Analysis

  • max time kernel
    209s
  • max time network
    219s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 01:13

General

  • Target

    FACTURAS.exe

  • Size

    95KB

  • MD5

    e945c5efd46a03fec5ab5c1d77b64e23

  • SHA1

    c9b3edb25d29613fc859d0c6d24bea02f3031c3b

  • SHA256

    5d2dd8452a0048b9d23499187fafc6e2cfd25efb72eee7f92657352e954bc160

  • SHA512

    56724b9a9271fc87e57b0b042c4d6d5935ca604e24f10e06183a3612590aa15bdbf1bf1f020eeae45b10c611d591acd42d80c0dd3f923df93ba8615d5b314fbf

  • SSDEEP

    1536:DGAIyl4VuPPlAlqFuJp2JxhVtPd9YebC+AARivhbv:aAI8QAFfPwVdhbv

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot7756107542:AAEhuCgRX-ckFVwps3xqgrtyb3JVRKo9Tog/sendMessage?chat_id=

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\FACTURAS.exe
        "C:\Users\Admin\AppData\Local\Temp\FACTURAS.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2144
      • C:\Users\Admin\AppData\Local\Temp\FACTURAS.exe
        "C:\Users\Admin\AppData\Local\Temp\FACTURAS.exe"
        2⤵
        • Checks computer location settings
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:4752
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging
          3⤵
          • Uses browser remote debugging
          • Checks processor information in registry
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2024
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc3fa6dcf8,0x7ffc3fa6dd04,0x7ffc3fa6dd10
            4⤵
              PID:2788
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1960,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1948 /prefetch:2
              4⤵
                PID:3604
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2128,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2124 /prefetch:3
                4⤵
                  PID:5880
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2292,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2288 /prefetch:8
                  4⤵
                    PID:1552
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3144 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:3704
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3176 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:5308
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4176,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4168 /prefetch:2
                    4⤵
                    • Uses browser remote debugging
                    PID:5144
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4560,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4556 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:4604
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4760,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4752 /prefetch:8
                    4⤵
                      PID:2532
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5408,i,3132342580498303882,11088959624187120121,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5404 /prefetch:8
                      4⤵
                        PID:5844
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                      3⤵
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:5012
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        4⤵
                          PID:5716
                        • C:\Windows\system32\netsh.exe
                          netsh wlan show profile
                          4⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Network Configuration Discovery: Wi-Fi Discovery
                          PID:2968
                        • C:\Windows\system32\findstr.exe
                          findstr All
                          4⤵
                            PID:4340
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                          3⤵
                            PID:3216
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              4⤵
                                PID:2952
                              • C:\Windows\system32\netsh.exe
                                netsh wlan show networks mode=bssid
                                4⤵
                                • Event Triggered Execution: Netsh Helper DLL
                                PID:5628
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging
                              3⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:4784
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffc3e1af208,0x7ffc3e1af214,0x7ffc3e1af220
                                4⤵
                                  PID:5312
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2672,i,10426452795790222384,13437841773983163744,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2668 /prefetch:3
                                  4⤵
                                    PID:3636
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2636,i,10426452795790222384,13437841773983163744,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2628 /prefetch:2
                                    4⤵
                                      PID:4928
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2700,i,10426452795790222384,13437841773983163744,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2692 /prefetch:8
                                      4⤵
                                        PID:3832
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3488,i,10426452795790222384,13437841773983163744,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3484 /prefetch:1
                                        4⤵
                                        • Uses browser remote debugging
                                        PID:4080
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3508,i,10426452795790222384,13437841773983163744,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3492 /prefetch:1
                                        4⤵
                                        • Uses browser remote debugging
                                        PID:5524
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ac488f96-5bf1-4e9f-a962-b3fd91023a34.bat"
                                      3⤵
                                        PID:5296
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          4⤵
                                            PID:5404
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /F /PID 4752
                                            4⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4180
                                          • C:\Windows\system32\timeout.exe
                                            timeout /T 2 /NOBREAK
                                            4⤵
                                            • Delays execution with timeout.exe
                                            PID:4736
                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                      1⤵
                                        PID:4992
                                      • C:\Windows\system32\msiexec.exe
                                        C:\Windows\system32\msiexec.exe /V
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:628
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                        1⤵
                                          PID:2716
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                          1⤵
                                            PID:3964

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\Browsers\Firefox\Bookmarks.txt

                                            Filesize

                                            173B

                                            MD5

                                            70e1643c50773124c0e1dbf69c8be193

                                            SHA1

                                            0e2e6fd8d0b49dddf9ea59013a425d586cb4730c

                                            SHA256

                                            4fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a

                                            SHA512

                                            664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\Browsers\Microsoft Edge\Cookies.txt

                                            Filesize

                                            768B

                                            MD5

                                            ff6ea394ba18a585ef1bf24074c58856

                                            SHA1

                                            a8d9325a7f24cf1fe73aa68f1e78b188b9b6a27e

                                            SHA256

                                            dba821c892317637a52632a1a2e8d9ad005576ff988eede113f3cbe023f8dd9d

                                            SHA512

                                            882eb76fabcd5c1ecf07711f60b396642a3546441044e7c81405fe8eda34516f3fd12e43c730a8aab2b39f48090bb0da6871fb30768d29d8532eaa2bbe7101c3

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\Browsers\Microsoft Edge\Cookies.txt

                                            Filesize

                                            2KB

                                            MD5

                                            687085d6174de96e3b75ab9249cc9480

                                            SHA1

                                            442570cf59a66125d5b262b0f8647bd0ffe154b4

                                            SHA256

                                            6af3c2e62c41c6821f3607e21108dee1920aba1100c8a9a89b04d7433c8f398c

                                            SHA512

                                            6284ed521776d3426c88c33841ea7113e68efeb6f25ee26a529cae718639edfb2dd3045af9e88aa79c789f3dacc7275c37c4add85e632e3b8f3ae31fadf040fb

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\System\Apps.txt

                                            Filesize

                                            6KB

                                            MD5

                                            f2a640d3dd6c363654908273ede6e94c

                                            SHA1

                                            79b93351400df4776b9f0cfb4ee3369d83b0a937

                                            SHA256

                                            0ba8dbdef4487b3afc802a9995cab8428d359c5550def7961c702f95c6dcb184

                                            SHA512

                                            6ebb593f7dadca51e61bca7dad689fd43767131cf83c8a80423444c37198327070e91535aee022fdb0fde5f403060ad02de8fe256df4a458a31d4444aa9bf790

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\System\Process.txt

                                            Filesize

                                            717B

                                            MD5

                                            15abbc612299e7e0d98e69f89ff3fa05

                                            SHA1

                                            0d3ca53e79429cebac76ee873c0e189b7ccf69bf

                                            SHA256

                                            09d170793d799b19feacd0b2ce30121f53d2396e52c514812cb9de19d44e95d0

                                            SHA512

                                            fca3ad2eacbf89c177832de9e81e11e1713fa8e83b93c41b6a441b1d46368258aff5c4b478fd731719e5ed31ec66a3416bb7702c9884faae295e6a4298bd6dc4

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\System\Process.txt

                                            Filesize

                                            1010B

                                            MD5

                                            973936066bd325f9e133f6f808eb9c7d

                                            SHA1

                                            f1b2e9b9da8e6835ca2fc57da907fe8e5baa6303

                                            SHA256

                                            7fccd29b25e49cb962cede4a19cfa82ff7523663f947a018f0e5175a4de20918

                                            SHA512

                                            54675dd576fd71bde4ac3ef1192bf6adb6b4e5ccab1868d7b0e43e6d757e3e8d9f1bdf2a7acc95de46678694f1251ae3b6ec05c83b7912112c343d3241e58d46

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\System\Process.txt

                                            Filesize

                                            1KB

                                            MD5

                                            a72b17c323c49ac99cf55e4c2b2cfed6

                                            SHA1

                                            cea610dcaca7edca93a94e6a97f25faef22ad080

                                            SHA256

                                            141fda1cffd6f86be875e02ed082aaad0b27f06274da6f8b9c9487bc29de2dbd

                                            SHA512

                                            ac3ba26233459541f802466060c756a1fce4bd6628c3503bad56a397da3935303801d3746ceadcaa4f1b04d344dda82432cbbc035cc70ddbd9c3de2ce702f5ca

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\System\Process.txt

                                            Filesize

                                            2KB

                                            MD5

                                            ff78f193681c8dbf0c164057a7305051

                                            SHA1

                                            b94e1360adbb32e04223350ee0023e1d4a561f67

                                            SHA256

                                            d3ad4262acfcf6d8a84005815e682932d2b326cfe0103791f136dc232be61885

                                            SHA512

                                            eaa7fc4df25e8e15aebeb0acb69a6abd80926b72b780f49a7c1ab9f09c9148b5038c8060197ad9d3c95057bd52a6bd3bd2e14ca8c66ccf0d65fcb24460634613

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\System\Process.txt

                                            Filesize

                                            2KB

                                            MD5

                                            c8cbab33fa3b578219634b3a8c57bf60

                                            SHA1

                                            c22ee93c0d0e23b6fe617d423b109282804edc18

                                            SHA256

                                            4437a913cd060ecfe3fdcfe9562980e8bdcde29efaf54750ee2b4de7b45a8822

                                            SHA512

                                            76a18d5be6b19989655f2b9dee8cb00307a5b0cf2c1f44a2e84a509d6f3055bc1ba4d660fd426becb49c537224f96195f8358dee9b699b32fe4b582ac4a1c759

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\Admin@ALDSPQOO_en-US\System\Process.txt

                                            Filesize

                                            5KB

                                            MD5

                                            d7ce3c7aac6cc7d4c166295d734ea25e

                                            SHA1

                                            1f4becf956bd04809519e5e0541a8fb38b01e6cb

                                            SHA256

                                            cdf90aff1c8ac21e14f6aafe983b6c792429d7343b7f1dada32aa80167242b4f

                                            SHA512

                                            d55de1911b7dedc80caa63e042117267b3b0d622389a292b4a9c73468c3519ce323eb0758f7dd7767979df2c1a47862769fab7a5fa5b6aaed3fe2a675853819d

                                          • C:\Users\Admin\AppData\Local\3ce1de7fc8927b44a7401e6cb4171eaf\msgid.dat

                                            Filesize

                                            3B

                                            MD5

                                            6766aa2750c19aad2fa1b32f36ed4aee

                                            SHA1

                                            08ec2efcf0142e45c607570add5be471abd4504c

                                            SHA256

                                            709df012e236dc3f5c53b8ce75c5adf74c39054aef58e3eca5d852fa5f2244de

                                            SHA512

                                            d1be978caa450ebb5044786cbef7206f0f03cb30427e7ba1ee01940e1c64ce32cec52fe972e8164f834940d3da927275ee5e8d91e56f7243443df6054fd507c0

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            80KB

                                            MD5

                                            d643ac8064d6b6e63814a00ce752697e

                                            SHA1

                                            7b7e405093b1ce92d0a58968ba493fbfe72b607c

                                            SHA256

                                            706cdc4a0bc4a139d349314ca8b2882cad34a3942747c035d34ff7f271137bf3

                                            SHA512

                                            7c36021be3bc0e37716ed7edb9d298c6573314d859bbb34af03d4b9b3d925a88aa6b73d541077718a2a2a45d0dc28074fe168af2249e7e7e6fa2d2dd89a6e01d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            280B

                                            MD5

                                            01cc3a42395638ce669dd0d7aba1f929

                                            SHA1

                                            89aa0871fa8e25b55823dd0db9a028ef46dfbdd8

                                            SHA256

                                            d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee

                                            SHA512

                                            d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                            Filesize

                                            327B

                                            MD5

                                            18f6a026be858841fe9c463448f7d6ff

                                            SHA1

                                            63fad255f44337440f8565226c12b92ba76a9519

                                            SHA256

                                            541b02ba1c4755e7dfe49e3eda1092d1dd587df3e6670c66ff46a7fc706441d0

                                            SHA512

                                            753ee0fe6e0a517f725eb52f07c755d300e66f21ae4ed9bd7639520433f7194c64063c24729a9eba6a9df044e91a39eba3f6c97642dc09e1c3c9a132376f2b0a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            40KB

                                            MD5

                                            65af8feabc9952f1d2e2b5dbc2e2f1e9

                                            SHA1

                                            b9dfc0ff02e638dd12da7cdeedadc12048987e4a

                                            SHA256

                                            e2a20af1d0d4b37a8911dc172d2db2d8f84f5446558342e9c69e90d378d28dbe

                                            SHA512

                                            af710224c2fe3a68a1ee3f623a2037a0fcaf98e4f44399ef706998f8faf6da0d781a22e4d172f6ba4fdffcab67eb7d8adae81fe1c2fbc8ab4232ddf7f089b07d

                                          • C:\Users\Admin\AppData\Local\Temp\ac488f96-5bf1-4e9f-a962-b3fd91023a34.bat

                                            Filesize

                                            152B

                                            MD5

                                            507f3cfdceef2ef29a2b16335197d031

                                            SHA1

                                            6dae51d5ebdbbec936a77e0b404fb3f18861713a

                                            SHA256

                                            69741edd97b5b9c168d49dcc008c4e62038359b02ca9d939548612c73602d2e9

                                            SHA512

                                            96eeef500300d38ca85779a291daee0aa32a364e7b80fc2edfc9d3007481dc75c4569fcb0e7c06c5e470e9e546e29b14f96a8dd365bdc1d6cf62d0c2e3130ca1

                                          • memory/2144-47-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-1352-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-49-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-45-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-41-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-39-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-35-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-29-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-23-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-22-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-11-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-53-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-57-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-55-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-52-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-59-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-69-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-67-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-65-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-63-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-61-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-1342-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-1343-0x00000210E1660000-0x00000210E1D8C000-memory.dmp

                                            Filesize

                                            7.2MB

                                          • memory/2144-1344-0x00000210E1D90000-0x00000210E24B8000-memory.dmp

                                            Filesize

                                            7.2MB

                                          • memory/2144-1345-0x00000210C8490000-0x00000210C84DC000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/2144-1346-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-1347-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-1348-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-1349-0x00000210E2500000-0x00000210E2554000-memory.dmp

                                            Filesize

                                            336KB

                                          • memory/2144-0-0x00007FFC45743000-0x00007FFC45745000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2144-1355-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-1358-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-1-0x00000210C67B0000-0x00000210C67CC000-memory.dmp

                                            Filesize

                                            112KB

                                          • memory/2144-1359-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-2-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-3-0x00007FFC45743000-0x00007FFC45745000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2144-43-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-37-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-33-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-31-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-27-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-25-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-19-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-17-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-4-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/2144-13-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-5-0x00000210E0E90000-0x00000210E1664000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-15-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-9-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-7-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/2144-6-0x00000210E0E90000-0x00000210E165D000-memory.dmp

                                            Filesize

                                            7.8MB

                                          • memory/4752-1518-0x0000024DFFC80000-0x0000024DFFCA2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4752-1457-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/4752-1795-0x0000024D98070000-0x0000024D980B4000-memory.dmp

                                            Filesize

                                            272KB

                                          • memory/4752-1796-0x0000024DFFC50000-0x0000024DFFC6A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/4752-1383-0x0000024DFF830000-0x0000024DFF8E2000-memory.dmp

                                            Filesize

                                            712KB

                                          • memory/4752-1360-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/4752-1357-0x0000000000400000-0x0000000000B0E000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/4752-1888-0x00007FFC45740000-0x00007FFC46201000-memory.dmp

                                            Filesize

                                            10.8MB