Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/04/2024, 20:02

240418-yr4gfsef9v 10

18/04/2024, 19:59

240418-yqw1zsef5z 10

23/03/2024, 00:07

240323-aearlsag84 10

20/03/2024, 19:20

240320-x17psshe51 10

20/03/2024, 19:18

240320-xz2gdshe3t 10

19/03/2024, 21:09

240319-zzr9tsgd4t 10

Analysis

  • max time kernel
    81s
  • max time network
    88s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240319-en
  • resource tags

    arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/03/2024, 19:18

General

  • Target

    GH0ST.exe

  • Size

    127KB

  • MD5

    90b828929de1319e5b9bf94f4ae990b3

  • SHA1

    8fc41267cfb9f057e78beca15b775d20fb01434b

  • SHA256

    14592b6ee58e6c1abe76e8148f087b1da84f54892b1cca31540dd728298bb185

  • SHA512

    57e50e8c3e424980bfb96d4d1862e998efd50e45df25478fc80537a67a27b8d7aa8cce00400e0126216395205946a38876a2ff494b74d86043c5e5779a4b5921

  • SSDEEP

    3072:oDk4Rq96liXWAPEV9Ue4znvqg2WVrxuF:h4Rq9UCW7WhZx

Malware Config

Extracted

Path

C:\Users\Default\read_it.txt

Ransom Note
Don't worry, you can return all your files! All your files like documents, photos, databases and other important are encrypted What guarantees do we give to you? You can send 3 of your encrypted files and we decrypt it for free. You must follow these steps To decrypt your files : 1) Write on our e-mail :[email protected] ( In case of no answer in 24 hours check your spam folder or write us to this e-mail: [email protected]) 2) Obtain Bitcoin (You have to pay for decryption in Bitcoins. After payment we will send you the tool that will decrypt all your files.)

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\GH0ST.exe
    "C:\Users\Admin\AppData\Local\Temp\GH0ST.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:4236
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2332
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4844
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3728
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4632
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:908
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1764
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1072
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1420
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:4772
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3256
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\Desktop\StopPop.shtml
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffab7e59758,0x7ffab7e59768,0x7ffab7e59778
        2⤵
          PID:872
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:2
          2⤵
            PID:4436
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:8
            2⤵
              PID:4960
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:8
              2⤵
                PID:2012
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:1
                2⤵
                  PID:3360
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:1
                  2⤵
                    PID:1756
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=1568 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:1
                    2⤵
                      PID:5428
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4920 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:1
                      2⤵
                        PID:5496
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:8
                        2⤵
                          PID:5612
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5460 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:8
                          2⤵
                            PID:5704
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:8
                            2⤵
                              PID:5856
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4740 --field-trial-handle=1836,i,14399507835668924802,16933028587566286936,131072 /prefetch:1
                              2⤵
                                PID:5968
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:5200
                              • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                1⤵
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:3528

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                Filesize

                                196KB

                                MD5

                                813c1b41e435242e7365a4bcd7adcf23

                                SHA1

                                2d25e1564eaf93455640413b95646b3f88f9075b

                                SHA256

                                70cb2151ee4ef83195855d29819491a23c5eafee2e72b7ffd9041b35363d1542

                                SHA512

                                268c4fa1797700a205e37e716c1472592ad6242344645c703ab1ab8d4d68452c3ccce7cdc4d56a0b42d4061bdc793f1c79dffc397f038133387b94b2a1f4051e

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                168B

                                MD5

                                94f80c07e542c0df1ac099461e126a99

                                SHA1

                                44ccfb59f1a5e94a5ee073dffd77ac871372d04b

                                SHA256

                                335433c17988bd0214c9f22f3f553f8878b80de3551745a5dcf4a94aa8399a29

                                SHA512

                                774d65b87ddcfdd1f1f2e9477038ec33144887f65758803775527cd59b8329d05a0698f4eed8a2f2aa5528045bb05a1a8059b257f262a604c5cd0f013e40881b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                31e71f693095cd7c14230ba54740f903

                                SHA1

                                aee1c34f60df941ccebffc255251f4a4c0fabb7c

                                SHA256

                                98bee686c9198f956acc81eb1bdfed907bd731f52f0da13f267dc3fd3767e72f

                                SHA512

                                00f54165192a54ab123a74a66e2b52f34746bfd18eacb3a28380912a883a2db4d74f29667aaa2d0d6981827ae9a60089fe1a383e9e0e744d7f2063e4727c88d8

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                2068714d37757064f68676cb12b386f4

                                SHA1

                                98e7fa9167402e2d72ae64158b70b4f37125ed69

                                SHA256

                                25be659930b80513ea2caec674dd83f340391abb1d79f298edcc979a478f10c1

                                SHA512

                                3dc364fcd17460a27e3157f990a239f392f9761c8e11de97ab19f9d091d9f6aa783cde7c65a6df40880fc46d38f4db3120de36bb0265f7e5742ba998e926cc7d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                afc80ea66657412d565bcca788a44719

                                SHA1

                                60e44f5169e3b7f9d175d93e289088b2329ebe3a

                                SHA256

                                f7e605eb6d004d28c7fbaf2c34e7ff4719890386d8517768a3f5d32c2016c53f

                                SHA512

                                55c5e724641eb14e2e95e0f80bef15aaeef9882f16abd44a085c57b1eb5914e107e15c99a6ee63e260370c1223cfc375b3c7199baeb8123ef9a8d59ada2bedc1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                c72d70950bf44e1c707e5facf319abeb

                                SHA1

                                2409aab561311d4c877c2e44c4b78507c88a891b

                                SHA256

                                62fee2402542eb52415e5b944796b00f898be381c5d2a2ba9bcfc960a67b9557

                                SHA512

                                158ca02080b8de35f19ca557832b03723dfa0948ce0da53f55f54f8b665b9f47871708e9eb8edb0a9dac0287578aade7c1446bef59d82732509d05282743b20b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                8a0ea81ceb6c95733da6ffef70226f4b

                                SHA1

                                070499c8e9138c26701344e8d54b08037dec80a5

                                SHA256

                                65cc91eea7b715b540aac3acb83f54f0bd681a4d66eb953a8a28aa6c959b66bc

                                SHA512

                                6f9c18d8911a70c8cd867ee33cc967ccd82b4c879bb1ffc05a68524d34ccc3afcae43b2ba5894656b330f1dc16951f7eb3d11a0b86f57d15bda04ad1e3633210

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                213957e702dc6983876aa38d572028b1

                                SHA1

                                eedce40043e775832d3c5a8483fb06e85e41d957

                                SHA256

                                7adeb9287a8271ef4775aa14e5f4a8676e26a8ed664bfc7269788fb6e28a7bac

                                SHA512

                                d67fd900fd5e3bd31ad595419483086942acf4b6f3e669cbc6a72708e9fbb5b6c7478ae254aa8f4b0dc5f319dd267e3357357d51046e70c9be5249b296b9350d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                51236c97b4548e4eaae1121c1e18ae7c

                                SHA1

                                beeaf00e8cf90140a1d08ecbb875aa42ccc8c1a1

                                SHA256

                                a0e0b155caeae38ec4b1e68886468e280dd350a3cd711926ee553ae65be43393

                                SHA512

                                57196e9f00161e028512213812cf23e7485062cbda0f5c72a5d0af93bf0511426c1ef20426a4d143e6ad50d48af3f7af47909a0037225d445a96ef39ae75133b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                15KB

                                MD5

                                2c18e5d3a0e36f320372c58bb2e435f6

                                SHA1

                                168a9056b4b780fb0281901de3903ab51c3b5d83

                                SHA256

                                ba3bd4f050d019ff385f3fe50dbb767a1c85038c4c8a881bf85754b865d9f9ef

                                SHA512

                                9e2664cc9222a435150c064bf2e19e2b31d7c896edc4b5cdb87a0e3bd76b994700c962a6d1bc72750449b46d06b04594503a9f895faba2b1aafd070f457cb483

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                264KB

                                MD5

                                fc1327d97600db3ba4549ae4a3d1ea01

                                SHA1

                                1f95012f08c403bf9481a2a51ff8e5da54f6d862

                                SHA256

                                bddeb68051090ab0e9fd175e77409cc36e7ae87a36dcf2a58a9eaf6f67890cc6

                                SHA512

                                24a9d22f81a9c69fa3778061769b4c01515fb559d99209c9d381f5aacabc36de5d92676612f877e1fca9f7581914c2296b6726709ddabb6ded4e89bd30ee2ebf

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                264KB

                                MD5

                                c72969da0ef3a25947fbbdd33f86b552

                                SHA1

                                02b839e74c7fa469680479c16775c16105921a31

                                SHA256

                                566414c976a17679c3bb44465a66f60cd270f7b8f3e4afb09b44cd47be85aa7f

                                SHA512

                                e0ec8cec31eff876d937a52a465483fcd5f428280f8ca24433b0986fedfdb1a9ad879e495f86157564983a6305d7d6538ee65dd8bb7f69c1cc9eb09186feae57

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                Filesize

                                264KB

                                MD5

                                a85d67f8741773fe4e60be408b95773e

                                SHA1

                                92006298a8179768c44d325aa976a9144d82fb0c

                                SHA256

                                1111bab7a9a210bec41c02e3c572aa337bb9489d539d25aa151243a88fd0cab0

                                SHA512

                                bee6137854afbd724e1549ce5fa7b11dcd1d938eb7d7785fa5322acd8aca192c9347ce0ac4fee688bddff2322b27f62e9a3ba6db30b7ea52734613639c3902bd

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\GH0ST.exe.log

                                Filesize

                                1KB

                                MD5

                                b4e91d2e5f40d5e2586a86cf3bb4df24

                                SHA1

                                31920b3a41aa4400d4a0230a7622848789b38672

                                SHA256

                                5d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210

                                SHA512

                                968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319

                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                Filesize

                                9KB

                                MD5

                                19ecf26011f1fd065f7be686ec3a9bce

                                SHA1

                                9d55618fa2ef1c68714ebca0e84df4d30feb8d46

                                SHA256

                                47bb978bc771c9f5e70aeed42f2dd56ca26285bd9b93a5985cdd277712d14155

                                SHA512

                                50ac9df37c7f8e6116f788690dbc50e7ba114aab98e5cac86385fe1e61009c7a238337e2d1d2599bd1a2dd73ea0e30f7aa1a82ef724aaa73bc817b7e1d1bb130

                              • C:\Users\Admin\AppData\Roaming\svchost.exe

                                Filesize

                                127KB

                                MD5

                                90b828929de1319e5b9bf94f4ae990b3

                                SHA1

                                8fc41267cfb9f057e78beca15b775d20fb01434b

                                SHA256

                                14592b6ee58e6c1abe76e8148f087b1da84f54892b1cca31540dd728298bb185

                                SHA512

                                57e50e8c3e424980bfb96d4d1862e998efd50e45df25478fc80537a67a27b8d7aa8cce00400e0126216395205946a38876a2ff494b74d86043c5e5779a4b5921

                              • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools.lnk

                                Filesize

                                1B

                                MD5

                                d1457b72c3fb323a2671125aef3eab5d

                                SHA1

                                5bab61eb53176449e25c2c82f172b82cb13ffb9d

                                SHA256

                                8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

                                SHA512

                                ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

                              • C:\Users\Default\read_it.txt

                                Filesize

                                582B

                                MD5

                                ed5cc52876db869de48a4783069c2a5e

                                SHA1

                                a9d51ceaeff715ace430f9462ab2ee4e7f33e70e

                                SHA256

                                45726f2f29967ef016f8d556fb6468a577307d67388cc4530295a9ca10fdfa36

                                SHA512

                                1745aefb9b4db4cdd7c08ee3a7d133db08f35a336fd18b598211519b481ef25ac84a3e8a3da3db06caef9f531288d1cf0ca8d4b2560637945e7953e8b45421f5

                              • memory/3996-16-0x00007FFABC6A0000-0x00007FFABD162000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3996-1126-0x00007FFABC6A0000-0x00007FFABD162000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4312-15-0x00007FFABC6A0000-0x00007FFABD162000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4312-2-0x000000001B210000-0x000000001B220000-memory.dmp

                                Filesize

                                64KB

                              • memory/4312-1-0x00007FFABC6A0000-0x00007FFABD162000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4312-0-0x0000000000490000-0x00000000004B6000-memory.dmp

                                Filesize

                                152KB