Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
31/03/2023, 16:46
230331-vagdtabg45 731/03/2023, 16:41
230331-t67efada7v 731/03/2023, 16:37
230331-t4rwzabf92 7Analysis
-
max time kernel
51s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/03/2023, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
Jenny Mod 1.8_n-6YZR1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Jenny Mod 1.8_n-6YZR1.exe
Resource
win10v2004-20230220-en
General
-
Target
Jenny Mod 1.8_n-6YZR1.exe
-
Size
2.6MB
-
MD5
5554e9b1bff7d5c406b7465701ceb732
-
SHA1
330eae0ac128d2077e63a189389fc1f6c1cae9bc
-
SHA256
e42ab3a701d02022694fb2bf7b46f3e934e9e3eede355d249ee77d85382fd1ec
-
SHA512
f0b9ad75123d31dbd5448cb213eb064bd3092825bbc13b5b0ff334f9ba9ffc536629bf134b795e999267f007c353df5e1dc21354dc6dc4444d7f4865a0718b8e
-
SSDEEP
49152:6qe3f6a5zD7+H98AHaCfu6F8HCL+WuTmuKwE0:TSiMD7E9vBuZHCK5NKX0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1064 Jenny Mod 1.8_n-6YZR1.tmp -
Loads dropped DLL 3 IoCs
pid Process 840 Jenny Mod 1.8_n-6YZR1.exe 1064 Jenny Mod 1.8_n-6YZR1.tmp 1064 Jenny Mod 1.8_n-6YZR1.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{097035E1-CFE3-11ED-BB73-72D88D434236} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 Jenny Mod 1.8_n-6YZR1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Jenny Mod 1.8_n-6YZR1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Jenny Mod 1.8_n-6YZR1.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Jenny Mod 1.8_n-6YZR1.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1072 chrome.exe 1072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1064 Jenny Mod 1.8_n-6YZR1.tmp 1356 iexplore.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1064 Jenny Mod 1.8_n-6YZR1.tmp 1356 iexplore.exe 1356 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 1064 840 Jenny Mod 1.8_n-6YZR1.exe 26 PID 840 wrote to memory of 1064 840 Jenny Mod 1.8_n-6YZR1.exe 26 PID 840 wrote to memory of 1064 840 Jenny Mod 1.8_n-6YZR1.exe 26 PID 840 wrote to memory of 1064 840 Jenny Mod 1.8_n-6YZR1.exe 26 PID 840 wrote to memory of 1064 840 Jenny Mod 1.8_n-6YZR1.exe 26 PID 840 wrote to memory of 1064 840 Jenny Mod 1.8_n-6YZR1.exe 26 PID 840 wrote to memory of 1064 840 Jenny Mod 1.8_n-6YZR1.exe 26 PID 1064 wrote to memory of 1356 1064 Jenny Mod 1.8_n-6YZR1.tmp 27 PID 1064 wrote to memory of 1356 1064 Jenny Mod 1.8_n-6YZR1.tmp 27 PID 1064 wrote to memory of 1356 1064 Jenny Mod 1.8_n-6YZR1.tmp 27 PID 1064 wrote to memory of 1356 1064 Jenny Mod 1.8_n-6YZR1.tmp 27 PID 1356 wrote to memory of 1664 1356 iexplore.exe 29 PID 1356 wrote to memory of 1664 1356 iexplore.exe 29 PID 1356 wrote to memory of 1664 1356 iexplore.exe 29 PID 1356 wrote to memory of 1664 1356 iexplore.exe 29 PID 1072 wrote to memory of 596 1072 chrome.exe 32 PID 1072 wrote to memory of 596 1072 chrome.exe 32 PID 1072 wrote to memory of 596 1072 chrome.exe 32 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 780 1072 chrome.exe 35 PID 1072 wrote to memory of 1064 1072 chrome.exe 34 PID 1072 wrote to memory of 1064 1072 chrome.exe 34 PID 1072 wrote to memory of 1064 1072 chrome.exe 34 PID 1072 wrote to memory of 1804 1072 chrome.exe 36 PID 1072 wrote to memory of 1804 1072 chrome.exe 36 PID 1072 wrote to memory of 1804 1072 chrome.exe 36 PID 1072 wrote to memory of 1804 1072 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Jenny Mod 1.8_n-6YZR1.exe"C:\Users\Admin\AppData\Local\Temp\Jenny Mod 1.8_n-6YZR1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\is-SDA0U.tmp\Jenny Mod 1.8_n-6YZR1.tmp"C:\Users\Admin\AppData\Local\Temp\is-SDA0U.tmp\Jenny Mod 1.8_n-6YZR1.tmp" /SL5="$70122,1785071,899584,C:\Users\Admin\AppData\Local\Temp\Jenny Mod 1.8_n-6YZR1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/1RBRX9DRM0pKj4Djoe8LOjz-Drri5SuAz/view?usp=sharing3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef66d9758,0x7fef66d9768,0x7fef66d97782⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1456 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1084 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:22⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2248 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1480 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:22⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3548 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3824 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3952 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3944 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4128 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4052 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4376 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4108 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4112 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4800 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4404 --field-trial-handle=1212,i,5017118262412658498,10295878191618976482,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2432
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f4b7688,0x13f4b7698,0x13f4b76a83⤵PID:2428
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a371c997de65fa1d0c1c6e2d862593f7
SHA12cf4f67996db546829222259c361d0f3f91d8718
SHA256f3e826add98dc2b453bad19a6492b09b9faef9de7651197314ad673583db5458
SHA512b986495e52fa6d9472fcdf7fea433e24a4acc0ff29734455d722e233737de199c2ee32788facb98de681ca4fba985783d736acfb028e0d5b53399687022a6811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_069B74A87A6EC019E2D40494DD95A2E8
Filesize471B
MD5bf29feb5d124115ffaf0b00e89ab0309
SHA1693d2ad3694d3171af6545ef4758855127b2e669
SHA25640c67d04ae6c3d13fd0a77cf0c804660a5498d0c24425162f8e21c86d9e85eb1
SHA512575e0a67b479940d8c48b27d44a04b53ba7eab1d407a4645cbf372b292978b24a80c34fd69081154c13f08583be62fca7ba54784512b507f63e6444159c6da04
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_78EA4F8D63D8B30DA71A216641B52FD1
Filesize471B
MD57117d0725779b203269d6c54c3ccedcf
SHA124f4e806fd15c39484288a88c67117c918ce0829
SHA256ecfdfee4723c973d404d5e580a8cead357de755354328bfa40c1041350a76504
SHA51265bfecd8275581d157fd5bbd1f351fbec4302543eee184675fd24f9f866e554f68b37ce6e93dc657c6c384b6a96e97673430fd330122a0150d5f4f7a80327962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_49270A533033765D7851C9B9F31A3504
Filesize471B
MD5293ec4834787d3b20e666ddf67a18073
SHA18e55bc7e73cd75205e88dbebc405cc158728c9b3
SHA256c85acabb4483244bfda3ee896c357144b2eeac28ed5b5833f61d099b64f7642a
SHA512386d01b4b6d0ad0d95f9f8476e3c24ed6d8f290d3db25c364343f997e9f208157e8fc9a2fbfd98fc4b9a3ca0b17a4a9edfebcc4e54a0d5f9cac7e27d83fbb778
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_A40DDA23AC660EBD6C048B34D97187FB
Filesize471B
MD5637a50ab6717280c84715f06bd5db3fe
SHA1a8835671e49a8a96543c317443ff8dc5c51f3804
SHA256dad5a0e3c84b082474a740f7eb75f1534093c4aebaafe2785011c733bd834c44
SHA512c4e7e83abd2fb3c5661b989c9fa08253ac41736f815317e88bafdb1640468892783e2b97a252869a7a8205f79c427613fb1c35f91ddf125149937bd952fd04d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5209225ce480d2debe3733a9f2619ecd8
SHA1e1cb470b8d533aec07e9bb1c38a6d6c8e8c6659d
SHA256481f83508940d8751f5f2c03b8c0625d92e27801fca5e4e5950222fbc5b50b9e
SHA5127e7fb908a4e558bab83076327105de1f42adb272a455caf88aac1de745a8a40b437ae5ffa4963ce6846523dbc829e52d748f372cc42b7435e3f1f275523d8033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_069B74A87A6EC019E2D40494DD95A2E8
Filesize410B
MD55cb86ebe0bb03e90d057372118af966c
SHA1e3db6535990c595f1a79af1c1dc0869178c4a71a
SHA256015b2a4a45131c7b72a277a7576e7c5e9114af9d90fb94588c8d2424427f7747
SHA512bd5eccc3fe64bbb797551e6a5b073ef7c8a2e7fef03df829c26df723e75237f4ec4c3f59689a616c8a4c68ed24c8864a514f092bf07d004c85285e8a07eecc78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58583a91853300ca6f4fc0484dcdda9c9
SHA191782cbfa5c6d18f5cb238686551905f8ccb1ca4
SHA25608b39b76c21c4e480d780b48d408517654dd3c9d312bf589a575b79016e7c74a
SHA5129bd7021a594e7db084b093fdc9e84c1fac388dfe0c1fd3556498af643ffb57ff3942f6540bdaedd2566248317ec9967c8928e827781462937dcc5cb19adc4c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5273718298b98292aedcc8c495a6249c9
SHA15aadfc1f105b722405dfbc9aa7d37023d5c4430b
SHA256468618ed26d244cf0a0e9a1c555b16846b9f39567dc2b251acbc1fc336d1fca2
SHA512f43cbd2c5b90035386977526dbd29c6c9f39b627606fe843261310efb5e7a118adec6f5cd8b12bf081d808bc6d81ae8ee1c585209a47cdf677466738550dcf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569221a3776e83fce92d375b0ae4234fa
SHA12f25a4cb1aca1c2e0d87dcc70f73281ee01dd3f9
SHA256ee1745bf268d63b114c22661c2f0c2313dd3f534f5f4e73683d771200ee882ad
SHA5127026f2f845b15ac0053f1b068960b2f6ceb0680e16db48a89baa006327c193fc4b2df2a848eabd62e072a1bb9bbc08262ef59b066f364bb45acc2e7e61e1e550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af596b56b4cd188cd5e4b070c5816af5
SHA1b5be8c1f77a8d5725829ec5d8f4e72f19693fb06
SHA2568b1784ed24f8d917ac4d459b5ad5eabf5e3e2741cbe952c8364b9fac650e0690
SHA51216083d6fa13e9c871030abb107719433d6201f74ea0ef3dd33a91bb887cccd94e7c3081ff4bdd963130a2c4c9cbede694faa0bf68c8d1ae46cc53cae4732f709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5746ecb8aea4387f2121183ad193868d2
SHA13e25cc433c20283f9c2dcfba27b8b46202caf301
SHA25678530e6b07d7db1879c3654884ac91885a45bd81161f565f7d9fc4b695b2c36f
SHA512c642809d7ada2c97f9d8db6dae92a7402163afad51938c3ed35d1d58fff49896edc29e07893bea2cd1fd21b8aa1647ca561b5efd1cdb7dc0cbdfccd90ff781d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5954eca459c7657efbf552dc03dc415fc
SHA1cf364a8bf440b7e332bdc3d23d7c98650c988847
SHA25630d2ab69b8649765e0460ed0e60f6dc38edf95574f44dffd2194ecb3f359ce0a
SHA51211973c0904f6027d7e03e9f67e9c8f026e9373d474aaacce3071d864769d4a73c3cf6ee8be200a2301b4a51d9ce8275c3ed080660dfd904f7394d6a5a4136b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53384ba7a2d72402df6741a8b8002ceba
SHA1cc4f6622325df44e6dfe72d4572d921dabb12bb0
SHA25610698614057a3dfe6679127735138fe753aabeda36947f6c52bdd048515725ee
SHA512c0654bdf36b06580dc6c029eb0b26c22086b52ccaa03ae7f160a1015135704c9bac066085a6ad0e15ab422e9af524ee3307a6e66c02e34f32505a9824e96884c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5801a4d71fd8a260ab6011fa47b753311
SHA1327ce54204a482af1f197530e84fdf44d88d199e
SHA2560bea385bf1b2117d1dad2732e861bd17933c89eb9b717fcf6750fbac678f5f9f
SHA512c27f9bc7cd170bda20b3d46201ef0f1129eb91313bc2d13a7e5b590b84e3466368bc70e763f6867abae4e1c77e1737178d1c2edd6ea3b12292184c241c2b3784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5269232e889c604d35e167582ab6bc0f0
SHA17cb17699939d8ffc448bf122216a88fc6e0269f1
SHA25654e653ad66935d167c7bd071f5109ae0d1c226933deaa09c9542b4681487a80b
SHA51207bd2c5113e58a9ed7beff4b656549ab02e47a8599b0c4781efb490e35013dad56f9c21274921a84c09d6b1dc6df87ced47d640fa72c983dc6d4b240b96393df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d61d036d7c41006c0b3f84bd94e98094
SHA12804674d7334c8e39cde7c19d464f510d6236b0f
SHA256b08c652c3f811c8a089ffbb6c6b219af59439dccfd9a0f8cfc2b9f12b3930d63
SHA5120514973f07bf10240ee90dd9e1f223e5ae4fed80739d880aa53ee0e42079ecf2b2b905fd873dc822138c41fa3c73b2f20409d8fd6ef5384675d3892585aac40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e007d5ab961f5b2a60e4a16f5c84cbc
SHA1a45c548a60600514d247131995ba17c1f3cc0a1c
SHA256968b0e03abf31097052c87e8f1a968eb66ca5c1cc7e6106e33b956f247a16814
SHA512718dc5861f01e74ab40bf5aa296369c680b9dad58c68e0fae07a272c0a49df22698d4bd0240ff53466208074d08ef515a9d96a6a0d8920278d128b14709be028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d4c7ddc25673403119bfaf7e1fd3c8c6
SHA10f7633a665c3fd4b019743c96fb8770146a4cdf9
SHA2566d16494e1781fd41a7ef11979595e9cc29123c7cb56d7daaeedd506551ce05d3
SHA51220da275f9352337e131239c30475395badb6de25ea119ad4bb38f052f7959e938eeaf05b2d579f0f057fdf66e4eaaa27b7dad11e6e807d40209d947392551f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a79dab6ed278f11e9acc3cc8c6ad292
SHA142860f437c68e4c2cc6884de9af4dd6e266f101b
SHA25650d97f5bb12185fe39d037590c3d46d6db914dad3ad37cbaf3e7610a1cbc3bd3
SHA512aa8a8639de6f575bd5e6934e9c68ecf1412f64e1526468c0dd1d0ac5d3cbd2c553718bd1d7fb88aff962721032efd7c1bc8423f0a936c8f454819e1cd0814a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5515109bcb7fb5bb79df52b7504126456
SHA158ef12474810f24b563214529ea844b2cda94f21
SHA256e9fe8b4683109fdc635cd5dae485e1e72048c165e10ddcdf627ea414277843e1
SHA51265f9002c88622839d5d4c3a31e57acd5d918c90a2ecb0c444912692cd1a5f6a65037aa028c799c83b83cea47de7b5afb9ed8d509e297da391da325ac921e72b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59423f30e764b8d91d6f2fcc16081025e
SHA1c1de95c4d4bf44809524929da7fa801f1f265eae
SHA25660d05b77d06d394075402336d0db21d2c3e4f91c319008d26923d99805cdc64f
SHA512b1ea39e0479ca63730f6878ae410b26a0e2051fe8b373ff87a72d443d0e3abfb36dbd6ade9ae36f92a1c4e3bb13657f9b4563dcc0217564e035f3ced2d4cd07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_78EA4F8D63D8B30DA71A216641B52FD1
Filesize406B
MD54947a2b31031ef12f9237cb1d21a12a3
SHA129df0318cec74f51e79e34e7ab37a6cd4cf0272b
SHA2564a4a463b708dab981191c647f73ea9e2bc7f4ae2495fd79ae20b999978a4116d
SHA512e1c46d29081f54b1057e36802429f59074a137bfe2341d2f5bc06b4c11c5ac7564e9fe4d676343836460fd3724238c2431830c2eb1d075c671ea54a2aca5f867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD56a0d4c207410f454db7e0fd8ce82a96a
SHA1187bbcef1c8d94ff03f4f761638858e941b5211a
SHA256f48a197ed5f97677eba25ef739ae55a2d9c95ff0f7f26acc20023641856fc848
SHA512eb6d4aa4d5be4efe102210f8d03e851f891825f14e0f6cfd0746ed75ef5cd5a403366ff7b35ac2110380a28d34745f0a6fa3d20adbdaf6ca86e0d80cfb51e784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_49270A533033765D7851C9B9F31A3504
Filesize406B
MD54b2468cd2cff4aaf0840845b8af940f1
SHA1ec8af4c1136386fe30d13649e27f3d7c28aea838
SHA2567f0eea2a2e8e68cd140ceb66afe2a40f854049ffb7e6c742d8c136c2873829c8
SHA51278e7a1d1567b22402e521b7bb7c2682dfe4043387b32f599012a615afd7168da22ceb55bb959b5781ec50cad9dda7a63cd06b41565261961bc83512ef0e3ad3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e3cd5cd72510a147a79d13a15de22c11
SHA1b0d8d036fc58b32c62317141597a85147737fa9f
SHA2561e83bbdecc3b1a4d9a7ecf6f826b644c7b320b1a87cfa4599008c71df542cc42
SHA5129d967982707c672c6d2f9be967e85892ac8f9a88e5b418e95c25da304f43a76f7f46fc57957a6a45b1bcf7d6c9e2fbb9019178c81234561b4cef2bfa48a23774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e3cd5cd72510a147a79d13a15de22c11
SHA1b0d8d036fc58b32c62317141597a85147737fa9f
SHA2561e83bbdecc3b1a4d9a7ecf6f826b644c7b320b1a87cfa4599008c71df542cc42
SHA5129d967982707c672c6d2f9be967e85892ac8f9a88e5b418e95c25da304f43a76f7f46fc57957a6a45b1bcf7d6c9e2fbb9019178c81234561b4cef2bfa48a23774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_A40DDA23AC660EBD6C048B34D97187FB
Filesize406B
MD5a5e630e206f16f99c09507e2b2456265
SHA1f24c645b07ca0781dae192a4b3b964d532f99935
SHA256712ddca2e38beee316cebdfa4107dfa244be5476c6ef561630d0b09535102d94
SHA512f2dc39aaa7777796229b26d427efba3338a07d0800c62416309536cc3bc998648550dcddaf0b0743b49c25e8516a9fcf6c0703282c55ed5eaa1a9bb97cc6e9ee
-
Filesize
20KB
MD56d44e33ce08b0371785e21d2972541b8
SHA1f2dec905580e831dee6cc85976abab45525b110d
SHA2560b64f894afdef4068401220a8f76ecc1fad2d02e3cf8e4dfcc46f313b87fa989
SHA512ea448217c3de23c7b7e158a527f83b44b189c3d6e4d2bcd9c219fae1d68d2a3d6ce05e1ff8ba2566d30a72c91776f6b28e1c1d14c1519dfa7286bd17ad20b007
-
Filesize
60KB
MD598a7ed2f6e2e215932d6500dc7996302
SHA1b038363967093ca619b268d3710aa04e2e9728be
SHA25650cb0367ad3bc71cfe2ba8b70274688d241fe57cd2d4cc2a041ba22510dfa8b6
SHA51257f52c8a82244a29e98c4fbb3ab5a37143ae25cd4fc41fdda338b2eef406f5b07cc3ad4d24dd2eff5b6f2e6699dcb92f4f6f44b0c0ac743fa8594d72a2bc5133
-
Filesize
19KB
MD5ca7fbbfd120e3e329633044190bbf134
SHA1d17f81e03dd827554ddd207ea081fb46b3415445
SHA256847004cefb32f85a9cc16b0b1eb77529ff5753680c145bfcb23f651d214737db
SHA512ab85f774403008f9f493e5988a66c4f325cbcfcb9205cc3ca23b87d8a99c0e68b9aaa1bf7625b4f191dd557b78ef26bb51fe1c75e95debf236f39d9ed1b4a59f
-
Filesize
162KB
MD54043af37a3392a9db521ff9ab62d9608
SHA183828688e7a2259ed2f77345851a16122383b422
SHA256ee076822f35390ee382cda71759a2eec8f4db2bc18e4e3acd586173c29dab321
SHA51297a9d37ec02796cbca922559f384e1632c249d9955022578c14e046f2bfd9f84db113cf55899cfcf63fd318fbee050f483d04ae3156220ff2f0d364f989e680a
-
Filesize
71KB
MD5b4b581ffead23ff63b97bda915a4dc7d
SHA1e2b8c9063a6eeea10be695332a5a8f7361afd9b8
SHA256c2f6298d31f9d92585db4318ea2a2a68cd81cf5d07cdf42413bbfe497744fa0b
SHA512b34043953f2e20115dd9692deb9617cce808bd51e7d50d45c516a7c5c41b8ac24d4405194085259d25c58633a9b0d9f35f63228b6a1b095187f4b210e74972e3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5fdde00551bd9c9ebc6ba9d4b89485c4f
SHA124cce181f1922af9a4a6203bffb19643772b0157
SHA256cbda58d0d4e2659b68df7ad043892f266fe36fc4d9eaf98b79ee5cf68bbcf5c8
SHA512d221ebf9929b960d8067d0d991eca64b0ffc4c3aa85c3b5d44e6e3c940f781ae78131b6f852b0351afedcfd8b6a7dc8277bddf471c361acd5f307beb0626cc04
-
Filesize
363B
MD519f64ef031b08627bc0e1003cc43b832
SHA1998b8a23b646e5361ee3dc212317beb12ec4c9cd
SHA256996af60593f454357ab565e16c0df516aa33c96e30add4a0197ad1906dae73a0
SHA51247a3798d326763ada1f8c6a35c427b41e98eb5247981a760534b09c0cf4aa72982ecba55ef9b6c81764e6d4fff93174437afb526f8161f572a553469a83641fb
-
Filesize
4KB
MD582f4f1310f16f96af3d6bdeb6a0537f7
SHA1798fb6971c2d325fc6bef3437c2213e597a5528e
SHA256f3a6b913b86643ffbc26b0a47fd583b25bf26675c4def07ee8635b5b789f674f
SHA512dd0f44eadef2d00f05e5141944da8406e980c19526be7d5af7b446532dde89e20d55f8b3266dc0fbab2d67326c8327aaeeb6c9d1faf56364cdc6b9cb6670c15d
-
Filesize
4KB
MD561e64bf17afdd489b8d67f2e148c08de
SHA1e07a8051ca47124276a63a28bc666808c637ce9d
SHA256e5335c69a22e43add3d57e3289c8b9407eb94b91e198fca5bbc8ebcc56f27c54
SHA5123b10361ffd07a1b49c8e4a858fd84546bdd7faf532c284cdceb55324eaba7d87c78ed8563119c3e8e1a680ca148b5f0b0ab3823190ad42be1019ecd6b3795ce3
-
Filesize
4KB
MD549d960b3d35ed235cd3716d43a5f8fe6
SHA12294c82c5242403a1b80c761624022cd3c945a49
SHA2561e007586389db726ed5103a36c9a387e2da2b39bab04d6f0ec73ffb9ea35e557
SHA51226ccbca727dacad47116885bb8b35d5e936efd1fdb287614502dca4e162a9ca0efc286f2af29c26f6c1aa4f1e32938702f38b53f4cc47237b239d69ab5a2b8a8
-
Filesize
5KB
MD53e11284afd5cdb359c417521b1889334
SHA147d184575f0ce57861c4fc3a5764f22928e0e8b5
SHA2565cad4696c80480af83a2df2cefb3e4451acb40e99f89fba12d94a7bf7511c8a4
SHA512507d2828b561c9f36cd0f2a918d91f9e7b91f466ac4f3f0fc17e55ad92c615ade5df57fc0de4f752f8998360a67e46beade5113dfc2deb0826d8c87b5a2c0ff4
-
Filesize
5KB
MD55f0c7e54480b26173ed061d6dea4fc4b
SHA19dcbed964b4abad84d817d7428b47ebac621d5c3
SHA256da7a64065c0c20d6342308613d2ef65784182654dcbd1cf5521fe82a8d18b8cd
SHA512339bf26874122c848b34d6cd356d8a4e2803f7b04a7bccd72012bc7072f88c4a083558522eb288d2c6d06e945ac7c15365b894ca59eb4060b1aa281855fbdece
-
Filesize
5KB
MD524612cf51c79ff85bdbc0aebda5029a7
SHA1dfa8f7d42506456e5bbe2e94f604b31551297642
SHA256ac677542b8cff640d699e75f3d8cfd6999e91b7e875cedc0cd54ce712fe3077d
SHA512aa71ffc47b497b625660b69a588f304beadf207a34c0f6e1549e02b4ac90c67dc449450ee7d8901419367308f2a5775d9084c1dd6298e88499cac4bcdd7911cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
173KB
MD5a3582a2e431ba8324583feb2396076b0
SHA1d7daaf132c8bd3b95ea586b020789408664e2abc
SHA256bc0ae4f10d2b0c664091cb2f67f7df2a54df558f5a6507bfad0e4a9febbcdb88
SHA512f77db9bd8c26ef786942f4e63d81c1d3df15ce16e7cc7323e506e17f342ee0c2bc480f17d4d1c4fa72512508572eb9142c20cfb1a3c47975f9cd17916022154e
-
Filesize
5KB
MD5111fd302e822bed933d45cabbfcf4565
SHA18e5a08456a549336a85b2f998b0afecc3749a023
SHA256aec4b057f940fdb99ab0506d4ab40f872d65741701f1437db7a98f8c7d7a2d01
SHA5122501f87a6b60393b0be054780b04b785426ee83cf8ae44db6f163c454ac49c4a407376e5eb5e2201ddacd0ed0c458799790ff3320048da765de3043f90ae500b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\cb=gapi[2].js
Filesize70KB
MD5357e6c63623f248d99478c9cc7770a73
SHA107baeceba09ff600b7c8d3b5b238ac433f5d7e0a
SHA256f9947608a0a19db721e12ac4d74f17fb5774d1b191c5d0191a7cdbc8df5cf0cd
SHA512e639cf0c8d6c18eae7ab26ad6c406e1babb382c8355951d39f605d82bf8587c4bfa85d7a1fbc6864337f095d4030b09320ddb2b4120b875097ae92d9dddfa3ba
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\drive_2020q4_32dp[1].png
Filesize831B
MD5916c9bcccf19525ad9d3cd1514008746
SHA19ccce6978d2417927b5150ffaac22f907ff27b6e
SHA256358e814139d3ed8469b36935a071be6696ccad7dd9bdbfdb80c052b068ae2a50
SHA512b73c1a81997abe12dba4ae1fa38f070079448c3798e7161c9262ccba6ee6a91e8a243f0e4888c8aef33ce1cf83818fc44c85ae454a522a079d08121cd8628d00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
3KB
MD5d35d95fc6bd8be33d3ce5da2630b90bd
SHA1be2fb4098a151f6c77a85ce8c274a3054a61178b
SHA256dfa608be394c8f6d19aff352185917720f04072ac0412a8cab1174fec4939c08
SHA512078fa3cf9c08c8bdaa554a52b153a159f537de3ee0ba923d64928cdd99b4f2528b4eb229c1b2352b946ef417efd478b453588a6cda1afc91b374e709afc730e4
-
Filesize
24KB
MD5e2d3022fb249af38288c47246bc60228
SHA1bf7a44230ec7dc0f45e89224a6fe821d25f91f55
SHA2569a7462e436d86f26ae9c0808b30810b8d2fd25ceef7af24ff09a1af32e63e2a9
SHA512510d60ed51bc972b6bb3ac80a86d31b6d797a1af0a3ffce068089f0adf39d6591471de7ef7f21ecaccb67255e57bbe04786534256a12bcae5017078df56f12cc
-
Filesize
3.0MB
MD5eaf2c9683c1424abb77a6104b339fda5
SHA182fe536dc66036a759f620003f324bc726192da0
SHA256a2c20488f11814b0bb8eb471f364c58d8f16a34fb526b84ccb97d15b98450d9a
SHA51249d9482bb2f41aa87654d22f3ffc31abed183ac68545cef87125de932cf745f8c68a31d17e142c4a4f0f21e2bf1edab8cda59ba2b1b1827f8c84837352196bf1
-
Filesize
604B
MD53ff51121e5166b9ecb5ac040d1324a6e
SHA1b6e7ce22329f14143e98eba20e245f4b8cbccb09
SHA2569e5ae9f43bb17b345af4ac99943781380be306c0e763ad79a259305402ab681d
SHA5122ce25b19df86180fcac923937c5b93e3e7ddaa739aa2f3a78be69044f045554e9931f62aa70b44a480a622251d6a2c6d781b4089fabbb1df028917a41d171786
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
2.0MB
MD5e1f18a22199c6f6aa5d87b24e5b39ef1
SHA10dcd8f90b575f6f1d10d6789fe769fa26daafd0e
SHA25662c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d
SHA5125a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190
-
Filesize
3.0MB
MD5eaf2c9683c1424abb77a6104b339fda5
SHA182fe536dc66036a759f620003f324bc726192da0
SHA256a2c20488f11814b0bb8eb471f364c58d8f16a34fb526b84ccb97d15b98450d9a
SHA51249d9482bb2f41aa87654d22f3ffc31abed183ac68545cef87125de932cf745f8c68a31d17e142c4a4f0f21e2bf1edab8cda59ba2b1b1827f8c84837352196bf1