Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2024, 10:46

General

  • Target

    file.exe

  • Size

    216KB

  • MD5

    082c8a659fa07a63f6078b1cbd00ae2a

  • SHA1

    ad6838c2971e01120b5f1c4a264d090c74fa0816

  • SHA256

    bf4bd835390e2607c737360a2527ea292bd0451507f93b623d3f9bbf4036c2fe

  • SHA512

    57eeb9cf08eb6d68941b029465771fb5f5aedb34f73d06212f0480f5cccf72873d6c75abf5346d8c352c65fbe5959dbc9323015b35416b278db999f6304a0b6a

  • SSDEEP

    6144:XTlqP0Xx9vlkheKNH+exE+NkO24Y9EV9GEO:jlbXLCh8ElCNEV9GEO

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Signatures

  • Detect Vidar Stealer 17 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2860
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:1616
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Checks computer location settings
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4536
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminJJDBAAEGDB.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2968
            • C:\Users\AdminJJDBAAEGDB.exe
              "C:\Users\AdminJJDBAAEGDB.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3836
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3536
                • C:\Program Files\Google\Chrome\Application\882OBL7M692QID1ASRIQMR.exe
                  "C:\Program Files\Google\Chrome\Application\882OBL7M692QID1ASRIQMR.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3024
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAKKJKKECF.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3324
            • C:\Users\AdminCAKKJKKECF.exe
              "C:\Users\AdminCAKKJKKECF.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3420
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Checks computer location settings
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:912
                • C:\ProgramData\GHJJDGHCBG.exe
                  "C:\ProgramData\GHJJDGHCBG.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4580
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • Drops file in Program Files directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3600
                    • C:\Program Files\Google\Chrome\Application\KU595W2A.exe
                      "C:\Program Files\Google\Chrome\Application\KU595W2A.exe"
                      8⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:3504
                • C:\ProgramData\AFBAKKFCBF.exe
                  "C:\ProgramData\AFBAKKFCBF.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:2748
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1476
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HDBKJEGIEBFH" & exit
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:3264
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:1104

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Google\Chrome\Application\882OBL7M692QID1ASRIQMR.exe

        Filesize

        63KB

        MD5

        0d5df43af2916f47d00c1573797c1a13

        SHA1

        230ab5559e806574d26b4c20847c368ed55483b0

        SHA256

        c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

        SHA512

        f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

      • C:\ProgramData\ECGDHIDAAFHI\BAECFH

        Filesize

        20KB

        MD5

        a603e09d617fea7517059b4924b1df93

        SHA1

        31d66e1496e0229c6a312f8be05da3f813b3fa9e

        SHA256

        ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

        SHA512

        eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

      • C:\ProgramData\ECGDHIDAAFHI\GCBGCG

        Filesize

        160KB

        MD5

        f310cf1ff562ae14449e0167a3e1fe46

        SHA1

        85c58afa9049467031c6c2b17f5c12ca73bb2788

        SHA256

        e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

        SHA512

        1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

      • C:\ProgramData\ECGDHIDAAFHI\GCBGCG

        Filesize

        40KB

        MD5

        a182561a527f929489bf4b8f74f65cd7

        SHA1

        8cd6866594759711ea1836e86a5b7ca64ee8911f

        SHA256

        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

        SHA512

        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

      • C:\ProgramData\HDBKJEGIEBFH\AFHDAE

        Filesize

        114KB

        MD5

        e110cbe124e96c721e3839076f73aa99

        SHA1

        02c668c17c7fae5613073e9641bc9bcff96c65a0

        SHA256

        a793f3d212f395bfc8973231a22a6013c0e334443aa4172a8b5d611bb0f378a7

        SHA512

        8d91ff245f703e5dbee68085e9ca0de4b2fc044befcf79977f46bb8bfd908fa0e22ec0dd6a2b400e9ff447f888b550635ed82ebda18575d17b1f3d478a45f5dc

      • C:\ProgramData\HDBKJEGIEBFH\DAEHJJ

        Filesize

        116KB

        MD5

        f70aa3fa04f0536280f872ad17973c3d

        SHA1

        50a7b889329a92de1b272d0ecf5fce87395d3123

        SHA256

        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

        SHA512

        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

      • C:\ProgramData\HDBKJEGIEBFH\EGIJEB

        Filesize

        11KB

        MD5

        2538a487b8f8927e34ba340ce00bcd70

        SHA1

        d7f46d04d6da24b348cb23014da72da84246dcc9

        SHA256

        300f96ad7dc5c86e33979b0998f29ec2247199d2567fff4987e7161cb42c2e8a

        SHA512

        f13b364ed149bbad4be720d107c02852e4e380d04616aa9860fa410dbdb2f124c6de35bd0150fe492853aa649bd72a3b620ab5c86875d3d7ba3820cfd15d0094

      • C:\ProgramData\freebl3.dll

        Filesize

        669KB

        MD5

        550686c0ee48c386dfcb40199bd076ac

        SHA1

        ee5134da4d3efcb466081fb6197be5e12a5b22ab

        SHA256

        edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

        SHA512

        0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

      • C:\ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • C:\ProgramData\msvcp140.dll

        Filesize

        439KB

        MD5

        5ff1fca37c466d6723ec67be93b51442

        SHA1

        34cc4e158092083b13d67d6d2bc9e57b798a303b

        SHA256

        5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

        SHA512

        4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

      • C:\ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • C:\ProgramData\softokn3.dll

        Filesize

        251KB

        MD5

        4e52d739c324db8225bd9ab2695f262f

        SHA1

        71c3da43dc5a0d2a1941e874a6d015a071783889

        SHA256

        74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

        SHA512

        2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

      • C:\ProgramData\vcruntime140.dll

        Filesize

        78KB

        MD5

        a37ee36b536409056a86f50e67777dd7

        SHA1

        1cafa159292aa736fc595fc04e16325b27cd6750

        SHA256

        8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

        SHA512

        3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

      • C:\Users\AdminCAKKJKKECF.exe

        Filesize

        292KB

        MD5

        9d0327bd2962fd98512fb4ad5fc9ad19

        SHA1

        37fd2898d15b6e4e4be596c11120649e374a091b

        SHA256

        86d1e9372127505a6200e134641390297bd255de3b742d874108cbf5670d3d9c

        SHA512

        9a768adcd08acc5766d2b7a46e1360c2a2551405248bf774bc736b196d902bbeee56e472bd8f94a8c993f54e6e2402a9a14d6131500cf7979b89ccdbdd6ecc15

      • C:\Users\AdminJJDBAAEGDB.exe

        Filesize

        338KB

        MD5

        7abd5004d90827227cb77ecebc6c0aba

        SHA1

        39c7f736d4041cb246b31d34f455460cdc3a071e

        SHA256

        13d8eb0461863ad7a6f2cd6c20133e6141b7ee60c2cfa16be07b050a1702b5ad

        SHA512

        7d95b29386c7a42da65be1888ce33d1e6e323da9e667cd72def869da3dfd60209b023d03e5258fcf52a71d7d2dd9a98e620cd1a44bc0e68da6d9567041a5e616

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

        Filesize

        471B

        MD5

        ed903dc101ccbb537798c3ce32180750

        SHA1

        9161ca52412344f139d0ea20f1a2774a3bd1aa27

        SHA256

        1cc1c4833c2571b964ae7cea986357d5089491d1b99995375a6aadfca10cf88b

        SHA512

        87626250eab1decdd95c7f6471fa375945aefe0d613e53b35271d83fa1d5caddeb313b22ecaa5067866e80803f223fda722ad3e7cc64d5650fe42bd8e4616269

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        2KB

        MD5

        d61c16c5dd12dce62b0311b4f5ae4702

        SHA1

        695352e746dbbf0d30b2ecd435c39e625f319b1a

        SHA256

        efdd18ad7b3d60cc9ee00dbcb26fe85b22096b21b10276bf70191da590252d07

        SHA512

        1b63567a9ea59457433aaaad1158fb5fd95b4b5bb88b5e099e38917206578556ead19accf0b1257db4a51c8f892fe3e91e1aed3353e0e66e5991315e92db62cf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        2KB

        MD5

        e2e9309062d386d7fec2730d865be1b3

        SHA1

        30dbe40a07dd56429b70601ff35c954d78ee99b9

        SHA256

        01459ba654c52454a8dae37f078fffc280d3a13b55837fd82d05a9c902e88ebb

        SHA512

        46ec1842ed5b93bf5e2533ce2561b0035ff0beb8e5ce61ecb2ec7bdb13f54e38a7a44d258b6713deb5278b39a6cd8b8dff349d3a2a088f9f4014eed6262f6b63

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        2KB

        MD5

        64be459578e3fccb849db1bac572e264

        SHA1

        e5333f9ed228dc7edd9b6b23ce23cc6b8dc59606

        SHA256

        e871fd44eb45caf8fa511a0b2eededc9a64edf7874b72b1d91f29d6ce05c06c9

        SHA512

        f20ab1b54a89aa86571614ea0d5ce12f220f43ad2d8f470bf4fa0fb3c86debe76a44b2b7bd19a19d07a383fed76a2462d0784690d82c95778028e0513954386b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        1KB

        MD5

        1cc4567f3b4498d86d59c906282f0bf8

        SHA1

        a0a19735d3d484c327a654923258598ad9d4e8ef

        SHA256

        e47ca5deb9fbb8ab95c49613e9f317344d66090e9c4d5107e8b11f268ee77354

        SHA512

        d781c81cd0f33b738cf1c5401630bba9ec6f5d3787369def9f8365596b0a3afa7126212d13b462df53afcda2c0cfe62c1a92af053e49f8e44733556d1c147127

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        1KB

        MD5

        66a1250945d5954ccd7a7270c292cdfb

        SHA1

        eef0640046e6b10662d2b2ff6f419bffd911c727

        SHA256

        4b7cf758eb8582e21a9915f9710a9dc30050df83ddd1fd374c358bf5d0bd2897

        SHA512

        3ac2725dfefe50f6f6e96853c7f9f647c5fe1c7fc762c0e777770d0f89d4ac8fad0886ff1ffb6475fbc6307935a1068a5567b940789e892edec7eb4599e943b3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8A726233B0F9B64FE822B7A4065CB375

        Filesize

        490B

        MD5

        f263e5288fac9ff3788d8c99d4d5629a

        SHA1

        935fd66f5fe829adbd6318e1aa4c43d915ee6e52

        SHA256

        e74d9ff9518e298899aee1806754a56ee631fbe84cece15fdfc071fdbd9c1b95

        SHA512

        d67def86ef69da9ec79feb0be63ac3b1130b5d41b1f6e608ba732793f8b58a80f7162d69b776980fe8e8f5e1fe50a42fe8ba5745347c78e830e14dcebff3286f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        458B

        MD5

        86a223aa98da5324a6470a1086f9c97a

        SHA1

        8d046f39ea436d6fd05a9f7eca796f655a368310

        SHA256

        27218d19713ecc51ad229c34345d27e39b3d01462a047353bc2739041af7d833

        SHA512

        c5e9bf6de5a24add95e50d9e04b9a48c3e456652f4bc1e378fff70e7786d78b33fdd1b7570af43e8748d131693564d0f5c1313bb0f1aab258455c99f23a14987

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        450B

        MD5

        d7f28dd6f2f146ac50cb9fe94293090b

        SHA1

        c9b3245a8f6df78d23460626ded486676401472c

        SHA256

        71117fd4980bd92ffb6c6b9b560b01fd2dd19e1636f217415b653bd0e61f5966

        SHA512

        909dd432d33964e69d004a5027875f9aab8d8f6026f57e1d4c6991d6c3cce3e1a6c7dfe76e8e5a22db96e81cbe5e68556b3461e267c4f38deb5d49f7fff4a08e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        482B

        MD5

        3b27a2d1a1adf3710ad09e5b004cb250

        SHA1

        f1c74d6d2fc36f639232e89efdd20a4953f24f0a

        SHA256

        2a9b2130225667c3cb39d515550aaf9c050d94d40ec5190c15bb81ad94baadcf

        SHA512

        1fa3f2a82669cba492579db269664c895c5cb1b7dcb9c6d9f7d458f9ee808381435f3f65c061182339bea4ec63135109e9e97bf8d67af2f1307301df65764fa1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        486B

        MD5

        7aa4228bd2322bc8c56f12cc6f28fd07

        SHA1

        5de181f77db23868200d61e985a5075bd5962d31

        SHA256

        48954314b33082098fb52eab73a5448f40428c15350fe0b52b236df852cecd3a

        SHA512

        06b229884ce3bac7c316206e511036f398817609aad19d5ecaa0303b99e9c63c4cfc994a9311ac5693128ff5599c08f29107e2a3669c80dd03cf2ea190a7a493

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        458B

        MD5

        4bb9180b966206992372e1988a16ab48

        SHA1

        7f72af37077156ffbe0baffab41d6295863e5e69

        SHA256

        0d5430cd9d70c41e44d2fbcb28528d1551c5c811987cc5ab0564eeb1e2d7a8c4

        SHA512

        36ef2d3ef7d974a76c072edbda95f8c5e15bf501cf5fc238d95c27d29dc2b369a0a67555f73d01b0a3423f2a8bd0c3e83121aff7d448ca1bcdb39c45aaac938a

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AFBAKKFCBF.exe.log

        Filesize

        226B

        MD5

        916851e072fbabc4796d8916c5131092

        SHA1

        d48a602229a690c512d5fdaf4c8d77547a88e7a2

        SHA256

        7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

        SHA512

        07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

      • memory/912-158-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-214-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-157-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-143-0x0000000022350000-0x00000000225AF000-memory.dmp

        Filesize

        2.4MB

      • memory/912-142-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-174-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-141-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-175-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-125-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-127-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-123-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-213-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-205-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/912-206-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1476-272-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1476-289-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1476-288-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1476-274-0x0000000022650000-0x00000000228AF000-memory.dmp

        Filesize

        2.4MB

      • memory/1476-273-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/3024-120-0x0000000000E50000-0x0000000000E62000-memory.dmp

        Filesize

        72KB

      • memory/3420-108-0x0000000000EC0000-0x0000000000F0A000-memory.dmp

        Filesize

        296KB

      • memory/3536-110-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3536-114-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3536-112-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/3836-117-0x0000000072240000-0x00000000729F0000-memory.dmp

        Filesize

        7.7MB

      • memory/3836-98-0x000000007224E000-0x000000007224F000-memory.dmp

        Filesize

        4KB

      • memory/3836-100-0x0000000072240000-0x00000000729F0000-memory.dmp

        Filesize

        7.7MB

      • memory/3836-99-0x0000000000DD0000-0x0000000000E26000-memory.dmp

        Filesize

        344KB

      • memory/4260-7-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/4260-6-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/4260-2-0x0000000074C50000-0x0000000075400000-memory.dmp

        Filesize

        7.7MB

      • memory/4260-1-0x0000000000600000-0x0000000000638000-memory.dmp

        Filesize

        224KB

      • memory/4260-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

        Filesize

        4KB

      • memory/4536-11-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/4536-9-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/4536-10-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/4536-4-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/4536-106-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB