Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/07/2024, 19:09

240730-xtvrnaybqd 10

30/07/2024, 18:49

240730-xgql6stanq 10

Analysis

  • max time kernel
    146s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/07/2024, 19:09

General

  • Target

    http://185.215.113.101

Malware Config

Extracted

Path

C:\axOkKRj8m.README.txt

Ransom Note
~~~ LockBit 5.01 the world's fastest ransomware since 2024~~~ >>>> Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom BTC amount 0.005 = up to 12hr BTC amount 0 , deleted all files from you PC, and post all infirmation to public. where send BTC: bc1qm7sg7p2jkgthv7pkjy856sh9lr5x3yrpzv099d Time just 12 hr, after everythink will be removed You can buy them on the exchange or at an ATM https://coinatmradar.com. You can find the addresses here buy with credit or debet card online https://www.moonpay.com/buy. After that, send a request with confirmation to TOX , faster way! You can contact us using Tox messenger without registration and SMS https://tox.chat/download.html. Using Tox messenger, we will never know your real name, it means your privacy is guaranteed. If you want to contact us, tox. Tox ID LockBitSupp: 47C90F99E92AC0ECEAD8C2BD15B21866EBC1195B6E2B0412CE3658E21B696843FF4A8D144B24
URLs

https://coinatmradar.com

https://www.moonpay.com/buy

https://tox.chat/download.html

Signatures

  • Renames multiple (625) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://185.215.113.101
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdd36fcc40,0x7ffdd36fcc4c,0x7ffdd36fcc58
      2⤵
        PID:2748
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1952 /prefetch:2
        2⤵
          PID:2056
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1840,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2124 /prefetch:3
          2⤵
            PID:1940
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2292 /prefetch:8
            2⤵
              PID:1296
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3012,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3044 /prefetch:1
              2⤵
                PID:3984
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3016,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3284 /prefetch:1
                2⤵
                  PID:2852
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4548,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4564 /prefetch:8
                  2⤵
                    PID:3860
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5084,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5100 /prefetch:8
                    2⤵
                      PID:4820
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5092,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5244 /prefetch:8
                      2⤵
                        PID:940
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5412,i,13078823538376409379,10996605235226379178,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=5136 /prefetch:8
                        2⤵
                          PID:3420
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                        1⤵
                          PID:4540
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:4836
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:1316
                            • C:\Users\Admin\Downloads\s5.exe
                              "C:\Users\Admin\Downloads\s5.exe"
                              1⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:676
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                2⤵
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5060
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:940
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                2⤵
                                  PID:4112
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                  2⤵
                                  • Drops desktop.ini file(s)
                                  • Sets desktop wallpaper using registry
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4860
                                  • C:\Windows\splwow64.exe
                                    C:\Windows\splwow64.exe 12288
                                    3⤵
                                    • Drops file in System32 directory
                                    PID:880
                                  • C:\ProgramData\8506.tmp
                                    "C:\ProgramData\8506.tmp"
                                    3⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:5356
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\8506.tmp >> NUL
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5668
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                1⤵
                                  PID:2144
                                • C:\Windows\system32\printfilterpipelinesvc.exe
                                  C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
                                  1⤵
                                  • Drops file in System32 directory
                                  PID:5228
                                  • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
                                    /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{6294A6F9-1ADE-46B4-B344-725A379834EF}.xps" 133668402734900000
                                    2⤵
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5452

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\$Recycle.Bin\S-1-5-21-3881032017-2947584075-2120384563-1000\AAAAAAAAAAA

                                  Filesize

                                  129B

                                  MD5

                                  c6e92ad8453098200bb67ddb40036fb7

                                  SHA1

                                  b6cbdbec72567c3f165b5915bce304dda5934580

                                  SHA256

                                  462beeac13966acb68505150322892e58d53b6e58e00ee515aa9f950611cdd91

                                  SHA512

                                  bd3cde81891b5074072e3b6f22976d148e8b139986685506e9087a2321b4fb6993617565233b13b169116954f3bcfc72a41f95b00366a20e46cb822ba7b53a51

                                • C:\ProgramData\8506.tmp

                                  Filesize

                                  14KB

                                  MD5

                                  294e9f64cb1642dd89229fff0592856b

                                  SHA1

                                  97b148c27f3da29ba7b18d6aee8a0db9102f47c9

                                  SHA256

                                  917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

                                  SHA512

                                  b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                  Filesize

                                  279B

                                  MD5

                                  3d7b42dd6afbe49b8a666c1c414f549b

                                  SHA1

                                  d46c0c162b48085253396908a6fab6b220cae092

                                  SHA256

                                  5afc4c350073e6ba181fbfa08de4c7e10a6fe43f71c00e7fc2252465640fd8aa

                                  SHA512

                                  7a6894ee9a37f5e6f796afe6742daf7cc53b468f1a5623d1d3a6d96dd1e6aa95ef00328d8b4f64ff8852dd79201ec5b31e09e01e2eb0f5730ea654fc2b5c917d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  a6d642c58101e278e13c8c5234105ba5

                                  SHA1

                                  6e3d3d39263602d7aa03eae3368ea520049f7613

                                  SHA256

                                  e40cd82c34d43d0b91f88690c611387d01fa618db17c2fb807ce2d8a2f48878c

                                  SHA512

                                  d06e24329878a112808002e081f8bb143a48a5c3577701af8266fee4dddb70a5d1430bbc5a3aaebe1bbcd29fd51f80a3a7b1dc6f892f31cfb9c639b2972727e4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  40fc4affba4d1aff2f34b33ffc7112c9

                                  SHA1

                                  523357e1f64eefd82ff70bb4309bda5f4f717e4d

                                  SHA256

                                  6193d9625c0db5103c2c55a1dab84d3cfee47e224d7c48d9157679d436306ccf

                                  SHA512

                                  6b252a21b89c2bb384bd13b4c5e914b1978d476e221fed55aefed8a1436c7ed7a2cb91e5927f0a4bbce0d82b291f4002e023d55baedcc456970e4c54b52cf4af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  debb49401d66a6b29c3ba0e5c8436621

                                  SHA1

                                  19a1c403b34c897ef7ce6a595655212593636384

                                  SHA256

                                  ee54cf705c26ac7274009b22265ed31c289f9365806795a1f0e453b47886858f

                                  SHA512

                                  b3c513a7c6c52338b4bcb43628603b6276dc9e0e314c1d44748fec4d44517ec11f12f9b9b39618b57f361637cf1fa62998a7c9c2f582abcf90b6a70a67141dee

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  37920b76e5b05f46f0436e4ec25280a9

                                  SHA1

                                  55e0c8adba0518ae09a8ca8e155cf479282a8e19

                                  SHA256

                                  dcd2b325ee4108ddcb4627a1f4eb14b839dcc9ed895f169f9f03830caf81462b

                                  SHA512

                                  29290d61e2ceff67d8de13268bb09103e25ce3219d2a26a6963af8634c1fc13a47f86308baac344bf872b0f9fdbb44b9218b60df58a6aa4e257a27732b7d99c9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  71af4ff515cfdb5aa2e37e7f6a09d368

                                  SHA1

                                  03b4cb5a416500059d50636630ae1b167db38339

                                  SHA256

                                  14604f9fad56d20db793ccee0fcf6b51ebb586c1164c7ffde3cda4fec61b83b8

                                  SHA512

                                  5a2f4433608815dec216934b6570fb21e8259155d9f9617599a0f486cffa631518aa75922fa27ee5ecf524e2b4fc1c4cd32ff60e6e58980b69938efdf1e3918a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  8KB

                                  MD5

                                  e6d89a7a9a7f59979403e8e228a0c540

                                  SHA1

                                  5f81b8eff4bc8b2eddb320e7cdba8d8e7d801ee2

                                  SHA256

                                  8a6a564dca390d7f758629e73267e60146b99e2722e3f103af7247c25c460faa

                                  SHA512

                                  7cfd86a3525c59fdc7822edb88612c0e5935a6795aa84200fe53ba92daeb0544ec07767b1bbb654a5519d99c0065cba48b77643ce95972d9746695c98371b708

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                  Filesize

                                  44KB

                                  MD5

                                  ef775b420665939ec6f54f7c6c568139

                                  SHA1

                                  414e459415128c3a8483a53079f44d59ab4a2e73

                                  SHA256

                                  3a21bcb8049652b569c524919277c24fe495bcfaaa2f3f53ba9b5a0ab9d6bb34

                                  SHA512

                                  8138e82d3e7f08b43fdfce0351ab80fcc9a3169e51e2e20eca83a6fca1b8045cbecf3039a50a08be0f62fade29a48c5be118414162e5aeb9fe09c84824a5cb8a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f2ea9eacbeb9cc2e77aee5a8cfea9ad0

                                  SHA1

                                  a4a12f4640fe8a78cf54293987bf15eff760fa34

                                  SHA256

                                  f8bd4b0e380383ae715d65b3c0f98218d2d9e254b6b44881a54d7cd116f7f877

                                  SHA512

                                  b36df57a2b1d87e19ecbc8d25756edc0aac382b3d6673d077065b55f13fafc2d9f6bffda2bae3d64b9db68e032f725d9d88618d1340f77dd70fd9d2e8c3035f2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                  Filesize

                                  4.0MB

                                  MD5

                                  40aa4e0dc3e5183de788077de7ecd0b1

                                  SHA1

                                  2b1ca7245cbf4a1732d5e1d246e401d5a9dba7fa

                                  SHA256

                                  cb0aadfb49df8a7367f2471431e4082e3b3b3877e36f23bdab50a40d5d01db61

                                  SHA512

                                  4a569facaf371b06f47c08dd8b51d587267553317acc2b02cac3124e49b507acaa19603e26bf2835d0e577ab14f7b70190f6a50f64eefeb3329a8a7e7cf2e0c6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Browser

                                  Filesize

                                  346B

                                  MD5

                                  25571cbb43f538b3f25e23e464d0fe2f

                                  SHA1

                                  861ac122a749fa8af2a17db5aa09ff34840e9a9c

                                  SHA256

                                  079973844cc6e0b72be421e21ddb5fe1cf4d13a83218c2355a73aa4076343b3b

                                  SHA512

                                  b771c84b6fbb7302368106974fc2dbde7ed52079002e9849be425503dddae592417e5f584808230249fde7060151e4010f70ed20679e738750b8ace8d77e7a27

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                  Filesize

                                  256B

                                  MD5

                                  9cd89c0cb89b839da6e043212ea482e2

                                  SHA1

                                  23f2e105c4e1b127781ceab9945e4e0934df041d

                                  SHA256

                                  cd695747ddf34fba699e6c445c005041e706c30d15c82b75c528d74cce712185

                                  SHA512

                                  f043ea89afc1da573340559a833e0b07ceb5a3f5218179a5120b2df70295c0146b783a258173114f6d04128eebfaf7bef5a4c7860b419bbf08baff780cf72f4b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  101KB

                                  MD5

                                  b0a9dea7b9867d2684d803aec5daca43

                                  SHA1

                                  2f964e10ed7ac4e2842271395a689791c20f1793

                                  SHA256

                                  d3163eff134a0d44dcede4f96fb16cb9c18d541773b2ef72ea8ec69601907144

                                  SHA512

                                  69b2b7b063ab36d703028cb489d95bc8e38744c9a0f55c747215afba05dc9b4c822bf7a9c8331fcca3a09fc5c54e4ccc8556c473760f27deed05caf507088990

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  100KB

                                  MD5

                                  56c43d9b9b31467e113973cf553f29c7

                                  SHA1

                                  5a4f51d6f8320a032644b0546089fe3fde61b92f

                                  SHA256

                                  e8c7dfee6d5f6f6a32e0601716078070595f7d80ef8438559ac33a7909ecfe97

                                  SHA512

                                  eaf2483cee1667f0ef4b5a8c2426a11493c9428eef003d6cce767a37b3da97e227c9719694d48ac577b19f0eb3a4ce1d7750abd3da714ba380967a7234c44325

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  100KB

                                  MD5

                                  e533eb254fac3cfd9cd92c98fa004964

                                  SHA1

                                  87f9b3a3d69eb8fc1f9e80671ecd751266b8915a

                                  SHA256

                                  1fea2eb253d08f26074cac39b3a6a5fd036c8d305f7618fc2a5d4edf3c8e56ca

                                  SHA512

                                  2e909cdd9eb8d6d8d6796b1070db010b8fde71bc45235e59335515a309137a1e90259384696c0ffa954c886fec83d4d3821cf03a51fe67ca5b6c1b4d99fd4e1e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                  Filesize

                                  321B

                                  MD5

                                  0aab6042234cb8fe9cb11637ec0ff363

                                  SHA1

                                  02101c6ec5e07adb9fba6d5352c5ac54989b91bf

                                  SHA256

                                  85e8d19af04c4383ba19ad20c6cd8b1e502f980d343c60a8c10bc0e13ab5cfe4

                                  SHA512

                                  3b047dd89e7bb7e50f3a24bb7ac0c432721b3cd5ecb6efaa4c6dbd1b0a8fe8ff965a10cd12f3529acd8070e521dc24d1c95435b383cbcc0d54cbb81242ab5c49

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\first_party_sets.db

                                  Filesize

                                  48KB

                                  MD5

                                  5a1706ef2fb06594e5ec3a3f15fb89e2

                                  SHA1

                                  983042bba239018b3dced4b56491a90d38ba084a

                                  SHA256

                                  87d62d8837ef9e6ab288f75f207ffa761e90a626a115a0b811ae6357bb7a59dd

                                  SHA512

                                  c56a8b94d62b12af6bd86f392faa7c3b9f257bd2fad69c5fa2d5e6345640fe4576fac629ed070b65ebce237759d30da0c0a62a8a21a0b5ef6b09581d91d0aa16

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\segmentation_platform\ukm_db

                                  Filesize

                                  28KB

                                  MD5

                                  749247e08029a3094d75bbcfb0f8b33a

                                  SHA1

                                  b945c8473f1f950018ba7b88b515fcb2a2861768

                                  SHA256

                                  9cc98e8ade3520103a2576e339fcc9c6f19dc94a9c48c2bf2493b9fe8f2dd8c8

                                  SHA512

                                  ed234a99a1abccf351ba4a1f8979dc1a9591dd472a0e19e68116f5dcf922753fec8b7b4e1fe1bc0370bb0db571f5035d5374b23d012f232f067951f935683806

                                • C:\Users\Admin\AppData\Local\Temp\{A0C9B2D2-E201-493B-BFC9-EE1F64B7F7CD}

                                  Filesize

                                  4KB

                                  MD5

                                  98e1b159144ca2b64e268c41c2cfbd41

                                  SHA1

                                  42d002c709c79bdc3eafe1adeabc8d013651d0d5

                                  SHA256

                                  f85120923c510cd79384fc6a5812258f34baab5dff65d58f0e3f9dc553f2e999

                                  SHA512

                                  0ba136fc075c7eb1b50f9bc9da997e1c716f72db49423a2b1ac6aa3219b29c4be06d3e0bc4fb772557b44585dc3903e40db8c1e62647c7318a250cae962653a7

                                • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

                                  Filesize

                                  4KB

                                  MD5

                                  9ac2717bfaf20b9d8996225c74b1e91c

                                  SHA1

                                  cbd43d3c64aa270853861917f23240313aeebd9e

                                  SHA256

                                  fa22183a1ed9184437b2de419c05d1519ab0e1b01c9865ef89a32fa628fc66f8

                                  SHA512

                                  ebdac103f708c4f959d9668aca5e151a6df6549501551a0aa9fc9a384abd0921f15775426978e54849ed94efd8cbe2d205f2b96e0e80772a7baed48d11fda3db

                                • C:\Users\Admin\Downloads\s5.exe.crdownload

                                  Filesize

                                  1.2MB

                                  MD5

                                  5c5f622e093ec21e8bffaf8b1aaf775b

                                  SHA1

                                  9e7ba88b6adff9020aa70061c22576601acd6730

                                  SHA256

                                  8d52782438c7f8de34e301a512613cb028c0b80f00c3e4011e618be72fdb7243

                                  SHA512

                                  2acbd5878dc0e0e753c7fa5c68abb6afbb9c705371dcdfcbbca4c58f977f88fcbd4533bde33a23d59546aeca908642b8283523ca1cb4e3fa6fa7e04f20616db3

                                • C:\axOkKRj8m.README.txt

                                  Filesize

                                  1015B

                                  MD5

                                  585e48da096ab22d9727946d44a47696

                                  SHA1

                                  2dc1aa3c6a6e8036e3f6e91538592522a91760bb

                                  SHA256

                                  631a4ff42b358b232f4bdfb989e139aef88aa75698e6a07f66fc3bd36fd7463c

                                  SHA512

                                  dbf2f14be8c40b217130e769008910a17a4894d775296348e68dffcaa82dfaa707c43ecb820dd141dd341c75005d060fa6e1b54f3b71ae411e489b7fdc655dbf

                                • F:\$RECYCLE.BIN\S-1-5-21-3881032017-2947584075-2120384563-1000\DDDDDDDDDDD

                                  Filesize

                                  129B

                                  MD5

                                  e80d89716862372902b566783a0dde9e

                                  SHA1

                                  b1ed6d5e4675ee9b07c8d62100b7d7db02f96e02

                                  SHA256

                                  df7226acd4e25bfdff37219d857ad40379b87fcb1f0c7fb6574d601faa8f14e5

                                  SHA512

                                  adc84677ab6b951ae098f4e7617db96072f3d3148588b98fc8467410443ec0f494e4e297b0794c44b8fc4cf5513d9911169808d151234ed9cf15b0a5c3849fff

                                • memory/676-61-0x0000000002EE0000-0x0000000002EE6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/676-48-0x0000000000150000-0x0000000000288000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/676-67-0x0000000007CB0000-0x0000000007CB6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/676-60-0x0000000007D20000-0x0000000007FE2000-memory.dmp

                                  Filesize

                                  2.8MB

                                • memory/676-63-0x000000000B5E0000-0x000000000B672000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/676-50-0x0000000074580000-0x0000000074D30000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/676-49-0x0000000005620000-0x00000000056BC000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/676-62-0x000000000BAF0000-0x000000000C094000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/676-47-0x000000007458E000-0x000000007458F000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/676-68-0x000000007458E000-0x000000007458F000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/676-157-0x0000000074580000-0x0000000074D30000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/676-64-0x000000000B5B0000-0x000000000B5BA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/676-65-0x0000000074580000-0x0000000074D30000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/676-87-0x0000000074580000-0x0000000074D30000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/676-66-0x0000000007C90000-0x0000000007CAA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/940-3168-0x0000000000400000-0x0000000000480000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/4860-164-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4860-3156-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4860-1536-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4860-257-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4860-159-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4860-156-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4860-154-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4860-167-0x0000000000400000-0x0000000000428000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/5060-103-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-105-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-115-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-123-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-125-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-121-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-107-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-101-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-99-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/5060-98-0x0000000000400000-0x000000000050A000-memory.dmp

                                  Filesize

                                  1.0MB