Analysis

  • max time kernel
    91s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 16:02

General

  • Target

    Setup.exe

  • Size

    955KB

  • MD5

    6f2164b49449467c08ddc249a96d9978

  • SHA1

    e41d5636ea631018d7ea7435ad9bd13bd18870b2

  • SHA256

    a4125660bc7eacca3f52f76caef4dd28ff5e08b41a28d853b8cac67ef6f723c3

  • SHA512

    2e5d6fbcf3b6f20ae9056247f6b81467672d32c9b74dd90ae19d22e2a72296b6fdbf818fca4b32b3ee147718d9e74d562c776443cdc10b245da0c41aebf79c62

  • SSDEEP

    24576:bfLaiJss+vwyIKjDA/+AtawB/BK+8J0Sm95/Q25/5YMUXDAr:DlJafj2taapK3y5o2dClq

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/ta904ek

https://steamcommunity.com/profiles/76561199695752269

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k copy Room Room.cmd & Room.cmd & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3348
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa.exe opssvc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3524
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2012
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:532
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 304707
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2840
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "proceedsscholarsbeingsattempted" Priorities
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3000
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b Impact + Spray + Highs + Ceiling 304707\z
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3820
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\Shine.pif
        304707\Shine.pif 304707\z
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\Shine.pif" & rd /s /q "C:\ProgramData\FCFIEHCFIECB" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:320
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 15 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\Shine.pif

    Filesize

    915KB

    MD5

    b06e67f9767e5023892d9698703ad098

    SHA1

    acc07666f4c1d4461d3e1c263cf6a194a8dd1544

    SHA256

    8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

    SHA512

    7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\304707\z

    Filesize

    372KB

    MD5

    e7b272e4804e27bf9ff64f6fb88cd7e0

    SHA1

    7250958cd53b5f6f4de5676c16e33311a3d4b857

    SHA256

    6363324addcacdb08d9134b6005a9e99e4793dd927b8c4f3d67d250853440e5d

    SHA512

    b67440501b4e346e89ea3e41e9aa1bf06396fb75c114b34f95269f3392bf7befe9802bf08ca7c3b2fba066216f041bcff3a60821419eac278469501a27fcf56b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Albert

    Filesize

    20KB

    MD5

    079dfc5410b0a15d8a2c5a3771d4d6df

    SHA1

    142dea287ca569b08011a77af9f8c5453b132847

    SHA256

    f0d335312413f293c46796acfff3649c2cbb88f40e6d6e68fe367ed0f82922cd

    SHA512

    1e2e28c489b739b1027b0656c5cf0457261977b973774cf8786fa4ceaec7e5a64cb708cbb21d5285573e404d9eb8ffece80b315a537dc90b831c607c747ac5a3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cambridge

    Filesize

    52KB

    MD5

    e4e4eb32d37126b0fefd144cfd0ca0cb

    SHA1

    de8e48aa3bb6c9662b4945b3a855c760274b9d72

    SHA256

    c5f686d90250df5f2e8615163a54b36056f9a6dbe8d8d73f8916f26784b1c97b

    SHA512

    4e51e93a9f53b83178e630344c73357f614c15921242242f113207ff7f3f96684fa7edaf301859561d92d5fb59750ece44865bc5e6b17e68aef16f9ccd0750db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ceiling

    Filesize

    50KB

    MD5

    50d3dbd0db78d2a8cc0ed58b4a4b39a6

    SHA1

    90162d2833882e597901331e2414b396b472bb21

    SHA256

    f56fc2515cb14a957ad25b69707f3614a9e48d3255191f43f0a92c8f80673765

    SHA512

    9637e71f39a7192a52a9bfd1ba0db0c93ccd9176b0f683135935564e5874fa28539e4e7449600442497eb2b3b05bf911dfe0f2349001dd5cd78f29b257618030

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cnet

    Filesize

    29KB

    MD5

    bfc9d589bed3445f3a64c55ad61edb22

    SHA1

    28a1b7c62d5fdabf394a8774740529b8c237528a

    SHA256

    8abad5c8bf20f6d59ef831d5b6f068ab84b28e1e3cb99080500ed7e3d86752f3

    SHA512

    ff686ee8b01f0afbf7204648ec454f57507bdeafc5287317213d0459f1e45d558af6a59bdc28f8395174a6ebc14f0938d815ceb68a3d28e2c64819f0b0ac58c0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Containers

    Filesize

    25KB

    MD5

    1d665d611f0ff7b056fa14f2964f3194

    SHA1

    cba5343ad045b2b6a44fff2e617aa63c232e45de

    SHA256

    8e79a421547ecb026103552ac6dc9981fae639ec8cf80ace0f5eb785700f3125

    SHA512

    d7ef6bf47946783a42d7cbdbc54b66b5279d2004c7c546b303cf68ff94323d1a3e3bcba0444418d368a0fdea170c76cc0a2d1a1487b948f59c3af1bc46d43842

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cost

    Filesize

    37KB

    MD5

    9cb04b15fca51c4f9a44fff3966fed32

    SHA1

    1a4be360cc4f6c84d43cd870406ef63413d4d4c8

    SHA256

    b5ef3500532c83714548ca76cc3e596b56526fb8ec066ccbd09099a727e21659

    SHA512

    eae1680a0c22f3e765d123d0f22cbdf64f76b266ad840e83d652c4206e5dce1e838d99d2e265d78a9e59912211ade244b249bf1897576ac014db1137419a9161

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cowboy

    Filesize

    40KB

    MD5

    02b78981c838968085bfe0de289b5215

    SHA1

    2f5ffb36bda5275bc4d9d0d47a542006b8b1584d

    SHA256

    c6d5ac7393f735ff356d1ec357090ef4041ee21e76442b8c56b72c81235d4d0a

    SHA512

    cdba8181407204f0a68d11ae62d0d5d08d35fb9bb8b74245c9bf84f83a5ddfd69a4fe71b1decd34349013adc5e24094e676ef0599fef0fb7363cb641d13866e3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Earth

    Filesize

    30KB

    MD5

    4f3987c88027f24ae2e056b60ce0608c

    SHA1

    59287c9c72601e3af55d0fd9ff12688991d21c88

    SHA256

    826d54a4bfdaa6bf94f9aa539cef7500615aa3302269542d626bfcffaacd40e8

    SHA512

    9f357821e7474a72868dcf1b1e1d50219d5b1b6c2faa77c2a31e2ad244af133427a0b72720625cc936872fb4da72c191ecf1e075e169190092da8183b86783d0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Echo

    Filesize

    38KB

    MD5

    81b866521f089d0754736909afe3acc1

    SHA1

    c5e2ac3d3c782399ea975825676c6c28d0cda4da

    SHA256

    d4f16caed11e8b0483e2fdff4f5a8ce4616c04329e1229f81b55c6fe3172ff92

    SHA512

    589e80f013a198b51444c3b7086988eaf4d347599ed82be449a18b765ec4b5045f6ce29bcaa658460746519b196ed278df51a2fd5350c3c39e169eb52fd3a392

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Exceed

    Filesize

    17KB

    MD5

    8cd48b44bc6ef77ee3daa3f815292e4a

    SHA1

    781cf7e513f2b21f01bf63c64175c674dd0b6509

    SHA256

    a8b4c0b980f6ad61c96dec7980518abf53d52b7fc412369776d561b36efeff51

    SHA512

    fb3ce9190657af1cc35376075830d011b8c7ad3a5b1a63bd0fb14a762bc3e29a224f34d4daac66ba05ca3aaa1e5ebd42617622ea1c88b6da7dbd93b391936878

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Exhibitions

    Filesize

    48KB

    MD5

    4845d3976da1b0dbfc8a7076b9b576fb

    SHA1

    26d8e94eecea60151426c0d2b2a2e32e6ef25225

    SHA256

    e43dd9cb0d3f2818af01e68f63634ee59755a9cfd4138193906216d88f10143d

    SHA512

    42b5e807785d66b95b850fcb4dc1aebf5884a402585334bb0636e3b143eced7d05a0c69cacf42cf57b72d2c27430e168c57e3699a6746ef28f66c845d637163d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Gnu

    Filesize

    35KB

    MD5

    66749747269216de87084c7d52740112

    SHA1

    e92d51034059d49b087d5cbe2b0eabc7cb870017

    SHA256

    07e9af45d4dfdca450c1b4f022b32d05e5245f6bbe93bfdadfdd80ecc5c57c06

    SHA512

    e113c5380850c68f3e9ca74fe5a85a699eef85af08bd25adf780b7b9730983aafe9e0f9ad8e81815057db25e7b2942e9bd2a77fe2d1c3929a9cad29d6533e50c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Highs

    Filesize

    77KB

    MD5

    febbb47302f3651238136ba7231a9233

    SHA1

    a31f40aee6b7b34af5a32b1915cfe9c99b59b45f

    SHA256

    6e73ca78a3d5a9d458291b89f4ec69aef6f04483836092dae213cf6f951f8db6

    SHA512

    dbc0d4274e300b822f5107a5fc1135ee6accf718db8c28abdc7ec21ed9cbd6d51a4c7d1ebe66fe8781cb52bae7153601184f9eeec9826c7e4b01d1640750f7ae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Hostels

    Filesize

    28KB

    MD5

    25794e1064554f83bb0c44b080622779

    SHA1

    c2168173df54449838625a9e2f3ea4234ea97287

    SHA256

    e512764af89828234d01597420478c9fb2e1d213f1f367aeda70933e15a8c375

    SHA512

    d7fc84cb0a1df3ec8c514bb65e1157dad7cabce6e96649213a4456dc64f9931d642bd8f9bb83e371229d0845ab3545e505ceea83a573abf9864b4d6217e3d362

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Impact

    Filesize

    146KB

    MD5

    7fdd9548391e401bfbcb86c17e4c8c3b

    SHA1

    75091cd1eab616547c3703554a23df1ca98d1fc5

    SHA256

    7972ee49faae16910e0b7b318c8fb81c62f99138b6786bf2f169230db8b93912

    SHA512

    e344a19355cf0f9abf47a10d52cf81b8d0990189a772353b2602659f7590acb454e58a4b617f5040a4484843924c37a5f453e8be302074b6987e185f70562a93

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Jungle

    Filesize

    15KB

    MD5

    a7eb66e52905dc186f036abc180a5046

    SHA1

    c1d15b635d6e750bd512de807c93847f2e0bfb13

    SHA256

    cf3f326aac1f32c2d53fc00958073398e3fa04ee9d1bb6a361013bc45e1e6f8b

    SHA512

    d0e55b6b144c02288b788661d6a4a4baa79a3e07cc529e66dee2d2c8d0b85831e33398c956b7749bceda225410ae097b0f81eff71e75c61aa2a38cfac394f633

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Kingdom

    Filesize

    13KB

    MD5

    3b3d4e1d4e0f8451c3902501ffe5d57a

    SHA1

    b21e4221fac05c9418202840fe2ac8ee2318cbec

    SHA256

    d9ebb830674e85027183ce2df03c62888030f4dae82c7471aadb832f22b5414f

    SHA512

    b79dae8b25a59a7f2ad628e17ec239c21db4c58fbfb655c2e92230f7699c41c7bbcf4135701b4e338fe15452c853b4d7f056fc5bb9be311768e668930843d3ec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Min

    Filesize

    63KB

    MD5

    a770be5fc6716b098d24fb856b0aa629

    SHA1

    18a00d8143b2feabb267bb669cb66b8ac88a6aa2

    SHA256

    9e5923fe6745fc55747b94cdcd2dddb10dd8733a2dce1b85e428644793bf0380

    SHA512

    2eefdc9da45c12f8e81250e30467617265ea8e9f403867116c4a4bece820e074cc934cc110610f7d9754595b4a0a9ce0521107d521bb69390d0bc67c48eb6d30

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Moon

    Filesize

    15KB

    MD5

    a63d11c94944115efe9dcb8485a6d51d

    SHA1

    ad59f7e7ae4d84cb4bc9491d9cac1129598dcc64

    SHA256

    3541881a222a40c41a11c8215b52959fa661214f5a4a9c70bd49f834adafab71

    SHA512

    e9478f57acf62565c68467bc810589c13c8e8fe326726abfdd4157781390df3b3fb40145168580ecd6e12bf9e83bffa35b99cbc67a8eaf6b6ff873bdabb8c7a6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nick

    Filesize

    65KB

    MD5

    4e5672c282edd0e6a9a5f1cf57d332dd

    SHA1

    1986d3cb3f050f1aba5f4b51e1536d1aa99b4192

    SHA256

    b474c63f62a8e729e3527d64b84d37d560c865e03afd22d5f1c97cc9555a3060

    SHA512

    fbb1cd269795e83f465da1eb230eea999afec92233254cdbd1fce31cbea5f9596eb2d8664188d9447a6fb3ecf660ccd23fcf87d3a0bfe337650788f0892c71cc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Normally

    Filesize

    66KB

    MD5

    596f6c72e34424040276d1ab55e0f7cf

    SHA1

    573d27da380ed02b269534d6638d554df57d7c3a

    SHA256

    a3b8e07b3be465a4258e890ecd71fb9d421768ba18c2346ff32eda3488a58df9

    SHA512

    65c411fb31f5ef60bc7ef02ab385d0076c1f1c98f4c29f1164a9394e2c309bab2b0dba321c89c63b27964c8984323deaa00d6e16af79781ca999119a11ec0376

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Nov

    Filesize

    47KB

    MD5

    88449540f6854b9763995e9010ead5f8

    SHA1

    062a6f1abbbaba46f4566c07fe36b0f1b4381fca

    SHA256

    eaa25673d8e4b9256f4ca127da71ae4c9180cd1e9f4d44d45a0d58c846f97bb3

    SHA512

    f789be1c5ecce00774a0f75aee3d1359a23a602f3b6930db1d3b3a377cd6eb8b62d0e4e6b44d2a893c4ea462741c7708c74cfcd95266ddf608edaa7534e2c355

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Priorities

    Filesize

    92B

    MD5

    d87d9a6328a3d42c17c4133d956f517f

    SHA1

    b939d56760afb2315d0878f47741f96a6391dd81

    SHA256

    34c75ff522b8a9db076aae0e42e95ad0beb77bd6ffbfc16b6774b0d45b0b911d

    SHA512

    400876bd435f12dcc3f3b0ac604a0ee65bdda56ae6842a5e3070ba7b3d4928c15cf7bd933b4e1bb324f9e913886c3eeafa1e4e7e5482c208b38c5aa5788ed1ae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ray

    Filesize

    19KB

    MD5

    96af1b45854e9ab33fd769a79aa7cefd

    SHA1

    b63a6ba7840f7f62f23b0d4bbfbb90af40339282

    SHA256

    3a11c16b348481f39066ab3e0ec033dd477f29785eed2da0ada0bd2f3a9d03bb

    SHA512

    98aabc3143b4ea143e2a329daea97c1fe06386d72d2df8dc3a4e39588c4acc7cd6c86e4f1f0ac3be8c4cc0f5f3a5b5232f9526730648b52373ae0e0787d65cb7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Room

    Filesize

    23KB

    MD5

    b1f21c390c54c5c2a98fb55a35c63253

    SHA1

    fe8db69bf03544b698459337a355edea89ee83fa

    SHA256

    6d407c39e84b8f4edb6946fb7993d4055b781d8952200cb8e8c117f92c32e1d3

    SHA512

    a024afe79ab0a27f4627ccf099a4c5bcffe29d5536220a8743e7efd7001a3cbb8b7cc5c66c73a35cafc1bc360fa8aca12a0afa481a33469d2d1f036542c3bd70

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Rough

    Filesize

    34KB

    MD5

    c27db32d4242f01357e2db8a3dd1bb59

    SHA1

    03f04166ef84f72f6fa5472ae479acbfcbc101c3

    SHA256

    3b4ae6f80f9eba9189aaa2c7d79f5dd10a41ae91020db899b23131ea36d7a649

    SHA512

    3dd825e1125c5daf8aa0bd26cf15f264d7d94d7b18c4ec2a80c661526a36930b86a1d72538f5702d2f66e7ee060f63f0ea82ac8c9662d7f6cdfcb7986c185b3b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Screens

    Filesize

    42KB

    MD5

    c4b113a02186c7e7a70130b20ae383b7

    SHA1

    531635fe7ac78db49170d7aea5510ddb92542637

    SHA256

    eda59b06cea3af8fc01c8b51d364d89fe79e998336a4873555cee76fb4bd8d4b

    SHA512

    f5c171a39f1eff059eba6ab649912436de7b3eb399f022b2e13d0eab8454639a1b4216c54d20f3574473f8c8e1f640620a9a40c4f844ce19fc5a34c5510d51f7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Skill

    Filesize

    33KB

    MD5

    08f23532b187a07575dd8488ff23ec96

    SHA1

    074a26961791eb321f3e90e07fdd72b5316ec321

    SHA256

    31e35c0d393f73d20ecc3680528d17d9837d4913d391cd7cc85770e815a38735

    SHA512

    387111dcf8fb75203d9fe942a55a977b96f837c0c9e802706eea13a1ed60b4efeddb9156a0d7bf4f8cd9c7b50555b950520b6c9434238d5e35ed804dea70508b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Spray

    Filesize

    99KB

    MD5

    1fc5385349c9ebc7599dca69a2f0c65c

    SHA1

    5f656ad103de6068741f43d721d9cec52bcb9c43

    SHA256

    868510635eeef94d64f712499091e79e09bcba0ee222894057b0e8941684b0aa

    SHA512

    20c0a843c7cc82180d032b200152c7c10553c4b802516e025ddd8b9d1be0736ebbaddc266be20eecf77f171c996fa8eddc257ffe3c1e30166dea35d46fb204c8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Technology

    Filesize

    31KB

    MD5

    7a634447eb6b81519d99fc571f44009c

    SHA1

    44055368e8a817ea9833100e48059140cfc42fde

    SHA256

    626eaa6ed33fb5244d3484d53a06323302bf83dcefe9a6d09b1d94944acebdd8

    SHA512

    e616e39754bc6de364ba97e41cc1807f8ababdedda154b77a421ce117b695109981284f4839b00dde2ae3e6df1205b5f22f9822292f2e4db7c6d41e39554cb8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Transactions

    Filesize

    22KB

    MD5

    a0d02e32ff4e9bfadf9a34ac1fc400b7

    SHA1

    ad101d77e9af1cd845ab7f7086d18c863ba005d3

    SHA256

    d961f3d6995e518d02190164efaeeca050ecd2badbd278481fc4ac8d0121bfab

    SHA512

    0ef72d33e3a4f95acde7e941cf67b2116e6e82f7c061f5ef30fd0ec9cf9769507df508833b91223347723e380e69bcc01f56e59554e8f687c79c10e5a95b8df0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Wallpapers

    Filesize

    51KB

    MD5

    1ee31954db32328f6e5d3eb676c1fcaa

    SHA1

    b5b84b64993aea5c06fcd53d9e8600db57c19df6

    SHA256

    229b4250fdbbfc9ee38717100e68d7e8b67ec20e309bf8e5c1d94e8c2c27d27e

    SHA512

    56474e7a5c84f41bdf29e01f8072ef7780a1a3817680a58e1711d617b17df178097f0650af41247140a8f1691da99b9dc944e1338af0a8c4baaed78cc3f5e693

  • memory/2640-573-0x0000000007B00000-0x0000000007D49000-memory.dmp

    Filesize

    2.3MB

  • memory/2640-574-0x0000000007B00000-0x0000000007D49000-memory.dmp

    Filesize

    2.3MB

  • memory/2640-575-0x0000000007B00000-0x0000000007D49000-memory.dmp

    Filesize

    2.3MB

  • memory/2640-576-0x0000000007B00000-0x0000000007D49000-memory.dmp

    Filesize

    2.3MB

  • memory/2640-577-0x0000000007B00000-0x0000000007D49000-memory.dmp

    Filesize

    2.3MB

  • memory/2640-579-0x0000000007B00000-0x0000000007D49000-memory.dmp

    Filesize

    2.3MB

  • memory/2640-580-0x0000000007B00000-0x0000000007D49000-memory.dmp

    Filesize

    2.3MB