Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 20:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/PowerPoint.zip?raw=true
Resource
win10v2004-20230220-en
Errors
General
-
Target
https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/PowerPoint.zip?raw=true
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sys3.exepid process 1116 sys3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Endermanch@PowerPoint.exesys3.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 Endermanch@PowerPoint.exe File opened for modification \??\PHYSICALDRIVE0 sys3.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
Processes:
LogonUI.exechrome.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "192" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133247768630305583" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exepid process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4112 chrome.exe 4112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
Processes:
chrome.exepid process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
chrome.exepid process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 4768 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4112 wrote to memory of 4956 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4956 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4864 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 1768 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 1768 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe PID 4112 wrote to memory of 4784 4112 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://github.com/Endermanch/MalwareDatabase/blob/master/ransomwares/PowerPoint.zip?raw=true1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7d4b9758,0x7ffa7d4b9768,0x7ffa7d4b97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5100 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1832,i,10243604871346587075,8636290829614860705,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\Endermanch@PowerPoint.exe"C:\Users\Admin\Desktop\Endermanch@PowerPoint.exe"1⤵
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\sys3.exeC:\Users\Admin\AppData\Local\Temp\\sys3.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ac055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD50a30ba97216306dca5abbe1859aabf7b
SHA1bf615f1c8527d4aae484c82bfb1a71adbf156186
SHA2569c6a7dc9c71df7a2ae8cdee1de231837b96c41c1d87bfa3a463f3c638d28de37
SHA512e6607d3d4ff34a5cc117a96c7520c9b3bdad030597bc94ca9403c1e5ae478c71c3b4449c120c5656823ea9c42dcd0affc0615e61bb2ec6e5882c16b1be7bf3ec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD58ad67c80528a8435b6612c4f97c19afc
SHA1e214b799e4fbd3b2b4a0657e0540f264df2ddba7
SHA25625e25688a9fb2ca160e4fa8283fa1490258a42da4d189a5de1e729338a70b62e
SHA5124ccbc011e3878b8ccb3f8cf31a2bacd48b7af86de6ca9a43442a190a63a8957e0b09c757af7dabe28c2ce55c1d6a33696ec3c61d1629752f0a587a3a96c43317
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5f3ac3b42ebe30602bead776896828a7a
SHA16fe02a1c23a23804f6ecb49e96601e8444e5be53
SHA2565739586adff25069f303f988a1eb386c83c795f8f941f4e82a5df967cc004a93
SHA512a2b33b3ced2f56409e9b998ca1d6758669e4740f3a0e2b7fbe36d6c38a075cfaaafb88b32738667c0c079829412d1bf3a47af22ad535b43e062600aa1574851a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD51b68d1d18d045e427ba0f5037b50c98e
SHA1b424ba6626fb2b57cce4c98172f0f1c2b7145f7b
SHA2561829662e39c0196dcad3d04b3d6ea0c7eb2a2273d64c6a92e8548011076ebe7c
SHA512fa53efd235710de7308e24cc504ced72de02e6ded9c0cea0208b7b9f4225e446b59994a9376be86352b038782649e81ff587e79302199a808dedee9f4524d456
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD56d9f85f285155791632e401ea4421670
SHA1ec91ad0f76399ed5de4852cab069cf67604af288
SHA2560cebb01801e9de4620abc7fb6b7ef86603b76ece43d288ac1978cefc5434c71c
SHA512dfaf791d803bf2d5444fe0a43c684dab7a97ac28f8c1057c4f3e3d05735f1457ccb24c6b5c7a5afde8066b18588899ce10d84e4bdd169fbc2c031e7c095588fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5c1c38db41c1938e4b895831091de2a37
SHA172879f1fe0fff926bed56afa36ecd8372b23dfa0
SHA256109cff278e10f77084ef8147e00d31b14c42d67c1914b8f5e952ee0ff878cad3
SHA5126f6636e026977914c3cccd1f427f723a78383a65d023fbd90965abb0c47a940f5c5d7074a36db7ffab26f56a5f604522a5d324743dd5f7275760812b9c3c057b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD55e5d92d174ef5046e4601336ffe07770
SHA1bb4b6cec844db67d6cbf15b423f4a75aea205441
SHA256a0898648e47c22fe79aaaee81ccbf5d8a1e1b3f1f7c790b18521058106653fe5
SHA512b9f8cb3aaa7eceb78579630880667f3fd36e22704041bc54344b6a7c4b5e6e691a130e64d22669577240fdc10d65712185c5e8ed2cba2001638f4ea55f0ecbe6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD558b140f089a70116812372e739a27c40
SHA1da9dcf9433b57034371adf90c15c10fd8628af9f
SHA2569f9333b5dc75fa0a294b8e331d69abfc0e32edfa2f7c7e95b333045b2d8b219a
SHA51258f9bbf145446c37935c7c6e4857dbb8863aa42e18066447e7c78a032787c6566ac41db7d2d1e101d61eb6fba667a74bce1b6366dab058f6a294662d8b281c12
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50d433d965f70f6f431621fd6f3eabef2
SHA1d7a94bc40cd271eac46e87405bf3f0a5c60c370f
SHA256e99140227e21495f1ec22793e85960ea1d1566aef9ee99b894dfdf1c972320d3
SHA5126367d12a29f04c3c4a1b0d6951fb6fa6ceb4435d19c3eb5a8c161fe27d9ee669613994e7f9e1467b496882971bf5cbe2df4334ceb8cb3d4b4bee3e3a4c424d2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD54f9aaa740843dfe3a9ffad920dd5d911
SHA19aaffff352b4340d4036d6f8fa5aa39ffe9e9217
SHA25647ba8d68337dd77ed35c93452f704fd5b295aab6ec3f899a6bdfbf71dd000218
SHA5126f635f77b7eaf5ac4e4dbb082cd13770b5d13ed9981f17faf9229786116fffcd1a3f003cbe6967a16062c3a1c5367934d55c30a017c7ec8ebdee0a09ef99278c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5d327b351394bf2d7ea52c9e69ff66735
SHA1d513c24316d700c66ad892f0c59e40bf43f3708d
SHA25684d63ffccf4dd1d511792ba06b609cdb3486967420ca419a75a06345e25a1c17
SHA5126e7edb49f6640163b6f355c109c60286090c88a2c6b5370b81970befdaeefe474d6b07b04287e8fa165c48d21b1eab9a7958a398e5c4271681ba97756b54bb99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
72KB
MD51b71711817f3a930924636e948b82595
SHA1ac7b4dea520e92facfe377c75b9c55ec8db5dfa3
SHA256a94aafc9a098ff91b8a2125dc66b532f93a4574623b0515a3418aec0427fcc68
SHA5125df81df3bacd5a3338a2e109f72c8917be6737519798a23d4664dfbe1b0778ab49e13ec6b089cbc8f74d6438b65022737b8b0d23cf42f8740c945439e5d9736e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
175KB
MD566bc52a4cd04256fa22ea561c22f21c7
SHA1170ebfbcbb4d68a61c7f8f972e90b1946d49a5f5
SHA256c3f6fceab7003a36230357192222d2939f61837254f2aa970098fc172ff4e4e3
SHA512ac08b9fab60a04cec15a5fd1cfd77ca4b1b8a43ee6cc566816065939271cba6b2cb118766792d9a72bedb6062e90feb90d30c5ac399a28567a06a92c6e98f7b8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
175KB
MD52485cfda230e852f41b6ee6bce749858
SHA190f618e6c03ec430244748e37c63938e0e263adb
SHA256dcd1fe01eb006c2e9e52074064df137a8b23a6c2bf467fa1924c2e5becdd49d2
SHA512aa9a7a31149f4f32c7f4ed2cd334d98ceb0f6594c9abbe831dc117f52e1d18a435f0dac76dcc47d49107286cd9a3f4a3ea1004b4e40bb5f8691db1c03af918a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
176KB
MD517bdfa3b2826e26f6f73a435cf663565
SHA1f1c989cc188fa6ff89d24fbabc1a8ad5cf04586d
SHA25668690b635aa0d882e9344e0d73a8da214a06d1a9041a076fb7df8656aa8bf705
SHA51240630940fac9ed6d87b27a7a2cbcdf98457d930c550a29e8ec471bb556087031c29e992483ff8ca4a29ea641bcec8babb4a21f54958ca8c232d2983cd474b088
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\c2da0249-5090-4bb0-9687-bf187c7f723d.tmpFilesize
175KB
MD573d18b9fffb8dcdad94009a8027dba86
SHA1dd54324e7dd391260eece2a6acec04a35b583072
SHA25679c289e0ee152c204908b24204edeadd69882a438f72d3435e83d0bcc96f64ae
SHA512bc177be4b58742ca0771c7dd2ce4ee599d0808e83587da7f60b66c708b1ecc336c0f880b2541ec38cbcdd706a4be4df4213c780fae1e95936e4c735b01d74a2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\sys3.exeFilesize
136KB
MD570108103a53123201ceb2e921fcfe83c
SHA1c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3
SHA2569c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d
SHA512996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b
-
C:\Users\Admin\AppData\Local\Temp\sys3.exeFilesize
136KB
MD570108103a53123201ceb2e921fcfe83c
SHA1c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3
SHA2569c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d
SHA512996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b
-
C:\Users\Admin\AppData\Local\Temp\systm.txtFilesize
48B
MD507e3589ce173a5f12986f44253b0bc8a
SHA17263c370da58a626831aa45fabefd8f8911a7450
SHA25669365cd85daf13bf52d9a8b1f0dd4d7658d0b4a364c8cd799e15f8a1bb05b896
SHA5123cf692a2b3004f0ef5488f5674b6c8adb9dcaab52be1ee9cae709e6a8688af443d735a060796f086d0bc1c4e6ea18f7b8ebe2517e418911dd1946b0aef7ef857
-
C:\Users\Admin\Downloads\PowerPoint.zipFilesize
66KB
MD5196611c89b3b180d8a638d11d50926ed
SHA1aa98b312dc0e9d7e59bef85b704ad87dc6c582d5
SHA2564c10d3ddeba414775ebb5af4da5b7bb17ae52a92831fe09244f63c36b2c77f34
SHA51219d60abf83b4a4fe5701e38e0c84f9492232ceb95b267ae5859c049cea12fee2328a5d26ffd850e38307fb10cb3955b7e5e49d916856c929442d45b87071d724
-
\??\pipe\crashpad_4112_MFWLEQLUQSJCTCEJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/3388-360-0x000000002AA00000-0x000000002AA24000-memory.dmpFilesize
144KB