Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2023, 09:40

General

  • Target

    cdc78c0483d93592b21eab286aeb2a726b306768b339020722b259169d7e2641.exe

  • Size

    3.2MB

  • MD5

    aabd0123bb50d8e1a975b83cc7abb051

  • SHA1

    4fa7c7d5b333d2bf44d4e4290f7fe012d433acfa

  • SHA256

    cdc78c0483d93592b21eab286aeb2a726b306768b339020722b259169d7e2641

  • SHA512

    812afc4a004b60ab53c6e29fbf041a8882ef65049e374eced93e03cf6fadcee82a61d416cd82b364e7bb64bd028247d00c021d377b32d1d8372ad17b6ccd21e4

  • SSDEEP

    98304:dlcGMKNkqS5tBqra2KV716Fl2a4FcA5aUcU:dlcGPCqS4a2o1GPA5fcU

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 21 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Drops file in System32 directory 33 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdc78c0483d93592b21eab286aeb2a726b306768b339020722b259169d7e2641.exe
    "C:\Users\Admin\AppData\Local\Temp\cdc78c0483d93592b21eab286aeb2a726b306768b339020722b259169d7e2641.exe"
    1⤵
    • Sets service image path in registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C C:\Windows\system32\sc.exe STOP "HDZB_DeviceService_For_CCB_2G"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:592
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe STOP "HDZB_DeviceService_For_CCB_2G"
        3⤵
        • Launches sc.exe
        PID:984
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C C:\Windows\system32\sc.exe delete "HDZB_DeviceService_For_CCB_2G"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe delete "HDZB_DeviceService_For_CCB_2G"
        3⤵
        • Launches sc.exe
        PID:1780
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C C:\Windows\system32\sc.exe create HDZB_DeviceService_For_CCB_2G binPath= "C:\Program Files (x86)\CCBComponents\HDZB\CCB_HDZB_2G_DeviceService.exe" type= own type= interact start= auto DisplayName= "HDZB Comm Service For CCB 2G MASS"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe create HDZB_DeviceService_For_CCB_2G binPath= "C:\Program Files (x86)\CCBComponents\HDZB\CCB_HDZB_2G_DeviceService.exe" type= own type= interact start= auto DisplayName= "HDZB Comm Service For CCB 2G MASS"
        3⤵
        • Launches sc.exe
        PID:1276
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C C:\Windows\system32\sc.exe start "HDZB_DeviceService_For_CCB_2G"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe start "HDZB_DeviceService_For_CCB_2G"
        3⤵
        • Launches sc.exe
        PID:1840
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /C regsvr32.exe C:\Windows\system32\CCBHDSNCtrl.dll -s
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Windows\system32\regsvr32.exe
        regsvr32.exe C:\Windows\system32\CCBHDSNCtrl.dll -s
        3⤵
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C C:\Windows\system32\sc.exe config SCardSvr start= auto
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe config SCardSvr start= auto
        3⤵
        • Launches sc.exe
        PID:832
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C C:\Windows\system32\sc.exe start SCardSvr
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe start SCardSvr
        3⤵
        • Launches sc.exe
        PID:1956
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C C:\Windows\system32\sc.exe start CertPropSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe start CertPropSvc
        3⤵
        • Launches sc.exe
        PID:1304
  • C:\Program Files (x86)\CCBComponents\HDZB\CCB_HDZB_2G_DeviceService.exe
    "C:\Program Files (x86)\CCBComponents\HDZB\CCB_HDZB_2G_DeviceService.exe"
    1⤵
    • Executes dropped EXE
    PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\CCBComponents\HDZB\CCB_HDZB_2G_DeviceService.exe

    Filesize

    258KB

    MD5

    edcfb5991d68d6b5d2a4caeaacbf0915

    SHA1

    21dd3bd5156d3b92e1d427f077b98949626d8898

    SHA256

    02bec26c7b54545002d360a39b9fbe4d88366dd72c6f0a299e0d0a73a7dc4ed5

    SHA512

    56a46ac19c45921fe7209507223f5909afa30e43953ae507df515b078438aa9b6e7f1f792a0dae293d3509238c2c7e96e668b16c3980430e9321e2764d0c644d

  • C:\Program Files (x86)\CCBComponents\HDZB\log\20230330.log

    Filesize

    4KB

    MD5

    8cdbfa5809c1b0c89cbf70a6367b5e8e

    SHA1

    590d141093ff3dbf94392e14b977b54c018c8cf6

    SHA256

    b31190337c7105912c49c6a622a0a76d4f41eac3076e1ff6b28a7bddf2100d7b

    SHA512

    7afa019e92dd4a155f7d3285c0d1a3ff12624e6575aad77b8431b4f4eed6c5873f9914cdea311b1dc69fb9e5973d3a5c24314c4fcd279f433b5405f265c1768e

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\ExecCmd.dll

    Filesize

    4KB

    MD5

    b9380b0bea8854fd9f93cc1fda0dfeac

    SHA1

    edb8d58074e098f7b5f0d158abedc7fc53638618

    SHA256

    1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

    SHA512

    45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\InstDrv.dll

    Filesize

    10KB

    MD5

    e33c90099612f1769abae7da48953731

    SHA1

    e111dfa793910b7a4c4c0a845415f4de839f5f41

    SHA256

    e513f09fa603941cf40bd76e458069966a616b3e125b772f85259ea2a9fbd937

    SHA512

    1fa472a40c3bc05e2e970a7621ae0d40d5d86e6c75d28807d6780330a735254653c777f73aff5ae60af8e2030df3bd535bfa2ec0e9ddeb5b18303b3124169d8a

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\ThreadTimer.dll

    Filesize

    9KB

    MD5

    697f61a904654e9363e28c5223182994

    SHA1

    df916f7098e3f89a5cf100529ba3480feba71ce9

    SHA256

    5ffc3354029e6c6ed0a7db4690fe74d453980a3f21dc8cf0fb94cb5bbd421ac1

    SHA512

    3bfd89810bccb0d8b389988201f65b8823f138f763a1cc0cbeebdeee5a086c5c8dfb18e2a4d664648224bb96dce0ce7b6936ccc63b10f6f56fc1a4247a0d0eb4

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\hzSrv.dll

    Filesize

    91KB

    MD5

    b037232e7e160c23458ab2df4987150f

    SHA1

    d760cb6fb752993816f3ee7554755dd556145052

    SHA256

    555599bb71f3f1905fbe606b4b552814239971f2de7e4ee4a928d424d0063467

    SHA512

    591b10c1c493eba936060871b48a432f77a4efdba09c693d382f8e8c1b0087232bbbd8799c331efabaaa68b4353aa00b5c331c6adb11dd08dd1f0f61a40db8aa

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    e54eb27fb5048964e8d1ec7a1f72334b

    SHA1

    2b76d7aedafd724de96532b00fbc6c7c370e4609

    SHA256

    ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

    SHA512

    c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4

  • C:\Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    05450face243b3a7472407b999b03a72

    SHA1

    ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

    SHA256

    95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

    SHA512

    f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

  • C:\Windows\system32\CCBHDSNCtrl.dll

    Filesize

    217KB

    MD5

    097ebdb8a5274eeaeef26f301af786b2

    SHA1

    3aba6c7c51821cda98e3427db2026c3879a09341

    SHA256

    367db5d59bb4a622a25c7f182300bc0daa31bf92d0cf990e8c00fee45394a593

    SHA512

    c1dfc5cab5ce7dea74868bfeeaf0265d3c6156b87f90fedd042ee071d994d489421987e35c93382871dbb36d3fe5198164d8c1fc9abe4ba4afa4634b98e5ad22

  • C:\Windows\system32\CCB_HDZB_CCID_USBKey2G\HD_TokenV2.dll

    Filesize

    811KB

    MD5

    04db61611f80f57c83467cf74984bc22

    SHA1

    b9d3d7cb40732fc9608fcd968cfbcfbf8068f521

    SHA256

    52f84436d0c802de132d5cc18a74574b03a983ece9d6b89063b7c6a55e13079d

    SHA512

    923ad0a107e06ae1d39e9bd18d73861311553f2918df8b7536278f60a1a2549d89a20aaa0a6f5cf1c4d671d55bc2f3dbe8af360edb2a3107478920ec8a71a144

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\ExecCmd.dll

    Filesize

    4KB

    MD5

    b9380b0bea8854fd9f93cc1fda0dfeac

    SHA1

    edb8d58074e098f7b5f0d158abedc7fc53638618

    SHA256

    1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

    SHA512

    45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\ExecCmd.dll

    Filesize

    4KB

    MD5

    b9380b0bea8854fd9f93cc1fda0dfeac

    SHA1

    edb8d58074e098f7b5f0d158abedc7fc53638618

    SHA256

    1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

    SHA512

    45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\ExecCmd.dll

    Filesize

    4KB

    MD5

    b9380b0bea8854fd9f93cc1fda0dfeac

    SHA1

    edb8d58074e098f7b5f0d158abedc7fc53638618

    SHA256

    1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

    SHA512

    45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\InstDrv.dll

    Filesize

    10KB

    MD5

    e33c90099612f1769abae7da48953731

    SHA1

    e111dfa793910b7a4c4c0a845415f4de839f5f41

    SHA256

    e513f09fa603941cf40bd76e458069966a616b3e125b772f85259ea2a9fbd937

    SHA512

    1fa472a40c3bc05e2e970a7621ae0d40d5d86e6c75d28807d6780330a735254653c777f73aff5ae60af8e2030df3bd535bfa2ec0e9ddeb5b18303b3124169d8a

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\KillProcDLL.dll

    Filesize

    32KB

    MD5

    83142eac84475f4ca889c73f10d9c179

    SHA1

    dbe43c0de8ef881466bd74861b2e5b17598b5ce8

    SHA256

    ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

    SHA512

    1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\ThreadTimer.dll

    Filesize

    9KB

    MD5

    697f61a904654e9363e28c5223182994

    SHA1

    df916f7098e3f89a5cf100529ba3480feba71ce9

    SHA256

    5ffc3354029e6c6ed0a7db4690fe74d453980a3f21dc8cf0fb94cb5bbd421ac1

    SHA512

    3bfd89810bccb0d8b389988201f65b8823f138f763a1cc0cbeebdeee5a086c5c8dfb18e2a4d664648224bb96dce0ce7b6936ccc63b10f6f56fc1a4247a0d0eb4

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\hzSrv.dll

    Filesize

    91KB

    MD5

    b037232e7e160c23458ab2df4987150f

    SHA1

    d760cb6fb752993816f3ee7554755dd556145052

    SHA256

    555599bb71f3f1905fbe606b4b552814239971f2de7e4ee4a928d424d0063467

    SHA512

    591b10c1c493eba936060871b48a432f77a4efdba09c693d382f8e8c1b0087232bbbd8799c331efabaaa68b4353aa00b5c331c6adb11dd08dd1f0f61a40db8aa

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\hzSrv.dll

    Filesize

    91KB

    MD5

    b037232e7e160c23458ab2df4987150f

    SHA1

    d760cb6fb752993816f3ee7554755dd556145052

    SHA256

    555599bb71f3f1905fbe606b4b552814239971f2de7e4ee4a928d424d0063467

    SHA512

    591b10c1c493eba936060871b48a432f77a4efdba09c693d382f8e8c1b0087232bbbd8799c331efabaaa68b4353aa00b5c331c6adb11dd08dd1f0f61a40db8aa

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\hzSrv.dll

    Filesize

    91KB

    MD5

    b037232e7e160c23458ab2df4987150f

    SHA1

    d760cb6fb752993816f3ee7554755dd556145052

    SHA256

    555599bb71f3f1905fbe606b4b552814239971f2de7e4ee4a928d424d0063467

    SHA512

    591b10c1c493eba936060871b48a432f77a4efdba09c693d382f8e8c1b0087232bbbd8799c331efabaaa68b4353aa00b5c331c6adb11dd08dd1f0f61a40db8aa

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\hzSrv.dll

    Filesize

    91KB

    MD5

    b037232e7e160c23458ab2df4987150f

    SHA1

    d760cb6fb752993816f3ee7554755dd556145052

    SHA256

    555599bb71f3f1905fbe606b4b552814239971f2de7e4ee4a928d424d0063467

    SHA512

    591b10c1c493eba936060871b48a432f77a4efdba09c693d382f8e8c1b0087232bbbd8799c331efabaaa68b4353aa00b5c331c6adb11dd08dd1f0f61a40db8aa

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    e54eb27fb5048964e8d1ec7a1f72334b

    SHA1

    2b76d7aedafd724de96532b00fbc6c7c370e4609

    SHA256

    ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

    SHA512

    c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    e54eb27fb5048964e8d1ec7a1f72334b

    SHA1

    2b76d7aedafd724de96532b00fbc6c7c370e4609

    SHA256

    ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

    SHA512

    c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    e54eb27fb5048964e8d1ec7a1f72334b

    SHA1

    2b76d7aedafd724de96532b00fbc6c7c370e4609

    SHA256

    ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

    SHA512

    c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    e54eb27fb5048964e8d1ec7a1f72334b

    SHA1

    2b76d7aedafd724de96532b00fbc6c7c370e4609

    SHA256

    ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

    SHA512

    c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    e54eb27fb5048964e8d1ec7a1f72334b

    SHA1

    2b76d7aedafd724de96532b00fbc6c7c370e4609

    SHA256

    ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

    SHA512

    c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4

  • \Users\Admin\AppData\Local\Temp\nsiFA19.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    05450face243b3a7472407b999b03a72

    SHA1

    ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

    SHA256

    95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

    SHA512

    f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

  • \Windows\SysWOW64\CCBHDSNCtrl.dll

    Filesize

    182KB

    MD5

    5d3719734f3d9c2e4ad47482e5051893

    SHA1

    e515fe68efa9afe6be8b694305556dacca1bcd30

    SHA256

    39c29baaba12a3a018a8ff2fcd91de322ba51ab5536ba852d214af5e2c678e2c

    SHA512

    6299458e041de4bc6eaca35ed7950d6cacae64ee6bd3a0cfe3f7e040677e12e43337ff1c5eb889f0f2ab29b52c09db718357b14fe8e3a5cbfb96e97d63fabcdb

  • \Windows\SysWOW64\CCB_HDZB_CCID_USBKey2G\HD_TokenV2.dll

    Filesize

    574KB

    MD5

    964fa6b0d17fb2511ad77f6ef6d099e8

    SHA1

    babd54bbbd634c903604c5585a4bee98849955e6

    SHA256

    bd06b09a1fba74213699e2fb4a669886d8c560f8708a4df29fbebe1be6d47bac

    SHA512

    e31298167233001c3fcbbbffd9a976006604372b828e805838bd6d57b49f876fc60abf57cbe09d0fab57b0e07cea187cb918abf4d05449190e584a687a65ecce

  • \Windows\System32\CCBHDSNCtrl.dll

    Filesize

    217KB

    MD5

    097ebdb8a5274eeaeef26f301af786b2

    SHA1

    3aba6c7c51821cda98e3427db2026c3879a09341

    SHA256

    367db5d59bb4a622a25c7f182300bc0daa31bf92d0cf990e8c00fee45394a593

    SHA512

    c1dfc5cab5ce7dea74868bfeeaf0265d3c6156b87f90fedd042ee071d994d489421987e35c93382871dbb36d3fe5198164d8c1fc9abe4ba4afa4634b98e5ad22

  • \Windows\System32\CCB_HDZB_CCID_USBKey2G\HD_TokenV2.dll

    Filesize

    811KB

    MD5

    04db61611f80f57c83467cf74984bc22

    SHA1

    b9d3d7cb40732fc9608fcd968cfbcfbf8068f521

    SHA256

    52f84436d0c802de132d5cc18a74574b03a983ece9d6b89063b7c6a55e13079d

    SHA512

    923ad0a107e06ae1d39e9bd18d73861311553f2918df8b7536278f60a1a2549d89a20aaa0a6f5cf1c4d671d55bc2f3dbe8af360edb2a3107478920ec8a71a144

  • memory/624-144-0x0000000001D10000-0x0000000001D3F000-memory.dmp

    Filesize

    188KB

  • memory/624-167-0x0000000001D10000-0x0000000001D28000-memory.dmp

    Filesize

    96KB