Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/05/2024, 11:39

240505-nr9clagh2z 10

05/05/2024, 11:37

240505-nq6kbacb39 10

Analysis

  • max time kernel
    84s
  • max time network
    83s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 11:37

General

  • Target

    http://google.com

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 47 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://google.com
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb5e3cc40,0x7ffbb5e3cc4c,0x7ffbb5e3cc58
      2⤵
        PID:4528
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1880,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1876 /prefetch:2
        2⤵
          PID:4664
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2152 /prefetch:3
          2⤵
            PID:1672
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2384 /prefetch:8
            2⤵
              PID:4728
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3096 /prefetch:1
              2⤵
                PID:464
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3272 /prefetch:1
                2⤵
                  PID:3900
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3676 /prefetch:1
                  2⤵
                    PID:1560
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4348,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4776 /prefetch:8
                    2⤵
                      PID:5040
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4948,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4836 /prefetch:1
                      2⤵
                        PID:3736
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3328,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5112 /prefetch:1
                        2⤵
                          PID:1908
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5456,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5480 /prefetch:8
                          2⤵
                            PID:4960
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5452,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5616 /prefetch:8
                            2⤵
                              PID:1088
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5284,i,8148541678753816153,9023425877832633477,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5296 /prefetch:8
                              2⤵
                                PID:4796
                              • C:\Users\Admin\Downloads\HorrorTrojan Ultimate Edition.exe
                                "C:\Users\Admin\Downloads\HorrorTrojan Ultimate Edition.exe"
                                2⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:4200
                                • C:\Windows\system32\wscript.exe
                                  "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\E213.tmp\E214.tmp\E215.vbs //Nologo
                                  3⤵
                                  • Checks computer location settings
                                  PID:3856
                                  • C:\Users\Admin\AppData\Local\Temp\E213.tmp\mbr.exe
                                    "C:\Users\Admin\AppData\Local\Temp\E213.tmp\mbr.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • Writes to the Master Boot Record (MBR)
                                    PID:2388
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E213.tmp\tools.cmd" "
                                    4⤵
                                    • Drops file in Windows directory
                                    PID:3892
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\bg.bmp /f
                                      5⤵
                                      • Sets desktop wallpaper using registry
                                      PID:2956
                                    • C:\Windows\system32\rundll32.exe
                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                      5⤵
                                        PID:2872
                                      • C:\Windows\system32\rundll32.exe
                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                        5⤵
                                          PID:688
                                        • C:\Windows\system32\rundll32.exe
                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                          5⤵
                                            PID:4860
                                          • C:\Windows\system32\rundll32.exe
                                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                            5⤵
                                              PID:1760
                                            • C:\Windows\system32\rundll32.exe
                                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                              5⤵
                                                PID:3592
                                              • C:\Windows\system32\rundll32.exe
                                                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                5⤵
                                                  PID:2528
                                                • C:\Windows\system32\rundll32.exe
                                                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                  5⤵
                                                    PID:840
                                                  • C:\Windows\system32\rundll32.exe
                                                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                    5⤵
                                                      PID:5080
                                                    • C:\Windows\system32\rundll32.exe
                                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                      5⤵
                                                        PID:4328
                                                      • C:\Windows\system32\rundll32.exe
                                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                        5⤵
                                                          PID:1160
                                                        • C:\Windows\system32\rundll32.exe
                                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                          5⤵
                                                            PID:4020
                                                          • C:\Windows\system32\rundll32.exe
                                                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                            5⤵
                                                              PID:4424
                                                            • C:\Windows\system32\rundll32.exe
                                                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                              5⤵
                                                                PID:2696
                                                              • C:\Windows\system32\rundll32.exe
                                                                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                5⤵
                                                                  PID:2196
                                                                • C:\Windows\system32\rundll32.exe
                                                                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                  5⤵
                                                                    PID:1276
                                                                  • C:\Windows\system32\rundll32.exe
                                                                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                    5⤵
                                                                      PID:1920
                                                                    • C:\Windows\system32\rundll32.exe
                                                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                      5⤵
                                                                        PID:2956
                                                                      • C:\Windows\system32\rundll32.exe
                                                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                        5⤵
                                                                          PID:3168
                                                                        • C:\Windows\system32\rundll32.exe
                                                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                          5⤵
                                                                            PID:2872
                                                                          • C:\Windows\system32\rundll32.exe
                                                                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                            5⤵
                                                                              PID:1380
                                                                            • C:\Windows\system32\rundll32.exe
                                                                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                              5⤵
                                                                                PID:3276
                                                                              • C:\Windows\system32\rundll32.exe
                                                                                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                5⤵
                                                                                  PID:4316
                                                                                • C:\Windows\system32\rundll32.exe
                                                                                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                  5⤵
                                                                                    PID:4572
                                                                                  • C:\Windows\system32\rundll32.exe
                                                                                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                    5⤵
                                                                                      PID:1760
                                                                                    • C:\Windows\system32\rundll32.exe
                                                                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                      5⤵
                                                                                        PID:408
                                                                                      • C:\Windows\system32\rundll32.exe
                                                                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                        5⤵
                                                                                          PID:3868
                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                          5⤵
                                                                                            PID:4416
                                                                                          • C:\Windows\system32\rundll32.exe
                                                                                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                            5⤵
                                                                                              PID:3156
                                                                                            • C:\Windows\system32\rundll32.exe
                                                                                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                              5⤵
                                                                                                PID:2904
                                                                                              • C:\Windows\system32\rundll32.exe
                                                                                                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                                5⤵
                                                                                                  PID:4820
                                                                                                • C:\Windows\system32\rundll32.exe
                                                                                                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                                  5⤵
                                                                                                    PID:116
                                                                                                  • C:\Windows\system32\rundll32.exe
                                                                                                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                                    5⤵
                                                                                                      PID:4204
                                                                                                    • C:\Windows\system32\rundll32.exe
                                                                                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                                      5⤵
                                                                                                        PID:1276
                                                                                                      • C:\Windows\system32\rundll32.exe
                                                                                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                                        5⤵
                                                                                                          PID:1164
                                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                                                          5⤵
                                                                                                            PID:4368
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\jeffpopup.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\E213.tmp\jeffpopup.exe"
                                                                                                          4⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:720
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\bobcreep.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\E213.tmp\bobcreep.exe"
                                                                                                          4⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:3812
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\gdifuncs.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\E213.tmp\gdifuncs.exe"
                                                                                                          4⤵
                                                                                                          • Modifies WinLogon for persistence
                                                                                                          • UAC bypass
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies Control Panel
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • System policy modification
                                                                                                          PID:2340
                                                                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                                                                    1⤵
                                                                                                      PID:3052
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                      1⤵
                                                                                                        PID:4584
                                                                                                      • C:\Windows\system32\taskmgr.exe
                                                                                                        "C:\Windows\system32\taskmgr.exe" /4
                                                                                                        1⤵
                                                                                                        • Checks SCSI registry key(s)
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                        PID:3280
                                                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                                                        C:\Windows\system32\AUDIODG.EXE 0x508 0x4a8
                                                                                                        1⤵
                                                                                                          PID:1724

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                          Filesize

                                                                                                          649B

                                                                                                          MD5

                                                                                                          662118f6c22ef98b51a5dc51381f02ea

                                                                                                          SHA1

                                                                                                          85c6d32c030d0f91ab338e35a807ee0c1801bdfd

                                                                                                          SHA256

                                                                                                          4d91a5f40001c3eba268b1f1f93ded33db8f9d8d11e52737966eab24d51d05bc

                                                                                                          SHA512

                                                                                                          b4b4ecb427ffe514e033ae0deacb407e1ffcee312bb81bd2aa48e07573f282155da93a8b148ba2ce61d32ee3c72849b4ece806731d5e371c5708dfeaa81b77f8

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                          Filesize

                                                                                                          3KB

                                                                                                          MD5

                                                                                                          df0936adb86b2aa26778fd3a822fa8f4

                                                                                                          SHA1

                                                                                                          09dcd36f84ec43c124b4fe618457bc23d58cf8f3

                                                                                                          SHA256

                                                                                                          fac7b0c186e2f5cc033199f137d02c766ada0bad1b6e6f33755dae5d4ad9c9d2

                                                                                                          SHA512

                                                                                                          c560bca67921ef42dbf73fa05047a6f2f4ac756967208088c5b5de62078670c3a8260aa5dc8683c29d0cdccff55a689a4dfb757aebf382098e5ebc896fac8be8

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                          Filesize

                                                                                                          7KB

                                                                                                          MD5

                                                                                                          ed0b377656f3b4bf2c27efe9712b4b41

                                                                                                          SHA1

                                                                                                          3b81db73f1e7a83069aba7d2718652a0469cb701

                                                                                                          SHA256

                                                                                                          8e065421ea6c5a5ba9f66d19dec167c13366078e72c38ca47ef131cde866cad4

                                                                                                          SHA512

                                                                                                          5995238164a0712c5773133b56da1325876d1ca560481dfaab3af1b4358848ca5d66b2ab37d850a39e8b42692c4660d602d9e1f9f86e26f26259dec03489d275

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                          Filesize

                                                                                                          2B

                                                                                                          MD5

                                                                                                          d751713988987e9331980363e24189ce

                                                                                                          SHA1

                                                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                          SHA256

                                                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                          SHA512

                                                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          a41b22c7f61a700e533a35cba7372051

                                                                                                          SHA1

                                                                                                          72d74138ff3b878d5158f3aaa4a407f3c6e262ea

                                                                                                          SHA256

                                                                                                          4d434dbb9e62fe8ce53dace3cb33ed940b1c375512c845f3af0ae929639ecb1a

                                                                                                          SHA512

                                                                                                          f068b2c1fb2d4e42890dea2821b20d3f73e39cc46cf3086344f80f4bf73fb549a8c6c36f00ab9c8dcda6d1fc74af34ef8d0e28a4b3d32c1493c11c6907082d09

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          ed522e3f69ffc6c095581a32b425b8e1

                                                                                                          SHA1

                                                                                                          9a8bca8e8083a26166fd65958efc99f72228d168

                                                                                                          SHA256

                                                                                                          f66d051c4e341e11c9bf6314380f3a137d84897c09e14f5d11fdedc4361d017d

                                                                                                          SHA512

                                                                                                          97128a6475aa7e4a6e703201a326f4ef41e014d2553520d43b5c1198cf678071c84783a36a64319c419112e511d73740f581d60e324e82c54ec0ac61540e9667

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          727a878d87445651abf46137b884df76

                                                                                                          SHA1

                                                                                                          b9c4006079646eb702e85386cee8994809049de7

                                                                                                          SHA256

                                                                                                          294189b6973512408274ef4af232b4677d1230285800773ee1ee6e68560463e4

                                                                                                          SHA512

                                                                                                          6c56eaf3ad401a49152dc3cbd0abfd480c8929d57368070847fba407ed9dbaaf77c1ac02b795daa41a346c81657bed5f4d657fcc3a9fc527eefa5ac1e2f48465

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                          Filesize

                                                                                                          524B

                                                                                                          MD5

                                                                                                          eb0eae4fc80cfaf600806191d85d3b20

                                                                                                          SHA1

                                                                                                          823f820b42dcb321b78c2379c884a7e8288da53a

                                                                                                          SHA256

                                                                                                          fbb0f2c6d743c9e4f70918efb6945678cf43f7fb4a3c097aacd1ebc6c5deb267

                                                                                                          SHA512

                                                                                                          869dfce0a81008fe0d93af9dca11524a4cc1499c42ef333ef777f991454e25cf65fd6f1209fb0dfe2a6e44184cf3040b36e8678bd838431fe112d17c6ede1bbd

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          9KB

                                                                                                          MD5

                                                                                                          d13917d90eb398bf3c0085bb7e679df4

                                                                                                          SHA1

                                                                                                          f3cda6634add67fed2d7c477df3bd1e90343797d

                                                                                                          SHA256

                                                                                                          5edf30ca08c0c2837a4385562e18a8d1cd825b5e3e9ccb8307497fe6cc918b0b

                                                                                                          SHA512

                                                                                                          173bc1c477910de7b108513f1647ecbb782e0f0bc5f399fb3d8b2c745e096e52157441b0482bd36aa6d5aa6c8731f603401a2c120e164df603b1d5b48c3d18fe

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          83e5599e92e9e5225c0177c852d0317c

                                                                                                          SHA1

                                                                                                          9806f8a6f52771444e4cd0e09cef9f58851835ca

                                                                                                          SHA256

                                                                                                          d6daa538ee5034774702241f9a876dee4fd0d3c9bd98900db800fb58ed8465f1

                                                                                                          SHA512

                                                                                                          156ae38c9132e534d467e61ae74881418021a661374cb13bed3ed84d26c70e38700a319193a13466a5b25418bd8fd09760a996762040fa98c1cf5f89bea7c005

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          ea3532c58ba1dac77727a302c2c34086

                                                                                                          SHA1

                                                                                                          d6c08a02912fdf38e862fae21024f9ae4331fe4c

                                                                                                          SHA256

                                                                                                          b5b9b3f365bfb3388a5860b7feefd3dd5a8657f6fb3810e22abee348a3e9b581

                                                                                                          SHA512

                                                                                                          2a3665359c4be4a06ea1fa1675eacc03b287955b01491101ec4905be9a9a5fc71770a2d7b624844ae17ea780b7167a0cbdc69b33864f0c0e73704a5468d94146

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          74938a363ebecd89be98f49ff968c3ba

                                                                                                          SHA1

                                                                                                          2e6e86e7c4bb15a78abbed6fcad79f52da866757

                                                                                                          SHA256

                                                                                                          c650d040ba436feee7a939e36adc64b629925d992487b883f9fe7484d146b039

                                                                                                          SHA512

                                                                                                          cf436a18102b3ed0500d1a4ac2aa8b4440022be7992d187ac774692778a33a3cc3fe7d63b203d41418a8d80871ea7737f24b24426c3594323e0015e7b9043178

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          10KB

                                                                                                          MD5

                                                                                                          df657e8cf3dd83eb817e09c2e4faf475

                                                                                                          SHA1

                                                                                                          0cd8f77c4eecfc029b95c031466213304437169b

                                                                                                          SHA256

                                                                                                          74d9fd44a56882ca1cdfe9f58245be12b1afd3366daadc9df31bba4ee04c200b

                                                                                                          SHA512

                                                                                                          ec34ec09df8de29eee314a8b1d1a9670fd57973bc90e31239089870c4e2738c84d7a2106a84b5d4ed182b9af7750113349feca48739db1255f555ba557e0d86e

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          9KB

                                                                                                          MD5

                                                                                                          b24e7f1326c5ef158aa05a37a901a7b0

                                                                                                          SHA1

                                                                                                          b6c7d65ec90dd61c54869aff381ca4a4f6daab6e

                                                                                                          SHA256

                                                                                                          ded363bcfb7b24a53e8946070fa68b92a77bf015beaef06df8f569ed348f4266

                                                                                                          SHA512

                                                                                                          8dbb7e68dbff4b61c0ca246ad61d31993540c4686c6f7a2f6c344a0447b948812f4bf4212c677ec49f3d0bb9b273239bb2e4333ff379689bf8c37283cef40f2e

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt

                                                                                                          Filesize

                                                                                                          140B

                                                                                                          MD5

                                                                                                          8059084560ee91f495a775de527df7d3

                                                                                                          SHA1

                                                                                                          5ba01c8af5c9d86577d63bd42ac74581ef4707f6

                                                                                                          SHA256

                                                                                                          2ba60434cf19e37275621d1d94cce909316c93e47c78991d735fbc93a130f42c

                                                                                                          SHA512

                                                                                                          a638c88f60c927e8652c869bb9b31c56ba73f6c865522de61149fced6577fde9ceaf87cf4656b68205536cf6701693994ef6eddfaabcf02b5b3486b870585b3c

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt

                                                                                                          Filesize

                                                                                                          76B

                                                                                                          MD5

                                                                                                          a7a2f6dbe4e14a9267f786d0d5e06097

                                                                                                          SHA1

                                                                                                          5513aebb0bda58551acacbfc338d903316851a7b

                                                                                                          SHA256

                                                                                                          dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc

                                                                                                          SHA512

                                                                                                          aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe576b5c.TMP

                                                                                                          Filesize

                                                                                                          140B

                                                                                                          MD5

                                                                                                          a01fe8a1ba01f75d7f57dfb5a0196ef5

                                                                                                          SHA1

                                                                                                          ae63031dbd9c47a14a676205e9341c9f9e6db6f9

                                                                                                          SHA256

                                                                                                          e0ec13f3bbab8469e9a1fb77ee9cf26e9ed369471b0000acfde618e6742b1361

                                                                                                          SHA512

                                                                                                          d1ecc64214287cd471dfdc4e71f704b6257b273113c82aea574ab0bc4a764d35af85d57d3b03744c2b09e22b9ce33e39338327ad706480e6fece2b594ec36fd8

                                                                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                          Filesize

                                                                                                          77KB

                                                                                                          MD5

                                                                                                          0090bb908a27e6649a906dc8807a05f2

                                                                                                          SHA1

                                                                                                          64345b181fced2c38793f19437d7537db050769d

                                                                                                          SHA256

                                                                                                          dd1d3b4ae714ace39b9cb1ce355dc18283285e8d60aab3df6df4928c188f4fc5

                                                                                                          SHA512

                                                                                                          c2ed574f0eef16fb90cec0543c69667d70df6d5dc7ff94b6c21e94de54bbeec18078c429f57e6fb7e841cc22ece11f5468cc75b5f2074e958b3f00031a9ced2b

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\E214.tmp\E215.vbs

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          a0679dce64fcf875f4208b823d4b85c0

                                                                                                          SHA1

                                                                                                          85abe3673db82bfe5b2c207dc98648e32afffea0

                                                                                                          SHA256

                                                                                                          85a07013575a6a890c7b1d26adaa52f17616c4cca673617aa1fc0992aa29dda1

                                                                                                          SHA512

                                                                                                          1e2740a09acc5b0d679acfd740feb3556638f1b6029078668bbb7e067b356fcecf23c5b317b02888822cc180c0eb5cb7e2caf63d92a74515ebc5a1031d80f3a6

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\bg.bmp

                                                                                                          Filesize

                                                                                                          6.6MB

                                                                                                          MD5

                                                                                                          a605dbeda4f89c1569dd46221c5e85b5

                                                                                                          SHA1

                                                                                                          5f28ce1e1788a083552b9ac760e57d278467a1f9

                                                                                                          SHA256

                                                                                                          77897f44096311ddb6d569c2a595eca3967c645f24c274318a51e5346816eb8e

                                                                                                          SHA512

                                                                                                          e4afa652f0133d51480f1d249c828600d02f024aa2cccfb58a0830a9d0c6ee56906736e6d87554ed25c4e69252536cb7379b60b2867b647966269c965b538610

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\bobcreep.exe

                                                                                                          Filesize

                                                                                                          92KB

                                                                                                          MD5

                                                                                                          219cd85d93a4ed65a481f353a3de5376

                                                                                                          SHA1

                                                                                                          a38ab77caf5417765d5595b2fcd859c6354bf079

                                                                                                          SHA256

                                                                                                          00c9fdc8b877c7fb8365709155ab28cb3dac282ae7ec9fc9d47a78b408e0d13f

                                                                                                          SHA512

                                                                                                          367644e3bc3310207b5863b09688269c38a55540b8c87e71d66771c954d37d561ed09f3ee11b36c4c8f4a48b618b2e8debae3d93ff684d15305f93a3ade6b3d9

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\gdifuncs.exe

                                                                                                          Filesize

                                                                                                          5.0MB

                                                                                                          MD5

                                                                                                          c47c6a5111193af2c9337634b773d2d3

                                                                                                          SHA1

                                                                                                          036604921b67bbad60c7823482e5e6cb268ded14

                                                                                                          SHA256

                                                                                                          7c4f20624dd062a6c71d845d05c6328d5a903ca96398e2902506591b231ed585

                                                                                                          SHA512

                                                                                                          56698b7b2edc0f94d0f7172c853cbe67ac682d132df768659ebca0c169091acb36ffd0a6874c26e2fb35117061c91c9eca4312532ba778312e3d63cc77ce1262

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\jeffpopup.exe

                                                                                                          Filesize

                                                                                                          780KB

                                                                                                          MD5

                                                                                                          4151b988c9d5c550ccb6c3b49bf551d4

                                                                                                          SHA1

                                                                                                          10ff979be4a5bbacaf208bdbb8236b940208eed1

                                                                                                          SHA256

                                                                                                          5ec45cc1a109f556d0cd44ba48d3bf11af556ee66dd8b78c94d3ef0e93735e8e

                                                                                                          SHA512

                                                                                                          c73947b534741c29340550066cd1a6b7cbb4387f3be8303f2d1d0cb21c6f430e0415c27daabc82d32570f421934db78dc840403de18aef09d5a4f0cbe4350e4d

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\mainbgtheme.wav

                                                                                                          Filesize

                                                                                                          19.0MB

                                                                                                          MD5

                                                                                                          1b185a156cfc1ddeff939bf62672516b

                                                                                                          SHA1

                                                                                                          fd8b803400036f42c8d20ae491e2f1f040a1aed5

                                                                                                          SHA256

                                                                                                          e147a3c7a333cbc90e1bf9c08955d191ce83f33542297121635c1d79ecfdfa36

                                                                                                          SHA512

                                                                                                          41b33930e3efe628dae39083ef616baaf6ceb46056a94ab21b4b67eec490b0442a4211eaab79fce1f75f40ecdc853d269c82b5c5389081102f11e0f2f6503ae7

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\mbr.exe

                                                                                                          Filesize

                                                                                                          1.3MB

                                                                                                          MD5

                                                                                                          74be3afd732dc010c8266326cc32127b

                                                                                                          SHA1

                                                                                                          a91802c200f10c09ff9a0679c274bbe55ecb7b41

                                                                                                          SHA256

                                                                                                          03fe34795ad0f91fc8eb8c9ebe8094541e4fb4d7095095f8b48f345c2a6d0f0c

                                                                                                          SHA512

                                                                                                          68fa03d640680e37614feccb56f4d41180724cb7c08ba25f9bea3830a44c03d635664d8e0255ab2d05d3613498f4a4dd4398b7971a2cb1c9ae3be93f944946e5

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\E213.tmp\tools.cmd

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          288bebe9f904e6fabe4de67bd7897445

                                                                                                          SHA1

                                                                                                          0587ce2d936600a9eb142c6197fe12a0c3e8472f

                                                                                                          SHA256

                                                                                                          cf965fcc5a7ca4d9245c706c88b4d5013fb84be27b0ec262facccfadf14bdca2

                                                                                                          SHA512

                                                                                                          7db8e7c1318bcab7cef2c02484a82f347a630443a644b546a5cc339a5a848d1a3e915255f9c357de6ee26817a55d1091d80e2a8e97f66afa5686b3d11ee56c3c

                                                                                                        • C:\Users\Admin\Desktop\YOUDIED 5.txt

                                                                                                          Filesize

                                                                                                          74B

                                                                                                          MD5

                                                                                                          05d30a59150a996af1258cdc6f388684

                                                                                                          SHA1

                                                                                                          c773b24888976c889284365dd0b584f003141f38

                                                                                                          SHA256

                                                                                                          c5e98b515636d1d7b2cd13326b70968b322469dbbe8c76fc7a84e236c1b579c9

                                                                                                          SHA512

                                                                                                          2144cd74536bc663d6031d7c718db64fd246346750304a8ceef5b58cd135d6ea061c43c9150334ee292c7367ff4991b118080152b8ebc9c5630b6c5186872a3a

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 631649.crdownload

                                                                                                          Filesize

                                                                                                          15.0MB

                                                                                                          MD5

                                                                                                          8f5a2b3154aba26acf5440fd3034326c

                                                                                                          SHA1

                                                                                                          b4d508ee783dc1f1a2cf9147cc1e5729470e773b

                                                                                                          SHA256

                                                                                                          fc7e799742a1c64361a8a9c3fecdf44f9db85f0bf57f4fb5712519d12ba4c5ac

                                                                                                          SHA512

                                                                                                          01c052c71a2f97daf76c91765e3ee6ec46ca7cb67b162c2fc668ef5ee35399622496c95568dedffbaf72524f70f6afcfe90f567fbb653a93d800664b046cd5f2

                                                                                                        • memory/2340-722-0x0000000000960000-0x0000000000E62000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.0MB

                                                                                                        • memory/2340-725-0x00000000062D0000-0x00000000062DA000-memory.dmp

                                                                                                          Filesize

                                                                                                          40KB

                                                                                                        • memory/2340-724-0x0000000005840000-0x00000000058D2000-memory.dmp

                                                                                                          Filesize

                                                                                                          584KB

                                                                                                        • memory/2340-723-0x0000000005D10000-0x00000000062B4000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.6MB

                                                                                                        • memory/2388-674-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                                          Filesize

                                                                                                          864KB

                                                                                                        • memory/3280-707-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-719-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-718-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-717-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-716-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-715-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-714-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-713-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-708-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3280-709-0x00000202E38B0000-0x00000202E38B1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB