Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 12:01

General

  • Target

    https://mega.nz/file/pX0hBaJS#VV5khgz77nLbZDiUUrO7RloqeX8VrXYYr6a9bZEDNJE

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1117069422671188109/cep5kWUSemmypgce-6GNd6aEGzUmDwmcSx6RUsK8Lwy9F_BYr7gzbX-xSh2ikm99A38C

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 6 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 6 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 12 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 27 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/pX0hBaJS#VV5khgz77nLbZDiUUrO7RloqeX8VrXYYr6a9bZEDNJE
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff974eccc40,0x7ff974eccc4c,0x7ff974eccc58
      2⤵
        PID:4080
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:2
        2⤵
          PID:4660
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2204 /prefetch:3
          2⤵
            PID:1928
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:8
            2⤵
              PID:3816
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:1
              2⤵
                PID:5060
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:1
                2⤵
                  PID:3820
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4632,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:8
                  2⤵
                    PID:2280
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4888,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4936 /prefetch:8
                    2⤵
                      PID:2300
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5056,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5192 /prefetch:8
                      2⤵
                        PID:664
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5456,i,16232743370573417286,7715869849435311823,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5544 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4768
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:4972
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:4288
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x338 0x2f4
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1684
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:1200
                          • C:\Program Files\7-Zip\7zG.exe
                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\vapeSpuffer\" -spe -an -ai#7zMap9949:84:7zEvent21523
                            1⤵
                            • Suspicious use of FindShellTrayWindow
                            PID:4868
                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe
                            "C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"
                            1⤵
                            • Looks for VirtualBox Guest Additions in registry
                            • Looks for VMWare Tools registry key
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Maps connected drives based on registry
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:2692
                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe
                            "C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"
                            1⤵
                            • Looks for VirtualBox Guest Additions in registry
                            • Looks for VMWare Tools registry key
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Maps connected drives based on registry
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:4780
                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe
                            "C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"
                            1⤵
                            • Looks for VirtualBox Guest Additions in registry
                            • Looks for VMWare Tools registry key
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Maps connected drives based on registry
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:4892
                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe
                            "C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe"
                            1⤵
                            • Looks for VirtualBox Guest Additions in registry
                            • Looks for VMWare Tools registry key
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Maps connected drives based on registry
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:3636
                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe
                            "C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe"
                            1⤵
                            • Looks for VirtualBox Guest Additions in registry
                            • Looks for VMWare Tools registry key
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Maps connected drives based on registry
                            • Checks SCSI registry key(s)
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:3468
                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe
                            "C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe"
                            1⤵
                            • Looks for VirtualBox Guest Additions in registry
                            • Looks for VMWare Tools registry key
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Maps connected drives based on registry
                            • Checks SCSI registry key(s)
                            • Enumerates system info in registry
                            PID:4656

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            081688f9f96f465e3a1ae3063da290f6

                            SHA1

                            6bc3a964a6e476880a481fb2166b0c0e3c090840

                            SHA256

                            171ebf430133f91f9aa6b1f9da8d2f7be65d44bf27ba5706b76c1e4c5edf2450

                            SHA512

                            e66fd86d6c3300160529000cb0836aa83c5872ca636fd1f1592eb08f580ecbb0e688b11dbe7296e5147d3de47de53b60dff843af4799aa2c2368258bf008426c

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            120B

                            MD5

                            04c29b3ac0239faddb4602bac37ef90d

                            SHA1

                            b3fe771647a740437369689ed0321c8c8d246197

                            SHA256

                            6c85011cf77b060f06d09bfbe3c2b38f9e24d92975eb491959c5a52c7fb61757

                            SHA512

                            4d91d89b36849cd1949de84a3a14c8a1fff872ed985604e1036ca8abb60657495fee278587770e1bbe2fca32c468c053a0346e0427e3968fd17a850129b7bc2a

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001

                            Filesize

                            41B

                            MD5

                            5af87dfd673ba2115e2fcf5cfdb727ab

                            SHA1

                            d5b5bbf396dc291274584ef71f444f420b6056f1

                            SHA256

                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                            SHA512

                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            4804e1c2cb6bdcf8b028b524539d3f4e

                            SHA1

                            d1089782bb72df63df937edf57f03df11f70535b

                            SHA256

                            8fdff627d907900a5411020db42a6dd85a8b6b860f6ecc6d6d3ca153e31894ea

                            SHA512

                            6ff5aaa0e69d7d300f09c736c97ec19dbe4cd263a2584b5cf14724337d4dd54553c787bea84d666f5a56b1e11335be8a7665892655fd2fb1c3c73a0394b9ff1b

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            523B

                            MD5

                            aabd223d6391200a5e6022f341285913

                            SHA1

                            746b0d28cbe6882fed84bca5b029ca7d1eaf46df

                            SHA256

                            014089f96562efc8e0dd1e5506558dd315de818d6ca1adee0af0cfc5b0e1dc9d

                            SHA512

                            561c0644cbb2ca11f4842accbef50f81e0a82b9f0b42b1e97c86af176302c2220e5c9e57744badd96c9759efed28dd31d8e930d768b76c87e29dad2a86b0b2d4

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            9bdb9caebe46a3a13386d878e3c6c2f6

                            SHA1

                            fffa3ecbaa12ce27cea4b926c9406d21b6f3f639

                            SHA256

                            f4242744fa157ef9623eed909238b9fa50e6c71766fe9078704654533d461653

                            SHA512

                            da8856c8913da561856734fc1ed2d13cc1750c659fd82413bf5f4bb6a36667df6af589244d593d9b59a94d8fde7acf3a445b43e7c1a2807a55bf6c3c0cac6357

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            740aa283ee95f90956732972628e9ce9

                            SHA1

                            f6f8595cfcc584e80f7f3706dad38cbf4c9be3ee

                            SHA256

                            791ed665a64c22143b6bf561fbaa945c459608689da0dc03f3e09d3b4c8e49be

                            SHA512

                            1a0eede2564132e3b8cd8f7c54cfdcad52254fdb3867c5927a2a250b2975a2c7a9b9cab215f81108f3b95abd9bc99b6d6d36ecbbe1213c5fa1ad438405e1aa03

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            21831d3333a3fb7454e0f2f6ec23b85d

                            SHA1

                            ae5a752427c005aac2e68eb214322d35ced96aa4

                            SHA256

                            b2830c5ab2e6dd031a7d319197ed0bc280a0d76c9c499bcabb4f8c594dc187b2

                            SHA512

                            a5598bd719510580a7273d2f91b6e8a4e2fd558a24dd56a2f83ed40728d303ca0520c6e1fc975160fa2334dace57efdc88ffe657515644a5efa859cd3be95abf

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            6f226806bb161a7abb7930abb40db352

                            SHA1

                            c7dc29165f02e3b300372e8c54ba56c388cae2e2

                            SHA256

                            5f5a3d4451a22cebc3454736aa6728e1a3a60e1e097d732ed33339aee82cc2a0

                            SHA512

                            72bda5dc4f15fd82a7c6c20aa77415c867d9083f31ac227ac06cee1d1e56995c3d7254531f8e56457f8e2a5dff84b378c6d920f3c17f69b30fe9a02986b1d55f

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            8dc126724d574c3a44494c77d90366bf

                            SHA1

                            b5cbcf5d5c6f7a06c17be796999e733fc00966a6

                            SHA256

                            ab9cfdaa6250bfaaf10298346e23620224aa373bea4dce4ea607217d94a370d2

                            SHA512

                            e9291157cb0fd3d88f4793dabcab8692382071dea89e81f66b4f162bd555ebc43e59cb6db0676fba55533017597fb52a7cb4f61c9e5e6f82005e7b6666af7a40

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            0e09ea32b906686fc435aa3e31fb249b

                            SHA1

                            f2ec2545e6e205bbe893c735e37131d02d3f6753

                            SHA256

                            e23d5a6b8ade6192ae3b9a7a0e2f80aad1ee0214d2168f984345c5daaf70c694

                            SHA512

                            1ed7304d43b4e39238c6dcf96d1513fdadd98dfc6feb83af373c60aca1b26243c9c86e6675f5bb88e7311a5a04e61ee63cdb43b15e33102a03f117044c8f3e91

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            1dd454cbaf3bb1a50001211f7fb467f6

                            SHA1

                            e1066c86bfaaa8f7951ed9b15ad0bcb947817d84

                            SHA256

                            a5e2ba8b42d8228ccfa991dcf2e922adb93c36fad78f32bca8c32876a174ab0d

                            SHA512

                            2d0b8900e2b5514a1a01230e6c5a6578bf11f3a9f666971f0b23593e5f43c37e881547d892e5a203a796fbbc0cdc1a25817d05f3e2fde552ba2d51acb4c6c757

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            ed237addf2b29a47e141ec117022a298

                            SHA1

                            d5b451d2ba8d518cef84f4a60498677a2f203aec

                            SHA256

                            144f54400164bc46c618822bc7507028fc9b507fe88349f72ae77f47919db219

                            SHA512

                            98fe9a3664104f6ea1ace6d153f9189a83567ac212f74593bf637b81559d5c8ca64bb89ee479b29078a3b751778f4b10b14b802698c23facf8be0aa00cfe63d4

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                            Filesize

                            96B

                            MD5

                            76da063417ef3ac7f063939cdf351c33

                            SHA1

                            a1ebf5d2b60de91fe63e9db226e5554b85027654

                            SHA256

                            939a6fe8e534e46746910bbdfd4c0c41fb926402d357e45b5e988a30617e9ded

                            SHA512

                            e10758b41f8326e638995d2ea9a2bb7bab2fe2e2df27f513396a61e6797ecf1b1f40f19411c4d853eaddc972c11053caa1ec8d98b2a4f5b2212b3f5a0cd73873

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            99KB

                            MD5

                            f405f7d2a1146ccedf18e3fdf89e5df9

                            SHA1

                            4767948c47448a76e85ab555267362d5694d286e

                            SHA256

                            3f2b5a9e13ad8df590f7df6d4379fb299bc69ddb1b32070966ae4360ef94e2dc

                            SHA512

                            457279b04eafb504335175e3e7cfbbd600de59b9eef3fa084b5ab4d42ec54c912e54341973c9a985c22c099cfe74f1609187ad8e70175e2d176822ddf2226440

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            99KB

                            MD5

                            8bd437c22e827d48fb7dc3db0703dd5f

                            SHA1

                            2d0c8f880037057d269a3a1847913a4a6465afac

                            SHA256

                            a5175171ac974e17ad1b3122e7136fb3cf0116397b71b694952893a8371f7544

                            SHA512

                            708e388f52080c3fd8daadcb8c888c9d28965866b94143b14a9803988bf2f6cdee01a2d04479080e40e8dcf370bba46fa4a18c01f0806224c2ec373d7096430c

                          • C:\Users\Admin\Downloads\vapeSpuffer.rar

                            Filesize

                            3.1MB

                            MD5

                            9d44dcfc7d26450adae63a1d442a20ab

                            SHA1

                            776e8cb7337f853c52b26ecd4cbfcb6a65c660bc

                            SHA256

                            79eaaa844003bf1b13d636fee7be489152c50fd8085f638446198fd010762ac6

                            SHA512

                            db704bbf7590a52fd02224dbad37e60b7099b9d916c3b3d9d2953cb1afaab74f212c260df6c4a58dfe3f1472d83241209c3a00262dcf707038335ba1b580ecd5

                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\spuff injector.exe

                            Filesize

                            41KB

                            MD5

                            c0f2d418c67db68bb879d8b45767b31f

                            SHA1

                            599f38e20ba503829621647c1a20c449797724ab

                            SHA256

                            50176c07a81e0f6cac89e8a783abc03aecb196179c8b49a07945dce37120d7d4

                            SHA512

                            6c7e2fdb939a03b4254bc270af1322eda5cf4ed64cb909c67406e2b9c7520c4a35dd9a9d6c434633d2521a873d37ee4905c82021b8a8518b8b87372817f05019

                          • C:\Users\Admin\Downloads\vapeSpuffer\vapeSpuffer\v4 launcher\2pKPn8W8KA.exe

                            Filesize

                            41KB

                            MD5

                            acffcf5d0df204936e97299c79274900

                            SHA1

                            8779b59032b6a0364cff20661ebe3a47afff8ae4

                            SHA256

                            0b9431cd08e84e39b59d31079b73b2db3cd044c4b3d2b9a0da147ff8a3c2a61e

                            SHA512

                            f51b26926af43a9140b453989fffcd596038e9cdee3926c8bd17df85d458655f0bd389eeca01ff6d20053604729802309bf55db3f064291f6d12e79222f2d309

                          • memory/2692-241-0x0000000000560000-0x0000000000570000-memory.dmp

                            Filesize

                            64KB

                          • memory/3468-280-0x0000000000080000-0x0000000000090000-memory.dmp

                            Filesize

                            64KB