Resubmissions

22-05-2024 04:29

240522-e39m3aca78 10

11-05-2024 11:09

240511-m9hrxsge69 10

11-05-2024 10:59

240511-m3ndtsdd2y 1

09-05-2024 13:02

240509-p91nvaag8v 10

04-05-2024 06:42

240504-hgj23ahe67 1

02-05-2024 14:21

240502-rpcsdscg77 10

Analysis

  • max time kernel
    136s
  • max time network
    232s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 04:29

General

  • Target

    https://download.tt2dd.com/

Malware Config

Extracted

Family

redline

Botnet

rajab

C2

45.89.53.206:4663

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://download.tt2dd.com/
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67d9758,0x7fef67d9768,0x7fef67d9778
      2⤵
        PID:3024
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:2
        2⤵
          PID:2736
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:8
          2⤵
            PID:2644
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:8
            2⤵
              PID:2620
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1868 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:1
              2⤵
                PID:2792
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:1
                2⤵
                  PID:2816
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1256 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:2
                  2⤵
                    PID:1616
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3156 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:1
                    2⤵
                      PID:2172
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:8
                      2⤵
                        PID:1800
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2664 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:1
                        2⤵
                          PID:1684
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2716 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:8
                          2⤵
                            PID:2960
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3148 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:8
                            2⤵
                              PID:1992
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1572 --field-trial-handle=1188,i,16311112763856086497,6717407667873126607,131072 /prefetch:8
                              2⤵
                                PID:1900
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2632
                              • C:\Program Files\7-Zip\7zG.exe
                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Manual_installer_Win7-Win11_x86_x64-05182024-278753659075324982\" -spe -an -ai#7zMap5843:188:7zEvent6617
                                1⤵
                                  PID:1576
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x4d0
                                  1⤵
                                    PID:1936
                                  • C:\Users\Admin\Downloads\Manual_installer_Win7-Win11_x86_x64-05182024-278753659075324982\Setup.exe
                                    "C:\Users\Admin\Downloads\Manual_installer_Win7-Win11_x86_x64-05182024-278753659075324982\Setup.exe"
                                    1⤵
                                      PID:2612
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /k copy Inch Inch.cmd & Inch.cmd & exit
                                        2⤵
                                          PID:1772
                                          • C:\Windows\SysWOW64\tasklist.exe
                                            tasklist
                                            3⤵
                                            • Enumerates processes with tasklist
                                            PID:1376
                                          • C:\Windows\SysWOW64\findstr.exe
                                            findstr /I "wrsa.exe opssvc.exe"
                                            3⤵
                                              PID:1928
                                            • C:\Windows\SysWOW64\tasklist.exe
                                              tasklist
                                              3⤵
                                              • Enumerates processes with tasklist
                                              PID:1504
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                                              3⤵
                                                PID:580
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c md 4165174
                                                3⤵
                                                  PID:3048
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  findstr /V "TemplatesJunkFinancialBlocking" Innovation
                                                  3⤵
                                                    PID:2036
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c copy /b Locks + Marble + Irs + Ray 4165174\X
                                                    3⤵
                                                      PID:600
                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\4165174\Infected.pif
                                                      4165174\Infected.pif 4165174\X
                                                      3⤵
                                                        PID:564
                                                      • C:\Windows\SysWOW64\PING.EXE
                                                        ping -n 5 127.0.0.1
                                                        3⤵
                                                        • Runs ping.exe
                                                        PID:2800
                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\4165174\RegAsm.exe
                                                    "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\4165174\RegAsm.exe"
                                                    1⤵
                                                      PID:1184

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp
                                                      Filesize

                                                      16B

                                                      MD5

                                                      aefd77f47fb84fae5ea194496b44c67a

                                                      SHA1

                                                      dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                      SHA256

                                                      4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                      SHA512

                                                      b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                                      Filesize

                                                      986B

                                                      MD5

                                                      f0de987884f1b3df8eae4bd3bb872180

                                                      SHA1

                                                      b50b713351c23c192d0c33430f5cde4856755111

                                                      SHA256

                                                      7ce1706618ed5ff7bc1236b1530e6061ccba9eada53d71862d447f6f13797594

                                                      SHA512

                                                      85f7c4cc5c4fdbd6f92d703c72f55b903a98a21c5d1fdf82971527ed1f5fdb468a57e489e0f9d5b964e435efbf590bbfaccff591e7b59a8181089a1b2d9a8d32

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                      Filesize

                                                      689B

                                                      MD5

                                                      cce456afea1968758d01536a161d1b6e

                                                      SHA1

                                                      2ebd28e089763312411b5419e6b486da55eeb601

                                                      SHA256

                                                      21471caf6e4826482602e0befabd794d43185edf288b0cc205ccc19bfc4b924a

                                                      SHA512

                                                      5111a382f263da808ddfaa1da2cc93587f7b779e6ba2481e8829035e6eaeadf57b1596abcce5deadf2f42f33b1902eb58dc4f9bb8e558a5480ce187ee45aed02

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                      Filesize

                                                      6KB

                                                      MD5

                                                      a1b856d986acf1f5eb6ff53e75261406

                                                      SHA1

                                                      63eb214b48d18afb45aba1358260a63963a3e95e

                                                      SHA256

                                                      6f1c4731c92c6aafe94293d17884258b3137029ae86acb9d7c6e7c650f9b96d1

                                                      SHA512

                                                      e7507b7e04e0924c2477f281ea31e8a6cf79dfc7e24bbffb736982845e88452627c9f5d72e9c83497a178a3c98b2a9ee27c1bf63ec64dc6ddfde93d4c695a24c

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                      Filesize

                                                      6KB

                                                      MD5

                                                      740a1f80c198c5d8ccaa04ddcbe6a0ec

                                                      SHA1

                                                      8bf1c6fd0d0b19c8b048f75c4c2a0d87ffe1e0fd

                                                      SHA256

                                                      6995a8a7c9b6e06514e643fbc217a7aa267562904f292938a684a5520c62544b

                                                      SHA512

                                                      e9375aec9aad4be85602e6ffa77f23ca5e8f4df78b469bd9e775aa9b86412d1c8fc6871d39d0c315c5ac9d82cd5046d5fe332f06a386da5cf6ed0737113eaf2f

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                      Filesize

                                                      6KB

                                                      MD5

                                                      49fce84a69719bfc4b07788b61775413

                                                      SHA1

                                                      df207e79ec9d69fc47e4399561dcbfd714054499

                                                      SHA256

                                                      35f1f1525b6381de6614beac2c8009e3a80c9e2c4f4fe39b0d6f5aa7719e64e9

                                                      SHA512

                                                      41a8f80cc43f69aea6c2eb96503c1664ec0ec935f876ade25ecf6ae55e1abecd93854e3a635a1244fc40a1e5cb742fa9911811f26f0e6a5be828b024b60b61f1

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
                                                      Filesize

                                                      16B

                                                      MD5

                                                      18e723571b00fb1694a3bad6c78e4054

                                                      SHA1

                                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                      SHA256

                                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                      SHA512

                                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b37eac40-423f-4a7a-817f-c146ebe36e86.tmp
                                                      Filesize

                                                      6KB

                                                      MD5

                                                      95cdd7047b8f251b4df098a691f534b0

                                                      SHA1

                                                      f7d5c6b9fae151e732c140375276f5e4dbf658ef

                                                      SHA256

                                                      d04aa07099965446686aa62f7ae1db8a243c967a3f274f26012f1ace70336589

                                                      SHA512

                                                      3aa786a32b5b2d06d085726ca34d8eda08b74ef5221bff7a77e025c72b7b15eb6f056287939899bd2dc7838e3c5e8283600f23941c25ebda28f7445ad8d04c57

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                      Filesize

                                                      129KB

                                                      MD5

                                                      470394e39605e0ba59946d9ad8427696

                                                      SHA1

                                                      0b90f9d7162ce382cee747e14b6bea247f485f43

                                                      SHA256

                                                      cfb4381758371a584bb31f022b37b371b7e1ecbceb1c10cd7f53a9bab93f3225

                                                      SHA512

                                                      e435a660d68e63b5f45deb2027556ed962205156d6781b4ea3e4e364d7879b3646cbb611b5d240b7fc950d4ebf50cadd975a3710ccf88a592766c5626b6ad8e7

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                      Filesize

                                                      129KB

                                                      MD5

                                                      3d8cc9a174cefa2fe79cbb73d0618460

                                                      SHA1

                                                      99ea10e786550e4ce4173ed10cd678ddc6391fec

                                                      SHA256

                                                      95a48a154eb56738bfd06b9e11f311a5f339d3f9c56c9b39459587c85c3b9bbc

                                                      SHA512

                                                      33781c95228fc3f65bb37003e5c3c6b2d3ff4a1412d263acf7e72215b9495ed35640e5d3ada02dc72905c2c19f4e7b8780d5724848a78e6a70101db01c2322ed

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache
                                                      Filesize

                                                      77KB

                                                      MD5

                                                      97fad7603c17b95efd351770589d4416

                                                      SHA1

                                                      2c124d861088acbe681ccd05055b21d4aa91ac58

                                                      SHA256

                                                      076e2d47a2e01022281e71d10e18b14b4250d4c6ce54846e0dd0fcecc3634b33

                                                      SHA512

                                                      8ad5d8e9622a9af60c8a9fc55b94d5cf2caa5bb04ffce0a0bd2fdfcfb8a170986e97197dea2c867e4f97bc106c12d4b07c4d1564f7838d4185d60ba770550894

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1
                                                      Filesize

                                                      264KB

                                                      MD5

                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                      SHA1

                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                      SHA256

                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                      SHA512

                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\4165174\X
                                                      Filesize

                                                      384KB

                                                      MD5

                                                      564fcef4278786869d9e7f8606d17f47

                                                      SHA1

                                                      d36470b9a08322aa27014fc9ae97a69829ae4d54

                                                      SHA256

                                                      7ecd3748e97c574c643cad0722725983ac377a780f8e5442c383ce7a3b2205bc

                                                      SHA512

                                                      983ebba8851235fbfe515aa9b4156eca079914bb9c126d5f31c592bcb0025d26c54e2fd50b9f153b9eb687b0cae4361aedee61634004296680d5d454ad0022e0

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Beef
                                                      Filesize

                                                      31KB

                                                      MD5

                                                      654f7945c1c6e8cf978cccce420e373b

                                                      SHA1

                                                      5e53a3e35f09ca36692a566a0735a398e1e541c8

                                                      SHA256

                                                      b56604fbe129b7f4c4ed303747f006541a46c0194871c92edac85bef7a192189

                                                      SHA512

                                                      ae05c90eaa2580db92c102f0de514a0226504d3679eb7ec3be6b01a5f7e8f704a5411370c588b8fc92aa930e699abad3ff6b3c9869c88a9370b72096e8703ab0

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Breakfast
                                                      Filesize

                                                      13KB

                                                      MD5

                                                      099088c7bdbeb6b0c025727492dd71cc

                                                      SHA1

                                                      3b186caff335362dacaf494a37f5c0bd8a42d5a8

                                                      SHA256

                                                      20883cfb559483c21725fbbc28934ddfe1a2bd9d3889fc0b2a925d41638c818d

                                                      SHA512

                                                      8897621fbcf8aec2409704dfa419edaff7a4321e2d5b0e7ecb47a1025fc3f8bcf1ea0a0e2ffa8bcdff13197fc427de395601607e8fa400e07d8c4f759173e46d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ce
                                                      Filesize

                                                      67KB

                                                      MD5

                                                      49fb14a076bcafc86abdbc27ebafe16a

                                                      SHA1

                                                      65ee937829f08d102962d6e3922eeaea2c84c069

                                                      SHA256

                                                      9d5aed42fcd6d3d8951bb96670834267e810f84b34860e3bf351afca28e3afb1

                                                      SHA512

                                                      5dbdccd64410a36dcaabb0bdb793e6123dc61bb32ac316644df394ba4c8ab147a027c38e8f819593b689189852c1436520866afa90d1f9b6b18398060610427c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Changed
                                                      Filesize

                                                      35KB

                                                      MD5

                                                      d9f09a4c8c1043afcfc246936564ee01

                                                      SHA1

                                                      169d6920213f5b8f3cd1cb576170e9ff6344fad0

                                                      SHA256

                                                      e672668d0fa0efc8952e4ff1f9437a5281827f0c16fe6e02a6792ba0e40b5b3e

                                                      SHA512

                                                      ef054d017fb61b32bb3fba7293173694c449cbf29d87830419fa1af27f6ec2da3dba6e72e8c7d88bb784bd8297606a05bfc039ca490a47978ec99731ee98c71a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Chronicles
                                                      Filesize

                                                      14KB

                                                      MD5

                                                      cccfe820790a18ad637c8c48190a07ab

                                                      SHA1

                                                      2860eeb3aad76c4de98251c643b097452f2adbe4

                                                      SHA256

                                                      e76044935d27539fe765cf0f38d62699736b8bfc9e1f9abb4dc9db3a325308a7

                                                      SHA512

                                                      e518668dea9e6d40bf51781792a85322b0119f67eb905f1064b8b08569413460598e1cf6a31e95eddf7500e315f082b37f55e91455dd91257a08daa5c6de3200

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Communications
                                                      Filesize

                                                      59KB

                                                      MD5

                                                      a78d9f9007458dad6a6288b823c02308

                                                      SHA1

                                                      6301c74ed457ea40b1f51cbd936213413db64c73

                                                      SHA256

                                                      d2410da2189f66692da2d44eb27900089b99f6433d5dbad7487a2dcaeeae5b2a

                                                      SHA512

                                                      886dd057ee869a6cdd75f7a57e3ac97ea9366d5aeae03ca7407d035d02b8eac8795122ee5a4827f8a566bdca29ad37e84e48fa1b4e14e16d8bb465cba0c9c6bc

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Debug
                                                      Filesize

                                                      57KB

                                                      MD5

                                                      3878f94befdeddeed4508cc91d30b775

                                                      SHA1

                                                      25dd781cba90168310653663767f51b82eae189a

                                                      SHA256

                                                      139c7c899303807f4c674d4ed2acab9043e470f3aec1598bc62f77348a3bafe5

                                                      SHA512

                                                      f12390ee74eb18557b2dfb4ea92f0875df945bd454c7b8304c5523df92ef53bb39fbb127044db29d5015e3ff5d2dedb4a2a69fe05a34be2b7200c969869d9904

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Diet
                                                      Filesize

                                                      68KB

                                                      MD5

                                                      8f80a990e34a018bf985ae5ee6880892

                                                      SHA1

                                                      9ea1c5555d63159d73331044cd2466002bb4b0ae

                                                      SHA256

                                                      9c4e2822f78488e9ce0e471944802feb840ae2aac1dd70dd0b38e69d06bb9462

                                                      SHA512

                                                      2e85af9e4e3b499a8577fa51c302a2a3df10bcf03650c68e6be82f6108ed0e9f5523abcd86f9ce8fcf6fc5ef7e5e9df5588e5b2f4ac1472dc006f22176a2e32a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Disclose
                                                      Filesize

                                                      10KB

                                                      MD5

                                                      11a09faaee7bc02ace390631b890021c

                                                      SHA1

                                                      fdd4a531a3be3eba5555ea9cfe9007dda09487a0

                                                      SHA256

                                                      ab4df3d0689cf6deb9baf90f7265d3465071a6e5b2d243a637d5ee49e997faa1

                                                      SHA512

                                                      4a72289d0147e065baa8f1d325c242bb8d7996c080a71e9053d3f1a7a7e2bcc9d5d2e04603f32d85ae34f8d903de762bab421917d78f87888cbec2b04185d773

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ebay
                                                      Filesize

                                                      18KB

                                                      MD5

                                                      ca0e475fb526f9bd88952e61eea23458

                                                      SHA1

                                                      aba4f6086c5f9f956059229428ab5809da1c8251

                                                      SHA256

                                                      042b18a9ccd495da456a3bbda195a91fadb37488fa3f24abe3f2a3bcc8fc500f

                                                      SHA512

                                                      a375461c6c5326a584476cf1228e0d7ec28d5e45d1af8e12a208336c4cec33885f2b668a2351d53be134aab6089c4f90b067920cb2638cd21ff7e54e073b690d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Et
                                                      Filesize

                                                      54KB

                                                      MD5

                                                      af2e88cb701298b419c76ac6e2d29138

                                                      SHA1

                                                      bf164d6fc81cbdf1350dc4cd12326a207ce26987

                                                      SHA256

                                                      02bea5cbe6052966fab2a8777c7be1927f70c57c57e64c46163288345e31ca80

                                                      SHA512

                                                      06c9d449eaebadd21a30f6960b6f3fe989f4316dc6119acbb5366624575d9cc7cac16d6825a08b286fedeb4cdf134e469f91e23e895833bb254c7bca60d7724e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hammer
                                                      Filesize

                                                      64KB

                                                      MD5

                                                      a594248941cb800e60aa32730e5afb2f

                                                      SHA1

                                                      b0f9230e670211942c750d3c68b148e2164947d1

                                                      SHA256

                                                      0df59af13668eca5be679c3e3a3da05185a59b2fd9778f2aecf3a3f353b9616d

                                                      SHA512

                                                      44923dcfbe8769895fa1be73bececefda9f78bfd40c18f0a44427225297f3edf28718becce133b0c883bd5f878bba82ccc0f658982eb187dd810ab2f43a53b2d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Inch
                                                      Filesize

                                                      5KB

                                                      MD5

                                                      c5ee4dcc9184a60b60f76481af4529b7

                                                      SHA1

                                                      7bbac90ca2bec5b295fed1c845dbec6ffddb727f

                                                      SHA256

                                                      7863ead1f7df1a80fc847a1751d02d99700714b9a4848401028bc7d36c4ba0d0

                                                      SHA512

                                                      c8cc6005194b041381a20ab0f02f7b35148fbf04c9b1b32d36dc4fa3aabfa5cc0f2db12163cb727ce48bb4db72fdf31a0e676045306cd72b9f6c625c1fad24d6

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Innovation
                                                      Filesize

                                                      204B

                                                      MD5

                                                      a159d27c920ba255b699838eaffccddd

                                                      SHA1

                                                      07e71d8b5084395931df7acd1771b2e9609e4ebd

                                                      SHA256

                                                      105b7b26ab1b62e5d3f32bfb07fbb8f91ad3e434a41ebc55c9d4d3befa82528d

                                                      SHA512

                                                      7bb0119fa06d4b6cc214015b2f87e05e9c1f1d139d7c85089c28a3ed36254d41dfb4ab8b19e471424f6d487159e497f5488bd8607d005402ed0820fbbdc0225d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Irs
                                                      Filesize

                                                      56KB

                                                      MD5

                                                      cdbf87ed2611759361edcf2d1c36cb8d

                                                      SHA1

                                                      fde07776b66674be84f7e112b080c4b20a6972cb

                                                      SHA256

                                                      4a2afbcbf160bf24e04c3b9aa72267ffe589a7126aedad36e8fd22126fb79ffd

                                                      SHA512

                                                      e1b1faec18c602f5d89c64488c148ba943dbfb014e4e2f030a00830d032c58ba95f79d135c39a4cf7346dd815f1996a8f863642f96f37ec9745dd46f42b6e32e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Issue
                                                      Filesize

                                                      68KB

                                                      MD5

                                                      c2a3acd5ffb5894a56f6d3546d5f9e57

                                                      SHA1

                                                      76c605744596cd2ece89fb6b7a6ab02379379eff

                                                      SHA256

                                                      f2bfdcb7a8fe95b531c796bd581258b9b61d1fbe815311f6dc2a633b0f80d8e9

                                                      SHA512

                                                      681ce12931591165b40bd46235bcb9d2fd2913aa9f3841d3d0b51c1276d951b85b30b50c0d92437191fc79522aba017c56849fa35826e71387401a716c6c01da

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Locks
                                                      Filesize

                                                      144KB

                                                      MD5

                                                      1659a7eb3dba9d9143f98def92dbbb88

                                                      SHA1

                                                      3338d23d47256b6c4bd475bd953dcb7b6de13f87

                                                      SHA256

                                                      8271297087605f98d4351eff05198533a63924f7b666754b85894392aa9327dc

                                                      SHA512

                                                      c473fc5b74a1877e29f2e904955bd1bb270932cb40148c25c49d5dd7f6d1932a1e70692083176c00eea82adc73e3bac860847bce7bab5d1ce1ed259415fd795f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Marble
                                                      Filesize

                                                      176KB

                                                      MD5

                                                      955750a52c9c524e3b1df558e4e598e1

                                                      SHA1

                                                      6362a9a195fc6446cedb85ecc8df0ba82a9a40b9

                                                      SHA256

                                                      f233ec33624377ac70388bd8738bab20538b7f8cae46dd1e8bfaf3c87014580f

                                                      SHA512

                                                      1d7e2fa136a618deffa215fec63b24ca1918c0d2f467c28572a6907e1cedc2c9356536ee111f9d9e0f917d5e38f3322cfcbb0d590c94a526fd9a98e3057b188a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ml
                                                      Filesize

                                                      8KB

                                                      MD5

                                                      edbf126b0d7e08948d224a05c9f95c99

                                                      SHA1

                                                      3669fba40d2ae16eaad5b6f35c92316d478e6d62

                                                      SHA256

                                                      8ded4af5019a2a1bc87ac8b309ba3de6595ea545cc654430804bb67ae1c38ea3

                                                      SHA512

                                                      fa75adb54353b5ae83ca072a941fb40d6efc19444e28e425e71692e7801eb9070be8967634c22148f0691743edd878605eee08867797142df1ac9c8c7f8a16ec

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Prev
                                                      Filesize

                                                      50KB

                                                      MD5

                                                      b38311b401517c75f606fa819430d170

                                                      SHA1

                                                      d9ed5c00db2c4c81a86602e9e66066788d87ce9a

                                                      SHA256

                                                      f4668ab86a62ae276fb3e9f0940e4a0b0456ff308b552f6e162795dd0e36b704

                                                      SHA512

                                                      5152bf7bc3eee603784dce61ee9ddd5ef9903fc6219e3052b96f7f0652133e50473ee25da4c85672a67ec3d47ab9bfb4e295a9a4c2a6f60019dfc01c65c9f3c3

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Probe
                                                      Filesize

                                                      21KB

                                                      MD5

                                                      227f0c2bb7513cb9549bf64d7a9b78ea

                                                      SHA1

                                                      0a9b1a053fc2a69b263a47f4b91943f60ba33ab4

                                                      SHA256

                                                      09b0812cf3a6232db410a32a7f288d2a2af53116475bd84c00cee02413798ada

                                                      SHA512

                                                      4a9180ee4eea8519cec3d082183da51aec4a0a0f1b71c1c19266056c400682a9c6bbe24b03ccc897690dc41007bdd9ab7ff3366f049ac1ab647acba9c39a12eb

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ray
                                                      Filesize

                                                      8KB

                                                      MD5

                                                      15b3c47ee4220a1317285551dc46df3b

                                                      SHA1

                                                      ecccbd8d0bc7616f30548bcee6179da004f64553

                                                      SHA256

                                                      9be2db11436373cbd4dabb4664297a0814ffa18be3a9637de1b583adb863ba79

                                                      SHA512

                                                      9859bda25d9eed059d9ac27d091dffcb63a1ea7a37c2dc3b7a7c8006d65e64414367021c97b4c27f1de2dd021f125d7e6451dcd07a497a05c0e0150c6f56d4d3

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reservations
                                                      Filesize

                                                      55KB

                                                      MD5

                                                      03bbac1012dc934a35d46a76a50e08ca

                                                      SHA1

                                                      a5e30a19cf6158349cae5731c35c35074dab14e9

                                                      SHA256

                                                      48eae157cbce36131cd2bdb12783c54830cfd41adf64b79bf667f71bab318b72

                                                      SHA512

                                                      c8b80dfd1a0f56634c9dad9cb09672eabcfe448f7270a783724623ae08c87f2948409865e3a53c8a464ea88f51777cb037421d9112b5c3954b242bf28aa25f52

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Roommate
                                                      Filesize

                                                      9KB

                                                      MD5

                                                      ad4997c14c040ff7fac72a295d80e7c2

                                                      SHA1

                                                      d4ac36b2f27ff097e90a2ebe8178ffdb238e022e

                                                      SHA256

                                                      3713b88f240265d95a532172bd41471c624126826a6176363e5256e1303bc234

                                                      SHA512

                                                      ef71df08a3b04942390976d721a175bc77365c6f725e82df102ef0d2b9a9a6f1ded8ed66f31e159f97dffe1a468413ba371883ff3e32def1f102bcd0112f71d6

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Smoke
                                                      Filesize

                                                      50KB

                                                      MD5

                                                      a6f632d877e85b03e384d505ea5eb42a

                                                      SHA1

                                                      2482da9e439923377d00bf481bafcb14a2fcac3b

                                                      SHA256

                                                      1b462e05740e262a67885186c277495de523d66ccfa216c2995f9209ad250b2d

                                                      SHA512

                                                      b29a73018c6029ce9cedd366d3307e351d03462d4f2dcaf9316b34e20d9d833b262f3a0cdb0741468f97599c171b25c016819be39ddbade4d3ef28ff340bcbf8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Specify
                                                      Filesize

                                                      37KB

                                                      MD5

                                                      e8a0490f31dbef2d3167b57713023d79

                                                      SHA1

                                                      7856a4a2f9493d0d519700d30935f834c1c0f81a

                                                      SHA256

                                                      367162d6b910ab48099fcaeb0b15d5b2acdefe995607ffd0bdd3d2f5d5b0f2ad

                                                      SHA512

                                                      0f89df4ba61ed14b6ef1774cf8a96974b2220cc7c782451818d2395e111d6da7283c9fd2e95589a4d4f644c87ac8efa77ae9f41a17be547a8cf94bcf04e16c01

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Up
                                                      Filesize

                                                      60KB

                                                      MD5

                                                      44c2a2e9389c9670587e7738cc481612

                                                      SHA1

                                                      dacec904f8f08948270f85b6496d2d0d9a291766

                                                      SHA256

                                                      4e6c972ee2bed1fb9953db12ff17d4e2b9bb3dee64362d9d182aa492e566f08e

                                                      SHA512

                                                      dfd35d87a4fb63971f6b07e3f60f387809563486a5373dd7af20a8e5245f9ea0d429837ff2ce3e9015c00036a992c1dbf0447971f192bf6e60bb51dbf14a0d94

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Woods
                                                      Filesize

                                                      67KB

                                                      MD5

                                                      44814f258e71a515115ee6b5b8288d50

                                                      SHA1

                                                      a8457825e68aed5813384a763163dafdec3502d0

                                                      SHA256

                                                      29c65d8353f89236340327b3b406712f7bc167c3004c8c68ccd20cde1bc1bc35

                                                      SHA512

                                                      21afd05cdc279e459ade9343aa5e6b78bfd097bd6bc34963421c457d131fae4efb33117258d78c1fb2043df627cee9f4db60de4427c9599c8b2ced42470acebb

                                                    • C:\Users\Admin\AppData\Local\Temp\Tmp69CC.tmp
                                                      Filesize

                                                      2KB

                                                      MD5

                                                      1420d30f964eac2c85b2ccfe968eebce

                                                      SHA1

                                                      bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                      SHA256

                                                      f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                      SHA512

                                                      6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                    • C:\Users\Admin\Downloads\Manual_installer_Win7-Win11_x86_x64-05182024-278753659075324982\Setup.exe
                                                      Filesize

                                                      910KB

                                                      MD5

                                                      94e7e5e1cee055f9ac963b7650d5d8bd

                                                      SHA1

                                                      f18a89aa7fa97135b1214e31f2c79877d2a04284

                                                      SHA256

                                                      94fa692514c48c66ade5a1a90d07b4114272faf810801efa472b803c49231ad3

                                                      SHA512

                                                      13f1eeb4788bf868e126e840645f7096c613d748318958116eb3cbfc44dd5876b024b85f8dfa0283921181e1ca3424c721780607480fb7a621ac4650ff6b9e99

                                                    • C:\Users\Admin\Downloads\Manual_installer_Win7-Win11_x86_x64-05182024-278753659075324982\bin\Debug\MusicPlayerApp.vshost.exe.config
                                                      Filesize

                                                      184B

                                                      MD5

                                                      28960c034283c54b6f70673f77fd07fa

                                                      SHA1

                                                      914b9e3f9557072ea35ec5725d046b825ef8b918

                                                      SHA256

                                                      8d65429e0b2a82c11d3edc4ea04ed200aedfea1d7ef8b984e88a8e97cff54770

                                                      SHA512

                                                      d30dd93457a306d737aac32c0944880517ed4c3e8f2d1650ffca6c1d98e892082b41b40fb89ccf75d5f03d2464b0b4f943cd4b082071f0abfe978d149bd61479

                                                    • \??\pipe\crashpad_3004_ZRDDXXKQENYFZCAP
                                                      MD5

                                                      d41d8cd98f00b204e9800998ecf8427e

                                                      SHA1

                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                      SHA256

                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                      SHA512

                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                    • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\4165174\Infected.pif
                                                      Filesize

                                                      915KB

                                                      MD5

                                                      b06e67f9767e5023892d9698703ad098

                                                      SHA1

                                                      acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                                                      SHA256

                                                      8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                                                      SHA512

                                                      7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                                                    • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\4165174\RegAsm.exe
                                                      Filesize

                                                      63KB

                                                      MD5

                                                      b58b926c3574d28d5b7fdd2ca3ec30d5

                                                      SHA1

                                                      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                                                      SHA256

                                                      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                                                      SHA512

                                                      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                                                    • memory/1184-426-0x00000000000F0000-0x0000000000142000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/1184-428-0x00000000000F0000-0x0000000000142000-memory.dmp
                                                      Filesize

                                                      328KB

                                                    • memory/1184-429-0x00000000000F0000-0x0000000000142000-memory.dmp
                                                      Filesize

                                                      328KB