Resubmissions

09/10/2023, 23:32

231009-3jce8abb24 10

09/10/2023, 23:25

231009-3ef8lsha7x 8

09/10/2023, 23:21

231009-3cfjasba86 10

Analysis

  • max time kernel
    134s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2023, 23:21

Errors

Reason
Machine shutdown

General

  • Target

    WIN_20230904_22_44_24_Pro.jpg

  • Size

    240KB

  • MD5

    2a34ccca435ec5f7fe7d3aa0994c43bb

  • SHA1

    957a8d917e9f795089dbc8ec95906530ba4b6ba1

  • SHA256

    a5a99b75b4cfbf2ee2fa04e09d3b4714e4710d5edde4d4807b9a15449ee3199b

  • SHA512

    7997510647b4d1999733f5af7b314f60f3dea09f970898e251754e72c8bbc18ecf5780ab1fecd4b19442d136f9a0943a95024385d60d42b1585ec46a6137545a

  • SSDEEP

    6144:cgwkJICGdV/WpuY9e5GtcYeAHsb//C7FciH:cgnJICGdV/Oe5Ge1sciH

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\WIN_20230904_22_44_24_Pro.jpg
    1⤵
      PID:4484
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdaf5b9758,0x7ffdaf5b9768,0x7ffdaf5b9778
        2⤵
          PID:388
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
          2⤵
            PID:1404
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:2
            2⤵
              PID:3348
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
              2⤵
                PID:3536
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:1
                2⤵
                  PID:4760
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:1
                  2⤵
                    PID:1120
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4660 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:1
                    2⤵
                      PID:4336
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3744 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                      2⤵
                        PID:1104
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4936 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                        2⤵
                          PID:1856
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5140 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                          2⤵
                            PID:5016
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                            2⤵
                              PID:3468
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                              2⤵
                                PID:3516
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5560 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:1
                                2⤵
                                  PID:3352
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5152 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:1
                                  2⤵
                                    PID:1216
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                                    2⤵
                                      PID:2680
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5752 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                                      2⤵
                                        PID:4840
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5816 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                                        2⤵
                                          PID:1984
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                                          2⤵
                                            PID:2920
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3200 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                                            2⤵
                                              PID:3776
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5376 --field-trial-handle=1708,i,7021638479785195451,70401443054428969,131072 /prefetch:8
                                              2⤵
                                                PID:1552
                                              • C:\Users\Admin\Downloads\RedEye.exe
                                                "C:\Users\Admin\Downloads\RedEye.exe"
                                                2⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • UAC bypass
                                                • Disables RegEdit via registry modification
                                                • Sets file execution options in registry
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Checks whether UAC is enabled
                                                • Drops autorun.inf file
                                                • Sets desktop wallpaper using registry
                                                • Drops file in Windows directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                • System policy modification
                                                PID:2888
                                                • C:\Windows\SYSTEM32\vssadmin.exe
                                                  vssadmin delete shadows /all /quiet
                                                  3⤵
                                                  • Interacts with shadow copies
                                                  PID:4128
                                                • C:\Windows\SYSTEM32\vssadmin.exe
                                                  vssadmin delete shadows /all /quiet
                                                  3⤵
                                                  • Interacts with shadow copies
                                                  PID:4168
                                                • C:\Windows\SYSTEM32\vssadmin.exe
                                                  vssadmin delete shadows /all /quiet
                                                  3⤵
                                                  • Interacts with shadow copies
                                                  PID:4208
                                                • C:\Windows\SYSTEM32\NetSh.exe
                                                  NetSh Advfirewall set allprofiles state off
                                                  3⤵
                                                  • Modifies Windows Firewall
                                                  PID:2144
                                                • C:\Windows\System32\shutdown.exe
                                                  "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                  3⤵
                                                    PID:4212
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:520
                                                • C:\Windows\system32\vssvc.exe
                                                  C:\Windows\system32\vssvc.exe
                                                  1⤵
                                                    PID:4952
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:1348
                                                    • C:\Users\Admin\Downloads\RedEye.exe
                                                      "C:\Users\Admin\Downloads\RedEye.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:3532
                                                    • C:\Windows\system32\LogonUI.exe
                                                      "LogonUI.exe" /flags:0x4 /state0:0xa3906855 /state1:0x41c64e6d
                                                      1⤵
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3492

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000018

                                                      Filesize

                                                      19KB

                                                      MD5

                                                      5d9b7eb68768481a0989ded4eef2fa49

                                                      SHA1

                                                      e0371a48813b1f842a5ace827793df3f916cd012

                                                      SHA256

                                                      bb568d46fcfc0636f69ebc72f5faa6034f896a668f1bf5c10be2e21bb93cbd0e

                                                      SHA512

                                                      9c22a5ab50c6ff354031af843a6d7ea184d84367cba3b0422420099764cf6b2904dfa775522aa3d86808ac9d52b47d8c13d2cd4cc9cc4d96e69167b63ba184a4

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      d3bfac245fe97181de92db3dc493f7cf

                                                      SHA1

                                                      011e73b774f11263acdf5eda764aa66e7dead01f

                                                      SHA256

                                                      b5aa121da37a87742126821fcfbc77b16bcac33d48e59da6f10ed1873abd4928

                                                      SHA512

                                                      037236c233b0362a503ed34b53095765d732cc3db91d08415cd0a11f83a14ba057e3e69f64a8a25a1979ff8e34892b53f0e302821431cb0784213012ca750521

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      c9edb93498e934c696b6074052e2b299

                                                      SHA1

                                                      51005331bbcbf65cbc1e066487dcef943787d928

                                                      SHA256

                                                      c303b968bb38326ef8167247ceb325c67f5242e18d1b57ee6a03e0564f762f41

                                                      SHA512

                                                      9dd785720408b3edfa9dbbdbfe3cb1fe8189be4c435e560172d8dea4b9b6a3fe7f423b2cb2fe1db5090d55f08f3466040228766176e5a8ed29eb24e8f68c098e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      b3b708b70f6f23d5abb935692e57359d

                                                      SHA1

                                                      c3a4928e0599e3b5169c389ea8306fc2d6c19b08

                                                      SHA256

                                                      5946d549dd0ed8ef9c3d14b55de37384fd13efed4078581e3aaf548da425af31

                                                      SHA512

                                                      76ca62b52e579e662202a4c33809f84663e5e6daf85a18d698ffb08dca1b95cf91a69e7f4d4addddc1b13a2c17d1e3dba1979528a7acadebc9c5425d354deb86

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      371B

                                                      MD5

                                                      6def5d63ab10dcc9ed5aebf45ec3f25d

                                                      SHA1

                                                      561562b4942315c675d41c78bf81403573dd19db

                                                      SHA256

                                                      30cb4fbf358010a2fb509f512e0b3384e2fb20e55af8c719508516c9f7e17f8c

                                                      SHA512

                                                      4ce86261c111823f43171a588ba03f8b0a251c1af73d5e101fe94bab9be6c89c0a949c3be385ba7d02017087320c7f9974a886cbe729c5729bb801902ea89241

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      371B

                                                      MD5

                                                      645f8e36fe64c8b0396165363540dcbc

                                                      SHA1

                                                      bb17b6976d52394237bc27a069bcdfb613c9960e

                                                      SHA256

                                                      a58b1dcf7373bb6bdd6f5111c1fa6f7268d727d8aabd12079f2e3b4a57a88dea

                                                      SHA512

                                                      c9bfeb639bfb562da2f5bd3a4fb2928bf10e701d6f5594ea2cf0d385271dce5fb653ab39a3078bcc09bec196819391ad8f890b9a7d017360432704fa4e1ae2b6

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      cb4ef94ce3975569fdf0618bb1daed35

                                                      SHA1

                                                      d4497d890a651b0e8ff2ab6adb4eb3a936e88443

                                                      SHA256

                                                      6e1c30260fbae33aa1a6fdb1d4f986b6ee6c45d258624b576d0dcaf863d39ff0

                                                      SHA512

                                                      02d5ef17d17a5038b264f75e7e81674734b6f17f1d5c7aa8015fc8d4860ba4022d155d8e30d07fe3d6233459935adc7c797f7e9b0da8b819f2741b9e631d8924

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      d6f76137361e9a5723ae13424ac87854

                                                      SHA1

                                                      5f0839f244acddd983e604600e4ad13dba253a1a

                                                      SHA256

                                                      1e3f545ff4c68a9a49f051775960012679cd1e18bac57e1415e8a25c2e98dc5e

                                                      SHA512

                                                      74c402723a0080de0e5d5d622cf5425dc5ad8f285d96f412b909fea21bca91e3818479070b01aa56be61e622b5a1c981a8a60d973e93ceb34820e98c6c9425b5

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      5ed36bbe60ebb024df1a6b5436ca77e5

                                                      SHA1

                                                      6a921285503351b5b036fb6a1b3db2b9e96e6eeb

                                                      SHA256

                                                      e826637707c76ab1323d84efe3f63c3966a6a7bf7bd5e662f92a98571fdefe69

                                                      SHA512

                                                      6d40d92fa6d8beb4b1b816bb0e5af986625b352c828a1120ac016d985381749df555a524bc31bffabf685797be6f979e132b59c7a4939ac4281ef7d20dbb7415

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      06e224a49b789ea666ad661fdd7df8fc

                                                      SHA1

                                                      f09842c913f66e211f4d8452f2e055adf94a6e9d

                                                      SHA256

                                                      452ba84a14e9f48c07a1ce79564034ef69621092f0ab8943cfafa16693035afe

                                                      SHA512

                                                      a88b4197fd6b61d0e1d1fb11e88b791ea23f421ddf5376c2eaff0db491c4c0a28593fd88a0d9fe478a6e058d6770bdb1a3fed1d9b3898472c5b927355d0241a2

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      c7ad5e057b5173892e712704c0c8864e

                                                      SHA1

                                                      e0f1b614f517202e4924f02d01bd3c97362b47e3

                                                      SHA256

                                                      e01545773cca9a7cec38b8b6fc8ab02e1fd260792407a58be603bc6ecb294bdb

                                                      SHA512

                                                      4f92f596e10f0377660d3688829e36e2a4c9443329c91d77d062d5100917381e74ae5734fa11f86e88b6f34cd23d9cf2017631aaa9bb20e7ff5e58dcc97b19fa

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      841bfdbb3d70b664c4ff4c71585a0c1a

                                                      SHA1

                                                      c6c03289048506aa7a1f77b64e0f2c2aaa562d4a

                                                      SHA256

                                                      c982b4b5e2d2f7331b00f46190311f8246bba80e5bc90c721eb62149557f0ec7

                                                      SHA512

                                                      e3514819b77916ffd831aebee202e44a8c9e5d3ca9dbf2cc069243b0beafe86f34b7c020c424d97e3907f303c1ea91fba11f2c57c6adc00582db5ae3a3c2f0f4

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      dc48b6261b633affbc40d9bbb9b7c419

                                                      SHA1

                                                      e526a4ec3d43956b8bfd59054d7a16038116bbc0

                                                      SHA256

                                                      36919ea9902b946869d2e89e001fe0a2e73785f9b65c2a109498ebb7a91dee1b

                                                      SHA512

                                                      592f1d3fcfc4f331bdcd022aac2a905f83f50f003064dfbc8b566e1226ce145b4588c33016ead554570f0e0a9a12c5111dd71251c6fb81c4057f9afe00655c9b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      47ef1c37c44700d6cb8e144a6f3dcb69

                                                      SHA1

                                                      197ec05d1c3dcad58c332499aaece243ce36c382

                                                      SHA256

                                                      c7349b80bade2d6ecf6a3180905055b95e69946389d45dd33e10e9f549c3ed95

                                                      SHA512

                                                      5c9fc267000387597d974df2247ef26954eed730d316a18ade7dc1bbf2874c7d9d8096ba96fc9d293d294262e0aa4b255893a46a20b5785244fda3787dce94b4

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      8802d52f9e6622d82301b5aeec2e1f17

                                                      SHA1

                                                      ba6523fdb8e7e2352a236406deb960d453c5a177

                                                      SHA256

                                                      9d17103c85045603a0e6344a6898e8d769f704b5fe983cc1c429a875b77e4a02

                                                      SHA512

                                                      388ead30614774e0ba3f69a2f9d90aa6cfdea0d5e3e8e0d9b1744ae089279996a9b03be0c4510ae8936687202ecdf5d7ac9e3c20dc84c6a2b136f11c7db0e6b8

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      203KB

                                                      MD5

                                                      83151c123def9205e6d447694fa5c22d

                                                      SHA1

                                                      98c7809468285a755234a1ce073aa6571ad74b88

                                                      SHA256

                                                      d3b2433fc33f11adfc47b19bd7350601353f793131f48dfdd32e2d6f97eb7621

                                                      SHA512

                                                      25637c11694707aae2f4bab96e142733150447bf992177f4c4d18faa4a349bc9aba8e0490639e04022c89d540be847eb075eb25afd693795c6eead7688e3ae23

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      203KB

                                                      MD5

                                                      920e0e9a9ac86b9dbe092c3b5a26d7c4

                                                      SHA1

                                                      50254e6398472e6038653f4a04c5c7bfde4056f3

                                                      SHA256

                                                      f42f8c5019876a60d7810e2df2d62040af2a3edbef6ae9ddf3f11ee41f9ed3c7

                                                      SHA512

                                                      aad39b8b7e3215c8e4e892047610d177fd7ac140799a24f15cacdecbe080c79ae160b63b5711085c418cc6bdc22f31f022dd7a45fb8ed185b64a3861370eec9b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                      Filesize

                                                      110KB

                                                      MD5

                                                      63562ea17ced4bcbfa59a2d82422f4f5

                                                      SHA1

                                                      ae568f593db3d019ebbd5f109b595f675ad06946

                                                      SHA256

                                                      890d3deeb5955e8b8198cbeeec41d2e4ab1363fddf66f603f98f32a6df4dfce2

                                                      SHA512

                                                      c6925735b779e46010690f68b4ceb797abd68ee783dcedcf0dfbfa8453009b7ddc7fda68df79b428ff2fb0d4ad92e703baf0a71c163a6bec2a3bf50784fa197a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe590bfc.TMP

                                                      Filesize

                                                      97KB

                                                      MD5

                                                      6cecd4ae90660c3a611aaa5d4f24bbc8

                                                      SHA1

                                                      2caf96c94505fde79fe789c50f23f65dea5ac500

                                                      SHA256

                                                      fdf2281f3086b09731e3d5896c9b2dd589379612c363dd3d3183cc32fcffdac8

                                                      SHA512

                                                      3ca9848ce813f0cbe06c9dfbee03c3f0379cf70c3a420a7bf1b6ab890de80d37be1ee546a385db9f7f89a03e1f225efa112540a2b25c9efa9b911c8eff157c9d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                      Filesize

                                                      2B

                                                      MD5

                                                      99914b932bd37a50b983c5e7c90ae93b

                                                      SHA1

                                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                      SHA256

                                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                      SHA512

                                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                    • C:\Users\Admin\Downloads\RedEye.exe

                                                      Filesize

                                                      10.6MB

                                                      MD5

                                                      e9e5596b42f209cc058b55edc2737a80

                                                      SHA1

                                                      f30232697b3f54e58af08421da697262c99ec48b

                                                      SHA256

                                                      9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                      SHA512

                                                      e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                    • C:\Users\Admin\Downloads\RedEye.exe

                                                      Filesize

                                                      10.6MB

                                                      MD5

                                                      e9e5596b42f209cc058b55edc2737a80

                                                      SHA1

                                                      f30232697b3f54e58af08421da697262c99ec48b

                                                      SHA256

                                                      9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                      SHA512

                                                      e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                    • C:\Users\Admin\Downloads\RedEye.exe

                                                      Filesize

                                                      10.6MB

                                                      MD5

                                                      e9e5596b42f209cc058b55edc2737a80

                                                      SHA1

                                                      f30232697b3f54e58af08421da697262c99ec48b

                                                      SHA256

                                                      9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                      SHA512

                                                      e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                    • C:\Users\Admin\Downloads\Unconfirmed 780213.crdownload

                                                      Filesize

                                                      10.6MB

                                                      MD5

                                                      e9e5596b42f209cc058b55edc2737a80

                                                      SHA1

                                                      f30232697b3f54e58af08421da697262c99ec48b

                                                      SHA256

                                                      9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                      SHA512

                                                      e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                    • memory/2888-450-0x0000019E61C30000-0x0000019E61C40000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2888-461-0x0000019E61C30000-0x0000019E61C40000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2888-436-0x00007FFDAAB50000-0x00007FFDAB611000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2888-477-0x00007FFDAAB50000-0x00007FFDAB611000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2888-449-0x0000019E602C0000-0x0000019E602C6000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/2888-487-0x0000019E61C30000-0x0000019E61C40000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2888-488-0x0000019E61C30000-0x0000019E61C40000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2888-448-0x0000019E7A370000-0x0000019E7B386000-memory.dmp

                                                      Filesize

                                                      16.1MB

                                                    • memory/2888-523-0x00007FFDAAB50000-0x00007FFDAB611000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2888-435-0x0000019E5F2F0000-0x0000019E5FD8C000-memory.dmp

                                                      Filesize

                                                      10.6MB

                                                    • memory/3532-499-0x00007FFDAAB50000-0x00007FFDAB611000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3532-500-0x0000021974260000-0x0000021974270000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/3532-502-0x00007FFDAAB50000-0x00007FFDAB611000-memory.dmp

                                                      Filesize

                                                      10.8MB