Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 00:28
Static task
static1
Behavioral task
behavioral1
Sample
CCleaner64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CCleaner64.exe
Resource
win10v2004-20230220-en
General
-
Target
CCleaner64.exe
-
Size
37.3MB
-
MD5
2989ffd5783532fb2d49588c9fc8b1c6
-
SHA1
d5b87c5402debd0434c02b2366fc2de50f47485e
-
SHA256
9d4b19b0723b350860614548f2c8342802fc115acff93ef63b580db189e57c2d
-
SHA512
1e666a6fed67b8aa492c3ca8de023bebb8ea842f4f67512c9876628d0a9f14efa1fce3b1abec32b9833470040dbd94c210a97b9241818fba8cfcdae036d7185a
-
SSDEEP
393216:Fud5EHypOO1QQsn5FHz8CeoF4c/rqNZ+gIItlxhSEAewYnhO:Fu7EbOC/Homk+gIIzx7Hw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CCleaner64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation CCleaner64.exe -
Loads dropped DLL 1 IoCs
Processes:
CCleaner64.exepid process 4460 CCleaner64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 8 IoCs
Processes:
CCleaner64.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Avira\AntiVirus CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Speedup CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Avast Software\Avast CCleaner64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
CCleaner64.exedescription ioc process File opened for modification \??\PhysicalDrive0 CCleaner64.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
CCleaner64.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer CCleaner64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName CCleaner64.exe -
Drops file in System32 directory 1 IoCs
Processes:
CCleaner64.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\addinutil.exe.log CCleaner64.exe -
Drops file in Windows directory 39 IoCs
Processes:
CCleaner64.exedescription ioc process File opened for modification C:\Windows\setupact.log CCleaner64.exe File opened for modification C:\Windows\Debug\PASSWD.LOG CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb0000E.log CCleaner64.exe File opened for modification C:\Windows\security\logs\scesetup.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log CCleaner64.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log CCleaner64.exe File opened for modification C:\Windows\Panther\setuperr.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb00005.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb00010.log CCleaner64.exe File opened for modification C:\Windows\Logs\CBS\CBS.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb00006.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb00009.log CCleaner64.exe File opened for modification C:\Windows\setuperr.log CCleaner64.exe File opened for modification C:\Windows\Debug\NetSetup.LOG CCleaner64.exe File opened for modification C:\Windows\Logs\DISM\dism.log CCleaner64.exe File opened for modification C:\Windows\Logs\DPX\setupact.log CCleaner64.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb0000C.log CCleaner64.exe File opened for modification C:\Windows\WindowsUpdate.log CCleaner64.exe File opened for modification C:\Windows\Debug\sammui.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb00008.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb0000F.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb0000A.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edbtmp.log CCleaner64.exe File opened for modification C:\Windows\DtcInstall.log CCleaner64.exe File opened for modification C:\Windows\lsasetup.log CCleaner64.exe File opened for modification C:\Windows\Logs\CBS\CbsPersist_20230329022857.log CCleaner64.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log CCleaner64.exe File opened for modification C:\Windows\Logs\MoSetup\UpdateAgent.log CCleaner64.exe File opened for modification C:\Windows\Panther\setupact.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb00007.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb0000B.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb0000D.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb00011.log CCleaner64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
CCleaner64.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz CCleaner64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor CCleaner64.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz CCleaner64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
CCleaner64.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs CCleaner64.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch CCleaner64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" CCleaner64.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245306324332619" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
CCleaner64.exepid process 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
CCleaner64.exepid process 4460 CCleaner64.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
CCleaner64.exechrome.exedescription pid process Token: SeDebugPrivilege 4460 CCleaner64.exe Token: SeShutdownPrivilege 4460 CCleaner64.exe Token: SeCreatePagefilePrivilege 4460 CCleaner64.exe Token: SeShutdownPrivilege 4460 CCleaner64.exe Token: SeCreatePagefilePrivilege 4460 CCleaner64.exe Token: SeShutdownPrivilege 4460 CCleaner64.exe Token: SeCreatePagefilePrivilege 4460 CCleaner64.exe Token: SeShutdownPrivilege 4460 CCleaner64.exe Token: SeCreatePagefilePrivilege 4460 CCleaner64.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
CCleaner64.exechrome.exepid process 4460 CCleaner64.exe 4460 CCleaner64.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
CCleaner64.exepid process 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe 4460 CCleaner64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4356 wrote to memory of 3176 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3176 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2208 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2092 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 2092 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1736 4356 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks system information in the registry
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd34f79758,0x7ffd34f79768,0x7ffd34f797782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2268 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3152 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3776 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5004 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4848 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4708 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4724 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4864 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5184 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5332 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3316 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5316 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4600 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5188 --field-trial-handle=1828,i,1743865589131306126,9376730029273591913,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\FaviconsFilesize
20KB
MD546ca0435a20303f7ddc5d5bfa1910fc6
SHA1171638da7bcc1a2890dfd1ae2daf776573e34286
SHA2566092d439881703436aa52e99c1862c03f1345e3ae65b6e7cd40de7bf63913dff
SHA512eb6e6aee2caf4a227e502db42695b83c03f5407d391ebf5ec6baf9cdeb83ade141bddcc91009f9313a3681a396ce5f109ff80e26961d197cc1f1ca14098b9f3b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\HistoryFilesize
148KB
MD5f3a9216f93890d26b872c11930326fab
SHA11b688517ae5b0ff3bce246b86f0e3193c290194a
SHA25677776e267ab794a6534469be1d8799fa195f728359c117b5e111c4fb5eda4e64
SHA512e4c1b8cae195225811a17419affd117cbe8708b0dd6638ffdaa5e089d7b7f4d87b022f70f654abc2b81a5a91320762b5ce99a13c16e59aedacdf821848fb5ca1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
369B
MD55717d3153d4013cbe10331bc98778dd7
SHA1bb3b1df3a99edfb47ff2431bf01c470173bb8c72
SHA256c8127317cfcc535e472ffb174ba74a0e2f9d5951edc0a05a49bd24d656fc70cc
SHA5123b28f9716839d08a98a78e0df7d9720d10f5db30b6148820ed328df48cac2873ab9f6212fbca4218bb2a741c0e73d578fa33c2ddb6e4584113ff606c3fd68b2e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
535B
MD55d28361e534459ee80a02cc288c9599d
SHA1948c78d3678c544509611ade47d80f511c418989
SHA2564b6534485a84899f2e26b6875a7b1195023e3c89cf3bd6373e67242e9f94adcd
SHA5122aeb3938601be28302536eb76bf6ac8ca5c128b7424a225919d3fce677f94f80dba66720a6817aa480ce28bbf12cab9db66bf029f1afe483b3ec861ba0036255
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
535B
MD5fc17a0a2646298d8e4d2028030301bc8
SHA1d6e3076d45b4b5d8c14dcf37a4ac432aaaeb097c
SHA25653bb7485bd497af625fdd54a5972a7cea363f58e375d5d76b5f432e6ec6f913f
SHA5121fedd9bd84cb23c8c144ba2b86869519cdf5811f399fe4444b21f08b6af7f98e58e68bfdd00a0b4beaa424580d5d8c72cc2fa18821ccff8c093e47438e563609
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
12KB
MD5eae8b7788eba501c7a99a65aa967e39d
SHA1d65afbe0610e04545f94b6bf7fdb27dfaec2be90
SHA256ff42606f927e77cfd2b56eb315a1637178f5225a8e2f84240646e288b8ed167a
SHA5124d242ff0d25ca9f9d5bdd7ff03848ec7f1a3c9370f6ff599dbca7da0c918393e54f7467b9ff191bccafe16014c52da418cfd16d81806b66cdfca57eb3ce6b2bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD511dfd7c5a6303b9f08aa802d170a0680
SHA12d88da3ca8b8729db26588a519215fac81167ee9
SHA2569ada98e344e50d9b0ab24ee99ffd8e1e59f4cc2264b768b2b44025332fd44fd7
SHA5122e689fa6c40e898c15b4060fe4ed9a60afdd5ada470ac7ccbcb17ee33e23d9d851f0fd45c9b69ff22cd6725b5a463aca22a6ce4eb005a33ec670fa93b4020c53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5ef88812d49ac72f94b593f31abc266f9
SHA1ce1c51fe8abab9723e4d956bb82451b69d66fe24
SHA256a2db84145ccde9451ec2cbf645da5782f960fe4404098a8b2406648ce05ec552
SHA512ee77389a287b90e3c4df7fc64e20dd8232fbfcba499b720f4729f0e7b2c6ea0ce365f315cc9e93f1676ab0177cf954bc158b089844e7bdb87bee0683cd0ba1bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5e7e26147e5149ec332f7e0b70b7edbb8
SHA1e4675b2a654c256c71572e06682bd75152f0aef3
SHA256104f418f17091bf58217db4ba597bcc5e6a60c735dada40e56dc5d79d2812ab7
SHA5122e4add7f37d7594aec3b036aa91b79f95374fbac86984b956c79700c43e5571f56ea014d8da217cfa7fdcc7babe27568fbbb1c6f1e1681550685cb0dbe63ebe3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web DataFilesize
92KB
MD57427b98d4857dbe8edd9fe423c95d288
SHA1b72ba81454c7a29c0d7b7b2d2def44d49802f5a9
SHA256f9df04253b3191e280ceb10cd66d79e1b33090cd38d5fefa3d0b48896c7e1ede
SHA5127e21444887f05157514834085fcde730c489aa33754d6a2d555d92e8c8421603336d6b5e2db980be98a2a0ad19c3885b1d13984f364e1c89c93ec56dbb0a15a3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD5a5383f33eb0a63971e3f0595984487e6
SHA1bf7d0e744bcde2bab0a8bf2a973e09cacb0af96a
SHA2565ef17cc4f4c8d695e29286b3599070196fcd553ae339b4daf72d1ec37a036e3f
SHA51269a6e0cd3bf3d729803fb7560add45ec4d4e1d84c835df9b84a33ef559c6a09fa985dc9ad1ed09083c8f0b4bc800040cb0b3076e2f28543b000d38d8a655a8e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
102KB
MD5b0ec390969c00f0c6dd1c5bead077b6e
SHA102ac8b9a9b45b7f3bf1cb74e9e099f1b712923c0
SHA2569a214864807fe2aab75af3e2da33edf449dc9ae6c57ac680a1de9b5fd5f4ed7f
SHA5124f6cc9568cbd7413d0ca33232c4784f40f7f6f423195f7b4da56e27f711fa7683f7ef4f08d2c23af3178ae950bfaddd667c4a095b4839efcf332aadd0100af33
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe589f0a.TMPFilesize
97KB
MD5161d4ac9683a7ce01ebea6888a5cc480
SHA175aab3e041fcfef17ae6558ef7aa8ba5125ec4ec
SHA25655d94db883eb4d964bca5a571f59e1ffe15e384ad9202a071b6a5547a13b25bb
SHA51231b2fc3bd890ded3804502eb96660f0b77bd407599d9ac7c5ebb488f21b1a6d699afd9e08a2a48e79ca2790445611baa9b3199821cb65d2686feba702310062b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\CC62C1.tmpFilesize
8KB
MD50829f71740aab1ab98b33eae21dee122
SHA10631457264ff7f8d5fb1edc2c0211992a67c73e6
SHA2569f1dcbc35c350d6027f98be0f5c8b43b42ca52b7604459c0c42be3aa88913d47
SHA51218790c279e0ca614c2b57a215fecc23a6c3d2d308ce77f314378cb2d1b0f413acd3a9cd353aa6da86ec9f51916925c7210f7dfabc0ef726779f8d44f227f03b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.logFilesize
512KB
MD56a2ab00f60014f7763cfffe3452d1a10
SHA1fc743cdde32df6d1c51ab0b22e4f5da95d3f6458
SHA2567264ec82bcb3a1dfaa10d37d2c3dda29ba5d6bda986e622d5bfce06f5ce46550
SHA5128904e4a02b0c88492030273a8006231c452ee576937c53f013265707b198c873993c1701a3ba98b720dbfb08b1414068262e396225e0348cca930178cb695375
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.logFilesize
512KB
MD567005b80571de93d3fd9f29c90502b1b
SHA118b0a7eb0bf7b724429cf913f8b434d2e50f6bf8
SHA256fff93efb9229b68667cbadc7478bcef60fb99e792c20addf0cde4e27fc01aab0
SHA51261f96de5ce95bd84fa3ea9764002dc36a9107d58cef413a9d743f91654d3eb85267e240a43c8ed8b9395c78b5d19f92397dbbed2dc921c9be88ccaf776185133
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD587f85f61ef20a9f934af4bb90948d375
SHA1cea7120d8fae407775648f007abdde782ff890c8
SHA2568dc2e054bbeef1530015bdb69fe73352b3ef3a6922ba745a8b884911ec30f0dd
SHA51228e555d95e6f88e54a2667dc3e25f6e9a84452506d9576d2d4f2a56195dc83e1461bb4ed437d70caf4008397ecfa22d6b54c505c4009b4107edfa2b66e722541
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD57b954e4f2e68612537f8b1f30d348d2e
SHA1a25f2c6a3436a9e78e5b4904cc759954eea6b334
SHA256311d68f41bdeb3bf146c79edf52643179fd9cf8635eb003478f73867aae5618f
SHA512791703ffeb5faaaac664adc3a065caca8fffe1546fa37b2b1f09f5a3d4e5c09d19b3ba0a858ffe7f901b7bfd5d458e22e702ae9568be763086303ed5d87105c2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD51dc1124c5a50b0d7d286693d35fe8b47
SHA10f4055d845988a20676a99873ccb4964a894ca2f
SHA256389d26f96c1120c70c184748f990cc6ddf8cddaf54ba1925f1ecf5c05bf34115
SHA512319477b1a37b6ab808563de15942b590a229956132cb3c31803504dd8b2596a94f86269ca44177d20ee276a6deaf56c366b3ffeafa3365373aa9a47bedb2031c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD535dc3124701b603cfe10aa34282aa1fc
SHA1c256f285a076996dd2ca5c01c4c3d45c47bd583b
SHA2566eec96230314a74933578df74dc31decfd41dcdb72b7856c09f1b046e29afd3b
SHA512812c57ddfae84109eb196681c882497919f58c0eae0325a828948a251884b41076c206e30291171ac6ed9ad4663c936f716fa09fe193e5bccb18ce23c0cd6bc1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD59eb9cb775fd8912197abb0c325877381
SHA16ae95d2aabf6274a789af3b4399f1eb52c54be8b
SHA2564a7316e312f2ba922a16e44da1eac43612cd7fc17747331b3e3d349950b1f1a6
SHA512e2078db06ed4ae3a9273625d5d5c3d912e14277dc088cafdc7480bb0a6b145dcbb1c954f608463d7464798365c386e163a855975ece5c7dadceb2a5997587670
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD57097152f6d6322ebfe0be0ae5c60a7fd
SHA15e6afb841a02d6efa8cc6d16c76aa7581566b459
SHA25694f30bcb80b33b738a8ded84e745556cba34e1d1b9acfb91e59d55e07b62970a
SHA5126e974c3ca0b1553e03ba62aae03258e5ad94f5caa523bf07c519e695c7154aa735d53e730bd01135e0d1b84aa1b1390a41ef75c8f50268f5ef38746a9798779a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD58e36d09a86da75eb7f709eac748a8ffa
SHA12579a91b4b6b6b12154794f65357b107a5948b2d
SHA256d62a26574b4652356d154f32f29a487e4062b72acbd9928611bda64282ccd4d5
SHA5124d3579c3e312563815511494a94b08f363218cfb2c0e3f35e7f193cb9650ad4718f8a6e2635f6c34678760799c7a561960900eba7a573a64450fc1af2c973b64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD5bfda249d670d8c600fd44d0d733e1fa4
SHA1bbaa7c6f174cf6eb597af6ba90a0abf74790c6ce
SHA256a70ba9daa1d6ba93e03cff68610841ca488e11b70930016ccd3acfe871e4a098
SHA5129c6a2aac86339915af590600dd88c28b52bc1d4430ad4b0356cf2ec66752f71b571fdf51da34cb6bed26e1acb758bf22a90869e05f438ed514406cdc8cfb2621
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD58ded45f92f3e4b6a87f015d2a3ef28a5
SHA1649cc72c61906c1a2a4df088d57f87f3a7510b7b
SHA256f7d5a8bfeb4a853f3d3e1c8d508a05ac99c791678f856036bcf0cb1da877d4bc
SHA51205d43999c4f998c7a62c7b4c0c73e6e5737a450e428d17432287a24d84e34fad0c9bbcd5cd9410923ff3245c000d0be54c3b2e2792950d5477f8a341b42fcab7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.datFilesize
14.0MB
MD54f83ea2f71e0419b1a1d587ab80e1268
SHA146a006e84df4f33e754dd06dc4365710838f746d
SHA2565ee7c1e86f10892af278b9f5b5cc1bcab4aad52fbb0d197ac42e65b8e5d68f76
SHA512ab69e7d4843001a7459c592c19e3107bd90222d062ec8aeaf8c4d1731b266a9d35612b3a17305b584bd4b1f9665fb14273b8e8bd03b960259931135a830a90bf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfmFilesize
16KB
MD5fcf53934a3b534d28fc27671d626b19a
SHA173778553a9730a256195241c17ed30740fb83f58
SHA25649e6480a2383719f0d1fc70ef82adcfb9fcd7f01e1814640e329fc74e27d99d6
SHA512dbae38a589b15a411e9cf08846d1b75a317949994c5844fa53416339965599b3f3139273f1679a286999eec9e517150a63a2a0921cd565caa9b2c0c81217e04d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfmFilesize
16KB
MD51298d8501cb9c377d44f70257dec5427
SHA10a0ff540055edb828c8038aa9ac1a79e4683d93b
SHA256b1c130b5e00b86ba0a3a39a868453bdb0550c62ed2a99f2276503c28bfcb3787
SHA5121206c790185e828afb9ccd2bdd1814b994b730b2f38efe2bd8436956878c44899cfaa7e620ab81b1b21ab082598092e6e308b985cb9ac5521c976acfdcd3ae18
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfmFilesize
16KB
MD511bb9c83f289f4979fdc998002b9d7b9
SHA15d4cee6d5013ade4a63064ea0f6d215ad50c1479
SHA2561125cb3d018148086a95507ce31cd32c419fb1cdba0c4689df98d19b20bb3f3f
SHA5124731ccc68b0b5a8f09aaee3acf08e72133a8600eb6273c569ca51d2067aa15b1444e6be558b3389c36e49a2a685e4bc9e6363863e50e678a0fbec188ff920302
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfmFilesize
16KB
MD55aecc8e096ff923f68c8191e2a70ed0e
SHA1704088b2462665405afad55d9696c1f93135df90
SHA256656917bb383dc41dee9d40352203124041589c0f37d0e93c1fe6676a9ed086df
SHA51262d7376f3f3b01b973f5f3eaf020cac68ffe18d3564cf540b2bab841efbaba30875048ea6f79baf1f9a4e72f11f4a5ca1452b2d9f78db65036ee6325f2eab0ee
-
C:\Users\Admin\AppData\Local\Temp\gcapi_16800569314460.dllFilesize
740KB
MD5f17f96322f8741fe86699963a1812897
SHA1a8433cab1deb9c128c745057a809b42110001f55
SHA2568b6ce3a640e2d6f36b0001be2a1abb765ae51e62c314a15911e75138cbb544bb
SHA512f10586f650a5d602287e6e7aeeaf688b275f0606e20551a70ea616999579acdf7ea2f10cebcfaa817dae4a2fc9076e7fa5b74d9c4b38878fbf590ffe0e7d81c9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.aclFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.excFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-us\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i5yk3ps6.default-release\places.sqliteFilesize
5.0MB
MD52edffbf6c2ba3fb129b75e63a8053817
SHA1681e6fe0e7c01f030722b10abb4945681bfbc349
SHA256b464f492518444afb5911311cad9249a59a22bb42b3cdfba7c9ec62ad00cd70e
SHA512d79baab24d8dd8ec778fab02c2223bee0f7286e3d8c7fdf22febebb920e3dde7638c30212bf2c83a97e452228141f97b4253adab6de300812e19fd5bf5fc3ad0
-
memory/4460-140-0x00007FFCCF6F0000-0x00007FFCCF6F1000-memory.dmpFilesize
4KB
-
memory/4460-136-0x00007FFCD0C80000-0x00007FFCD0C81000-memory.dmpFilesize
4KB
-
memory/4460-205-0x000002A345AF0000-0x000002A345AF1000-memory.dmpFilesize
4KB
-
memory/4460-178-0x000002A345B40000-0x000002A345B48000-memory.dmpFilesize
32KB
-
memory/4460-175-0x000002A345B40000-0x000002A345B48000-memory.dmpFilesize
32KB
-
memory/4460-176-0x000002A345B30000-0x000002A345B31000-memory.dmpFilesize
4KB
-
memory/4460-173-0x000002A345C60000-0x000002A345C68000-memory.dmpFilesize
32KB
-
memory/4460-181-0x000002A345B30000-0x000002A345B38000-memory.dmpFilesize
32KB
-
memory/4460-134-0x00007FFCD0C20000-0x00007FFCD0C21000-memory.dmpFilesize
4KB
-
memory/4460-133-0x00007FFCD0C10000-0x00007FFCD0C11000-memory.dmpFilesize
4KB
-
memory/4460-155-0x000002A33D620000-0x000002A33D630000-memory.dmpFilesize
64KB
-
memory/4460-139-0x00007FFCD0C50000-0x00007FFCD0C51000-memory.dmpFilesize
4KB
-
memory/4460-138-0x00007FFCD0CB0000-0x00007FFCD0CB1000-memory.dmpFilesize
4KB
-
memory/4460-137-0x00007FFCD0C40000-0x00007FFCD0C41000-memory.dmpFilesize
4KB
-
memory/4460-196-0x000002A345BE0000-0x000002A345BE8000-memory.dmpFilesize
32KB
-
memory/4460-198-0x000002A345C30000-0x000002A345C38000-memory.dmpFilesize
32KB
-
memory/4460-201-0x000002A345B30000-0x000002A345B31000-memory.dmpFilesize
4KB
-
memory/4460-184-0x000002A345AF0000-0x000002A345AF1000-memory.dmpFilesize
4KB
-
memory/4460-135-0x00007FFCD0C30000-0x00007FFCD0C31000-memory.dmpFilesize
4KB
-
memory/4460-149-0x000002A33D5C0000-0x000002A33D5D0000-memory.dmpFilesize
64KB