Analysis
-
max time kernel
53s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe
Resource
win10v2004-20241007-en
General
-
Target
64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe
-
Size
297KB
-
MD5
314558f9a6da39ffd12cba6c1064b3b8
-
SHA1
2c416cbfa8aeee687534b7c0888d411c0a837c59
-
SHA256
64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842
-
SHA512
41fdd3cff2e4620c0dfc7adca6a985ba5af69c1e72be409ae8d206534e32e1d3d34358f3f90521f57969c3cdf391442f4dfeba2a174b3abcbe72257d36706947
-
SSDEEP
6144:ZUL4NWKzjkaphkIOe2q4EVSh/Bw/mhMgAB:ZUsNWK3bT4EneIB
Malware Config
Extracted
F:\$RECYCLE.BIN\GVEUPPKLFU-DECRYPT.txt
http://gandcrabmfe6mnef.onion/79756566b346ab9
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (269) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\GVEUPPKLFU-DECRYPT.txt 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6b346d546b346ab379.lock 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Libraries\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\O: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\B: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\E: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\N: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\P: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\A: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\W: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\R: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\U: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\L: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\Q: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\T: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\V: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\X: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\G: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\J: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\H: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\M: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\S: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\I: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened (read-only) \??\Y: 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\pidor.bmp" 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\GVEUPPKLFU-DECRYPT.txt 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\GVEUPPKLFU-DECRYPT.txt 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\ExitUninstall.raw 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\InvokeFormat.mhtml 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\ProtectRegister.wma 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\RenameUnregister.mp3 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files (x86)\GVEUPPKLFU-DECRYPT.txt 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files\6b346d546b346ab379.lock 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\DismountExport.rle 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\UnblockUnprotect.emz 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files (x86)\6b346d546b346ab379.lock 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\DisableRestart.pptx 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\LimitConvertFrom.xltm 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files\GVEUPPKLFU-DECRYPT.txt 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\ExportBackup.potm 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\PingSave.DVR 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b346d546b346ab379.lock 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\RestoreCopy.xltx 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\StepUnprotect.WTV 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6b346d546b346ab379.lock 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\DisconnectBlock.emf 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\ExitStep.jtx 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\StopUnregister.cfg 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6b346d546b346ab379.lock 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\AddUnprotect.vsd 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\FormatAdd.mpg 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\GroupInstall.wmf 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File opened for modification C:\Program Files\ShowBlock.php 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\GVEUPPKLFU-DECRYPT.txt 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpshare.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945\Blob = 0f0000000100000010000000824bae7c7cb3a15ce851a396760574a30b000000010000004a00000045007100750069006600610078002000530065006300750072006500200047006c006f00620061006c002000650042007500730069006e006500730073002000430041002d0031000000090000000100000020000000301e06082b0601050507030406082b0601050507030106082b06010505070303140000000100000014000000bea8a07472506b44b7c923d8fba8ffb3576b686c1d0000000100000010000000d06bc27453aa4f6d586437e5d3b377980300000001000000140000007e784a101c8265cc2de1f16d47b440cad90a194520000000010000009402000030820290308201f9a003020102020101300d06092a864886f70d0101040500305a310b3009060355040613025553311c301a060355040a1313457175696661782053656375726520496e632e312d302b06035504031324457175696661782053656375726520476c6f62616c2065427573696e6573732043412d31301e170d3939303632313034303030305a170d3230303632313034303030305a305a310b3009060355040613025553311c301a060355040a1313457175696661782053656375726520496e632e312d302b06035504031324457175696661782053656375726520476c6f62616c2065427573696e6573732043412d3130819f300d06092a864886f70d010101050003818d0030818902818100bae717900265b134553c49c251d5dfa7d1378fd1e781734152609b9da1172678adc7b1e8269432b5de338d3a2fdbf29a7a5a7398a35ce9fb8a731b5ce7c3bf806ccda9f4d62bc0f7f999aa63a2b147020fd4e4513a123c6c8a5a548470dbc1c590cf7245cba859c0cd339d3fa396eb8533211c3e1e3e606e769c6785c5c8c3610203010001a3663064301106096086480186f8420101040403020007300f0603551d130101ff040530030101ff301f0603551d23041830168014bea8a07472506b44b7c923d8fba8ffb3576b686c301d0603551d0e04160414bea8a07472506b44b7c923d8fba8ffb3576b686c300d06092a864886f70d01010405000381810030e20151aac7ea5fdab9d0650f30d63eda0d14496e9193271431efc4f72d45f8ecc7bfa2410d23b492f9190067bd01afcde071fc5acf64c4e09698d0a340e2018aef2707f165018a442d06657552c0861020215f6c6b0f6cae091caff2a21834c475a4731cf18ddcefadf9b376b492bfdc95101ebecbc83b5a8460195694a955 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945\Blob = 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 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 560 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2744 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe 2744 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2764 wmic.exe Token: SeSecurityPrivilege 2764 wmic.exe Token: SeTakeOwnershipPrivilege 2764 wmic.exe Token: SeLoadDriverPrivilege 2764 wmic.exe Token: SeSystemProfilePrivilege 2764 wmic.exe Token: SeSystemtimePrivilege 2764 wmic.exe Token: SeProfSingleProcessPrivilege 2764 wmic.exe Token: SeIncBasePriorityPrivilege 2764 wmic.exe Token: SeCreatePagefilePrivilege 2764 wmic.exe Token: SeBackupPrivilege 2764 wmic.exe Token: SeRestorePrivilege 2764 wmic.exe Token: SeShutdownPrivilege 2764 wmic.exe Token: SeDebugPrivilege 2764 wmic.exe Token: SeSystemEnvironmentPrivilege 2764 wmic.exe Token: SeRemoteShutdownPrivilege 2764 wmic.exe Token: SeUndockPrivilege 2764 wmic.exe Token: SeManageVolumePrivilege 2764 wmic.exe Token: 33 2764 wmic.exe Token: 34 2764 wmic.exe Token: 35 2764 wmic.exe Token: SeIncreaseQuotaPrivilege 2764 wmic.exe Token: SeSecurityPrivilege 2764 wmic.exe Token: SeTakeOwnershipPrivilege 2764 wmic.exe Token: SeLoadDriverPrivilege 2764 wmic.exe Token: SeSystemProfilePrivilege 2764 wmic.exe Token: SeSystemtimePrivilege 2764 wmic.exe Token: SeProfSingleProcessPrivilege 2764 wmic.exe Token: SeIncBasePriorityPrivilege 2764 wmic.exe Token: SeCreatePagefilePrivilege 2764 wmic.exe Token: SeBackupPrivilege 2764 wmic.exe Token: SeRestorePrivilege 2764 wmic.exe Token: SeShutdownPrivilege 2764 wmic.exe Token: SeDebugPrivilege 2764 wmic.exe Token: SeSystemEnvironmentPrivilege 2764 wmic.exe Token: SeRemoteShutdownPrivilege 2764 wmic.exe Token: SeUndockPrivilege 2764 wmic.exe Token: SeManageVolumePrivilege 2764 wmic.exe Token: 33 2764 wmic.exe Token: 34 2764 wmic.exe Token: 35 2764 wmic.exe Token: SeBackupPrivilege 2700 vssvc.exe Token: SeRestorePrivilege 2700 vssvc.exe Token: SeAuditPrivilege 2700 vssvc.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2440 wmplayer.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2764 2744 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe 32 PID 2744 wrote to memory of 2764 2744 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe 32 PID 2744 wrote to memory of 2764 2744 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe 32 PID 2744 wrote to memory of 2764 2744 64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe 32 PID 2152 wrote to memory of 2148 2152 chrome.exe 38 PID 2152 wrote to memory of 2148 2152 chrome.exe 38 PID 2152 wrote to memory of 2148 2152 chrome.exe 38 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2912 2152 chrome.exe 40 PID 2152 wrote to memory of 2876 2152 chrome.exe 41 PID 2152 wrote to memory of 2876 2152 chrome.exe 41 PID 2152 wrote to memory of 2876 2152 chrome.exe 41 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 PID 2152 wrote to memory of 2932 2152 chrome.exe 42 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe"C:\Users\Admin\AppData\Local\Temp\64a45b42204cf4412dc2891368a4b72670642a008b13f3d99f6d3d42de95a842.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6bb9758,0x7fef6bb9768,0x7fef6bb97782⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:22⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:82⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1512 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1268 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:22⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3280 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1172 --field-trial-handle=1236,i,15849691689471998319,16131452630481883079,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:624
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:11⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2440 -
C:\Program Files (x86)\Windows Media Player\wmpshare.exe"C:\Program Files (x86)\Windows Media Player\wmpshare.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1408
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Music\ConnectDebug.search-ms1⤵
- Modifies registry class
PID:2672 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Music\ConnectDebug.search-ms2⤵
- Opens file in notepad (likely ransom note)
PID:560
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4595881f1e3b4f4d5e2353263a02afc
SHA10e4064c78ff807659b03c4a0a79630bc766ae2f7
SHA25617afd5e9f965da94c6b853bb2cf35e295506780128a76bd83f40473e55f3e830
SHA5121eb63d4591410b2076a8cda5f328b9d380eb5c87c0d6349a40fcb3349ce018a22f9766af4fc49069270cc6f1c3873b79208e231ea4d6c91d8766624a6844bd24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b3b18bcc127f8da52950939217fcbda8
SHA1a0e26663a4e7b3dfc3976818ecb63d4692792173
SHA2564781665732752be18eca3d0e029fcc547a856fb7f6387700386930b1adb5f2de
SHA512a4d5320ed0ddd69045f3131c5dc46322e4454c25b78009f7229723e2fe071272b877b6f41ba5e06c90a424e6bfc19c2e3b4fd6498d1e2e72695b50ad0822e327
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
363B
MD58ffeb558e2f0518727b388028df60c2e
SHA1768cbf8273960e356835e7578a5fb56cee9f91de
SHA25693f0f06d7373738ded67aee795ce8fb2e2698ebafd767b0938611b788868003c
SHA51214e0c4ad9bd39089b1b23d11a4d0f36acdc1faf96c6df91943d274af0b7760725226b93a2e7ac6574d509221f62ce1428cb94013dfb2fc1f3fb79155d986a0c2
-
Filesize
5KB
MD5924d4398e43290a9bebe3d79359b52a5
SHA1b70842b01808e0aee630f0dcb8d2f7e95d582228
SHA256cd81bb074a1dd3bdcb61a41b1e351856203a609a9ca5f01f07a7bdc5f954a44b
SHA5120468a89cfb6c938b14a506764202ccdd86fbefb4b7eb99727d337a2cef46376ac4d43dae29be5232b1a3f6468279cc4a918b209c31ee065638bf6956b575d3d2
-
Filesize
5KB
MD59420146537d7702eaf3f75ef5e116dd0
SHA1184bb54cc1dca7cd4819355c77a85261012a9a4e
SHA256e63065741737a3a95a7e7c661856b699675ca9466bd4e4f554f0751d3163acd0
SHA512d3a08de25930ec4aaffd798ddb2d74eae3ef2cd8e44ad1f097984a6dcc0b335f594f7e9f57c666ce40d2760ce5ed6b018ab1f6d1dd8cc6247fc0c95ae1e8500e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
384KB
MD59feff8e35b4484e65dd65870c920614a
SHA1c1659cfc48d4f72b21a5d88dca3b0e0aa77211cc
SHA2564b10a3ebf8a6ea85f25de68253d1a6d2e45ac70f6cf8cb429683186bae7f88c7
SHA512a6d6acb1e29c2e0a5c28e23715a8f224f96b4dd77c99eabf5ea6bb13961ba49916523b742947abe3f4fa2a84ddb3fef348c931bf298aa81bdda32216c7aeaa27
-
Filesize
2KB
MD54b666d4a4d5fc3d4233157105dc12755
SHA171d8c68a03ce7bccb88a10408a47fc25cd295f0d
SHA256084a81a6eda6a3b81a0c6ffc576a951d78eb6e2cccbc8ea5ea55eda4c6ca6a73
SHA512c3e13008ec5ff0f19f513c10d4f401ccc47a91b736f7c82fec1d1fa1238ef264e2126e9c927701359be6fdd8b8dcc36d6d746957120a53ad0c83b02dc0b7459b
-
Filesize
8KB
MD5e38c90a45e9f2ebf5cd1c9bdfec80dd2
SHA1484f4fa834be9e7d48ef69a47fdd247bdeb8d7cd
SHA2560016984fdc2aef633d6b43871958af09cbbaa1ade2d28b28374230f568f6241b
SHA512f4eae5d33fa9ecb41990e067d4b244306b111acb76348778eddf83b92e78fbc7fd2cd704e362c70eea3eafca2bdc451a620c436f8766af503b2787df6da28c2e