Resubmissions

30-01-2025 03:04

250130-dkkesawjdk 10

30-01-2025 01:27

250130-bvjj5atmbk 10

30-01-2025 01:11

250130-bj2assvkbw 10

Analysis

  • max time kernel
    234s
  • max time network
    248s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-01-2025 01:27

Errors

Reason
Machine shutdown

General

  • Target

    chat.exe

  • Size

    27KB

  • MD5

    bb45c811961c699e90d80cc770fd828b

  • SHA1

    bab510ce8e9413bfcb907964e7f29c6f0af740ac

  • SHA256

    e5c6c05c353d24bb71d61de48ec945c4284df2ac6aabd751405b7f9349973bab

  • SHA512

    2f5c64b96ad289d38b498d949c2d7d89006d4c19a61efd53fdda48342817febdd1b1ffdf6f53d99296101d88a3d669bc9d3fef5017eb4254c759148eb410cd6b

  • SSDEEP

    384:+tWZPzzxAm1vS5ZooqGhvLKe2cIS2NirglyOy5o91XOkHpg82vO:j7zxAmOS/Gee2VSSifho9pOkHq822

Malware Config

Extracted

Path

C:\Users\Default\read_it.txt

Ransom Note
Don't worry, you can return all your files! All your files like documents, photos, databases and other important are encrypted What guarantees do we give to you? You can send 3 of your encrypted files and we decrypt it for free. You must follow these steps To decrypt your files : 1) Write on our e-mail :[email protected] ( In case of no answer in 24 hours check your spam folder or write us to this e-mail: [email protected]) 2) Obtain Bitcoin (You have to pay for decryption in Bitcoins. After payment we will send you the tool that will decrypt all your files.)

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Chaos family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 62 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 44 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\chat.exe
    "C:\Users\Admin\AppData\Local\Temp\chat.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:248
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:2944
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3828
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3456
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:1032
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:4976
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:7696
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1384
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4344
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:4872
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3480
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
        PID:2676
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4880
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im notepad.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4700
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im explorer.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:288
        • C:\Windows\explorer.exe
          explorer.exe
          2⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:6308
        • C:\Windows\system32\notepad.exe
          notepad.exe
          2⤵
            PID:5160
          • C:\Windows\system32\taskkill.exe
            taskkill /f notepad.exe
            2⤵
            • Kills process with taskkill
            PID:6096
          • C:\Windows\system32\taskkill.exe
            taskkill /im notepad.exe
            2⤵
            • Kills process with taskkill
            PID:6936
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im notepad
            2⤵
            • Kills process with taskkill
            PID:7548
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im notepad.exe
            2⤵
            • Kills process with taskkill
            PID:7752
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im explorer.exe
            2⤵
            • Kills process with taskkill
            PID:7776
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im svchost.exe
            2⤵
            • Kills process with taskkill
            PID:7908
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:840
        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
          1⤵
          • Enumerates system info in registry
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3440

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\USERS\ADMIN\DESKTOP\BACKUPRESET.DOCX.7UKU

          Filesize

          604KB

          MD5

          9896189f6e7f2babae8b5709f5be6b8a

          SHA1

          e56dae4016900ea8e721cb6cd0ee440a2b4e1c20

          SHA256

          cda2c5b886a87bd6b3c2cdd574bcf02007e95117585d7a9255b025146e2965b8

          SHA512

          f82316c50fb7bc09ebd3c2eff71cdc419297865cbe991be8e96afcbd379294c4cd7b0e3835728ef56624dd41f07e66a549cac82bbcdb6892f78381f7f123d637

        • C:\USERS\ADMIN\DESKTOP\COMPAREMOUNT.XPS.U9MG

          Filesize

          1017KB

          MD5

          92f5e00cc834df1e2fedaf6373377cff

          SHA1

          853025431dcf9397080072938c9df58e7e612ae6

          SHA256

          5e6c8b9696033a2aa386cac4079b96a095b87cbdc904a415ce394eab1da5605c

          SHA512

          4ed65e100ca5105d6218b3235323fc90d93cf8d2b167c36d53276e9f86608e5d474b7755b2c41b6aaa7f26e2fa1f541ad6f92b3f6b777a6f148a574838f62d2a

        • C:\USERS\ADMIN\DESKTOP\CONNECTRESOLVE.PNG.4IEJ

          Filesize

          752KB

          MD5

          806891981ae0b9de922ff49b40a0c73d

          SHA1

          adc98bbfdf5e7c99ceea644e87c49759d41b250e

          SHA256

          4eda74d151c90f03525fef585fd5364c89e0d30a5567f92b7a11c5ac764e5996

          SHA512

          d4548c0272c0acba9b7fbc2b47bde8d01c2bcb15b785ee43592e34e14546cd79b17e366f01bd907a3d3460013669f51b513c9d3615028216d7b5b19740cceed8

        • C:\USERS\ADMIN\DESKTOP\DISCONNECTSUBMIT.MPG.Q658

          Filesize

          1.4MB

          MD5

          97c257922253c5cef0df41375e615e60

          SHA1

          9d584dd30f8aa0b8d966aa49040b8b8013df8df0

          SHA256

          c96d4c8b12813bc6c0c755ddde791309a4f42500d6517bf4bfc764c8307cd44c

          SHA512

          ea03c95d7d0c3956db2a43ef061ae8509dcca8bd96b8d39b83e824a1dd48b616ff7eb793481137c4a0d2bf5f4f32e5cbbeec8bcf1bc84f7776a54a5aaa91ee3e

        • C:\USERS\ADMIN\DESKTOP\FORMATUNINSTALL.TIF.TYZ0

          Filesize

          722KB

          MD5

          eabced71c794cbd5031b1c2bc01f6850

          SHA1

          9bdfb11d126d900bbac14f751adcff3059c80745

          SHA256

          99c55bc3cadbb8580da74ed9f0822a2e947035a446248bc7c4961e22629f4950

          SHA512

          2eb58bd8dfb6e59068c0cbd3f5fb85c59cdffaf387dca3175047c31a6e620b32d74ad0191456e31848d97cbda9b8a8107159a9d07fa412cb2455265cd9fdeb95

        • C:\USERS\ADMIN\DESKTOP\MICROSOFT EDGE.LNK.0YFO

          Filesize

          2KB

          MD5

          7ffabe247c1384e07add83dfac71a4ba

          SHA1

          5a1571a5328d70e7c06ca34efdd641e1a700375b

          SHA256

          9da8215841073760a64c5ad883a9c52ef4c5af946efc39a2fe536000f032b0ba

          SHA512

          5c24dcaa1c569b1a226eb934499d13ee9307639088fd190b373fa19386bb9eac0e132428cdde77145fedce3273d88b6e28dfd9be530cce5b7ac1e60db79f987f

        • C:\USERS\ADMIN\DESKTOP\NEWMOUNT.RAW.LYUA

          Filesize

          663KB

          MD5

          f25e01814ebe221aa1bd3e0afafb80e9

          SHA1

          053ae7406c7f66fd32191b270cf26d2e3d725d7c

          SHA256

          b84327937923c44793f8c0d4cff9aedc6bc012d9ccf66cad9f91c36c4c83485e

          SHA512

          609c78c912b63ab04c5a24fee206d4e30bbdf271e07962f31af41e91a856675a77e272b563cfd21c4f9b7b25c7f4d4875343eddf4f123ee64b51538b831d6a9e

        • C:\USERS\ADMIN\DESKTOP\PROTECTINITIALIZE.HTM.8XOP

          Filesize

          545KB

          MD5

          b5f8709fbc646e9983961dd5054b7920

          SHA1

          e1ad864f9bebcad9ff807fee475991b0ebd71ad3

          SHA256

          d320a954c2bb09b53d17932716d109b5373e341eaec1015709ab5ad0a38d0597

          SHA512

          35f6ed9441f27a19288fdb4b578f962ae284d044589561aa2456eb094fc2bf952476a71d7998b524816cafa53454c7352240ad60e9ba1ce56b1a145a43979a1c

        • C:\USERS\ADMIN\DESKTOP\PROTECTSYNC.POTX.DF9E

          Filesize

          1.0MB

          MD5

          dbec906bd69b05f25f47ea919ddcd0f1

          SHA1

          1221782682e4ed22becae9665df04b510bc0e537

          SHA256

          8d76a6026cad5c65afa31effcdb5dae19b95206e1abdaf4b5aeb3f95af0e7faa

          SHA512

          d17b7713b2f009b6ff22cb02099ce87c249ebd1d3a5ba7056a6bc5d6d499a1c34b762b72094980d08e76d7a0fff65fd24045baf16c7b821ffc0ff11d2af06784

        • C:\USERS\ADMIN\DESKTOP\PUBLISHRESTORE.ODP.AQSC

          Filesize

          781KB

          MD5

          8bc39faa25820266bbb3e5c9bb3e519f

          SHA1

          af9f44740bcf4f8024ccf838d6367e12a2864cca

          SHA256

          97b9671a1c0313c5d93d744e9cfe6a45ef4b5011af29bce879dc012608ca696b

          SHA512

          14c786b58a52355e2a237ead06320d7267bb2b18417b113add322c08d2a4f2cbc3333531cfa39ed2d8ad59ebef05074e85fa28f907baf93580f1bf1c336bf043

        • C:\USERS\ADMIN\DESKTOP\PUBLISHRESUME.MPG.00TW

          Filesize

          958KB

          MD5

          b95490d7882ed76571f910c27eaec069

          SHA1

          1a01b83e058b888a9c871bb74af05f0dc7e76379

          SHA256

          24ac69515eac71bccbd5ba0cbb15cf96f4292c76f1f4e6e65923f857d6bc679e

          SHA512

          5368036187db7dc6b7d501f257d0cb6305c31e16069768d946eeac590c892ed3edf06f188187a044cd2bc9c1388c17d4927eed94e631ec8b658074c6a6c1144b

        • C:\USERS\ADMIN\DESKTOP\RESTOREDISCONNECT.JS.D8SI

          Filesize

          811KB

          MD5

          3c0e64340e2208f9f1435dfae01f7c2c

          SHA1

          dd451adbe05148906678327721a298d0e3465ec1

          SHA256

          3f7e3ffa3b9bab716eebadec541752ac9bcb9fb7f49bfcd523308204d8eada76

          SHA512

          31fb38dd46294d75eed64136eb84dcab9f8110ec5c930bd1e2d1c17387759cc7178ccb87dbb8b7803596c331504a89ba41121203fb916ca375e9341a41ef3f7d

        • C:\USERS\ADMIN\DESKTOP\SUBMITREPAIR.M4A.6ZFD

          Filesize

          575KB

          MD5

          b8e98ea7c476208c90cfa1eaa0fb2c17

          SHA1

          ffc45339fa8ff438f75d7240d0800fe29a6512b1

          SHA256

          573fbc0bbcbe0a6633883d812b57bb2c95151132cd0c7ded1ae84167861c8308

          SHA512

          700f4732c05e5628f8254fea829618d434219676a64f809666bb61d33a8fc886ea4636caa63d255608f5578df9a132ea8ade01b63684465850473d8bc03b9021

        • C:\USERS\ADMIN\DESKTOP\SUBMITRESIZE.POT.1DMJ

          Filesize

          634KB

          MD5

          b6e5d90d9911f544ade291bbc9786148

          SHA1

          7b232a993349facc58b749a89ceb72da994fe712

          SHA256

          4eb57b7d1d5437ca0da6c825b29daaff79f4459a92a319dcca4a1bd2e1b9dcad

          SHA512

          7e362dec4672e47059a6eb5cd558890d3c53214362669a063f27254dc4f40b9489d689d91633021e4a3e10513dd28771b0bc2c0d53becc3991fcd8771356779c

        • C:\USERS\ADMIN\DESKTOP\SUSPENDSTOP.XLSM.O5I5

          Filesize

          457KB

          MD5

          54950e5a8d5b66e5d0fb70e45b56b60e

          SHA1

          077e4c368b68af7cd09777331624c1000853a122

          SHA256

          d1c443b6d5a889ef1694301efa559cb583447664c4a596435b19403f98f065da

          SHA512

          e2a867928ac883fd6ce929838a7d7c388fc630179c715a16ddb9c91895c8e1cba7dc9dc3be221bbc4b5c2346515c34cb151c3bceaa34924832ed8a126105dd89

        • C:\USERS\ADMIN\DESKTOP\USERESOLVE.POTM.OLIG

          Filesize

          516KB

          MD5

          01c3bd27c03401399ee8643873629b22

          SHA1

          0b36e1e4fe38c9dce801e204c4bbdad3faf9bf05

          SHA256

          a2389e3d5a4e582d8a2114a4807a64d3240b2399c6c3313f6d02d72503c4ddcc

          SHA512

          1d2f2a912d4d1a1818419b87661c149be53867b601aeb8435658c57688e43d98b37c6038b0d168dac660006657f3c796b80f5ba55cf9da2460b021f45f4c39a7

        • C:\USERS\ADMIN\DESKTOP\WRITEGROUP.DOCX.4ZGL

          Filesize

          13KB

          MD5

          f23a639b5bff154f82aaec1d017282a3

          SHA1

          ddf2d7437175d872510abe11899f5f08b0f11d80

          SHA256

          7eee3149e6f9c469af72e58800b291ea182a0d7fe00b8010aca8983ffea58154

          SHA512

          2ee6dc0e8a6a4784992703c130006632ab3212778be35d866406ea729cb6db98a78985a96e785524aa539eb3ca9878186acbbdfc5ba0da66ab139e006e6bffbf

        • C:\USERS\PUBLIC\DESKTOP\ACROBAT READER DC.LNK.CC6O

          Filesize

          2KB

          MD5

          7e6b6b718f01e3f888f981724ae96840

          SHA1

          3de46eb5ba8b7a5a93bcf99b79cbbe989a3e956c

          SHA256

          29818666334196dd7d83848ef47e207b8e65bb73a737ecbc0fed7509fbd9b827

          SHA512

          fbbd341c515c1907620eda21d969d2134165ff4de5ebec4b0f466f84b3fb7dfeebd3abf350b4cf6a2edd8c3bb4921df0248668f3df4bf6f709ffbb16ec5af3c9

        • C:\USERS\PUBLIC\DESKTOP\FIREFOX.LNK.4II9

          Filesize

          1KB

          MD5

          958a181c76b26edb98ad287df70b0dee

          SHA1

          5a7eb71f38f1ab0ba6dabf593ece88a685d79fd0

          SHA256

          87f9d94fae0404c0a6a167f1ba5aef712147c38588a369d9852523e2a4442d99

          SHA512

          9c7b33c21f7b5c9f1fcb4892092117ced37ef91116c98c151b62985c27350ca6f995eda6422a0481f014eb9ac4614df6a22bceb78b19e01f9bf2526c584ced96

        • C:\USERS\PUBLIC\DESKTOP\GOOGLE CHROME.LNK.F2XY

          Filesize

          2KB

          MD5

          614de0cd3ca3bba2e926f1e06bae496f

          SHA1

          5360fa6cbc0d28ebab8f97517baa3b084337d4a3

          SHA256

          8cef543e5a96017dd3b978d65e2bf7448f4e84137f684a2ab0de411ed77b5676

          SHA512

          66d503de7a58089f8deafa0d854c4f85cbd3c3b5ce9b43a67b978125f7c15e43fb98b35b71286941e4cbcb62cdd5b1ddecf6bd4fecdb73b3c1f33c882064163a

        • C:\USERS\PUBLIC\DESKTOP\VLC MEDIA PLAYER.LNK.1Q3D

          Filesize

          1KB

          MD5

          db2620720469de6475c3bbacc64889ea

          SHA1

          52ab53f1f3d9d19f04d9d0e134acec732d4a46d0

          SHA256

          28924593b9b255a580154b62f2ac56026b03507ab703957cb7e3b3f31ecd6f4e

          SHA512

          3c9fef5f445a6396bb8ccb15143eff5c5cd8458543ea84c13001f632733154ad4816d8b5dd3a25f2955972f06cf595a9c1838b33f738f9cbf7e7e8b60816e36a

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chat.exe.log

          Filesize

          1KB

          MD5

          b4e91d2e5f40d5e2586a86cf3bb4df24

          SHA1

          31920b3a41aa4400d4a0230a7622848789b38672

          SHA256

          5d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210

          SHA512

          968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\MSL4LVZ8\www.bing[1].xml

          Filesize

          17KB

          MD5

          af772db664cdae1ff38e0d74f80d8bec

          SHA1

          c456591c4afff1e352adec0429a654a8f44d7da3

          SHA256

          af28f50e241c7d22f94d2e7bc4aa8b80090ebe52f25d92707cb6e83879ef95c6

          SHA512

          552c2712a8c215a5fff317ab90be8b2ede8e5a4b1516eeb7c6fffcc408533a6cf2995709d1ca64e6ee4d8648b66153c4c9866e3fb329b6d6bf944c78f6836899

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133826742736660347.txt

          Filesize

          57KB

          MD5

          8111cff3635328396072c85805305e53

          SHA1

          b531efd0b4a66735473069ca707e8fe9f4dd7685

          SHA256

          a725527361fb9903126de9ef255aba5200c21fc27cafbb2f816ba87c072ae47e

          SHA512

          8edccbedd1d9e88ff01628d1efee384fa978838996090b7acdba7fdfb72dfd2ec454667256046859d2973df359ded07d4cf99658db06b7d7c7cab8d20d9af18c

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          27KB

          MD5

          bb45c811961c699e90d80cc770fd828b

          SHA1

          bab510ce8e9413bfcb907964e7f29c6f0af740ac

          SHA256

          e5c6c05c353d24bb71d61de48ec945c4284df2ac6aabd751405b7f9349973bab

          SHA512

          2f5c64b96ad289d38b498d949c2d7d89006d4c19a61efd53fdda48342817febdd1b1ffdf6f53d99296101d88a3d669bc9d3fef5017eb4254c759148eb410cd6b

        • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools.lnk

          Filesize

          1B

          MD5

          d1457b72c3fb323a2671125aef3eab5d

          SHA1

          5bab61eb53176449e25c2c82f172b82cb13ffb9d

          SHA256

          8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

          SHA512

          ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

        • C:\Users\Default\read_it.txt

          Filesize

          582B

          MD5

          ed5cc52876db869de48a4783069c2a5e

          SHA1

          a9d51ceaeff715ace430f9462ab2ee4e7f33e70e

          SHA256

          45726f2f29967ef016f8d556fb6468a577307d67388cc4530295a9ca10fdfa36

          SHA512

          1745aefb9b4db4cdd7c08ee3a7d133db08f35a336fd18b598211519b481ef25ac84a3e8a3da3db06caef9f531288d1cf0ca8d4b2560637945e7953e8b45421f5

        • memory/3440-1209-0x0000024DA5000000-0x0000024DA5100000-memory.dmp

          Filesize

          1024KB

        • memory/3440-1400-0x0000024DDA0E0000-0x0000024DDA1E0000-memory.dmp

          Filesize

          1024KB

        • memory/3440-1312-0x0000024DD7F30000-0x0000024DD7F50000-memory.dmp

          Filesize

          128KB

        • memory/3440-1306-0x0000024DD8110000-0x0000024DD8210000-memory.dmp

          Filesize

          1024KB

        • memory/3440-1305-0x0000024DC6DC0000-0x0000024DC6DE0000-memory.dmp

          Filesize

          128KB

        • memory/3440-1210-0x0000024DA5000000-0x0000024DA5100000-memory.dmp

          Filesize

          1024KB

        • memory/4888-16-0x00007FFAE7830000-0x00007FFAE82F2000-memory.dmp

          Filesize

          10.8MB

        • memory/4888-1154-0x00007FFAE7830000-0x00007FFAE82F2000-memory.dmp

          Filesize

          10.8MB

        • memory/5064-1-0x0000000000D80000-0x0000000000D8E000-memory.dmp

          Filesize

          56KB

        • memory/5064-2-0x00007FFAE7830000-0x00007FFAE82F2000-memory.dmp

          Filesize

          10.8MB

        • memory/5064-0-0x00007FFAE7833000-0x00007FFAE7835000-memory.dmp

          Filesize

          8KB

        • memory/5064-15-0x00007FFAE7830000-0x00007FFAE82F2000-memory.dmp

          Filesize

          10.8MB