgramData\sqlite3.dll
    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • \ProgramData\sqlite3.dll
    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • memory/340-235-0x0000026A1C9B0000-0x0000026A1C9B2000-memory.dmp
    Filesize

    8KB

  • memory/340-234-0x0000026A1C4E0000-0x0000026A1C52E000-memory.dmp
    Filesize

    312KB

  • memory/340-233-0x0000026A1C4E0000-0x0000026A1C52E000-memory.dmp
    Filesize

    312KB

  • memory/340-230-0x0000000000000000-mapping.dmp
  • memory/400-140-0x0000000002B90000-0x0000000002C3E000-memory.dmp
    Filesize

    696KB

  • memory/400-136-0x0000000000000000-mapping.dmp
  • memory/400-139-0x0000000002B90000-0x0000000002C3E000-memory.dmp
    Filesize

    696KB

  • memory/400-141-0x0000000000400000-0x0000000002B81000-memory.dmp
    Filesize

    39.5MB

  • memory/668-227-0x00000000021D2000-0x00000000021D3000-memory.dmp
    Filesize

    4KB

  • memory/668-222-0x0000000005770000-0x00000000057AE000-memory.dmp
    Filesize

    248KB

  • memory/668-218-0x0000000002470000-0x00000000024A2000-memory.dmp
    Filesize

    200KB

  • memory/668-217-0x0000000004AB0000-0x0000000004FAE000-memory.dmp
    Filesize

    5.0MB

  • memory/668-216-0x00000000021F0000-0x0000000002224000-memory.dmp
    Filesize

    208KB

  • memory/668-215-0x0000000000791000-0x00000000007BD000-memory.dmp
    Filesize

    176KB

  • memory/668-220-0x00000000055D0000-0x00000000055E2000-memory.dmp
    Filesize

    72KB

  • memory/668-221-0x0000000005600000-0x000000000570A000-memory.dmp
    Filesize

    1.0MB

  • memory/668-212-0x0000000000000000-mapping.dmp
  • memory/668-219-0x0000000004FB0000-0x00000000055B6000-memory.dmp
    Filesize

    6.0MB

  • memory/668-223-0x00000000057B0000-0x00000000057FB000-memory.dmp
    Filesize

    300KB

  • memory/668-224-0x00000000001C0000-0x00000000001F9000-memory.dmp
    Filesize

    228KB

  • memory/668-226-0x00000000021D0000-0x00000000021D1000-memory.dmp
    Filesize

    4KB

  • memory/668-229-0x00000000021D4000-0x00000000021D6000-memory.dmp
    Filesize

    8KB

  • memory/668-228-0x00000000021D3000-0x00000000021D4000-memory.dmp
    Filesize

    4KB

  • memory/668-225-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB

  • memory/836-253-0x0000000000000000-mapping.dmp
  • memory/1256-152-0x0000000002C70000-0x0000000002C79000-memory.dmp
    Filesize

    36KB

  • memory/1396-150-0x0000000000402F47-mapping.dmp
  • memory/1588-134-0x0000000000400000-0x000000000046D000-memory.dmp
    Filesize

    436KB

  • memory/1588-133-0x0000000000030000-0x0000000000039000-memory.dmp
    Filesize

    36KB

  • memory/1588-129-0x0000000000000000-mapping.dmp
  • memory/2232-240-0x000001EB4AC70000-0x000001EB4ACAA000-memory.dmp
    Filesize

    232KB

  • memory/2232-241-0x000001EB4C820000-0x000001EB4C870000-memory.dmp
    Filesize

    320KB

  • memory/2232-236-0x0000000000000000-mapping.dmp
  • memory/2232-239-0x000001EB4AC70000-0x000001EB4ACAA000-memory.dmp
    Filesize

    232KB

  • memory/2304-158-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/2304-159-0x0000000000419192-mapping.dmp
  • memory/2304-167-0x0000000005570000-0x00000000055AE000-memory.dmp
    Filesize

    248KB

  • memory/2304-176-0x0000000006480000-0x00000000064E6000-memory.dmp
    Filesize

    408KB

  • memory/2304-166-0x0000000005640000-0x000000000574A000-memory.dmp
    Filesize

    1.0MB

  • memory/2304-165-0x0000000005510000-0x0000000005522000-memory.dmp
    Filesize

    72KB

  • memory/2304-177-0x0000000006FB0000-0x0000000007172000-memory.dmp
    Filesize

    1.8MB

  • memory/2304-168-0x00000000055B0000-0x00000000055FB000-memory.dmp
    Filesize

    300KB

  • memory/2304-174-0x0000000006660000-0x0000000006B5E000-memory.dmp
    Filesize

    5.0MB

  • memory/2304-173-0x00000000060C0000-0x0000000006152000-memory.dmp
    Filesize

    584KB

  • memory/2304-178-0x00000000076B0000-0x0000000007BDC000-memory.dmp
    Filesize

    5.2MB

  • memory/2304-175-0x00000000062A0000-0x00000000062BE000-memory.dmp
    Filesize

    120KB

  • memory/2304-162-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/2304-172-0x0000000005910000-0x0000000005986000-memory.dmp
    Filesize

    472KB

  • memory/2304-163-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/2304-169-0x00000000054A0000-0x0000000005AA6000-memory.dmp
    Filesize

    6.0MB

  • memory/2304-164-0x0000000005AB0000-0x00000000060B6000-memory.dmp
    Filesize

    6.0MB

  • memory/2564-202-0x0000000000000000-mapping.dmp
  • memory/2672-117-0x0000000002B80000-0x0000000002CCA000-memory.dmp
    Filesize

    1.3MB

  • memory/2672-118-0x0000000002B80000-0x0000000002CCA000-memory.dmp
    Filesize

    1.3MB

  • memory/2740-124-0x0000000000402F47-mapping.dmp
  • memory/2772-196-0x0000000000C52000-0x0000000000CC6000-memory.dmp
    Filesize

    464KB

  • memory/2772-197-0x0000000000D40000-0x0000000000DD7000-memory.dmp
    Filesize

    604KB

  • memory/2772-209-0x0000000000BC0000-0x0000000000C10000-memory.dmp
    Filesize

    320KB

  • memory/2772-210-0x0000000002910000-0x00000000029A2000-memory.dmp
    Filesize

    584KB

  • memory/2772-211-0x0000000000400000-0x0000000000885000-memory.dmp
    Filesize

    4.5MB

  • memory/2772-207-0x0000000000400000-0x0000000000885000-memory.dmp
    Filesize

    4.5MB

  • memory/2772-206-0x00000000026D0000-0x0000000002765000-memory.dmp
    Filesize

    596KB

  • memory/2772-205-0x0000000000400000-0x0000000000885000-memory.dmp
    Filesize

    4.5MB

  • memory/2772-204-0x0000000000CCC000-0x0000000000D29000-memory.dmp
    Filesize

    372KB

  • memory/2772-208-0x0000000000400000-0x0000000000885000-memory.dmp
    Filesize

    4.5MB

  • memory/2772-193-0x0000000000000000-mapping.dmp
  • memory/2772-198-0x0000000000400000-0x0000000000885000-memory.dmp
    Filesize

    4.5MB

  • memory/2784-120-0x0000000000000000-mapping.dmp
  • memory/2784-127-0x0000000002CC0000-0x0000000002E0A000-memory.dmp
    Filesize

    1.3MB

  • memory/2784-126-0x0000000002CA0000-0x0000000002CA9000-memory.dmp
    Filesize

    36KB

  • memory/2940-182-0x0000000000000000-mapping.dmp
  • memory/3040-135-0x00000000033C0000-0x00000000033D6000-memory.dmp
    Filesize

    88KB

  • memory/3040-170-0x0000000003510000-0x0000000003526000-memory.dmp
    Filesize

    88KB

  • memory/3040-119-0x0000000001460000-0x0000000001476000-memory.dmp
    Filesize

    88KB

  • memory/3040-128-0x0000000001560000-0x0000000001576000-memory.dmp
    Filesize

    88KB

  • memory/3092-203-0x0000000000000000-mapping.dmp
  • memory/3264-188-0x0000000000E10000-0x0000000000F74000-memory.dmp
    Filesize

    1.4MB

  • memory/3264-183-0x0000000000000000-mapping.dmp
  • memory/3264-186-0x0000000000E10000-0x0000000000F74000-memory.dmp
    Filesize

    1.4MB

  • memory/3264-190-0x0000000000E10000-0x0000000000F74000-memory.dmp
    Filesize

    1.4MB

  • memory/3264-192-0x0000000074860000-0x0000000074A22000-memory.dmp
    Filesize

    1.8MB

  • memory/3264-191-0x00000000005E0000-0x00000000005E1000-memory.dmp
    Filesize

    4KB

  • memory/3264-187-0x0000000000E10000-0x0000000000F74000-memory.dmp
    Filesize

    1.4MB

  • memory/3264-189-0x0000000002670000-0x00000000026B6000-memory.dmp
    Filesize

    280KB

  • memory/3728-243-0x0000000000000000-mapping.dmp
  • memory/3804-181-0x0000000000000000-mapping.dmp
  • memory/3956-115-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/3956-116-0x0000000000402F47-mapping.dmp
  • memory/4060-153-0x0000000004A90000-0x0000000004B06000-memory.dmp
    Filesize

    472KB

  • memory/4060-154-0x0000000004A70000-0x0000000004A8E000-memory.dmp
    Filesize

    120KB

  • memory/4060-148-0x00000000000E0000-0x000000000016A000-memory.dmp
    Filesize

    552KB

  • memory/4060-147-0x00000000000E0000-0x000000000016A000-memory.dmp
    Filesize

    552KB

  • memory/4060-144-0x0000000000000000-mapping.dmp
  • memory/4060-155-0x0000000005300000-0x00000000057FE000-memory.dmp
    Filesize

    5.0MB

  • memory/4060-156-0x0000000004BC0000-0x0000000004BC1000-memory.dmp
    Filesize

    4KB

  • memory/4060-157-0x00000000025A0000-0x00000000025A1000-memory.dmp
    Filesize

    4KB