Analysis

  • max time kernel
    133s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-09-2024 22:38

General

  • Target

    798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe

  • Size

    283KB

  • MD5

    a8fef7b198fa122ead5bcf5b84f2737b

  • SHA1

    00ac0d1d6354ba397ea4d69265ed227817a29d8f

  • SHA256

    798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30

  • SHA512

    acf483ef4846e1bff039c615eca505547e3739c979a6ecf08bda31869d69c3b71dcbdab045ac28bfcd5bd8bc92201fd5841b54c48ccb39986b712a99f8ef7d3b

  • SSDEEP

    6144:/aYRRx/KV1vo9X/FLI/tiDS/MqmPJOUv5/iqfMvBO71BBEO:/9Lx/i1a/FL2tKeOJv5/iqEY7FEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/fneogr

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe
    "C:\Users\Admin\AppData\Local\Temp\798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\ProgramData\EHCFBFBAEB.exe
        "C:\ProgramData\EHCFBFBAEB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3956
          • C:\Program Files\Google\Chrome\Application\FJFDAV4J7.exe
            "C:\Program Files\Google\Chrome\Application\FJFDAV4J7.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2336
      • C:\ProgramData\DHCBGDHIEB.exe
        "C:\ProgramData\DHCBGDHIEB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:2844
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1104
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDGDBFBFCBF.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:200
              • C:\Users\AdminDGDBFBFCBF.exe
                "C:\Users\AdminDGDBFBFCBF.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:3900
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • Drops file in Program Files directory
                  • System Location Discovery: System Language Discovery
                  PID:5000
                  • C:\Program Files\Google\Chrome\Application\RMKXMK5CW.exe
                    "C:\Program Files\Google\Chrome\Application\RMKXMK5CW.exe"
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4260
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBAEBGHCFCA.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1372
              • C:\Users\AdminBAEBGHCFCA.exe
                "C:\Users\AdminBAEBGHCFCA.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:2376
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4884
        • C:\ProgramData\GDHDHJEBGH.exe
          "C:\ProgramData\GDHDHJEBGH.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4580
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:4100
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GCAFCAFHJJDB" & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            4⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Google\Chrome\Application\FJFDAV4J7.exe

      Filesize

      63KB

      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\ProgramData\AAKEGIJE

      Filesize

      92KB

      MD5

      f1f1e52e12157f58250690a14935123a

      SHA1

      025aa05e57a95271b542e7f968750fe0b7152775

      SHA256

      158a58c6f84871d2d0ad01de5e4b54f308bea3669a5e8e5bb4ad5b0824a9f72e

      SHA512

      8f3b4841ce6aea0d3a0e93b420b5985be47c609f4e477e432c626b2146c8b97854ed115b3c4fa2495033a103cb51f0d9cce85b14acb0a1de2227bbbb2305fab5

    • C:\ProgramData\AAKEGIJEHJDGDHJKJKKJ

      Filesize

      6KB

      MD5

      5227db9712d17ce11a5369309ce710b4

      SHA1

      6a9153997dc82f44622967a8ed1af1c2f3de8440

      SHA256

      4fd2777a43aa5b3e369dbd1ce74d5f8bb95e4050328589f47665bccd6054ae11

      SHA512

      7b79a79eaa7c6617356a535c1031cba7c8051a6c4ee209f82490d4b52bedc49b82067fffd05467343228bb182538d639f2acc6390eb3b8c004953a4c011c87bd

    • C:\ProgramData\AFCBKFHJJJKK\IDHIEB

      Filesize

      20KB

      MD5

      c9ff7748d8fcef4cf84a5501e996a641

      SHA1

      02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

      SHA256

      4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

      SHA512

      d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

    • C:\ProgramData\AFCBKFHJJJKK\JDAKJD

      Filesize

      148KB

      MD5

      90a1d4b55edf36fa8b4cc6974ed7d4c4

      SHA1

      aba1b8d0e05421e7df5982899f626211c3c4b5c1

      SHA256

      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

      SHA512

      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

    • C:\ProgramData\AFCBKFHJJJKK\JDAKJD

      Filesize

      46KB

      MD5

      02d2c46697e3714e49f46b680b9a6b83

      SHA1

      84f98b56d49f01e9b6b76a4e21accf64fd319140

      SHA256

      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

      SHA512

      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

    • C:\ProgramData\DHCBGDHIEB.exe

      Filesize

      206KB

      MD5

      f24d1ef9ffb8be85e5b7f03262eb2e88

      SHA1

      ca80ca5aa19037b424f73de09d52f079032ea546

      SHA256

      c98f17dd444209ad0a6d71221b67cd632bc6409686f750bb5118a7e42eca91e0

      SHA512

      4b0ddd0ad28f7fd30324add6623f399dec43df33d0e9bb24788c0d0e96c1b2f25b96644b5320755299b1d2fb66e4417a0402fd6729d3ed33aec2117c485c3567

    • C:\ProgramData\EHCFBFBAEB.exe

      Filesize

      328KB

      MD5

      55f1d65ca0130c6a8cba2f206b4b0e36

      SHA1

      9ef2f827c92f21f375a50ace8faf72f5b9083ddd

      SHA256

      efe0690c0cc62906989a9e2bbc6e697046b093624e02e15d0e63ea7aa0186884

      SHA512

      8aaa0f9cff3bbdf3bd94735f5282338c088ebefcd21bb3d8982645aa06614e71cde9f7d38673433e3fe41bb959f4c995e42a36aad269de8ac286104de4eb3eac

    • C:\ProgramData\GDHDHJEBGH.exe

      Filesize

      282KB

      MD5

      3a507b0b6463481cbb8d248efa262ddd

      SHA1

      97cc6f79eb1352660997a2194d7d3c9e1aff7a0e

      SHA256

      fdf090545751ce09207f7cec140d21d246cb2f25002683e2cd36c92e18707f56

      SHA512

      4e0abe7ecd536b25146a663ebc49afd955727d32e2e01a6b7305afec79decbc649e95e841d18e226e346eb4d1e91228c215888c1ffb5363d888f6a1a6fed57a8

    • C:\ProgramData\freebl3.dll

      Filesize

      140KB

      MD5

      6e87e7a8277c25cc0faba97391e6572c

      SHA1

      714af7e37d35c77853d4009bc912474a324acc1c

      SHA256

      6c7bc88f1df64dcf09ee163f3137d0e81374165c7b5dbc84a31a21d533296eb0

      SHA512

      5d2c8a3f9bd3e63b5417561dcb702b18248f31d98c59b612cfb305f7e58fad628bec9acbcec9f8839225ae826e6d83607222c3c8ea5bb5b6441b34d36d2bb04d

    • C:\ProgramData\msvcp140.dll

      Filesize

      13KB

      MD5

      e416a22acaeff6cec5aa36a72becbede

      SHA1

      9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

      SHA256

      edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

      SHA512

      8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

    • C:\ProgramData\softokn3.dll

      Filesize

      13KB

      MD5

      16c75e764a9b70ca06fe062d5367abba

      SHA1

      b69856703cc2633f6703368ada943f2ce1e1d722

      SHA256

      3ef27598650d34ccca435d9eb54db0a0ba7c25d6325e17665d7905dfa2423f9f

      SHA512

      edd7391aea11ca27b88c84046e1e88623998f638a0ab7d978aec98e36d7d773f19acbf3c55fefa9ccdaa19adb28124c80431309d21dab2deec152ca2e356aec5

    • C:\ProgramData\vcruntime140.dll

      Filesize

      1024B

      MD5

      b82fcea38722d7a2b82e366e2dcabeeb

      SHA1

      8e2ac40ca1915b45e15b8a84647d0c5d6f9441d9

      SHA256

      a6fca6a2f37912cb23f6baee9dc5e606c9f43559a483b0bcce7cdc28e262d277

      SHA512

      fddb1f635f3f4588a8ee4057c618a8620c509a366856c429bd111802b091844422caa1d3bead9ba2f7412274086ae1fb096bfd3895b85b78f09636d179424b37

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

      Filesize

      471B

      MD5

      cecf9e39987128b205ec741afbac86d1

      SHA1

      1599deaf71c3c5ec61afc7f7b14575face03e409

      SHA256

      40cb238f64b6d464f297878f2389d1223b1417f493f488c1d55759df7f8a39c2

      SHA512

      92243e1a2993034f3b57cc60aecf57aac98e1e5a0e177b35ba981534dec72990b1ac72c01b439b3826871d88bcd2977febb417749d1b276bdb28b56493959c25

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      2KB

      MD5

      3eb397a524d6b064f4130d706bbb32c9

      SHA1

      b79b1169cc971f21308e91af43a295c9cefcfd71

      SHA256

      ba7c039a117bca61feb4ede0876ff545248209cbcc30a8b08f4e84e894227a22

      SHA512

      40015805e1a585aac7c4a07a95a00f3808d99eb6080cd642dfe13d3a735f69dc54ed7381aa9cab498192c8af792c663ae4647597fd82cd96967cad464c5e75a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      2KB

      MD5

      8bd5a49df494d8ec0e300e48bc5ccac7

      SHA1

      1a5a88b912d7533e5f9d23c923c15e1a6e18a87e

      SHA256

      261b931e89a697f15f35ebe38faf32cb8b67ac3fe628ec8ac860c0e6e9b01464

      SHA512

      0e36c0c7ef6abe353ab46efccb296129239b355f873c8cf40ca210be2f6f5d2da89c1e6a5dc260beab7207529e9422748b87b04c7d72bce43b5b7342c4f7b6e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

      Filesize

      2KB

      MD5

      ffec8069cabce0949aaee67665624e67

      SHA1

      d449a98b34103a9e80740ed9d7593c8115c3dc75

      SHA256

      340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

      SHA512

      770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

      Filesize

      1KB

      MD5

      67db8c5d484fe0b60abd574b0480e4c9

      SHA1

      bafea8ad167114a72854bfe78095155bb7c44f89

      SHA256

      5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

      SHA512

      5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      1KB

      MD5

      267213063373c723fc10225ef5c35205

      SHA1

      405c393523c0341b508bed3bef206e10060aacd5

      SHA256

      fcd368cd3608e36d7cb22c98ea40b5c77feec34a08719fa136cef6db5e2036ec

      SHA512

      3a7cbd0ff672feea120d61c9b820727ec35a9345c5e6c5678e5140e1375a6881419e82a2b54528f39c4241bcdbdec3bf89c28288b217dfbb2d21ff8399c59032

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

      Filesize

      490B

      MD5

      8cf87f87db3df2c5e33b4cad8097086d

      SHA1

      9c452e5cc5b1c300f26c3bad1f3ec430d3338c0f

      SHA256

      f39b6b87499f1ef468c7c6b9160e8ba12409d687b86a9d387f3695bce60bea05

      SHA512

      fffcc1e3db257c30ce7cd25daec436df50f4d4c66273b73ea4dccad5ca005fdc3a6ca99958f8cb50fbb7c3a6f4572e4dac03ad699209e8467d7594be9c27d5a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

      Filesize

      458B

      MD5

      4e638f6148d376286804fc9a40cdd0c4

      SHA1

      b421a3a5f02ae65b514f26eaddd16fb4804a4488

      SHA256

      56a71d72725ba4f816dc35ac3e9b873b23f082e042befc8cf3d846337c37c1f8

      SHA512

      6bc8ccf519e016c00e6f0f89d2f5157e6cad781e3f8d790bb05a832218967d97da06358bee4cf4f4eebe9607353c9d9ae4c8c0e21b0672d58974d673f5e7c506

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      450B

      MD5

      9f023a819b27d93972b191b80a5c38f5

      SHA1

      c0aad00517a9772da37f018f7fda1c7703c9ee90

      SHA256

      74db26396eee40c794bc643e0fe38029bfffd286df6ba3947f241222bf145543

      SHA512

      a45b71e31828265a6fb03b664da0c3ebbecbfbd78a9208d0bf3a90fbb4e2d0a99b37c2b046c735d375ce988373dec22a9ce9188280fc4b68121832dbea2546b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

      Filesize

      482B

      MD5

      ad1e24e2a7c719e4312d25e9a899a320

      SHA1

      a489432754fd2d448ad4157ac95ada5e172c7f27

      SHA256

      49c17014c7c660e442fd13b189b3ae62a0eb8338860eb3dd5d25b1bcb8ac5cf3

      SHA512

      e231304e26d92c88dda7e6004725db207a28e3c83fedba673fc2b4cc34c1ecc19507baa4e5a9843b80f8a039399b5fd97bab92b0e1f992417ac591f640e15c76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

      Filesize

      486B

      MD5

      c3537d403648f82f59b3faf14cb3352b

      SHA1

      e1b02b2722715a6ceece74174042fb85f243a877

      SHA256

      7cd4dcce8af4856ff3032e25e8019551705a8707bc8b4fa23b9c5d06acdb1c4c

      SHA512

      5d45a18e210f7626afbbf76ca05666c37c8111f070b7f50a4db30ca22eb0225b0adb480a35589ba06a8b4ecd734bbfcca6f94a47a94461e9379b96e6624bb6c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

      Filesize

      458B

      MD5

      cb9acdb4d59265172746ffff9c9479f8

      SHA1

      a27de4b1cd55c87a18269d099c909b5c1e0ce4ff

      SHA256

      dadd2299f3c77881d0db8941a69ee5594fab02359996367406ceb56e0e679019

      SHA512

      299df1c3dbb76cf0847dc5bd89385de05342a1a138e91833342b2792e1b3e7ecebf33b3831c8585dbd5c8e19cfbaa499b18b0f1e9cd38eb82b12a46d83ac58b8

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AdminBAEBGHCFCA.exe.log

      Filesize

      226B

      MD5

      957779c42144282d8cd83192b8fbc7cf

      SHA1

      de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

      SHA256

      0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

      SHA512

      f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\S590L86P.cookie

      Filesize

      103B

      MD5

      153c6262a7d0b63d149b57f3b6590050

      SHA1

      159c9111398b2ebab134a42961e9819a21b0d96a

      SHA256

      5eff533c138ff388c131ddb39ee372ab7b69dead1a636d41764d7de273683cd8

      SHA512

      b9820967a82cb9fc805f5879fd87165322f675504d2bb500c3eddc163d95cbe577ef86f7ebfc083bcf560901be60bfc9ef32d9efe2fed1f1469e81c2d892e1c6

    • \ProgramData\mozglue.dll

      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • \ProgramData\nss3.dll

      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • memory/1104-139-0x0000000061E00000-0x0000000061EF3000-memory.dmp

      Filesize

      972KB

    • memory/1104-117-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/1104-119-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/1448-0-0x0000000073ACE000-0x0000000073ACF000-memory.dmp

      Filesize

      4KB

    • memory/1448-44-0x0000000073AC0000-0x00000000741AE000-memory.dmp

      Filesize

      6.9MB

    • memory/1448-6-0x0000000073AC0000-0x00000000741AE000-memory.dmp

      Filesize

      6.9MB

    • memory/1448-2-0x0000000073ACE000-0x0000000073ACF000-memory.dmp

      Filesize

      4KB

    • memory/1448-1-0x0000000000650000-0x000000000069A000-memory.dmp

      Filesize

      296KB

    • memory/1688-70-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-71-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-4-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-8-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-10-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-18-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-19-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-20-0x000000001F9F0000-0x000000001FC4F000-memory.dmp

      Filesize

      2.4MB

    • memory/1688-35-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-36-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-62-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/1688-63-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/2052-103-0x0000000071AD0000-0x00000000721BE000-memory.dmp

      Filesize

      6.9MB

    • memory/2052-99-0x0000000071AD0000-0x00000000721BE000-memory.dmp

      Filesize

      6.9MB

    • memory/2052-89-0x0000000000890000-0x00000000008E6000-memory.dmp

      Filesize

      344KB

    • memory/2052-88-0x0000000071ADE000-0x0000000071ADF000-memory.dmp

      Filesize

      4KB

    • memory/2336-105-0x0000000000980000-0x0000000000992000-memory.dmp

      Filesize

      72KB

    • memory/3956-95-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/3956-92-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/3956-102-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB

    • memory/4100-257-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4100-133-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4100-243-0x000000001FBB0000-0x000000001FE0F000-memory.dmp

      Filesize

      2.4MB

    • memory/4100-242-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4100-258-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4100-241-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4100-135-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4100-131-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4508-114-0x0000000000BD0000-0x0000000000C08000-memory.dmp

      Filesize

      224KB

    • memory/4580-128-0x00000000000A0000-0x00000000000EA000-memory.dmp

      Filesize

      296KB

    • memory/4884-265-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4884-266-0x0000000000400000-0x0000000000657000-memory.dmp

      Filesize

      2.3MB

    • memory/4884-267-0x0000000020140000-0x000000002039F000-memory.dmp

      Filesize

      2.4MB

    • memory/5000-224-0x0000000000400000-0x0000000000459000-memory.dmp

      Filesize

      356KB