Analysis

  • max time kernel
    87s
  • max time network
    86s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 01:03

General

  • Target

    09b478546bc4ae0d040069e275324a0a6b1d7b08b0ccd66ddf95d9e233c8618e.exe

  • Size

    911KB

  • MD5

    d51ffcf06dd50b2b76721970c389dde2

  • SHA1

    2969c12eb142c1facd990f3db7050742f120d578

  • SHA256

    09b478546bc4ae0d040069e275324a0a6b1d7b08b0ccd66ddf95d9e233c8618e

  • SHA512

    d57755f4c8f6b88bb701f6e5d1ef2e4da4d7628773461e7a9829dddae6c627f931753a29a27639dd5c010d1bad8e3a745da435e9ab6b75d4a3f7f048d8c9c863

  • SSDEEP

    24576:VfLwgdkd80aWoFinfbtihLBfcHL0kPO2yP9+RBQFiv:Bzkd1aWoghidBYvO

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://5.75.212.114

https://t.me/r8z0l

https://steamcommunity.com/profiles/76561199698764354

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Detects Windows executables referencing non-Windows User-Agents 4 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 4 IoCs
  • Detects executables containing potential Windows Defender anti-emulation checks 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09b478546bc4ae0d040069e275324a0a6b1d7b08b0ccd66ddf95d9e233c8618e.exe
    "C:\Users\Admin\AppData\Local\Temp\09b478546bc4ae0d040069e275324a0a6b1d7b08b0ccd66ddf95d9e233c8618e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy Filme Filme.cmd & Filme.cmd & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4528
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa.exe opssvc.exe"
        3⤵
          PID:4408
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1404
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
          3⤵
            PID:668
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 620735
            3⤵
              PID:464
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V "EvenAttributeWatershedCumshot" Professor
              3⤵
                PID:1276
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c copy /b Ron + Treasure + Dept 620735\d
                3⤵
                  PID:2096
                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\620735\Joe.pif
                  620735\Joe.pif 620735\d
                  3⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:4116
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\620735\Joe.pif" & rd /s /q "C:\ProgramData\DAAFIIJDAAAA" & exit
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1252
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 10
                      5⤵
                      • Delays execution with timeout.exe
                      PID:1808
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 5 127.0.0.1
                  3⤵
                  • Runs ping.exe
                  PID:4436

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Credential Access

            Unsecured Credentials

            1
            T1552

            Credentials In Files

            1
            T1552.001

            Discovery

            Query Registry

            3
            T1012

            System Information Discovery

            3
            T1082

            Process Discovery

            1
            T1057

            Remote System Discovery

            1
            T1018

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\620735\Joe.pif
              Filesize

              915KB

              MD5

              b06e67f9767e5023892d9698703ad098

              SHA1

              acc07666f4c1d4461d3e1c263cf6a194a8dd1544

              SHA256

              8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

              SHA512

              7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\620735\d
              Filesize

              313KB

              MD5

              da5b07c131a945c8a60447e1639d45d1

              SHA1

              ebc88a1dc887e5d4dabf1cdc7618b7bd82ab749f

              SHA256

              c671e116d75250abcea020c026b346e19a3698331482ac7094441b4688ba4746

              SHA512

              310cedb1735cc901ebd378cc3325edbb7f5baf336e7a40cd02ea40a2d5624dda13b986fc00db3776adddad35e99faa58684f848d95dc708bb4eb0b6ea89fce02

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Appearance
              Filesize

              51KB

              MD5

              78b150be4d0f1b2b2065e5b7e0b24c78

              SHA1

              f5a40bbb78de278a3275df00d705836c66b20398

              SHA256

              0e2c878fa125b22abc9eb8a68584560ec7102779928a05d3643ef09bd518f63b

              SHA512

              e58cfd473c63ccf3c271203aa46e553f93acb9c3a25f91d01c3a7240d6195bfb6365bf886b72a930676c7e13cca53e6acd3fe0ff98b57d43f9a7d3c50b9ba2ae

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Appliance
              Filesize

              36KB

              MD5

              f56673f815351ad31aa3f00c7245c059

              SHA1

              3f48e22be046d0f0021e99adca8bcf304c04a296

              SHA256

              76c57b6c3ab9498bd15594bad148dd34e9a2600da3223dd053a5921ef64e6783

              SHA512

              6dd5fadc55b004020d65e4d02f4386278a1f9d0130fca6547c93648a64679d33929c4b05c3b0f2e52eecc497a737cd8dd49f4fdd8879de3e76b6312ffe27da26

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Barely
              Filesize

              13KB

              MD5

              a14c7999ff4fc32e3b7f76a62e29709c

              SHA1

              66e47e7dfed689d11f977175de1003b0a9014001

              SHA256

              7dc5dd261a1271d218148b42eee51eaa70b89e29fccfdece5cc33fcee1305e58

              SHA512

              22b16f41e1b4148ee38b9e519696414296a2ebf3ead9acb3d56b1fbbb590bbc45f09e221a9996b648516cbbb8b0d859d8b32d681acef1ce9a17f671b253711f9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Bros
              Filesize

              48KB

              MD5

              50d7b3138896b3dec2a052bab3d2a29a

              SHA1

              1d7dc8c41e83ebf35ee3e6eab35e7a0ee7e4d93d

              SHA256

              ff646b437a7bee76ff369e310881a238411c6774827ffcef71e1554f5b3e76a6

              SHA512

              7276fb5521655b86697aa46d1dc9a520ed38c4e335f8ba8b520e679137f85ac2981e33448426f01599af1cfe3abcf8ceec56f73124462c22748a1884c9706a31

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Dept
              Filesize

              6KB

              MD5

              e40b3c6634aebdc9d64c834850739f1b

              SHA1

              2496be6acf6c11c242a7b7356ce62c3badfa4298

              SHA256

              a386251d028f047e347d80b8943070315b43030144d3092272e8e02b82f41ac9

              SHA512

              11c077c9ca80d6ebeb3bc07b0ffe8cc31a4999574d38380b9aac48ea483f9578f0fff6bd5645f36767e2b90584a31b17499b511c25c925dca73654fc67a5a9c8

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Detail
              Filesize

              24KB

              MD5

              aacce588e7ca3a293424ef3c45cda11f

              SHA1

              ac09508c18894d937df859676b5b65d8a0af712b

              SHA256

              54365bb8ad9817cdbbf95154157a67626eb99ea3c88b3f5b295d66bfab692078

              SHA512

              1e146feae37a9da8e167f285e5f1dfe4b43e51eb8e257b3fe025ca7aa0171c9c8f2a038428124b19574ae2eca95635153ff7ae0cb91c9dbc953fe97204f3c700

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Directory
              Filesize

              24KB

              MD5

              0e71805320ce820e8a0fcf9ed10296a7

              SHA1

              877dc110151acd54bb89aa89a55e0c5292e3fef1

              SHA256

              fe66a53c1b920f5312d0d8f2f7d37e1614d6776111f4d12e7cabe9e23c39ab5a

              SHA512

              633b04cb46be64ba9089966aadb2cc4f2085d89cb86674c3beb3e930b07b6e05ea0680de0c837729363468066562dd525e01a91002b7e2dbe80201d9dc0d5c66

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Filme
              Filesize

              27KB

              MD5

              32b89cdd98765294a865d24d3ff416bf

              SHA1

              6b2d48789c1d3c383c9e76246046bbed55d226a3

              SHA256

              fb5fdc4d1276303ff4651a7177e9b1bbcbdff2438c50df99b946e87c568e84ab

              SHA512

              2a4af9e316711062c26e3455f5c1d45fb66683c13668067b6319c89440b4d8b59c40f4704a25b31c9c37f4223e69aeab1a2eca7783b40ab9feef6785edfb9fd1

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Frequent
              Filesize

              9KB

              MD5

              344f8759460f7592df30385354132e8d

              SHA1

              222aed99d7a1064968a96c1ddbffe4d08678a9d1

              SHA256

              838c929d12e9d1a835cf4b188639d4316d9f40bf9201241d695cfc3e64242a24

              SHA512

              d58524540408b326177893d7f28a5b768f8a0187da5899c2f7ae84ff6ef19a680dcb572bbaa521aa7202dae84eccbd617681db8df93ea036717c50f995a9113a

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Fri
              Filesize

              69KB

              MD5

              2c3df2fa120a9510e81161e271b5b8bf

              SHA1

              be13265571f051ce0b4b7b6f0f53dfd279f6fbda

              SHA256

              267391ed6c73a010e7a26bafc6b285b2726b22b8f52a17d2d50551d6ca9c0b0d

              SHA512

              8d65d9287d64a97389cc2fd7ed955a52f953c05b9bcf15149f566de7e0075efe6f8203c5412a2cf51567ec798cd31cb68a5df778edd294d73770ed38da4571bf

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Future
              Filesize

              18KB

              MD5

              de457f7cb457e1f9d9cc08426f48d35c

              SHA1

              5ac37406be1d140096596b26acc95fcbcfbc6445

              SHA256

              34ceb19d2286d7d9d26bbab78044f71a629bc75a25bc097805d5bb07add510bf

              SHA512

              79581b6fd033ae0690689083136109eb4c15843f4b597a671ad9d56ad243f63c3beeb52e11119980c8b9bbef46c477af2dfd64b09b79792b42c43ff510a2ffc0

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Giant
              Filesize

              27KB

              MD5

              48e6960e7c881d6d5c41457b7d1abcce

              SHA1

              b0ae8dbcd5f165091c2b5b295b92d8d704064692

              SHA256

              4bc581cb17ffe5b5e148f36019ae5bac5c7f8f97e6db740e1f4b95294d6a10f1

              SHA512

              00202707218357e1e43c1fea798eb8555d954baec94312378f933fca3844b95ab705855ba336add935801f084f3b3b5ad6355bc046db567a942fde4255f61ba4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Interact
              Filesize

              19KB

              MD5

              996cf7bf0146d63c4d415655994c6a94

              SHA1

              189ebd4f58887dccc02ab5db46deec1c5dac8145

              SHA256

              37da2ddaee7dc02018e16ed50acc79aabe79c4a4562a561733a6f447e2033849

              SHA512

              5b9296a12cf461afd44a64d19db35cf9345df16394b2639a94294f705fac0896224d788ef077cca98634976b57824f915b933336dd234e691f084a4c2348b823

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Interest
              Filesize

              37KB

              MD5

              3345f2cdd61b5e9af9902ee8558e04f9

              SHA1

              3aca625fbb299f9299a5e0790022e7627cbd9dad

              SHA256

              9735f972650ae5d350f79edc82be9c01edfc7477bc30484f2f65374760c865dd

              SHA512

              570f580f80bb2f2a306773c06afe2109236fd2839ba5d8307beb00fb2a1b14a53d2cc917c1f76a42df41adf9a57717312bff1f2006be2ec487926be5a78250c4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Iraq
              Filesize

              38KB

              MD5

              bfaf2d299bdd465ffa3a5d42e46e025b

              SHA1

              ca781b9099eb11de7a672cc7dc0d5c48f14d3865

              SHA256

              8aea50ccfbe95fe490d9021f90e9a1af30e14093363d8cf7711f3ff3c9de694b

              SHA512

              2a3ab6c2fec3fb64256f4820b4cb606959bf22d33cfd0439128bc1f0d2db31499164ca73de5bf8248587147c8749b13801374acd38681aa53846841eb7ed523c

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Periodic
              Filesize

              12KB

              MD5

              5baf13b9d96b426d60fe331154f4c915

              SHA1

              2e6b30d41da7d15953741d7da4a3c11b5abb9eb8

              SHA256

              13bd87051bf93fdf2ea085d3776a0f1981c9f45ed1fdfc6bae3487f0023f588a

              SHA512

              bf9923fa7ed914f65cc21fa0719736dc94bb64ebd7c351918cb898d9122a3b8362d309597c92c2220bef87e1cb29cd1b51e37c9086cce4bb74263630b82092ac

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Professor
              Filesize

              132B

              MD5

              9a3ceeeba34e0ce1353bb1e45603884a

              SHA1

              994c2352530052684dca2706ec8707e87e78c3fa

              SHA256

              0b78d958972123238bb1ee439aa4ac30b1bff93071daf362bc1e171ab22f9a13

              SHA512

              f291ee3ba3fedd739cb5ef863fb75a7659c12765b9baa3b2861b43c879e2f5424c68ad0b5e2a9bcfe526f45f5727ac8e50b0af3d842d9d27cdfe95bad94e94b1

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Public
              Filesize

              62KB

              MD5

              8a5d414718c02e5ce2506a8cadd86f87

              SHA1

              d48d0190fed7c5f09605e78d6819fce0c7c33c8d

              SHA256

              e880506f49a2868fe5aa8e8678ab36683dd2884b748452d0018e486d9825f274

              SHA512

              6efabefb7c6d674adb4f48e04ffc769f85fd1f69776ccd1dafd6e8d64238173581da02caaf9e42bf48b6f63d7c2b37583752e724aac52e79eff00fdedc4d9a41

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Resumes
              Filesize

              59KB

              MD5

              c3c150db3cd73c20a412ebd3da0671a5

              SHA1

              8ff704187a9d072d3f52d4f8487024bee6085f32

              SHA256

              60a10e46b7192fbe909d09768298111b02a77ea32f10c4f98934a5a37a149f52

              SHA512

              ad972dbb1bb2a0dcacb6574a4e6936136d6bd97c8bee590849ff3be78a294536af563fc2be5899bf613e963db90934ec3ddec962a6f671f247c8dd5e23c8532c

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ron
              Filesize

              142KB

              MD5

              6b2e81e49af868704424172e697ef28d

              SHA1

              907d657ef08e2c5bbe323a1a3c8661f48f080216

              SHA256

              2207d8c994bbd9734530a340cc7ebbb85fe907f5cfc3da49d3ef004f5b85f3af

              SHA512

              f5775348ea81815c79ece370a2534ee17261aa82a78aca301f2d7991c4ad52349038af6a0853ddd0eadcc9e6bd1a9cc60b725414395a7d801fdc720e5ca954cd

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Sky
              Filesize

              23KB

              MD5

              fe8ed675ad3b1c287832b698ff88ce68

              SHA1

              0ffe5ac683c2acfb24c15fff721bd851c62c547e

              SHA256

              9e3c9261bad186dc4313dad5f7bf75bcba10fc5ef0210ca2af68cb2f4e1e06c7

              SHA512

              b599c7965aff9db03faf3791caa31d2e21afabc3e76cc54fbed898099232e9ddfdb99044b2ff45a89a3636146f20effad03839cd48c69a60ee04c86fb18da74e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Struggle
              Filesize

              65KB

              MD5

              205b5f07cbccaf204c27a25316166170

              SHA1

              865dee186ef4b5ff63cc35e62bf5c487889ed52f

              SHA256

              89dfb375f6adbaeed627d94e290883eccbaa21e26045759a81a8bdf81bce12d2

              SHA512

              99f27e28701ea137bd4da11411d9e0d2f31599f07a0c5b84586e6ca78ecd632218ff1048619d948dc97f808d5576834fb99ddd0701a6750e6c36e8dbc8b1b2f9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Switches
              Filesize

              33KB

              MD5

              7386c0c41ac1bbf52dff08b41058154a

              SHA1

              e1bc5026757358fddef544b6a5ae940c9a5db152

              SHA256

              2bea5f056f09480542b7ae221801fc9d1a6872e3f032e2b7f8b8cdb91b978c28

              SHA512

              5f597b3ad0658a776eeddb6e057a6652023ad2729279f74d0da91d7845db47a61cf940ee6529f5d6bbd36550ce4ad26f11298a49b93f5bd9f23b009a65ccbb4a

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Treasure
              Filesize

              165KB

              MD5

              3b4b56b69acbe7d5be4688a301f8fb9b

              SHA1

              e742fe917aceb4e644e1ed527a52a90a5db13165

              SHA256

              edc1e95ea7f2c3bd473063eb675f51a223aa011c12ea250aea14f40ab118bce4

              SHA512

              98252fa254c4ddaf776aaa629d8e0907dd45fcfa0fb1031ed6e4d2e23658f9dc14867cebe5e6dc7392bfb41f9d1b71db484b2bbe3c151e706e55178a4e49455a

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Triangle
              Filesize

              15KB

              MD5

              81d946f263006eb46f2cb8b8a2173d65

              SHA1

              6e77d3cefddf5ce5c63adc1c5bdbc345f582dcd8

              SHA256

              4e9c4c1b63c3a2f7095a7bdbaa60667a45001d5ec64d0c888813d2b65f35fba7

              SHA512

              1a291efc4780c55818d4656cfc243711a700aaeb4fa773734ea653bf57c8d6aa611d15c94f830d4fd4b7e24fa96b3810aa5ff14edeee86f00cecc92404012bf2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Truly
              Filesize

              33KB

              MD5

              e6b141ed920de3bdce0371b7e1cb0780

              SHA1

              88b447c8508edf6935840efe3a0be52b2860590c

              SHA256

              2bcadebab748765fba52f83a8f90d380213c70cb5335208debe8b6311465ce79

              SHA512

              5284c6529f064e0576e0fd01ec8b4f3e6fc60e0ba591d94129e4145e8379098d182837949a7ca7acc78706031efbd92731759a92f5f99ceb5a94a76383ef89da

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Unix
              Filesize

              58KB

              MD5

              49a19fd12501352b42a9ba87c3a2230e

              SHA1

              23960e63c6bed0d7867480f51754adff56e31598

              SHA256

              f650622c690d896bba73ebce76b4d71e0103337734eb8bbf6e32e9fea184929c

              SHA512

              45f013e34f75dfb8042a957b0edce907696b6b3f0aa99960c6c5628b769a361653b77bcea63540ae38365cbcb00776d343bc0749bb0da25ac12a10608126c09d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Very
              Filesize

              61KB

              MD5

              156d49c96e480544061f89a4cc92b9a0

              SHA1

              5f4036d3028a81eb8c1dbb4c64e616e5db9d7cde

              SHA256

              cff8c7cd73d289821ba6896070519f2c28bf5060caa64db55145b12630e8ee14

              SHA512

              799dc1419ed48be7d26861989cf6be85cce24905819f2c8b0725715aae627f931ba6e0af8322803f5e7f1845a5b0528e74048764884e776fd8ef08c4f88ccc2f

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Welding
              Filesize

              22KB

              MD5

              96ca4691b9a93102277a1c395a21e048

              SHA1

              881ee9f726112dcac4a357fc7a5390215c60b076

              SHA256

              c7787314c7423b0e69d1165194935a617e3adaee2b12b82134008d26c09e0cd6

              SHA512

              ffd3d43119d00a82ef4f2ade3f2f5d66c5ae5abce3b9a58bfed09ff8a8687119b399b65c2c8ce79c754329a7e2e328471d64281c5732354f898751a4a9dae946

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Wellington
              Filesize

              59KB

              MD5

              c758d0d897a17ae1344789cbd6d2315d

              SHA1

              e59c8d272e020ec06793c02f7161dd6f3934cf18

              SHA256

              331d9c0aa037672726ef2e7e120e8bc15d0ec32293fd102733d7d23ac5dd4119

              SHA512

              705ea1d1124b62866fbf0cf414883b979e06fef5632381ed34c45a5158c8c2dbecbaf2f68be5ab0a4ede19df18990478279ac70e762cfa4bdc113fd33ae81832

            • memory/4116-654-0x00000000045C0000-0x0000000004808000-memory.dmp
              Filesize

              2.3MB

            • memory/4116-655-0x00000000045C0000-0x0000000004808000-memory.dmp
              Filesize

              2.3MB

            • memory/4116-656-0x00000000045C0000-0x0000000004808000-memory.dmp
              Filesize

              2.3MB

            • memory/4116-657-0x00000000045C0000-0x0000000004808000-memory.dmp
              Filesize

              2.3MB

            • memory/4116-658-0x00000000045C0000-0x0000000004808000-memory.dmp
              Filesize

              2.3MB

            • memory/4116-659-0x00000000045C0000-0x0000000004808000-memory.dmp
              Filesize

              2.3MB

            • memory/4116-660-0x00000000045C0000-0x0000000004808000-memory.dmp
              Filesize

              2.3MB