Analysis

  • max time kernel
    200s
  • max time network
    202s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-09-2024 22:48

General

  • Target

    daf4e8849a3b6011bff41cc2c7decee8c769a4ebf2be3d7316930f40448ddb25.exe

  • Size

    205KB

  • MD5

    5409b0fc8b14c5b24f5db3ede8cef555

  • SHA1

    9f6beb3b72e1956860cdc4683fcb788b2b912713

  • SHA256

    daf4e8849a3b6011bff41cc2c7decee8c769a4ebf2be3d7316930f40448ddb25

  • SHA512

    ef9f1438c39c992f76b28e2fa2f4789875a00a49072d42410cf4c65549597adfb119547afaa8738a9270c6a6c94e199f283442edc05d294e6a8f60a0eec5c10a

  • SSDEEP

    6144:nXXbZkdfvaC2pgfSO6z43ZJ2wcdp8gd51zEO:nXXWdqC2Ka/AJ/cdzd51zEO

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Signatures

  • Detect Vidar Stealer 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daf4e8849a3b6011bff41cc2c7decee8c769a4ebf2be3d7316930f40448ddb25.exe
    "C:\Users\Admin\AppData\Local\Temp\daf4e8849a3b6011bff41cc2c7decee8c769a4ebf2be3d7316930f40448ddb25.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHJJEHJJKJE.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Users\AdminHJJEHJJKJE.exe
          "C:\Users\AdminHJJEHJJKJE.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2120
            • C:\Program Files\Google\Chrome\Application\YNS3IZFA9716M4I.exe
              "C:\Program Files\Google\Chrome\Application\YNS3IZFA9716M4I.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3916
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCBGHCAKKFB.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4292
        • C:\Users\AdminCBGHCAKKFB.exe
          "C:\Users\AdminCBGHCAKKFB.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4548
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
              PID:4832
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
                PID:408
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:8
                • C:\ProgramData\DHCBGDHIEB.exe
                  "C:\ProgramData\DHCBGDHIEB.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2400
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • Drops file in Program Files directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1836
                    • C:\Program Files\Google\Chrome\Application\AEFFGQ8KP49LP3WZO0TUN.exe
                      "C:\Program Files\Google\Chrome\Application\AEFFGQ8KP49LP3WZO0TUN.exe"
                      8⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4660
                • C:\ProgramData\AEGHJEGIEB.exe
                  "C:\ProgramData\AEGHJEGIEB.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:1552
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1996
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDAEGIDHDHI.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:1396
                      • C:\Users\AdminDAEGIDHDHI.exe
                        "C:\Users\AdminDAEGIDHDHI.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:4156
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          10⤵
                            PID:2176
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            10⤵
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            PID:1936
                            • C:\Program Files\Google\Chrome\Application\TSVIPICP6NEEI7Y.exe
                              "C:\Program Files\Google\Chrome\Application\TSVIPICP6NEEI7Y.exe"
                              11⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3052
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminJKEGHDGHCG.exe"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:1856
                        • C:\Users\AdminJKEGHDGHCG.exe
                          "C:\Users\AdminJKEGHDGHCG.exe"
                          9⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:4520
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            10⤵
                              PID:3476
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              10⤵
                                PID:2060
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                10⤵
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4104
                      • C:\ProgramData\HDHCFIJEGC.exe
                        "C:\ProgramData\HDHCFIJEGC.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:884
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2828
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JKEGHDGHCGHD" & exit
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:4356
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 10
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Delays execution with timeout.exe
                          PID:4372

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Google\Chrome\Application\YNS3IZFA9716M4I.exe

              Filesize

              63KB

              MD5

              b58b926c3574d28d5b7fdd2ca3ec30d5

              SHA1

              d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

              SHA256

              6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

              SHA512

              b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

            • C:\ProgramData\AEGHJEGIEB.exe

              Filesize

              206KB

              MD5

              f24d1ef9ffb8be85e5b7f03262eb2e88

              SHA1

              ca80ca5aa19037b424f73de09d52f079032ea546

              SHA256

              c98f17dd444209ad0a6d71221b67cd632bc6409686f750bb5118a7e42eca91e0

              SHA512

              4b0ddd0ad28f7fd30324add6623f399dec43df33d0e9bb24788c0d0e96c1b2f25b96644b5320755299b1d2fb66e4417a0402fd6729d3ed33aec2117c485c3567

            • C:\ProgramData\DHCBGDHIEBFHCBFHDHDH

              Filesize

              46KB

              MD5

              02d2c46697e3714e49f46b680b9a6b83

              SHA1

              84f98b56d49f01e9b6b76a4e21accf64fd319140

              SHA256

              522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

              SHA512

              60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

            • C:\ProgramData\HIIEBAFCBKFI\KKKJEB

              Filesize

              148KB

              MD5

              90a1d4b55edf36fa8b4cc6974ed7d4c4

              SHA1

              aba1b8d0e05421e7df5982899f626211c3c4b5c1

              SHA256

              7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

              SHA512

              ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

            • C:\ProgramData\JKEGHDGHCGHDHJKFBFBKJJEHDH

              Filesize

              20KB

              MD5

              c9ff7748d8fcef4cf84a5501e996a641

              SHA1

              02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

              SHA256

              4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

              SHA512

              d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

            • C:\ProgramData\JKEGHDGHCGHD\AAFIJK

              Filesize

              92KB

              MD5

              55d8864e58f075cbe2dbd43a1b2908a9

              SHA1

              0d7129d95fa2ddb7fde828b22441dc53dffc5594

              SHA256

              e4e07f45a83a87aff5e7f99528464abaad495499e9e2e3e0fcd5897819f88581

              SHA512

              89ce123d2685448826f76dce25292b2d2d525efd8b78fd9235d1e357ad7ae2d4b3461ef903e2994cd2b8e28f56b0cc50137dd90accdd3f281472e488f6c7cf2e

            • C:\ProgramData\JKEGHDGHCGHD\CBGHCA

              Filesize

              6KB

              MD5

              970f00ea0587c9ec08c27a25c9b65b31

              SHA1

              ffce2668452dd74985b0db82316c7a4ed0e45885

              SHA256

              38e540365a07c1176bb473d744a96289febf147bb04b159893e7ecbce8144457

              SHA512

              ac5af3649d0da33c6852300b2b8600664b192e4eb3a28d36e6fed228dcd6929a44a2287354065c68ba59a490e309e380c6de82ba9d78b54fc8b66d57cddc8845

            • C:\ProgramData\freebl3.dll

              Filesize

              669KB

              MD5

              550686c0ee48c386dfcb40199bd076ac

              SHA1

              ee5134da4d3efcb466081fb6197be5e12a5b22ab

              SHA256

              edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

              SHA512

              0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

            • C:\ProgramData\msvcp140.dll

              Filesize

              439KB

              MD5

              5ff1fca37c466d6723ec67be93b51442

              SHA1

              34cc4e158092083b13d67d6d2bc9e57b798a303b

              SHA256

              5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

              SHA512

              4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

            • C:\ProgramData\softokn3.dll

              Filesize

              251KB

              MD5

              4e52d739c324db8225bd9ab2695f262f

              SHA1

              71c3da43dc5a0d2a1941e874a6d015a071783889

              SHA256

              74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

              SHA512

              2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

            • C:\ProgramData\vcruntime140.dll

              Filesize

              78KB

              MD5

              a37ee36b536409056a86f50e67777dd7

              SHA1

              1cafa159292aa736fc595fc04e16325b27cd6750

              SHA256

              8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

              SHA512

              3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

            • C:\Users\AdminCBGHCAKKFB.exe

              Filesize

              282KB

              MD5

              3a507b0b6463481cbb8d248efa262ddd

              SHA1

              97cc6f79eb1352660997a2194d7d3c9e1aff7a0e

              SHA256

              fdf090545751ce09207f7cec140d21d246cb2f25002683e2cd36c92e18707f56

              SHA512

              4e0abe7ecd536b25146a663ebc49afd955727d32e2e01a6b7305afec79decbc649e95e841d18e226e346eb4d1e91228c215888c1ffb5363d888f6a1a6fed57a8

            • C:\Users\AdminHJJEHJJKJE.exe

              Filesize

              328KB

              MD5

              55f1d65ca0130c6a8cba2f206b4b0e36

              SHA1

              9ef2f827c92f21f375a50ace8faf72f5b9083ddd

              SHA256

              efe0690c0cc62906989a9e2bbc6e697046b093624e02e15d0e63ea7aa0186884

              SHA512

              8aaa0f9cff3bbdf3bd94735f5282338c088ebefcd21bb3d8982645aa06614e71cde9f7d38673433e3fe41bb959f4c995e42a36aad269de8ac286104de4eb3eac

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

              Filesize

              471B

              MD5

              cecf9e39987128b205ec741afbac86d1

              SHA1

              1599deaf71c3c5ec61afc7f7b14575face03e409

              SHA256

              40cb238f64b6d464f297878f2389d1223b1417f493f488c1d55759df7f8a39c2

              SHA512

              92243e1a2993034f3b57cc60aecf57aac98e1e5a0e177b35ba981534dec72990b1ac72c01b439b3826871d88bcd2977febb417749d1b276bdb28b56493959c25

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              2KB

              MD5

              3eb397a524d6b064f4130d706bbb32c9

              SHA1

              b79b1169cc971f21308e91af43a295c9cefcfd71

              SHA256

              ba7c039a117bca61feb4ede0876ff545248209cbcc30a8b08f4e84e894227a22

              SHA512

              40015805e1a585aac7c4a07a95a00f3808d99eb6080cd642dfe13d3a735f69dc54ed7381aa9cab498192c8af792c663ae4647597fd82cd96967cad464c5e75a2

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              2KB

              MD5

              8bd5a49df494d8ec0e300e48bc5ccac7

              SHA1

              1a5a88b912d7533e5f9d23c923c15e1a6e18a87e

              SHA256

              261b931e89a697f15f35ebe38faf32cb8b67ac3fe628ec8ac860c0e6e9b01464

              SHA512

              0e36c0c7ef6abe353ab46efccb296129239b355f873c8cf40ca210be2f6f5d2da89c1e6a5dc260beab7207529e9422748b87b04c7d72bce43b5b7342c4f7b6e6

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

              Filesize

              2KB

              MD5

              ffec8069cabce0949aaee67665624e67

              SHA1

              d449a98b34103a9e80740ed9d7593c8115c3dc75

              SHA256

              340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

              SHA512

              770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

              Filesize

              1KB

              MD5

              67db8c5d484fe0b60abd574b0480e4c9

              SHA1

              bafea8ad167114a72854bfe78095155bb7c44f89

              SHA256

              5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

              SHA512

              5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              1KB

              MD5

              267213063373c723fc10225ef5c35205

              SHA1

              405c393523c0341b508bed3bef206e10060aacd5

              SHA256

              fcd368cd3608e36d7cb22c98ea40b5c77feec34a08719fa136cef6db5e2036ec

              SHA512

              3a7cbd0ff672feea120d61c9b820727ec35a9345c5e6c5678e5140e1375a6881419e82a2b54528f39c4241bcdbdec3bf89c28288b217dfbb2d21ff8399c59032

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

              Filesize

              490B

              MD5

              f66a830d3b99129d032886022e71c928

              SHA1

              fdedb7575070a40308574e07a55950741c24c613

              SHA256

              417c09ea5a6af72230b4ff655e0a9fa7167b7b31c46ccea19381cfd4bb250883

              SHA512

              3b709df4f0d89031ef87b23a4a394aca695d7057b37e7b10a2ba10de380178bc2a4362a411ac752ce7ca947b1044b8bcd3cb3eabce0d6c78b1975ee91c59c704

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              458B

              MD5

              a097ce2fc2e13b8e3f0d76bbb05f2482

              SHA1

              af8d3b7d31180472cda3a589cac42c636ab1308b

              SHA256

              6136aa6741fa51ab56c52c4ef0dc6563d88e1f018e93543d45afdaac805bb495

              SHA512

              481fd9cb9fa282376d6b7d9dbcca313e3f96dd4f3251e47523cdeb799ca29c7a0145c455c8e0762562f02df4158f9ee0a994b4028af18e648378f5b6c1b33393

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              450B

              MD5

              38a73d4135e4a54f6af662ca9b63c827

              SHA1

              137ba14aff9f893da3dc264db958be2b8107802f

              SHA256

              4c351056e7b863c05815c2636e528fa776f7545c156af51193282a81a1787e34

              SHA512

              abd02258e11f06267d921aa35dae928835a7f2cc2d5fab3ccf585a49381ae48bafcbd0b354c8f9498dacd87f921167622efe4ffb5deb72ff8a0597acaf3d1953

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

              Filesize

              482B

              MD5

              7414c714d98f0ce6225fcb032716a26f

              SHA1

              452ec3bed093514a5fdbf1d0cc7286a1a06d141d

              SHA256

              c5cc2aa7a083d71328cfb7b21316ec5c7d5ff15faebe520400e1539a62ae7dd2

              SHA512

              354f01ff5d159c03c330f69c9ba3cb4c0f61d1e92620bd27ca55ce74f448e3b2eb9100244e965217f0866a3cbf0b09a1dd2ab7b007882d6fe333ca5eb5758665

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

              Filesize

              486B

              MD5

              3f8d9e1d62532db68748d69c58b2b174

              SHA1

              7e0070a8f61f7f6778653bff9f26df5d6f8a3f90

              SHA256

              8c5f17baf6fb83d7c1d15fdd2c51e4dc1ecab640ea022c66c7dce205aba5862e

              SHA512

              9b4660eb9af8a024322816687f01b2d515444ee0719d1896c2af8f6bb97fe55d0e500f7b4b8282d53b99e130dcdccbc1ab6de00ca89d181bdb22aff7da8789b7

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              458B

              MD5

              3136accc29f9ecef45dc0cc8472b80d5

              SHA1

              84de5a879eb837609c1203dab04f63fe59189f9b

              SHA256

              4c3987238e66e0946dfc9b07c0bdd2d52502ca629b51a4f6aaf56c44fdba868f

              SHA512

              ca5e10b52984b7da6277414e38bdcec943ee5efc04d454be2f7b0ad37a6abbeb6b4447a592e144b0744944471bfa21f8506926dca131dcd58c45f8d74cb412ac

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AEGHJEGIEB.exe.log

              Filesize

              226B

              MD5

              957779c42144282d8cd83192b8fbc7cf

              SHA1

              de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

              SHA256

              0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

              SHA512

              f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\7Y1TZOL6.cookie

              Filesize

              103B

              MD5

              8436881b5c0e84cf105aaa6e65b6423b

              SHA1

              f318bbf134694cc790194f0936b5b913f3eb97a2

              SHA256

              956c70bc6c8c119b801b83a6ec4d45187edc591812bc774b996f8d79c13112f4

              SHA512

              c0179d29b2e58a367ab8bba218b9042603d2fb9ef4ece878d8b403359fa2afc5086d87cafaa9a9e80baa67042d3a010204e8d20dd8b78e2fc1aaf62fa2f04d6c

            • \ProgramData\mozglue.dll

              Filesize

              593KB

              MD5

              c8fd9be83bc728cc04beffafc2907fe9

              SHA1

              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

              SHA256

              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

              SHA512

              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

            • \ProgramData\nss3.dll

              Filesize

              2.0MB

              MD5

              1cc453cdf74f31e4d913ff9c10acdde2

              SHA1

              6e85eae544d6e965f15fa5c39700fa7202f3aafe

              SHA256

              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

              SHA512

              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

            • memory/8-181-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-149-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-115-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-112-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-134-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-135-0x000000001FBD0000-0x000000001FE2F000-memory.dmp

              Filesize

              2.4MB

            • memory/8-188-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-189-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-190-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-116-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-133-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/8-157-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/816-87-0x000000007244E000-0x000000007244F000-memory.dmp

              Filesize

              4KB

            • memory/816-86-0x00000000000B0000-0x0000000000106000-memory.dmp

              Filesize

              344KB

            • memory/1552-224-0x0000000000E50000-0x0000000000E88000-memory.dmp

              Filesize

              224KB

            • memory/1836-211-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1996-255-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/2120-93-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/2120-95-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/2120-90-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/3916-103-0x0000000000BA0000-0x0000000000BB2000-memory.dmp

              Filesize

              72KB

            • memory/4548-108-0x0000000000AC0000-0x0000000000B0A000-memory.dmp

              Filesize

              296KB

            • memory/4788-1-0x0000000000A00000-0x0000000000A38000-memory.dmp

              Filesize

              224KB

            • memory/4788-0-0x000000007403E000-0x000000007403F000-memory.dmp

              Filesize

              4KB

            • memory/4788-7-0x0000000074030000-0x000000007471E000-memory.dmp

              Filesize

              6.9MB

            • memory/4788-132-0x0000000074030000-0x000000007471E000-memory.dmp

              Filesize

              6.9MB

            • memory/5084-109-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB

            • memory/5084-9-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/5084-6-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB

            • memory/5084-8-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB

            • memory/5084-3-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB