Analysis

  • max time kernel
    113s
  • max time network
    117s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240730-en
  • resource tags

    arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-08-2024 11:25

General

  • Target

    file.html

  • Size

    312KB

  • MD5

    eac54c77a132de1321de2b7c014512a9

  • SHA1

    58e2f16d2ddb9dbd5908f291de2665fa8bc1e7f6

  • SHA256

    a83fea4d354875936b6239b40ada368af6f69596d78f94e30dbd786921bac719

  • SHA512

    e89e8f2588c377762430f563234112be0ea00495ec0878e90f11bf699e2738fa52b8a040289611e60afb2f2624f025b4f92fe6ae4712011c892d2ae802b22e20

  • SSDEEP

    3072:qi7gAkHnjPIQ6KSEc/rHzPaW+LN7DxRLlzglKSVO7k:FgAkHnjPIQBSECTPCN7jBSVO7k

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 8 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 4 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\file.html
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9174cc40,0x7ffd9174cc4c,0x7ffd9174cc58
      2⤵
        PID:404
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1800 /prefetch:2
        2⤵
          PID:3640
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2088 /prefetch:3
          2⤵
            PID:2140
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2524 /prefetch:8
            2⤵
              PID:1784
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3132 /prefetch:1
              2⤵
                PID:3556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3280 /prefetch:1
                2⤵
                  PID:2868
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4692 /prefetch:1
                  2⤵
                    PID:2504
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4676,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4700 /prefetch:1
                    2⤵
                      PID:4744
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4732,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4756 /prefetch:1
                      2⤵
                        PID:4668
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4764,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4776 /prefetch:1
                        2⤵
                          PID:4516
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5008 /prefetch:8
                          2⤵
                          • NTFS ADS
                          PID:4620
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3296,i,15933781742843496786,5887963169332966057,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5568 /prefetch:8
                          2⤵
                            PID:2788
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                          1⤵
                            PID:2224
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:1120
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:3096
                              • C:\Windows\system32\NOTEPAD.EXE
                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\TokenGrabber\DControl\ReadMe.txt
                                1⤵
                                • Opens file in notepad (likely ransom note)
                                PID:3968
                              • C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe
                                "C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1248
                              • C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe
                                "C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2536
                              • C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe
                                "C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe"
                                1⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:2184
                                • C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe
                                  C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  PID:5048
                                  • C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe
                                    "C:\Users\Admin\Downloads\TokenGrabber\DControl\dControl.exe" /TI
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:2736
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Modifies registry class
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of SetWindowsHookEx
                                PID:3116
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\TokenGrabber\DControl\Defender_Settings.vbs"
                                1⤵
                                • Modifies registry class
                                PID:4104
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of SetWindowsHookEx
                                PID:3092
                              • C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe
                                "C:\Users\Admin\Downloads\TokenGrabber\Grabber Builder\GrabberBuilder.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4556
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:2632

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                Filesize

                                40B

                                MD5

                                a8ec4f0fabb875bcbb1c73a1910b9d98

                                SHA1

                                4617f95e1f027d7ea080a4229441ce2974767c78

                                SHA256

                                2e673599c07e8d86144f8752857bef0bdffd7e1f66a944153edf5d9ffac5192b

                                SHA512

                                47612d59a020211c0b4e14d74f9b18aba1215140c8d41f74a62eaacafca46d0e95a0d0794396439af409334bcc68c1ac068ee9c2c7809d27882c944f71c799f2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                576B

                                MD5

                                1dfb9535e9ee4a0cd9ef6bc9edd5937a

                                SHA1

                                fb45c5eed5c572375db4dd388c1c21dc08fbe557

                                SHA256

                                78eda5b86cf219cd502b8d5199c52f8c159ea7ec921bb8b9b991e27637152f11

                                SHA512

                                7412130b01b8049d0345e1c8d06cf5029e7e4da896a8d756e53c8286f438d1d440a476cc9be14f387d4f70d5eaa8fd31eee66a6a98466493759961a6211405da

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\77a4d569-aed2-4972-943a-80de32c62c96.tmp

                                Filesize

                                1KB

                                MD5

                                acc996492315d953390a7d870a74e8f0

                                SHA1

                                5106fb08d0fb39de30bf8b91c2231ecf4ef3d8a9

                                SHA256

                                13f1f760c08acb20ffb0ffa444697055a24005c951553d44e4a23b0dffedcb50

                                SHA512

                                d3ca2aaf88a8e8160dcda331fdaa39a43fcf271891869fe749264966ec3d4e781171263cc3d1770d3f3e9c06afe0516d6d7f65fc71b75d8b10d20d8636db0e22

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                7KB

                                MD5

                                e8ed33a20153558aca8746038550ff0d

                                SHA1

                                f5c67356f63b685ed6069b9c6685d68b19adb765

                                SHA256

                                7d856a509e58e55b45c5e5a57aaf4432a784cf3203286c4bb0f2076bb79a2690

                                SHA512

                                9cfe5ae7df12fee1dab80824457382bc416eb8cd886d906bfe6073b128b8263c5dc4aa1f132c83ca005ae153f00943e532b819d257dc70a7807902fad92eca9f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                5b8cd4407634d360b45229fbba99ffad

                                SHA1

                                8825ce51dbbf5fbf87e42b262cde3f865c908345

                                SHA256

                                18cc2ce41ef8c6d9bf1b8f93b771bdc548add6be68ef142e00321381460a05ed

                                SHA512

                                4aea01fe5db67789486b630a8221f38a9fe220620145365224f31f0ee6e8a130957c76f1f9a97fd492ef038c55a9534941daf302c38e08cdf44c63d6156c7907

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                74ab218df984ffda543985606f66acf4

                                SHA1

                                7a640e08a167f5680df43de574fb05edef78ed33

                                SHA256

                                49b86ba383c26bb1e4535af80aadf282f46799eaf7896882487c037baa798480

                                SHA512

                                cf259b6f605d3fe144701e34932dc7ed3f8138b1a484027047bd271034d0e9f84da0814a3b5c2f28e68d1c0e487d114986410e5618f76ecd960f4a49fa1b0ec4

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                98102ad1f4938ceb8d24ccbc7c713005

                                SHA1

                                a80e9bc61e250bab12977871ac64384c6a426925

                                SHA256

                                93f952b8928265c9cab994022146bd065b225c6bb5ac564a3bfafea7a82df2f2

                                SHA512

                                186fc71b7b723d406bf9b66c30976726c98216b2d4e7d4ea5315f25f7b52d175ae9a6e0c9d4503a4721d81b8eef331c88d1a199658ab2621f30992ee7fadc207

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                10KB

                                MD5

                                de5d39b18b04e00ebc1f25c9f07039b1

                                SHA1

                                c689d0021813c6c80c11fb2d46c6a90f8390925e

                                SHA256

                                d10d5e51098d2c5b309f9cdc8f0f4b76657757d587c3175119157dd697087ffd

                                SHA512

                                56a5e1a0c79aa717662e1951039ca749b875f2dd89b0d320c0975c6bff34f743ae0d17b9f9b5ec0779c34890c8790e531e660ab8e7c3c31b5365984d1f5e188f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                10KB

                                MD5

                                78a9c43e3d5675f2f7351f3059081634

                                SHA1

                                c3f5baeeb46cdfe3e570714f262321557880fb42

                                SHA256

                                85261c4a412eb903926f16aea9f612e04e10bf12e6af64f3473c32e9208e2e0d

                                SHA512

                                98b99709dd0392d28a1be5f4395c77f2d3a8248e92b7a65d2dcee7234192e9553d597f806a256ab55f1574d57f6960115d2c4c6f02f08fbe066c5c67e2eb8b73

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                bdf7b7bbd1f155700d35b93ee0869164

                                SHA1

                                450d7f11fe5c0a64ca1757b3d411ec88f938ad3f

                                SHA256

                                29fdcc5dcc4575f3cd44eafaee450f1f57b5cd794a739f11d8a954ec515339ae

                                SHA512

                                c5f90ef422f1b68c3db7bfdf8a80410514865d65ddca32279b9e6c6a72b14e372e60655916ecac32ce980c0a7086f8faaf7e287571ef3c6fe6d7d772c04bedf8

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                10KB

                                MD5

                                3f554fd31ebc62041c079c7a95fdde51

                                SHA1

                                99656708ccd2847b5cd9649e68ab3adf4f7ee966

                                SHA256

                                8c3c9e92ccc59671466c4720d15607c8854b81bec3b1d7ca9918f643c1f5e500

                                SHA512

                                30bdac3f4ff91e73e357e396f4a0071251ec3b7dbb5f69ee52cb919ab5bdfea58472aab94e628b54d1c2310672ebed95f9462d56db5adfbafc283587c747f449

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                100KB

                                MD5

                                cfc541cefe14ec4032da7f058b127ed8

                                SHA1

                                b9cf6ccac4a6c5d9f2aa34a2d9c76e5218297564

                                SHA256

                                ff1f51f852e5937a1bfc4a196b136759622188f79915c80db5f5ca2449890566

                                SHA512

                                332f8834c534619ac5c9f42f8fc313e2ac9ab9155941d56f7a7dc467b18b95bfe5cac1c098918ead4fdc3f6c35e3dc31ddd0d3abf2154500e8c1003c35df3dfd

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                100KB

                                MD5

                                58fe61472e2e866a8a7fb85ace5096b4

                                SHA1

                                a5c9dc400d9c99cdb85e1ccb2b47e1ebc25dde06

                                SHA256

                                35f1ce67b6f1e11de0684db0cc46e16cad9ed6a1183be806b2f2baadc9620c8d

                                SHA512

                                6f5d51373842525490ebfc021f78da8a5d2d707be9e9e5c68a3666a28704a11dbb169ed049e0cc3be1d452a2da37894a63863fba26222b1304674a7710c47b85

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GrabberBuilder.exe.log

                                Filesize

                                2KB

                                MD5

                                562e7708e65396a05d7e1f05e6192ded

                                SHA1

                                5772f714d5f525289e4b83c48fc5e93e5d127585

                                SHA256

                                d6122340f41f7dfc6d42d88eae7135c184433f701e18cda27489941059985608

                                SHA512

                                e112b68a5cadc018e8ee647e0ef4a64731724e1ac074966a831e3577c869528c3f028b48bc3c28b89a9ec007ceb3f1766b0e32a7af83d6248c27f3bae1fb880b

                              • C:\Users\Admin\AppData\Local\Temp\2d1w8k4m.tmp

                                Filesize

                                37KB

                                MD5

                                3bc9acd9c4b8384fb7ce6c08db87df6d

                                SHA1

                                936c93e3a01d5ae30d05711a97bbf3dfa5e0921f

                                SHA256

                                a3d7de3d70c7673e8af7275eede44c1596156b6503a9614c47bad2c8e5fa3f79

                                SHA512

                                f8508376d9fb001bce10a8cc56da5c67b31ff220afd01fb57e736e961f3a563731e84d6a6c046123e1a5c16d31f39d9b07528b64a8f432eac7baa433e1d23375

                              • C:\Users\Admin\AppData\Local\Temp\tmpBDC4.tmp

                                Filesize

                                40KB

                                MD5

                                a182561a527f929489bf4b8f74f65cd7

                                SHA1

                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                SHA256

                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                SHA512

                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                              • C:\Users\Admin\AppData\Local\Temp\tmpBDE9.tmp

                                Filesize

                                114KB

                                MD5

                                14f9823c7f73af418659d716fc91c0d1

                                SHA1

                                56eca072fcba259cf0813ef67bdd8d663825a865

                                SHA256

                                8d95ff19d697afe7bfd166c4ffc38921fae8434043c09c900c303841acb36ce1

                                SHA512

                                a9c0547671cfa4558a2b9a1e1501e50004d7d4d1cc1014dffe8bb8e91ccbee9c611f210f93bdc5e397161d15a4181b99c98c4e380626aa1488b48a0c855a3f18

                              • C:\Users\Admin\AppData\Local\Temp\tmpBE24.tmp

                                Filesize

                                46KB

                                MD5

                                14ccc9293153deacbb9a20ee8f6ff1b7

                                SHA1

                                46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

                                SHA256

                                3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

                                SHA512

                                916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

                              • C:\Users\Admin\AppData\Local\Temp\tmpBE2A.tmp

                                Filesize

                                20KB

                                MD5

                                22be08f683bcc01d7a9799bbd2c10041

                                SHA1

                                2efb6041cf3d6e67970135e592569c76fc4c41de

                                SHA256

                                451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457

                                SHA512

                                0eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936

                              • C:\Users\Admin\AppData\Local\Temp\tmpBE30.tmp

                                Filesize

                                112KB

                                MD5

                                87210e9e528a4ddb09c6b671937c79c6

                                SHA1

                                3c75314714619f5b55e25769e0985d497f0062f2

                                SHA256

                                eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                SHA512

                                f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                              • C:\Users\Admin\AppData\Local\Temp\tmpBE4C.tmp

                                Filesize

                                96KB

                                MD5

                                40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                SHA1

                                d6582ba879235049134fa9a351ca8f0f785d8835

                                SHA256

                                cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                SHA512

                                cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                              • C:\Windows\Temp\autFC8B.tmp

                                Filesize

                                14KB

                                MD5

                                9d5a0ef18cc4bb492930582064c5330f

                                SHA1

                                2ec4168fd3c5ea9f2b0ab6acd676a5b4a95848c8

                                SHA256

                                8f5bbcc572bc62feb13a669f856d21886a61888fd6288afd066272a27ea79bb3

                                SHA512

                                1dc3387790b051c3291692607312819f0967848961bc075799b5a2353efadd65f54db54ddf47c296bb6a9f48e94ec83086a4f8bf7200c64329a73fc7ec4340a4

                              • C:\Windows\Temp\autFC8C.tmp

                                Filesize

                                12KB

                                MD5

                                efe44d9f6e4426a05e39f99ad407d3e7

                                SHA1

                                637c531222ee6a56780a7fdcd2b5078467b6e036

                                SHA256

                                5ea3b26c6b1b71edaef17ce365d50be963ae9f4cb79b39ec723fe6e9e4054366

                                SHA512

                                8014b60cef62ff5c94bf6338ee3385962cfc62aaa6c101a607c592ba00aea2d860f52e5f52be2a2a3b35310f135548e8d0b00211bfcf32d6b71198f5d3046b63

                              • C:\Windows\Temp\autFC8D.tmp

                                Filesize

                                7KB

                                MD5

                                ecffd3e81c5f2e3c62bcdc122442b5f2

                                SHA1

                                d41567acbbb0107361c6ee1715fe41b416663f40

                                SHA256

                                9874ab363b07dcc7e9cd6022a380a64102c1814343642295239a9f120cb941c5

                                SHA512

                                7f84899b77e3e2c0a35fb4973f4cd57f170f7a22f862b08f01938cf7537c8af7c442ef2ae6e561739023f6c9928f93a59b50d463af6373ed344f68260bc47c76

                              • \??\pipe\crashpad_4684_CJJESRLDMXXHFNXK

                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • memory/1248-211-0x0000000007A70000-0x0000000007B02000-memory.dmp

                                Filesize

                                584KB

                              • memory/1248-196-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/1248-213-0x0000000007EA0000-0x0000000007EBE000-memory.dmp

                                Filesize

                                120KB

                              • memory/1248-210-0x0000000007460000-0x0000000007A06000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/1248-209-0x0000000007240000-0x00000000072A6000-memory.dmp

                                Filesize

                                408KB

                              • memory/1248-208-0x0000000006C00000-0x000000000712C000-memory.dmp

                                Filesize

                                5.2MB

                              • memory/1248-207-0x0000000006A30000-0x0000000006BF2000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/1248-212-0x0000000007B20000-0x0000000007B96000-memory.dmp

                                Filesize

                                472KB

                              • memory/1248-193-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/1248-198-0x0000000005480000-0x0000000005A98000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/1248-202-0x0000000005CD0000-0x0000000005DDA000-memory.dmp

                                Filesize

                                1.0MB

                              • memory/1248-404-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/1248-201-0x0000000005B40000-0x0000000005B8C000-memory.dmp

                                Filesize

                                304KB

                              • memory/1248-197-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/1248-199-0x0000000005AC0000-0x0000000005AD2000-memory.dmp

                                Filesize

                                72KB

                              • memory/1248-200-0x0000000005AE0000-0x0000000005B1C000-memory.dmp

                                Filesize

                                240KB

                              • memory/2184-602-0x0000000000400000-0x00000000004CD000-memory.dmp

                                Filesize

                                820KB

                              • memory/2184-580-0x0000000000400000-0x00000000004CD000-memory.dmp

                                Filesize

                                820KB

                              • memory/2536-206-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/2536-579-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/2536-203-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/2536-205-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/2736-654-0x0000000000400000-0x00000000004CD000-memory.dmp

                                Filesize

                                820KB

                              • memory/4556-664-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/4556-666-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/4556-667-0x0000000000400000-0x0000000000D28000-memory.dmp

                                Filesize

                                9.2MB

                              • memory/4556-668-0x00000000053D0000-0x000000000541C000-memory.dmp

                                Filesize

                                304KB

                              • memory/5048-633-0x0000000000400000-0x00000000004CD000-memory.dmp

                                Filesize

                                820KB