Resubmissions

28/03/2025, 19:50

250328-ykn37azzgv 10

28/03/2025, 19:45

250328-ygeeksslv2 10

28/03/2025, 19:28

250328-x6yn3szybz 10

28/03/2025, 19:13

250328-xxc11szxbt 8

Analysis

  • max time kernel
    72s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 19:50

Errors

Reason
Machine shutdown

General

  • Target

    PassatHook.exe

  • Size

    14.7MB

  • MD5

    eafb67ed7734f5561c709b64e6e36b8f

  • SHA1

    d7d5859993759ef0079a92506a9eed6a11fbdf48

  • SHA256

    1c1e61fa3ca755e7f1616263bcf948ce2a22ae9d01dac95d4093f59ec5e42ce3

  • SHA512

    f152eab4c9b4d80ccfb9d9aea316838ea2f10376d681b1371dee02484fa68e8949a05c5fd6536f21939f036bd70cc179e364099d59f3aa3645bb8534b8f2c692

  • SSDEEP

    393216:l++AaWnPOESRAc5OKC4JLXH9ip87knYOwPecB:HtQtgk4JrYp8gYOUf

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Downloads MZ/PE file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 3 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PassatHook.exe
    "C:\Users\Admin\AppData\Local\Temp\PassatHook.exe"
    1⤵
      PID:3316
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbb5f2dcf8,0x7ffbb5f2dd04,0x7ffbb5f2dd10
        2⤵
          PID:4652
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1916,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1912 /prefetch:2
          2⤵
            PID:1688
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1508,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2288 /prefetch:3
            2⤵
            • Downloads MZ/PE file
            PID:4792
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2396,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2376 /prefetch:8
            2⤵
              PID:2180
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3188 /prefetch:1
              2⤵
                PID:872
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=1408,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3256 /prefetch:1
                2⤵
                  PID:1104
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3916,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4472 /prefetch:2
                  2⤵
                    PID:3952
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4704,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4612 /prefetch:1
                    2⤵
                      PID:4400
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5444,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5456 /prefetch:8
                      2⤵
                        PID:3200
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5520,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5536 /prefetch:8
                        2⤵
                          PID:464
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5456,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5708 /prefetch:8
                          2⤵
                            PID:3764
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5484,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5856 /prefetch:8
                            2⤵
                              PID:1152
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5688,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5540 /prefetch:8
                              2⤵
                                PID:1352
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5664,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5904 /prefetch:8
                                2⤵
                                  PID:3484
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5672,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5636 /prefetch:1
                                  2⤵
                                    PID:2588
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5916,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3968 /prefetch:1
                                    2⤵
                                      PID:2392
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=240,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6108 /prefetch:8
                                      2⤵
                                        PID:5660
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6124,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6112 /prefetch:8
                                        2⤵
                                          PID:5668
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6128,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3364 /prefetch:8
                                          2⤵
                                            PID:5676
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=4556,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4876 /prefetch:2
                                            2⤵
                                              PID:5264
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4636,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3452 /prefetch:8
                                              2⤵
                                                PID:5964
                                              • C:\Users\Admin\Downloads\vc_redist.x86.exe
                                                "C:\Users\Admin\Downloads\vc_redist.x86.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:5552
                                                • C:\Users\Admin\Downloads\vc_redist.x86.exe
                                                  "C:\Users\Admin\Downloads\vc_redist.x86.exe" -burn.unelevated BurnPipe.{79DD6A36-8A98-41AC-9DEE-F6D6FD2685CD} {3B4C7B8F-932E-44BF-BA06-EB8198ED8CE4} 5552
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5648
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6340,i,16979361694579581529,17962553002982440827,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6348 /prefetch:8
                                                2⤵
                                                  PID:3416
                                                • C:\Users\Admin\Downloads\NoEscape.exe
                                                  "C:\Users\Admin\Downloads\NoEscape.exe"
                                                  2⤵
                                                  • Modifies WinLogon for persistence
                                                  • UAC bypass
                                                  • Disables RegEdit via registry modification
                                                  • Executes dropped EXE
                                                  • Checks whether UAC is enabled
                                                  • Drops desktop.ini file(s)
                                                  • Modifies WinLogon
                                                  • Sets desktop wallpaper using registry
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies Control Panel
                                                  • System policy modification
                                                  PID:4688
                                              • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                1⤵
                                                  PID:3420
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                  1⤵
                                                    PID:1336
                                                  • C:\Windows\system32\LogonUI.exe
                                                    "LogonUI.exe" /flags:0x4 /state0:0xa3926855 /state1:0x41c64e6d
                                                    1⤵
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5340

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                    Filesize

                                                    649B

                                                    MD5

                                                    a61da2a0a3940a407612b8e03912189e

                                                    SHA1

                                                    35adc86704d5585f4bdb281c6ce113c9e57d5091

                                                    SHA256

                                                    5a689df2414c67e8e64559394ba93083fb442cd1caad756ed0fcdf26088c3119

                                                    SHA512

                                                    4499fea602da241e76be020ec1bf800a3865492f0231cdafbcbc91d887e0b3e5840ee83a4445c5dfe3e13e6b2f9ec29ffb8e32216f9c6e542d7f16a60a3092a4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json

                                                    Filesize

                                                    854B

                                                    MD5

                                                    4ec1df2da46182103d2ffc3b92d20ca5

                                                    SHA1

                                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                    SHA256

                                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                    SHA512

                                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    225ee483d8d33dac197153fb20247550

                                                    SHA1

                                                    5f79482ea2e869e74b71930e5e70b7be0f736b45

                                                    SHA256

                                                    48d6fa0768237706614a376ef9f952a7b7b7b7391728f29b92eb4d89ebb8f6c8

                                                    SHA512

                                                    02e2178beb52621dcf382c72d7e59cdefb898f26d1461c819e79ae80f2e3360c61aa55e4328b98eabbb2a67aa642a88b8638053a33553cacc6780978aa382ec2

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    ad39546c63f986896089e8ca40373d8b

                                                    SHA1

                                                    8e9388b66914f08b61e240c3863b7bb187f25058

                                                    SHA256

                                                    4d1ad07522725a5ee8062e42b3342c711bff2e9c2196a006f4c9c866a00aba58

                                                    SHA512

                                                    277303d38848dee94d924477e27fde763ccd3bb1ce1959cebb8ab554b0ffdfa6c647fcb3c2ca9e4297f35fd2e86adf622216b873de64b89e0be8247ad55ccd48

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    a1ef4115ffd55f33739160a6263b167b

                                                    SHA1

                                                    68bcd5e055865cd0d0d22aca09ef491a5cf79c3c

                                                    SHA256

                                                    f782cfbbb75d37379df8a9073e4ea6bdaf721612e3715b66b8c6280ff0597ba9

                                                    SHA512

                                                    28eef6c5ac2b27ad92b519d547b110bc9901b90599c71557d6c3edfffe3e85b14c9d072128993b30a2e9d9fd958060871b019253091ce91778c5428ef5c89498

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    718fd5ee2a60244eb5b1bf57c6d061b8

                                                    SHA1

                                                    54bdd351e314e2a33f147f74d60f719d4a47bd79

                                                    SHA256

                                                    3f864d8a27253ce6cd5363d01e675ab0125d176ba30819b2813290bd867717af

                                                    SHA512

                                                    307af48d41e51f208ddf913abc1e701a91a7da2333193932f1afed7a7db3344304a8e2c16282def4c62d87dc9ac3c34ef33a0d58a0ea5d232939c223a44fe972

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    4df4746564c165c6163aa84be76eed8e

                                                    SHA1

                                                    b6eab429800d5fadb56e73216b7d541009ce2bd2

                                                    SHA256

                                                    eb541b046093c071348feec1bc1a24d05d95be4f60a460a13a2e759e890779a8

                                                    SHA512

                                                    da18c711cb8ba590cf87e626ab14343d3c8b742a76749a8e1bd7bfc014857b16af2c4f158b75ba364202ff835c96642acd71e2d2dd84ea86747aabe8230469ff

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    a55fd35ef274a1e5e56501fdbb15a86b

                                                    SHA1

                                                    5a161c39607c34f261b51a4bceb50071ca2b5e8e

                                                    SHA256

                                                    6ebaff0697b07dee1904d84783f04d133f2edff9fce28e4ff4621d7991e15df4

                                                    SHA512

                                                    637081bad73572b3113939df49d4c7b9a8d5db469d448419ee2c9c240e67c418911fec02d24957dc15c5ec248a0495da9541d235958ab95ace44652a60e69b31

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                    Filesize

                                                    72B

                                                    MD5

                                                    34c6ab68992bb3f44a6e0df5a2eafa51

                                                    SHA1

                                                    88ffa33b371e7b7682da40e532be5da108256c11

                                                    SHA256

                                                    6b1ee1a514388aa25e899fa4a5cecb63520c07247aef771fbbb69097e8e191ae

                                                    SHA512

                                                    9054273ed5af076cd28921bd35424d973221b2d985d18766482906cec23cf9196b209820e6c66efb4c917127cd8b8e459ecf4a4876dbe018563c4878f019797d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                    Filesize

                                                    72B

                                                    MD5

                                                    25ae3a2f2ae805fac329190078062e37

                                                    SHA1

                                                    97df32c8fb7551446be284d2aa4dcea5b7ad2bda

                                                    SHA256

                                                    964e1e4e29f7d5484d068a81d259b3160aab637e20fa0febf2f8bb44f99ee488

                                                    SHA512

                                                    79012995443b6c31c13eefce1815c2abfcf63c3fbd8b4cd64f7421af3adca0162ab6fa5674328519e0e30e9d33701053c686857f85192ef5b83147a01d2815b1

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582074.TMP

                                                    Filesize

                                                    48B

                                                    MD5

                                                    c53264e2a8440822f5faddde35646285

                                                    SHA1

                                                    59a199c7cc5ff659c893f0dbc0c2d74740055f42

                                                    SHA256

                                                    8490a62428ada4197870a2995d8e4b90f1b00930afbfc34339c59ccc1bd402cf

                                                    SHA512

                                                    b80450016b763fac0fcad582f46872bbd7d1dfccf74a5c17e62430e9a23cf3e3f6acc6b28d25411d35c7cf526fea25902c316110957b0db5aa53bd1e7491e62d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    80KB

                                                    MD5

                                                    02c21a30978ca8645c53bff554513a66

                                                    SHA1

                                                    711f4340b755ba95e996fc6669c24ad226f448d1

                                                    SHA256

                                                    c1c31394d4a4e488ea539ed75428354a690db8ae9b18f61a56e40752ba5fb9a5

                                                    SHA512

                                                    b0f1902fa1361ab4b954b132c22a4b98e45773141ea009789eef49ccbd48c202b21411980c0222eb4bfb08e623084099b192dab160b0ce2a84b88b9802aa1353

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    155KB

                                                    MD5

                                                    ec33dd2d8855a9cfa79aeb53e6409666

                                                    SHA1

                                                    b5a7405eaa740078382da1d3316c4d13ec67c38b

                                                    SHA256

                                                    a670bd3e68214ea20ea71f35def2a52a752e3a1e0dd52e25a667c61412ac5d4a

                                                    SHA512

                                                    0c9fed3ed07b48571e10b8c4f20f3acc5825799ef3e2853f56271f9989d7630acde51173669eed6a21cb1de1193abb0037de6cb23e0767b878ef5abb6b125406

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    155KB

                                                    MD5

                                                    61c6a9558f7d467f46d3ff482a5aa88a

                                                    SHA1

                                                    26e17f83dd88bd9dc83e1e32d305af8938f92944

                                                    SHA256

                                                    6a358fdfaed92e78f07e4c9ef16865f4e4612b581f668929d16a3cd07bc45b57

                                                    SHA512

                                                    cea2b861509f45fd9e3a9ae342f3d3e9dfbb5542169589965d2b7bfc78ab9fb19f15cccdce494d88e04d9c62e54b1e761af7d133a53aef9019b165f6898b0a37

                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir1388_940029355\8d9d7a13-a9e7-49a0-99eb-6c4ab32c737f.tmp

                                                    Filesize

                                                    152KB

                                                    MD5

                                                    dd9bf8448d3ddcfd067967f01e8bf6d7

                                                    SHA1

                                                    d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                    SHA256

                                                    fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                    SHA512

                                                    65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                  • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\logo.png

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    d6bd210f227442b3362493d046cea233

                                                    SHA1

                                                    ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                    SHA256

                                                    335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                    SHA512

                                                    464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                  • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\wixstdba.dll

                                                    Filesize

                                                    118KB

                                                    MD5

                                                    4d20a950a3571d11236482754b4a8e76

                                                    SHA1

                                                    e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c

                                                    SHA256

                                                    a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b

                                                    SHA512

                                                    8b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2

                                                  • C:\Users\Admin\Downloads\NoEscape.exe

                                                    Filesize

                                                    666KB

                                                    MD5

                                                    989ae3d195203b323aa2b3adf04e9833

                                                    SHA1

                                                    31a45521bc672abcf64e50284ca5d4e6b3687dc8

                                                    SHA256

                                                    d30d7676a3b4c91b77d403f81748ebf6b8824749db5f860e114a8a204bca5b8f

                                                    SHA512

                                                    e9d4e6295869f3a456c7ea2850c246d0c22afa65c2dd5161744ee5b3e29e44d9a2d758335f98001cdb348eaa51a71cd441b4ddc12c8d72509388657126e69305

                                                  • C:\Users\Admin\Downloads\Unconfirmed 2409.crdownload

                                                    Filesize

                                                    13.1MB

                                                    MD5

                                                    1a15e6606bac9647e7ad3caa543377cf

                                                    SHA1

                                                    bfb74e498c44d3a103ca3aa2831763fb417134d1

                                                    SHA256

                                                    fdd1e1f0dcae2d0aa0720895eff33b927d13076e64464bb7c7e5843b7667cd14

                                                    SHA512

                                                    e8cb67fc8e0312da3cc98364b96dfa1a63150ab9de60069c4af60c1cf77d440b7dffe630b4784ba07ea9bf146bdbf6ad5282a900ffd6ab7d86433456a752b2fd

                                                  • C:\Users\Public\Desktop\ᒡᇸᴾㄌㄜ※ᇭൺ۱Ⰵ➈ࢴ྇ᠫഢ⻋⚈᪟Ỗ◕

                                                    Filesize

                                                    666B

                                                    MD5

                                                    e49f0a8effa6380b4518a8064f6d240b

                                                    SHA1

                                                    ba62ffe370e186b7f980922067ac68613521bd51

                                                    SHA256

                                                    8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                                    SHA512

                                                    de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                                  • memory/4688-1043-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                    Filesize

                                                    1.8MB

                                                  • memory/4688-1230-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                    Filesize

                                                    1.8MB