Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    28s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 12:47

General

  • Target

    d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe

  • Size

    4.3MB

  • MD5

    0ea4b3d116fc31e856a0ff9ede8e8211

  • SHA1

    39ef55554a6981517ca64599a193ea68377b00df

  • SHA256

    d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff

  • SHA512

    d5f7a7ba1f8ad2d994e84f402ac6eeb5de5dd67de6d1aac9d427b765893f56792fceed6d4a841794285a2f7e264a6b0b15adbeb41c5cbe8b7b584c90e0b1363e

  • SSDEEP

    49152:Fj8f3jtqiCLg9LK2hIOR+k9jdAsizqxSiZ4K5MZqkL92c6nkdmbDgiIerM1R6ZPs:erZ4K5M+XDgiIewG+x6xZ14J

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe
        "C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a7926.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe
            "C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe
              C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x15c,0x160,0x164,0x130,0x168,0x140327688,0x140327698,0x1403276a8
              5⤵
              • Executes dropped EXE
              PID:2816
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1884
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ab9758,0x7fef6ab9768,0x7fef6ab9778
                6⤵
                  PID:2456
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:2
                  6⤵
                    PID:2904
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1580 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                    6⤵
                      PID:2800
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1668 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                      6⤵
                        PID:1872
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:1
                        6⤵
                          PID:2772
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:1
                          6⤵
                            PID:2880
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2616 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:2
                            6⤵
                              PID:1704
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:2
                              6⤵
                                PID:2052
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2636 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                6⤵
                                  PID:2412
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3116 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:1
                                  6⤵
                                    PID:2384
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3716 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:1
                                    6⤵
                                      PID:2860
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings
                                      6⤵
                                        PID:1108
                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f597688,0x13f597698,0x13f5976a8
                                          7⤵
                                            PID:1904
                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=0
                                            7⤵
                                              PID:1892
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f597688,0x13f597698,0x13f5976a8
                                                8⤵
                                                  PID:668
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4248 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                              6⤵
                                                PID:2124
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3880 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                                6⤵
                                                  PID:1332
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                                  6⤵
                                                    PID:2796
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4244 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                                    6⤵
                                                      PID:1228
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3708 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                                      6⤵
                                                        PID:2576
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4160 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                                        6⤵
                                                          PID:320
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3892 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:8
                                                          6⤵
                                                            PID:2292
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4244 --field-trial-handle=1224,i,4436927450018474619,1401268424039154522,131072 /prefetch:1
                                                            6⤵
                                                              PID:2980
                                                      • C:\Windows\Logo1_.exe
                                                        C:\Windows\Logo1_.exe
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Enumerates connected drives
                                                        • Drops file in Program Files directory
                                                        • Drops file in Windows directory
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2968
                                                        • C:\Windows\SysWOW64\net.exe
                                                          net stop "Kingsoft AntiVirus Service"
                                                          4⤵
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2252
                                                          • C:\Windows\SysWOW64\net1.exe
                                                            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                                                            5⤵
                                                              PID:2348
                                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                      1⤵
                                                        PID:948

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        40B

                                                        MD5

                                                        368840f784134cee7a9b2d8fac41f311

                                                        SHA1

                                                        244bcb87cc0588825c0b95eea2f658390c6b3855

                                                        SHA256

                                                        62f83ba8df4f0d7ed1b81b23d7f4aae12c4e7ab7581b1be41f605a91a9f9324a

                                                        SHA512

                                                        2c0b4e48415f94c8895fdcd0ccd6d834a5281b4608db01e4bf029cbb734349142a29a1c507234cbab3c03b95d38e9b207843e12ae728d51b1023eb2af3882921

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files\_desktop.ini

                                                        Filesize

                                                        9B

                                                        MD5

                                                        ec7139d5bb99bcebaf0b91c58a9ec5aa

                                                        SHA1

                                                        70404362dd74e309722fd282c3492ec95674123c

                                                        SHA256

                                                        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

                                                        SHA512

                                                        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\CURRENT~RFf770493.TMP

                                                        Filesize

                                                        16B

                                                        MD5

                                                        46295cac801e5d4857d09837238a6394

                                                        SHA1

                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                        SHA256

                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                        SHA512

                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\000004.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        6752a1d65b201c13b62ea44016eb221f

                                                        SHA1

                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                        SHA256

                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                        SHA512

                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json

                                                        Filesize

                                                        851B

                                                        MD5

                                                        07ffbe5f24ca348723ff8c6c488abfb8

                                                        SHA1

                                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                        SHA256

                                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                        SHA512

                                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json

                                                        Filesize

                                                        854B

                                                        MD5

                                                        4ec1df2da46182103d2ffc3b92d20ca5

                                                        SHA1

                                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                        SHA256

                                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                        SHA512

                                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                        Filesize

                                                        264KB

                                                        MD5

                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                        SHA1

                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                        SHA256

                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                        SHA512

                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi\000002.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        206702161f94c5cd39fadd03f4014d98

                                                        SHA1

                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                        SHA256

                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                        SHA512

                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        52cf70f690de99237187230601ba574c

                                                        SHA1

                                                        5ff1cd482883dfb2638eb7c7a08e6eb4882c2982

                                                        SHA256

                                                        d0ce5856dd52f05e4e6ac463f578c4115aa166bdfd18bb2af9a7d9b5654acde6

                                                        SHA512

                                                        d97e9ef14fca1215e4a1362e90f1d3c650728aaa81f764fd1fd0ae4bace134e1f27a55d90222f7b510f02a4e1290ddc0e57d6186f8ba642826f5f451fce09752

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        e10f68ad3127a7054eb765dbfb29931f

                                                        SHA1

                                                        8a3649c3d910890446480af623b3f0550240368c

                                                        SHA256

                                                        8af812a3bdf1bf85d2f02686face22e43cfd90cac21cf2bdbf7545dfa5c83de8

                                                        SHA512

                                                        5bcffda0d312c777b4e5b0caeb0175f727d348ebdd7d8670cc672fa905470d72ffb94caaaae59f2b2e8ebe6691fbe32c4f36819f0d45f38345718125e95ca974

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        c5753c524aea743e801e39ec08c5e15d

                                                        SHA1

                                                        77d9e608df18898ba15ef02fb93e4bb7e629b7ba

                                                        SHA256

                                                        f12ccc55b8d69461f93bc934bf943185e7c98469e12566510c02facce63b02dd

                                                        SHA512

                                                        61da1adfaff9e060f9fe1d64ab2a5ae7d5a9ef47437201c95476c2eaa649463b3a69c8b07e5314e84f21b4e8fb1879efd9d143f2a3204e1372010d861bfadb6d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        7d0689dbff3c42d7e07a8c9c305eeb70

                                                        SHA1

                                                        b260e9ed7ce43c57d8b2a6ab72e3b4f4749e18f0

                                                        SHA256

                                                        797941b65ed0935029e3ca562d80efd3a095229c2cdee9bd0a0f9260c87efa79

                                                        SHA512

                                                        c897465bfb835305c1b7facaece6905c0d8912b20fa70ea6c10ab52b3ade9de77c89f6ed8152550e1f413b7a4cd923e044d45a4517c3af0415a3cc64fb1c68e4

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        bf956b5668be9437f3c969a9a0f9b6a1

                                                        SHA1

                                                        bd438797f204b41b64d284820b45c984428555fd

                                                        SHA256

                                                        8bf10f279dc914ee98b95bc06ebf3e8bad231be72ce81c4586c74ce5e3165e37

                                                        SHA512

                                                        61edc542c64374738cc24ab06538d55883c1d639fb2cb656935fca1c7f651950b3ddf3ad4323ae72a38c619fe8f6dc43a533b1569324222c301d67bf994d5a2e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                        Filesize

                                                        16B

                                                        MD5

                                                        18e723571b00fb1694a3bad6c78e4054

                                                        SHA1

                                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                        SHA256

                                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                        SHA512

                                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                      • C:\Users\Admin\AppData\Local\Temp\$$a7926.bat

                                                        Filesize

                                                        722B

                                                        MD5

                                                        7b1aafa46adcf91ea68b79e561d8a8ad

                                                        SHA1

                                                        195698128c3420e275d389312b8e58639adc98d6

                                                        SHA256

                                                        18fdcf467a791e6350795bd0d5851931b659a681d16d1bbbec0c9ea7898bede4

                                                        SHA512

                                                        c6b81cc4394958106358ddebaa4cf094c87b5acade6969293349170eb33ce3cf0f87562d8b71f1bbf30292f82fecfb99c7424822de903fa3a3e7521db550e9d3

                                                      • C:\Users\Admin\AppData\Local\Temp\$$a7926.bat

                                                        Filesize

                                                        722B

                                                        MD5

                                                        7b1aafa46adcf91ea68b79e561d8a8ad

                                                        SHA1

                                                        195698128c3420e275d389312b8e58639adc98d6

                                                        SHA256

                                                        18fdcf467a791e6350795bd0d5851931b659a681d16d1bbbec0c9ea7898bede4

                                                        SHA512

                                                        c6b81cc4394958106358ddebaa4cf094c87b5acade6969293349170eb33ce3cf0f87562d8b71f1bbf30292f82fecfb99c7424822de903fa3a3e7521db550e9d3

                                                      • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        26ddae731f8441e59ac8f197833bd0a7

                                                        SHA1

                                                        89a2d82ab5f80f66d404587dab5fc351a7d2b934

                                                        SHA256

                                                        0d63db9203e3ea36976104dd51c3c6c69293bfed8fae12d7fbc79176c5fc8a87

                                                        SHA512

                                                        d6bff99913ceb07dfdfc66cda74945261fad0c8671f413399b20604a0d96f11d6e4e4c7ded3c1637a8b4c30602bff2f8bbb6da1d35de806589e0ae22cc31c19e

                                                      • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        575cbf81a067845e8b3a19aae376c188

                                                        SHA1

                                                        3e8c6d16b8ec4b9020d8c905eef4a4bdaadf8d2d

                                                        SHA256

                                                        caeca08894404cfee187d4cfd039773bd778c3c8d08840e7bd2434562d3e3f1a

                                                        SHA512

                                                        7d67a809695d6ce0d66a096809bdd27589eafb9a6d02eaf317b52c70e366a3783b238992509f3f80af7a6b46a09a29d5b350683e2675525d49d1a7d2f1c5d4bd

                                                      • C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe

                                                        Filesize

                                                        4.3MB

                                                        MD5

                                                        2161730a7ae00a1fb8c5020a43be949f

                                                        SHA1

                                                        8db6b820472cdfa266c874e0d3a9395412995aa1

                                                        SHA256

                                                        07e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15

                                                        SHA512

                                                        aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a

                                                      • C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe

                                                        Filesize

                                                        4.3MB

                                                        MD5

                                                        2161730a7ae00a1fb8c5020a43be949f

                                                        SHA1

                                                        8db6b820472cdfa266c874e0d3a9395412995aa1

                                                        SHA256

                                                        07e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15

                                                        SHA512

                                                        aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a

                                                      • C:\Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe.exe

                                                        Filesize

                                                        4.3MB

                                                        MD5

                                                        2161730a7ae00a1fb8c5020a43be949f

                                                        SHA1

                                                        8db6b820472cdfa266c874e0d3a9395412995aa1

                                                        SHA256

                                                        07e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15

                                                        SHA512

                                                        aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir1884_468874336\38d3fda0-f097-49bf-94ca-0022d9340ec0.tmp

                                                        Filesize

                                                        88KB

                                                        MD5

                                                        2cc86b681f2cd1d9f095584fd3153a61

                                                        SHA1

                                                        2a0ac7262fb88908a453bc125c5c3fc72b8d490e

                                                        SHA256

                                                        d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c

                                                        SHA512

                                                        14ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir1884_468874336\CRX_INSTALL\_locales\en_CA\messages.json

                                                        Filesize

                                                        711B

                                                        MD5

                                                        558659936250e03cc14b60ebf648aa09

                                                        SHA1

                                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                        SHA256

                                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                        SHA512

                                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir1884_468874336\_desktop.ini

                                                        Filesize

                                                        9B

                                                        MD5

                                                        ec7139d5bb99bcebaf0b91c58a9ec5aa

                                                        SHA1

                                                        70404362dd74e309722fd282c3492ec95674123c

                                                        SHA256

                                                        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

                                                        SHA512

                                                        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_desktop.ini

                                                        Filesize

                                                        9B

                                                        MD5

                                                        ec7139d5bb99bcebaf0b91c58a9ec5aa

                                                        SHA1

                                                        70404362dd74e309722fd282c3492ec95674123c

                                                        SHA256

                                                        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

                                                        SHA512

                                                        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_desktop.ini

                                                        Filesize

                                                        9B

                                                        MD5

                                                        ec7139d5bb99bcebaf0b91c58a9ec5aa

                                                        SHA1

                                                        70404362dd74e309722fd282c3492ec95674123c

                                                        SHA256

                                                        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

                                                        SHA512

                                                        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_desktop.ini

                                                        Filesize

                                                        9B

                                                        MD5

                                                        ec7139d5bb99bcebaf0b91c58a9ec5aa

                                                        SHA1

                                                        70404362dd74e309722fd282c3492ec95674123c

                                                        SHA256

                                                        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

                                                        SHA512

                                                        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

                                                      • C:\Windows\Logo1_.exe

                                                        Filesize

                                                        31KB

                                                        MD5

                                                        2b8afcdb6ed4ca38b8acee22489318a8

                                                        SHA1

                                                        ae3ae4402adcc0ce43f95e09cab85fb3a3caad59

                                                        SHA256

                                                        2fc57cf6290f57609b6d8054e57e75481f4295526a25697229b8d47eb9a32e25

                                                        SHA512

                                                        feb6c4fac5c2a1ba6c062507184936749149813085f8d780a7bd87bdb87c6477b689a205434cd449d3edc0961f3eafc91d690debe32c1e76f543d633edc7e73d

                                                      • C:\Windows\Logo1_.exe

                                                        Filesize

                                                        31KB

                                                        MD5

                                                        2b8afcdb6ed4ca38b8acee22489318a8

                                                        SHA1

                                                        ae3ae4402adcc0ce43f95e09cab85fb3a3caad59

                                                        SHA256

                                                        2fc57cf6290f57609b6d8054e57e75481f4295526a25697229b8d47eb9a32e25

                                                        SHA512

                                                        feb6c4fac5c2a1ba6c062507184936749149813085f8d780a7bd87bdb87c6477b689a205434cd449d3edc0961f3eafc91d690debe32c1e76f543d633edc7e73d

                                                      • C:\Windows\Logo1_.exe

                                                        Filesize

                                                        31KB

                                                        MD5

                                                        2b8afcdb6ed4ca38b8acee22489318a8

                                                        SHA1

                                                        ae3ae4402adcc0ce43f95e09cab85fb3a3caad59

                                                        SHA256

                                                        2fc57cf6290f57609b6d8054e57e75481f4295526a25697229b8d47eb9a32e25

                                                        SHA512

                                                        feb6c4fac5c2a1ba6c062507184936749149813085f8d780a7bd87bdb87c6477b689a205434cd449d3edc0961f3eafc91d690debe32c1e76f543d633edc7e73d

                                                      • C:\Windows\TEMP\Crashpad\settings.dat

                                                        Filesize

                                                        40B

                                                        MD5

                                                        acf27d607470046665af80da19dc90eb

                                                        SHA1

                                                        dd275804288e832e7bd7b47e95193d07d18833f3

                                                        SHA256

                                                        d62a43a87febb9ec1557fde7ac24bf6e12957b34fdaff05f7ada82b97a2fac38

                                                        SHA512

                                                        e2eed4b539885027a1ff2e8af6873a210ce337633e0924077edd57a59c4edc7e62e3077e79dcc0465510845555d5b512f452cf01d644d1abcfa7de95d38aa92e

                                                      • C:\Windows\rundl132.exe

                                                        Filesize

                                                        31KB

                                                        MD5

                                                        2b8afcdb6ed4ca38b8acee22489318a8

                                                        SHA1

                                                        ae3ae4402adcc0ce43f95e09cab85fb3a3caad59

                                                        SHA256

                                                        2fc57cf6290f57609b6d8054e57e75481f4295526a25697229b8d47eb9a32e25

                                                        SHA512

                                                        feb6c4fac5c2a1ba6c062507184936749149813085f8d780a7bd87bdb87c6477b689a205434cd449d3edc0961f3eafc91d690debe32c1e76f543d633edc7e73d

                                                      • F:\$RECYCLE.BIN\S-1-5-21-3408354897-1169622894-3874090110-1000\_desktop.ini

                                                        Filesize

                                                        9B

                                                        MD5

                                                        ec7139d5bb99bcebaf0b91c58a9ec5aa

                                                        SHA1

                                                        70404362dd74e309722fd282c3492ec95674123c

                                                        SHA256

                                                        eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582

                                                        SHA512

                                                        b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48

                                                      • \Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe

                                                        Filesize

                                                        4.3MB

                                                        MD5

                                                        2161730a7ae00a1fb8c5020a43be949f

                                                        SHA1

                                                        8db6b820472cdfa266c874e0d3a9395412995aa1

                                                        SHA256

                                                        07e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15

                                                        SHA512

                                                        aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a

                                                      • \Users\Admin\AppData\Local\Temp\d00f911b3ad3541ae8caea4ae79b81b15bab1fe99f8d4c189306a83a293bc7ff.exe

                                                        Filesize

                                                        4.3MB

                                                        MD5

                                                        2161730a7ae00a1fb8c5020a43be949f

                                                        SHA1

                                                        8db6b820472cdfa266c874e0d3a9395412995aa1

                                                        SHA256

                                                        07e7896b2304e3b9966294a02d2ed32f41994ee7bd0a284e4160743edaeb9e15

                                                        SHA512

                                                        aa3659b6184f4273b7fcf1f7d2cd0a5a9129b8856d15e4ca8904b709e85cd432538ce0510ca9777760a1a9d5391671232a79908860e7d665260a54910f6fea5a

                                                      • memory/1268-32-0x0000000002990000-0x0000000002991000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2196-1821-0x00000000003B0000-0x00000000003EB000-memory.dmp

                                                        Filesize

                                                        236KB

                                                      • memory/2196-0-0x0000000000400000-0x000000000043B000-memory.dmp

                                                        Filesize

                                                        236KB

                                                      • memory/2196-16-0x00000000003B0000-0x00000000003EB000-memory.dmp

                                                        Filesize

                                                        236KB

                                                      • memory/2196-15-0x0000000000400000-0x000000000043B000-memory.dmp

                                                        Filesize

                                                        236KB

                                                      • memory/2968-4465-0x0000000000400000-0x000000000043B000-memory.dmp

                                                        Filesize

                                                        236KB

                                                      • memory/2968-2034-0x0000000000400000-0x000000000043B000-memory.dmp

                                                        Filesize

                                                        236KB

                                                      • memory/2968-1822-0x0000000000400000-0x000000000043B000-memory.dmp

                                                        Filesize

                                                        236KB

                                                      • memory/2968-19-0x0000000000400000-0x000000000043B000-memory.dmp

                                                        Filesize

                                                        236KB