Analysis

  • max time kernel
    117s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06-04-2024 19:43

General

  • Target

    2f133fae5486b86cbf0f65e82c309692c054557cc4fde262af158c489a7ec00b.exe

  • Size

    9.8MB

  • MD5

    8f31cb1de574e7070f0b756474968456

  • SHA1

    680aba2b6b0a4cfa1d106c3c8f732a89d261e265

  • SHA256

    2f133fae5486b86cbf0f65e82c309692c054557cc4fde262af158c489a7ec00b

  • SHA512

    825a889b23884c8cb3fbaf06de6184b387c087bf24bdca17380f0442523d49c97762a6b6150a8276d1ff414799728a340e9f9e114f36b045d865d7d2e5912b57

  • SSDEEP

    196608:iwumqqo5Kpjc4bSmpcxZJMI3LDbbxI0T1SwgfWtjen+7VMHFRMY:iwumRoApjc4bJKxzMcbbX2WNen++Hp

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot7160282613:AAFbC1FSQC-98qkDv63fGJWl04i7irG3A2w/sendMessage?chat_id=5314341717

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
  • Detects executables containing common artifacts observed in infostealers 2 IoCs
  • Detects executables packed with VMProtect. 4 IoCs
  • Detects executables referencing Discord tokens regular expressions 3 IoCs
  • Detects executables referencing credit card regular expressions 3 IoCs
  • Detects executables referencing many VPN software clients. Observed in infosteslers 2 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
  • Detects executables using Telegram Chat Bot 2 IoCs
  • UPX dump on OEP (original entry point) 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f133fae5486b86cbf0f65e82c309692c054557cc4fde262af158c489a7ec00b.exe
    "C:\Users\Admin\AppData\Local\Temp\2f133fae5486b86cbf0f65e82c309692c054557cc4fde262af158c489a7ec00b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SharpBuild.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\SharpBuild.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Local\Temp\sharp_build.exe
        "C:\Users\Admin\AppData\Local\Temp\sharp_build.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2476
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Firefo.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Firefo.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:292
      • C:\Users\Admin\AppData\Local\Temp\7zS421DDB06\setup-stub.exe
        .\setup-stub.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://www.mozilla.org/firefox/system-requirements/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1108
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1108 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\sharp\Process.txt

    Filesize

    496B

    MD5

    6ec7c7c52a63231fc2c70261900de760

    SHA1

    1a81b4d57c8d2660e90d6f51dfd1a8cba890a827

    SHA256

    14656133e25c38a8cb0678cb21767a2b4d2d2813c73ae396722c58a027787401

    SHA512

    3360168fa12803da801150f5d3d1375be54edab6aceeaa3c00df61251a6fb796912cdb5e1105c573456f0a7ecb390415338a6b4b887c238a7329b5fe3d7bb0f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    45d054e80e5ba62909c4b64920d8fc8d

    SHA1

    79f47025124e29abbc09ec50591f0be10dbdae7e

    SHA256

    641ddef6fd730a4ff3fb5683ad09bd0c67500b9900f832942dc4a6cd3f1e3336

    SHA512

    737cacdff2f54f07d2b4f0d169a5d50ebbe9f5ca2d02e1228fefe57f5464138441513883624e4267b5e87def7ce268034af627528d2422e80719dc3f00d3034e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    295dca804da9b9ecce3260e1c9ba1543

    SHA1

    fd37f8b485458fc12cc7d7475f9f9128756e04a3

    SHA256

    d5adf384929e7079e52ed17f3fb4b0a105307e0a6bd703221f4a9045797f2593

    SHA512

    860fb2c53004862a9c7c8d3b0dea9af7de9eaedd642d2f19bb377fe72bf2a04b77fbec119d12bb46c279319375200edeb32c8ff77d9dd2f92b22769e098ed47e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6faf9c00bae6ad3801e7d5f6058c833e

    SHA1

    5b379d7f0a2166e658f9b4f32cafb781dcfe42c6

    SHA256

    6c93c3063588986d271c05f8e6a790fa8780675a1dc0fd93cef05d5c8e07c4a6

    SHA512

    2c88a85d154dbaeaa32d4a776497fee44e06fb322962845585beac465495b76933cfc737c94bee1d74096c7d3214098aa630c4fe9b8cd908f74f93c3c82b360d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ece7f2c4e32aee38d1f4ea25c45f816a

    SHA1

    1216378c23003a8af29a4eb528be9c14c50c306b

    SHA256

    34b191446ff21f89e827f8586c4e913b6e83d75d2c9c159e6a815f61296333bc

    SHA512

    32535666c78782e6fa96290979aee51da232782cacea4096a7f05abfcc509511e514a34ce26fe92f32de6b025cf7c06dbe2d6e6dc3c215b032fcd78bdf8bfce7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    025d17a821d921f402fe0676a9bcdfaa

    SHA1

    5d23a76850e045e90f7b0ab30af27cd259a2b48c

    SHA256

    e10016ba1cb13dbb337cfdc42379921072db278f533920a1d81125ed8cee2324

    SHA512

    c74f61660f714453c1f5be681fe8b74cb94aedee87d0c44215aca514befda56fd7460e8ddd73631941f0859d93d44808b26a9eb0d4310bc7f265d4fcb085ab46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    38deb2a17c8bf1f5ac3ae76d459561f1

    SHA1

    b71d547db1fee501562f9a734ad42218dcd3c2b8

    SHA256

    d6e57ddd24c323706bba0d83f8c4376028eb56cf4e3bed0bb879dce4396ce419

    SHA512

    d3652f4bcbbcc34dd2a7b163551710e378d49d024e1aa3040105ac06aa483fb9d6503f28fe4494e825f8a1e1fe077e77ffab55b729cdb217d2035a32db24dc09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    73378e1b07740004faf704862210c2fb

    SHA1

    a4fb290d0fcfeb4bb9bf8ca3870733f069e57b2c

    SHA256

    9346b914dfa43bc3a2b9b314700e45eebd507397f06ad4d2b2f2537f5ee6bf16

    SHA512

    2c033229fe0221546316afb620a066b93b20a6a702ef9a8caad776f42d59e93a9c3830a245d0c6acee85d14d289ac1069f40828022a1d8f60c07e30aec0ca45f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8e2b68307a4f8f56067ab24345657d17

    SHA1

    1253c46715bed32c8b14283b8a70c45d30951200

    SHA256

    eab5e2415c904e087b6e531a6e8a310bfdcabbf6e7df2dcb4eee3b0122f1f0df

    SHA512

    14f619fae53e28e13d7fe8ab47f6225c535bfa2c70076ddc17408537b396feebc0a9f87b1d54a8c896b4a1f4c872d6d2d2e65f130d721216607bc84dd5bc8180

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9ee6da9f3ba3339ecada7f0eee5f555c

    SHA1

    fa3e2ff1952e2481cc9b10216af9f2312d64d115

    SHA256

    f1ff9ac3a5139eae7ba05e5003240b94d028a4e5e76216242834c90fea946ad9

    SHA512

    d9c7bc5b8f9922eeb6aec86f860cc0c32a934e85c70089c88fa237b93171aee23d6f6610262f2ba30fd87e9d5f4084dbc2e018d61a63e4ebac4b5035d85e3642

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    18efd2c79580862fecc4f898a9e3ddd1

    SHA1

    d37a32eb2bc251c2b68b3893f7f3249c0b655fb3

    SHA256

    319da9e0db6a9cc1fe9d4464e90ccb4b3ed227578ec6677498fe0819aa139a72

    SHA512

    ad5de43d13585ee19e3632edf11830052dec6ee2f9c18df9b2f7e6f7121705abeb3ef8083d2333dc499b120a4c99b5b17540626d9a3c2998442a49ec65dc5a40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c5874d364c94dd552ae71e439a7c8170

    SHA1

    b88bf8aa8c4d0f717f772c6a556ed3ce9c7ef909

    SHA256

    ae6937011c5101a71ed13c68749dc4e5437bdeaeedb061007b0e94d6dd705493

    SHA512

    ad1080da2df77df50d54dd29c3d5a890f1bf549d9f38bfa8d9f9e566ebbbc7decacd324ce27bd12024b0a1c5ca8f7249c6f3393c839cdbce21f5d18a087d42e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c5897c6553bb81eb296959f02878f947

    SHA1

    4fc0e3c7b73c04ce5e7ad7a5afcbc5e2e29d1e25

    SHA256

    2d4419e2b4769e72ae7832cf24fd55caa60867dd32ab2882d2768577de179015

    SHA512

    664d6d764113bbf59cd3e3a3fb927c04efc53c049e900205848445cdde9a0480bdc82195d8999b751ca50443216216684f579b782fb8216b41d4249e677fd220

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    97ae926c6c581480b295058c7198035d

    SHA1

    147fab6132f44a6a0f2f5043afd801d97b08e0d3

    SHA256

    690f758e928e94b3c452e4aa1b81992045d48a6ea1b82680d0719144419d57a5

    SHA512

    601cb0480164ad2e422ae27e56bb795cdcb9f0280e5da9196659a520e0c936b5597e469bfd681033d4c7b9578ffb90db9578ea6600f48cda70a739dde3c65eb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2c8289de0b991a2aa4e068d9314d0505

    SHA1

    1b5fa08a916173abb895843706fdd138982e6006

    SHA256

    5e5553f5f11c1f7e193b4a7cd1a9b5e2b2bfac5ef75d7a3e8d336224c6e49a90

    SHA512

    0483add5abcf5d749c463d4f10299ee9cb354f83845a87771946f94521dde018c1a0ed36c489c4e7f2ae40182c3565155464fd8d24d36ea9816a7747e72a6565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ef15743aef6fb4fe8b94f47cb02e7ac1

    SHA1

    de666d576d2aac4609ad951cc590e8e9c7e13b28

    SHA256

    b471b0906e2c83a0285d4582f3326dbad4d67062a946287875a457ef199efde4

    SHA512

    356700edf41b8aaca2897b8201b4b439ceb74449b0c8b6284e62aecc694ba5c4a7c8008a634c043ba9059a5775adac63b25bf2b0807edd0f624fbc7e80214ad7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c88dd5c078be59fa14c45d781ad55187

    SHA1

    519540f9fb9c479309354357215b1b5ee17930cd

    SHA256

    c5250d9defd4ce1c1b7e14f65c87dcf757e4ffde5772879a60067b508459ecf3

    SHA512

    2882dc9c39b339de5b959fceea60be50f957e29020fd81512ca3ed0bcc6a67d0fcea7ac292dd7cf9a3734c02154e1848f17ec74f42fc162fbe1f8c06f854d37f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8866c072bed97c886269e27ed48b9339

    SHA1

    11497a9f23eda27d8281ab82994f54dd4c709e0c

    SHA256

    f29aaf2b3e7ce7ab8a2c5c9250b16e013adb520d5e024cee4d3aa2e2a6262431

    SHA512

    336e5a5738f0b358cd54f067e8d8a16b885d56879a3efb96cc4cc51aca488bfd4bb5bb1ae0935114ea1de679c40d738899270c7de7697379d0002bfbd086bdf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ad32bcf88a505f67723671015a4ac8e7

    SHA1

    d0c3a2218efada3c483b75d4f44ba51821dd85e7

    SHA256

    6321f8e24080dc6365e341c0faf6f41fcfb53bf69d346b5c21defad570aaaeca

    SHA512

    16120c0bc26cb7bada449f63cdd98802ae22ab4e5c4160a739a8f34f14d5d3b4a79c09f8fd29654822e1a48f39b6de3ce111b68a87f0c2b91574793c475edc87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f48bedf00807b0cf100cbac939256119

    SHA1

    3ac3098ead94c16cdb6d9d14d42b7f6b30ad730e

    SHA256

    2c54385b58ef194b590d94feb7ce401718a0e901e3308ba9ce5a172a5fc12b43

    SHA512

    d104c68fdccb8b35c82de50eb37e598bf4d63b5ef7c8421976fd4ca2083a4deac31ea011ff6efced8fbddb5bd65306b623d2244951db51bba9e9e88d69376e80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4e5cfbfd5b50b8af177331b440c4503b

    SHA1

    f9737292ecfe037f27e846e4f98cbbd1a4b73c58

    SHA256

    9a89aa914b11d1d565320f4a72cae128a5a1c3832b01b7ef3e272845fc733866

    SHA512

    52d6b30ddd69e9649c8f20fb22d9ae8ebf6caa7977e19c50198cc3691193771376f6752ba548fe949e1eb84617a4bf93d4e906e4109e0e52ee5f0a0c87d0dc9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4273b4663e50caa547ac951d81f67d9a

    SHA1

    dc29b1b5fc5e9a255c9a5a0c8ba9890d3531bf5d

    SHA256

    ee52732a75184e1c9866c9018ad0a6eddd410d5119916f1324d7d8b26feb94be

    SHA512

    cdfd5bc6f95cedc44bdd921eb46a93c9005a73582a24f9b14f22952135eef5f3851ec91c9d2821905cd575761b9c378c89c58ca4e4439a46bb4b0386737f4fd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0175866a4e581179a2005739658bfcfc

    SHA1

    3052994b501ee37d358688481691200fa78afee0

    SHA256

    5fbd1ea47543934a021a13f177d280487a4d161224ccb2304bde4f9aa06c982f

    SHA512

    554d7820b9f48ddf6bd69e8bd92883dbec1e311086ae760d1237cb1c60c35c372001bd1a0a683bdd9113adf21017c9fb55094db5a753637630e3ef1f8dc7edc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7c94e9b63454399a3fa53dfda11ed344

    SHA1

    ed90da7dadd1bfffcbc850b9da89887ba5c0f68b

    SHA256

    55846e415642ef759d9e1181532264f69c0a384316f76715c198b9a118b61d6d

    SHA512

    45b72d6d297a7ef98c4db900f0a3761ba422603a9179564124274a17c3e01b4e1fbf4e91aeb029dbc577c042f9d4d28cb22ef47f9d470221df7ef67f6d74a208

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6c6dac71fc940aa2b7b562702c88ffa6

    SHA1

    6022998419670b77cdd23bb5d0ca6ed8e8d59567

    SHA256

    1e5cf3b309ec352c512b45207600389a68d4cd8e27f85dd2df74f22f6c463eed

    SHA512

    2720245e889ccebcf76e374da446cc5049480d09f86bc82cc104e05fee7f1c0df94774f05e71194462a7437fb1018c0ebcf24025431f35c582c0117b3a83ee2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    693bbd8eefd38816d506382e1f8fdf7a

    SHA1

    37f6dbd2d2f72a6c77e7371b662a4b73d679c79f

    SHA256

    94d2f28d3e53cf8027d9e82e675b27f62bb0048f13e6937bf1b1148f68669c20

    SHA512

    00d74ec169ca2e77318c429d249377f0cb04347338f2d55f46577b4bdf79e4b89f13daeab5f4965adb570f6c77aa76ba5cf95c9f8b56f1ad4de906f0c8f8872f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1cb8c4da3685b31ed20ce783e264084c

    SHA1

    75a17fe2c70fb52b4592131e74455c71ab9902e9

    SHA256

    0d834b8bfda7eece780b56f1d328e8255f177f4c19e2cf5ec1cf59a9172bc66c

    SHA512

    cb5fff4f4fbef226629a3c21b0b03db35912d6379e1e790e49ead60d930d6e254ec17244b05f794d293385d460a956c7e22691709a56202c7bafb1ab21e5919d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bf5ad9a9df52e0048e8e26648c169df9

    SHA1

    a9fd0b87f2ca2b92019130f7d09c647cd00a84a1

    SHA256

    741ccabf50d0f15700f658ea0b613aa467fb1dda28e7c4f01fd0e133f8378083

    SHA512

    e7465f7d429547c0e0b587bc28bd8ce21e3af85c643df75772918e2c17fd871855ce30d0633da814a7488bfdf3ee57d24958c19859800a79c333bfabae10b604

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    6267b593f9261df7c309e6b93b2202b2

    SHA1

    bdf1e5d86930b4c231c6d44a470ae16a16a71d65

    SHA256

    0a95203f14fd61e654417bbf951ff76dea32a66195fe8cd2fe30e82967dd99f3

    SHA512

    7e3c48e7b6f599b7530fcc04f878556b5193f0ce61b5f2f58a559877a40265a84d65853861365ab84d1b68cd21ef53d64aaf3418719d669babe2e3943037031d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\92bocja\imagestore.dat

    Filesize

    8KB

    MD5

    b7a0a372bce1824ab06cc79b7fe1326d

    SHA1

    561bf0ee27877dcedfafa79936a76d13251a5a60

    SHA256

    78ba5495690d4e2b1763ced2d8b9ac9566c14bc8e295613a53836e2bfe96142f

    SHA512

    ebb0811d0473f00e719b42c0b7f0bbe8e6512555e24291e6ce83e5675a906353a61a72396971034f7358f3cd833773163e51b3d8ae6ef7573b90a0cc407ff521

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IFGNZ1XG\favicon-196x196.59e3822720be[1].png

    Filesize

    7KB

    MD5

    59e3822720bedcc45ca5e6e6d3220ea9

    SHA1

    8daf0eb5833154557561c419b5e44bbc6dcc70ee

    SHA256

    1d58e7af9c848ae3ae30c795a16732d6ebc72d216a8e63078cf4efde4beb3805

    SHA512

    5bacb3be51244e724295e58314392a8111e9cab064c59f477b37b50d9b2a2ea5f4277700d493e031e60311ef0157bbd1eb2008d88ea22d880e5612cfd085da6d

  • C:\Users\Admin\AppData\Local\Temp\7zS421DDB06\setup-stub.exe

    Filesize

    551KB

    MD5

    5fd46fbfb36b47f608282ae8d55abf6e

    SHA1

    81470ec69b0bf36fa80e08c6fde624af4c77b236

    SHA256

    2e73a71335a1d0d90abaca7885a4de92077092400764ecaebe47c8fc8846b4b3

    SHA512

    e589cb3cf54fba262a57332a034b4aadfbb57ba1fb746c7fc013bb07d53c00e0207fd418d9f02d1caa834dde193f6635dd6959799bd88536657d47b4557c6c1d

  • C:\Users\Admin\AppData\Local\Temp\BouncyCastle.Crypto.dll

    Filesize

    3.2MB

    MD5

    0cf454b6ed4d9e46bc40306421e4b800

    SHA1

    9611aa929d35cbd86b87e40b628f60d5177d2411

    SHA256

    e51721dc0647f4838b1abc592bd95fd8cb924716e8a64f83d4b947821fa1fa42

    SHA512

    85262f1bc67a89911640f59a759b476b30ca644bd1a1d9cd3213cc8aae16d7cc6ea689815f19b146db1d26f7a75772ceb48e71e27940e3686a83eb2cf7e46048

  • C:\Users\Admin\AppData\Local\Temp\Cab319C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    195ffb7167db3219b217c4fd439eedd6

    SHA1

    1e76e6099570ede620b76ed47cf8d03a936d49f8

    SHA256

    e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

    SHA512

    56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

  • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

    Filesize

    1.7MB

    MD5

    a73fdfb6815b151848257eca042a42ef

    SHA1

    73f18e6b4d1f638e7ce2a7ad36635018482f2c55

    SHA256

    10c9ccec863ed80850c7b7080e4f2e34b133ce259d1ae3ea7a305cebf6e2940d

    SHA512

    111f5a7bd916ab317fc127cbf49a2a81c2a614ce3a655a0446f2ebf3c2e61509db5633a391bef06c4ba0b58a71c752262ec2467a09abc56827263c647b08a09d

  • C:\Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll

    Filesize

    402KB

    MD5

    b0911d27918a1e20088b4e6b6ec29ad3

    SHA1

    93a285c96a4d391ea4fe6655caaa0bbf2ee52683

    SHA256

    24043ef4472d9d035cd1a8294f68d2bbfdf76f5455af80c09c89e64f6ed15917

    SHA512

    518da2e73b849be38570d7db218adeb47f85fde89c15dac577eb1446a9a55bb4cfaf31d371428b9c4f0c69c0be3e2cb10fafcadbec24e8ab793b639392e3f029

  • C:\Users\Admin\AppData\Local\Temp\Tar32BF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Firefo.exe

    Filesize

    342KB

    MD5

    f48a8bcd6a286303feedc0912b34eaf9

    SHA1

    461b7e1e6d0359b480c82802724c6b316d19c291

    SHA256

    17ab9465b0ead4ba02d2d68a03f34cd04144db5dd2ce73d6a35c71566d1574b7

    SHA512

    58b98b4e8cbf44cef124ec71ec305419fa8f049d1a1e78cdcfddc9ba18a7f893b35198b04bb5e311de2a91e58ac49e9047c962debefc7896918005d640f4b201

  • \Users\Admin\AppData\Local\Temp\RarSFX0\SharpBuild.exe

    Filesize

    9.4MB

    MD5

    25759c878c892572e611027fecda3c12

    SHA1

    e135b3537c01f7811fed683aa0650246fe5d9d30

    SHA256

    319e0029327f1eeb479f4272213bbe7d01e66416152ee33cc4916cd7e4421d96

    SHA512

    8e3b70589b5799a7762c6420f8f2f34cb5929d05e97a843d62951f5b77e0941801b9041a622c6fcff636c82262ead7d8f88fc29fa0d46f2eac55fd480f9a50c5

  • \Users\Admin\AppData\Local\Temp\nst1C0A.tmp\System.dll

    Filesize

    22KB

    MD5

    b361682fa5e6a1906e754cfa08aa8d90

    SHA1

    c6701aee0c866565de1b7c1f81fd88da56b395d3

    SHA256

    b711c4f17690421c9dc8ddb9ed5a9ddc539b3a28f11e19c851e25dcfc7701c04

    SHA512

    2778f91c9bcf83277d26c71118a1ccb0fb3ce50e89729f14f4915bc65dd48503a77b1e5118ce774dea72f5ce3cc8681eb9ca3c55cf90e9f61a177101ba192ae9

  • \Users\Admin\AppData\Local\Temp\sharp_build.exe

    Filesize

    384KB

    MD5

    6ef54f1c226c282e6042cd24f0e7e7ab

    SHA1

    4a8906557438a27379d7243d05d03743a07c7551

    SHA256

    42efd817539480fb44da60d797908869af796df6bfb700980709ccf483e92b96

    SHA512

    2a6a0f1da35c27a1df09983a96b79720579cc17eb3609845ff05788503a064c578156d8db87d10a7b554a9acbd220e5bc2aa0ae11a68df3a9998637c0f3acb13

  • memory/292-104-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1512-96-0x0000000000D80000-0x0000000000DC6000-memory.dmp

    Filesize

    280KB

  • memory/1512-98-0x0000000000D80000-0x0000000000DC6000-memory.dmp

    Filesize

    280KB

  • memory/1512-99-0x0000000000D80000-0x0000000000DC6000-memory.dmp

    Filesize

    280KB

  • memory/1512-102-0x0000000000D80000-0x0000000000DC6000-memory.dmp

    Filesize

    280KB

  • memory/2008-53-0x00000000014D0000-0x00000000014D1000-memory.dmp

    Filesize

    4KB

  • memory/2008-45-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2008-20-0x0000000000400000-0x00000000014CE000-memory.dmp

    Filesize

    16.8MB

  • memory/2008-19-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2008-23-0x0000000000400000-0x00000000014CE000-memory.dmp

    Filesize

    16.8MB

  • memory/2008-81-0x0000000000400000-0x00000000014CE000-memory.dmp

    Filesize

    16.8MB

  • memory/2008-22-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2008-25-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2008-40-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2008-51-0x00000000014D0000-0x00000000014D1000-memory.dmp

    Filesize

    4KB

  • memory/2008-38-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2008-62-0x00000000779D0000-0x00000000779D1000-memory.dmp

    Filesize

    4KB

  • memory/2008-55-0x00000000014D0000-0x00000000014D1000-memory.dmp

    Filesize

    4KB

  • memory/2008-56-0x00000000014E0000-0x00000000014E1000-memory.dmp

    Filesize

    4KB

  • memory/2008-58-0x00000000014E0000-0x00000000014E1000-memory.dmp

    Filesize

    4KB

  • memory/2008-60-0x00000000014E0000-0x00000000014E1000-memory.dmp

    Filesize

    4KB

  • memory/2008-26-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2008-28-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2008-30-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2008-33-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2008-35-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2008-43-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2008-50-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2008-48-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2476-115-0x0000000001220000-0x00000000012A0000-memory.dmp

    Filesize

    512KB

  • memory/2476-151-0x000000001D440000-0x000000001D76E000-memory.dmp

    Filesize

    3.2MB

  • memory/2476-146-0x000000001B4C0000-0x000000001B526000-memory.dmp

    Filesize

    408KB

  • memory/2476-80-0x00000000012D0000-0x0000000001336000-memory.dmp

    Filesize

    408KB

  • memory/2476-82-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

    Filesize

    9.9MB

  • memory/2476-120-0x000000001BE70000-0x000000001BF22000-memory.dmp

    Filesize

    712KB

  • memory/2476-153-0x00000000011F0000-0x0000000001215000-memory.dmp

    Filesize

    148KB

  • memory/2476-193-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

    Filesize

    9.9MB