Analysis

  • max time kernel
    134s
  • max time network
    256s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-09-2024 22:37

General

  • Target

    6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e.exe

  • Size

    282KB

  • MD5

    f33b34d0de9bb27980bc99ea468c1181

  • SHA1

    b6ddd17ceed5372febacae3d2c3b95165053fc62

  • SHA256

    6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e

  • SHA512

    e6a7083752cafcc5264ee312cc4804b646c5f9788c24905a7df689c1520552b73ebc04ff1af5ef0c0c93c026cc3249738fa194caef75ba2f9af7ea1a3f72545e

  • SSDEEP

    6144:Ms6bXo+ImXuZeO59j7MLE/Ut67PmromTk8uHc+1BagPivpNEO:MnbLBXkZ7Bc67PmkR2g6/EO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 17 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e.exe
    "C:\Users\Admin\AppData\Local\Temp\6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\ProgramData\CGCFCBAKKF.exe
        "C:\ProgramData\CGCFCBAKKF.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\Program Files\Google\Chrome\Application\ELKT97FEZ4J1BE6M9S86.exe
            "C:\Program Files\Google\Chrome\Application\ELKT97FEZ4J1BE6M9S86.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2844
      • C:\ProgramData\AEGHJEGIEB.exe
        "C:\ProgramData\AEGHJEGIEB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3572
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminJJJECFIECB.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1904
            • C:\Users\AdminJJJECFIECB.exe
              "C:\Users\AdminJJJECFIECB.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3724
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                PID:4568
                • C:\Program Files\Google\Chrome\Application\CRUXSBJAFG09WLJYW726S.exe
                  "C:\Program Files\Google\Chrome\Application\CRUXSBJAFG09WLJYW726S.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:808
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCBFCBKKFBA.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2860
            • C:\Users\AdminCBFCBKKFBA.exe
              "C:\Users\AdminCBFCBKKFBA.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3848
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:4800
      • C:\ProgramData\IJJJKEGHJK.exe
        "C:\ProgramData\IJJJKEGHJK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3156
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:1412
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:908
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:1920
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FBAAAKFCAFII" & exit
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:712
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              4⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:2508

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Google\Chrome\Application\ELKT97FEZ4J1BE6M9S86.exe

        Filesize

        63KB

        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • C:\ProgramData\AEGHJEGIEB.exe

        Filesize

        206KB

        MD5

        f24d1ef9ffb8be85e5b7f03262eb2e88

        SHA1

        ca80ca5aa19037b424f73de09d52f079032ea546

        SHA256

        c98f17dd444209ad0a6d71221b67cd632bc6409686f750bb5118a7e42eca91e0

        SHA512

        4b0ddd0ad28f7fd30324add6623f399dec43df33d0e9bb24788c0d0e96c1b2f25b96644b5320755299b1d2fb66e4417a0402fd6729d3ed33aec2117c485c3567

      • C:\ProgramData\CGCFCBAKKF.exe

        Filesize

        328KB

        MD5

        55f1d65ca0130c6a8cba2f206b4b0e36

        SHA1

        9ef2f827c92f21f375a50ace8faf72f5b9083ddd

        SHA256

        efe0690c0cc62906989a9e2bbc6e697046b093624e02e15d0e63ea7aa0186884

        SHA512

        8aaa0f9cff3bbdf3bd94735f5282338c088ebefcd21bb3d8982645aa06614e71cde9f7d38673433e3fe41bb959f4c995e42a36aad269de8ac286104de4eb3eac

      • C:\ProgramData\FHCGCFHDHIIIDGCAAEGD

        Filesize

        6KB

        MD5

        35428edbc428fb6d3333675903239714

        SHA1

        e66d10e9ad22a3f393aa02c7cb2216aa973e74ff

        SHA256

        558a6151b354f24569ee97b2064fcbebd391b7c53b4ff4d03dc871454a253c35

        SHA512

        02efb3406a6dcfe16e0b03b1efb59ee2775feabb908dfd0e282742ee1bfe47b1e4bd76d5abfcba0f95cc59337e43121eaf203bc84ba31066ce0aacf5a2e5e457

      • C:\ProgramData\IECFHDBAAECA\DBFBFB

        Filesize

        20KB

        MD5

        c9ff7748d8fcef4cf84a5501e996a641

        SHA1

        02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

        SHA256

        4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

        SHA512

        d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

      • C:\ProgramData\IECFHDBAAECA\ECFCBK

        Filesize

        46KB

        MD5

        02d2c46697e3714e49f46b680b9a6b83

        SHA1

        84f98b56d49f01e9b6b76a4e21accf64fd319140

        SHA256

        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

        SHA512

        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

      • C:\ProgramData\IJECAEHJ

        Filesize

        92KB

        MD5

        55d8864e58f075cbe2dbd43a1b2908a9

        SHA1

        0d7129d95fa2ddb7fde828b22441dc53dffc5594

        SHA256

        e4e07f45a83a87aff5e7f99528464abaad495499e9e2e3e0fcd5897819f88581

        SHA512

        89ce123d2685448826f76dce25292b2d2d525efd8b78fd9235d1e357ad7ae2d4b3461ef903e2994cd2b8e28f56b0cc50137dd90accdd3f281472e488f6c7cf2e

      • C:\ProgramData\IJJJKEGHJK.exe

        Filesize

        282KB

        MD5

        3a507b0b6463481cbb8d248efa262ddd

        SHA1

        97cc6f79eb1352660997a2194d7d3c9e1aff7a0e

        SHA256

        fdf090545751ce09207f7cec140d21d246cb2f25002683e2cd36c92e18707f56

        SHA512

        4e0abe7ecd536b25146a663ebc49afd955727d32e2e01a6b7305afec79decbc649e95e841d18e226e346eb4d1e91228c215888c1ffb5363d888f6a1a6fed57a8

      • C:\ProgramData\freebl3.dll

        Filesize

        14KB

        MD5

        0fa512f77b04080b3507002c89017363

        SHA1

        22c3fc5dc131771dfbd689267202346422a00593

        SHA256

        5356b19edffb7610e00b61c3bbf1f855ce7b693ffb2f086f146e749854fb1f8f

        SHA512

        86b67ef9864aebe1c445b1b4c4bd72980c03902e2ea716f615821b50a99afd94f454558e2edb0a8ee715117a58ff186f19e563052a05079b901e3513f6baab7e

      • C:\ProgramData\msvcp140.dll

        Filesize

        13KB

        MD5

        e416a22acaeff6cec5aa36a72becbede

        SHA1

        9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

        SHA256

        edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

        SHA512

        8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

      • C:\ProgramData\nss3.dll

        Filesize

        4KB

        MD5

        12dfa45a949ac84acfcc1a882c46e201

        SHA1

        da55dd7dd774ca648811c8750f3ebc7a745eb289

        SHA256

        ca1b8e2426c1d453dba612f9f6e3e4df325512a7b261ea59b054ef00a3e9bafe

        SHA512

        9c1c84510ee9c0058aa6b13a1d87ce8d16992826ee03b2634f0dafb337c1a6e8a7af7f195e08631a8139e5e0d629b7846caee63321da944c97f05f36108bc3be

      • C:\ProgramData\vcruntime140.dll

        Filesize

        8KB

        MD5

        0540bebba9053435a89e7af0abf55b02

        SHA1

        0a8baa4607f7c569af2cad1eece6f623d30c897a

        SHA256

        96ff2f9a84b863df3f2eb63afeb0959bae20e4b79992665cd5f4f6d28c8ade88

        SHA512

        42cdc56e4af62ebc9f5ee7f8dc83ed9e9be58600eb00366e3b60f88f41e5dff3de75daef38cf22ca2836bfb6f60c4f5c86b4141862502bbc7f3386e2453119b8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

        Filesize

        471B

        MD5

        cecf9e39987128b205ec741afbac86d1

        SHA1

        1599deaf71c3c5ec61afc7f7b14575face03e409

        SHA256

        40cb238f64b6d464f297878f2389d1223b1417f493f488c1d55759df7f8a39c2

        SHA512

        92243e1a2993034f3b57cc60aecf57aac98e1e5a0e177b35ba981534dec72990b1ac72c01b439b3826871d88bcd2977febb417749d1b276bdb28b56493959c25

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        2KB

        MD5

        3eb397a524d6b064f4130d706bbb32c9

        SHA1

        b79b1169cc971f21308e91af43a295c9cefcfd71

        SHA256

        ba7c039a117bca61feb4ede0876ff545248209cbcc30a8b08f4e84e894227a22

        SHA512

        40015805e1a585aac7c4a07a95a00f3808d99eb6080cd642dfe13d3a735f69dc54ed7381aa9cab498192c8af792c663ae4647597fd82cd96967cad464c5e75a2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        2KB

        MD5

        8bd5a49df494d8ec0e300e48bc5ccac7

        SHA1

        1a5a88b912d7533e5f9d23c923c15e1a6e18a87e

        SHA256

        261b931e89a697f15f35ebe38faf32cb8b67ac3fe628ec8ac860c0e6e9b01464

        SHA512

        0e36c0c7ef6abe353ab46efccb296129239b355f873c8cf40ca210be2f6f5d2da89c1e6a5dc260beab7207529e9422748b87b04c7d72bce43b5b7342c4f7b6e6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        2KB

        MD5

        ffec8069cabce0949aaee67665624e67

        SHA1

        d449a98b34103a9e80740ed9d7593c8115c3dc75

        SHA256

        340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

        SHA512

        770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        1KB

        MD5

        67db8c5d484fe0b60abd574b0480e4c9

        SHA1

        bafea8ad167114a72854bfe78095155bb7c44f89

        SHA256

        5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

        SHA512

        5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        1KB

        MD5

        267213063373c723fc10225ef5c35205

        SHA1

        405c393523c0341b508bed3bef206e10060aacd5

        SHA256

        fcd368cd3608e36d7cb22c98ea40b5c77feec34a08719fa136cef6db5e2036ec

        SHA512

        3a7cbd0ff672feea120d61c9b820727ec35a9345c5e6c5678e5140e1375a6881419e82a2b54528f39c4241bcdbdec3bf89c28288b217dfbb2d21ff8399c59032

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

        Filesize

        490B

        MD5

        2e63e09c02876b9c7fe77c813aee6490

        SHA1

        83e45962abd319e0acfc6509897962cf30bd0801

        SHA256

        ad9f90db008b6c578b7c5288d2878007b92d4e6f04298bcf4bc9c861a98f79cc

        SHA512

        f1ed51a38fdcb9d4ab845aa813a724c691bc8fd3b39ccf92603be76eaa88d5c43372f19f23a2208af5fee3e3ef7a76fa851ae9c6998b7a28e6141c2be69c4b99

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        458B

        MD5

        ac0f809469c34fc461ab6e3b5f66df71

        SHA1

        4b314d52f534483bb45e03b69b543d8c2e9e2255

        SHA256

        ec2c150cfc9ce981500ea05b371e41f015eb44a691166bd920bb3b92ee0e221d

        SHA512

        46015e0f467ae0092f773093fa39267baa6efe7cf711464286ca1e96bc7c43860f47a515e780f579b58c23d9f0250b8b7979fc69455879b1d1118f4b1e3ff61d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        450B

        MD5

        974258efc2142da80b42a1681662b573

        SHA1

        aacafdd61c6fdae03dd0d5ca1b23d8ee791e8378

        SHA256

        e637e5a1f4ea39c5a7eee2301a80c353be45c7dd2edc04d9d4c4848a746fba8e

        SHA512

        bc3e03d8aca0a48eaebd1655812c465b478ea08740b1e61e5680b1ac59a92f8960dc2caafb62e4e69349058b16b5ab462055fa93e3bb09fe2c1566fedfa9432b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        482B

        MD5

        43b357e04328f30e590f11b61b757559

        SHA1

        b79b8888ee16dd344193916153897e7505c23cb1

        SHA256

        8f8de6b71062ce88b12a81fd24809a7e6b63dd4b959d764721c335afba985443

        SHA512

        92cf16832dc9ae997e6764310da094e2b69632d63e6f83b84b97d169301857c2951c60d2d2699dd8e7a8d1858badc1141191b0d86fb0fbb99b3e03cbb0bee180

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        486B

        MD5

        c224ee7eb219b5f7b5af5f92d51a7bca

        SHA1

        72c5a5db843072b63e2d85dab4709dee09a16f99

        SHA256

        263b719d97266260453e8dd8c11aa8e546080f51ec67a5ffb8d12b585acb7614

        SHA512

        d9533c3e5f03eea6a7a8989775ae138da9f52bc9d362b92ebdce4dcc5f8ddcd0834e988a6bd51507b217bab6cfa2d8b50cd5ba86367fef79c03b3d25af910cd2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        458B

        MD5

        ef8b092ceb6fc26cd9e73401f36fb040

        SHA1

        4a7b9710cb60d19bd9ddcade010897735fb0f5c6

        SHA256

        018a9af73d6f0bf26605129280f93e0013ab9f5473792b4211f483f41a9e08fe

        SHA512

        9b57da13facf56b43cbafb5d7955199412852a472974e24c5551653aa88ef0f17627f3c94bb5407037bffa9d39990e0d5bb3f95f5394be6faf4886b29b749fd1

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AdminJJJECFIECB.exe.log

        Filesize

        226B

        MD5

        957779c42144282d8cd83192b8fbc7cf

        SHA1

        de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

        SHA256

        0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

        SHA512

        f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7TNM0UOJ.cookie

        Filesize

        104B

        MD5

        35ca85fdc754879e974a4fb95279cf97

        SHA1

        4d72be5d23b3a55218db94bf32f369b4fffec13b

        SHA256

        265d4a3e21d18ac162117231693a66a3fabfec1a37fec31f8f64a414b763ed7f

        SHA512

        1ac5f183df10e49ab245bb411bb2b64c392cf20746484822cef873ad3681990a4fd0d55a7b6ba6b41137fb4e6d0e7be4c70fee42ad3029af3e702dca030fe41e

      • \ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • \ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • memory/664-108-0x00000000724E0000-0x0000000072BCE000-memory.dmp

        Filesize

        6.9MB

      • memory/664-99-0x00000000004C0000-0x0000000000516000-memory.dmp

        Filesize

        344KB

      • memory/664-113-0x00000000724E0000-0x0000000072BCE000-memory.dmp

        Filesize

        6.9MB

      • memory/664-98-0x00000000724EE000-0x00000000724EF000-memory.dmp

        Filesize

        4KB

      • memory/1888-0-0x000000007385E000-0x000000007385F000-memory.dmp

        Filesize

        4KB

      • memory/1888-54-0x0000000073850000-0x0000000073F3E000-memory.dmp

        Filesize

        6.9MB

      • memory/1888-1-0x0000000000560000-0x00000000005AA000-memory.dmp

        Filesize

        296KB

      • memory/1888-13-0x0000000073850000-0x0000000073F3E000-memory.dmp

        Filesize

        6.9MB

      • memory/1920-254-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1920-255-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1920-256-0x000000001FA90000-0x000000001FCEF000-memory.dmp

        Filesize

        2.4MB

      • memory/1920-266-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1920-267-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2228-102-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/2228-105-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/2228-111-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/2780-124-0x0000000000C00000-0x0000000000C38000-memory.dmp

        Filesize

        224KB

      • memory/2844-115-0x0000000000C70000-0x0000000000C82000-memory.dmp

        Filesize

        72KB

      • memory/3156-138-0x0000000000870000-0x00000000008BA000-memory.dmp

        Filesize

        296KB

      • memory/3572-149-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/3572-129-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/3572-127-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-46-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-8-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-73-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-72-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-4-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-81-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-45-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-30-0x00000000228F0000-0x0000000022B4F000-memory.dmp

        Filesize

        2.4MB

      • memory/4436-29-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-28-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-80-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4436-10-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4568-235-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/4800-268-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4800-269-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/4800-270-0x000000001FE00000-0x000000002005F000-memory.dmp

        Filesize

        2.4MB