Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/09/2023, 05:51

230901-gkbdnacg6t 5

01/09/2023, 05:47

230901-ghbawacg5y 5

Analysis

  • max time kernel
    1050s
  • max time network
    1049s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 05:51

General

  • Target

    SHIP DATE Aug 29 2023.msg

  • Size

    64KB

  • MD5

    7bf98f0a5f9f5ed23adfb55e05c63e0a

  • SHA1

    a0b9e77350c064a3c84caf19ae244cce660bc1f4

  • SHA256

    d93460264759ad750506d4d660c489a18be534ad6e3b5ae613043d503927578c

  • SHA512

    ec495c0004e5939b3e073041237df596a3e78c0fbff630788e91dd3ef7411ee41ece4cb961f34572169c399b613d86b72628fb28153d64df0314ae948719b61c

  • SSDEEP

    1536:aunkB9hJ6RWPKnhKHcvdE46Q2MOYMmSb+pKmU5OLiz:aunkB7J6RdKD46QdgmS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SHIP DATE Aug 29 2023.msg"
    1⤵
    • Modifies registry class
    PID:4924
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\SHIP DATE Aug 29 2023.msg
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1684
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc69be9758,0x7ffc69be9768,0x7ffc69be9778
      2⤵
        PID:1912
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:2
        2⤵
          PID:4516
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:8
          2⤵
            PID:2328
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:8
            2⤵
              PID:2940
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:1
              2⤵
                PID:800
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:1
                2⤵
                  PID:4480
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4700 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:1
                  2⤵
                    PID:4704
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:8
                    2⤵
                      PID:2676
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5016 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:8
                      2⤵
                        PID:4568
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:8
                        2⤵
                          PID:2200
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5348 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:8
                          2⤵
                            PID:4012
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:8
                            2⤵
                              PID:3540
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5332 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:1
                              2⤵
                                PID:5096
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1860,i,12083170628192392332,3989693773252198775,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3688
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:4496
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:3180
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of SetWindowsHookEx
                                  PID:800
                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\SHIP DATE Aug 29 2023.msg
                                    2⤵
                                    • Modifies Internet Explorer Phishing Filter
                                    • Modifies Internet Explorer settings
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5052
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5052 CREDAT:17410 /prefetch:2
                                      3⤵
                                      • Modifies Internet Explorer settings
                                      PID:2216
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5052 CREDAT:17414 /prefetch:2
                                      3⤵
                                      • Modifies Internet Explorer settings
                                      PID:4976
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  PID:2288
                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\SHIP DATE Aug 29 2023.msg
                                    2⤵
                                    • Modifies Internet Explorer settings
                                    PID:4648
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\SHIP DATE Aug 29 2023.html
                                  1⤵
                                  • Enumerates system info in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:2324
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc737d46f8,0x7ffc737d4708,0x7ffc737d4718
                                    2⤵
                                      PID:4340
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                                      2⤵
                                        PID:3276
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2520
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:8
                                        2⤵
                                          PID:2820
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                                          2⤵
                                            PID:3748
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                                            2⤵
                                              PID:840
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:8
                                              2⤵
                                                PID:1824
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4844
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                                                2⤵
                                                  PID:456
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                                                  2⤵
                                                    PID:4480
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:1
                                                    2⤵
                                                      PID:1740
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,3401448416817391504,17517270659733169337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                                                      2⤵
                                                        PID:3316
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:2656
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:464

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                          Filesize

                                                          288B

                                                          MD5

                                                          697f59d8654daa5f46f675f6a225fb85

                                                          SHA1

                                                          76fbfdb83435b2fedae02fd3db7a6150c4fe2a8b

                                                          SHA256

                                                          974c5224d086f2b7e9801db92b9d207b19692a971051e8803dea9755a2a2e44d

                                                          SHA512

                                                          cb63b098e44120594d7ad56288aad8d896e5ff356b0e6abc0be1828dad28a8cdf4514d0da018e8a5ff7658d9e0677fd6281f02fb85df0965039387158954c6f6

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          0f97c0850b66695688348038e377296f

                                                          SHA1

                                                          5e2b17c2167be9467fb842f509c68a44d7f2ed19

                                                          SHA256

                                                          f1c427a760c9b6b5b7280d9c597150022c0dc79cf2369e5971ac89b8f7d33028

                                                          SHA512

                                                          8aa7f15105129316c441f9bff43da06486c9dabab9ce92ec128161c9ef755d6dbf994e3dadc845e645855d38c89d5ddfdda9b894f4b8b5761b8f15feeb04268f

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          2f3df4569c7426decf1b3ecc16f1033c

                                                          SHA1

                                                          c96047357e200d62220b1bfae677e678f9df779d

                                                          SHA256

                                                          388bd45f7a10f0500f7da6d9372eb5eec60cc8659b9f355df606ae1fc4f0ccce

                                                          SHA512

                                                          a9dc22a5ede61d52b8a5a9ecd29903a3afc344ff770a353422ec2ed2cf11395c9c09039f19d85454621a68d9b00981a6d0349afa8873506ef27e2c2854160723

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          1fe2635f13fa7d8ce867ae876f355209

                                                          SHA1

                                                          583c852ea65657f04c011edc988c638e63b7071b

                                                          SHA256

                                                          d7c230d3b0beac6d9014af33d094f951a868eba8351e0d618393112ec907dad9

                                                          SHA512

                                                          938d80c35c34428ee11a55e48e2065c9c7a1bd91c5986a0878aa2d7d60466a49075ca63f083a82459829894af7b2de6b466026be7ef642cfeee2bc1359073bd6

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                          Filesize

                                                          371B

                                                          MD5

                                                          6751225fc9d0bdff41f4b0480d8a47c1

                                                          SHA1

                                                          a3ac5fe0e99b8fd5aab31891e7593529db23d5b5

                                                          SHA256

                                                          73dbadaaab0c78d8bb4142358219b17806f220d371987d83a0062e00f953a237

                                                          SHA512

                                                          ac232450ead5c37d93e3d1f31d1f12a78863521e53901b9ef7f2380dfdd80495565cfd8381a069b341d930ab3eb798bf3ae971bac0878e24d100cec6d58c2035

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                          Filesize

                                                          371B

                                                          MD5

                                                          433277f89a2c35efb869b7b212b114aa

                                                          SHA1

                                                          ef19de6c9780702d29b04aaffe9979b6ee964064

                                                          SHA256

                                                          9b97eed3e23ee1e16870dc2f894010d96605e08ddf842678d9dac8e2da70db5a

                                                          SHA512

                                                          9493cba2e0bac89a4896df346360224f22d9014e2cde9ff34edcbe7b80adde7e4c3151ebb0674e1d6655a65cf44aa0342e9b5f84677a141195b370dc5eed31d0

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          ea972fb0d4baef6c24901e90515b0a82

                                                          SHA1

                                                          3e7ec97224f08370bb391ba019865aaab2879821

                                                          SHA256

                                                          145fd537dfb464f62b09e5ff284bf0653e4032fe3b1dc0907e2d55ce3f02286e

                                                          SHA512

                                                          4ccdadb81799e3dc13f966bcab796e78063fdd17fe42ea5cd4c6c3a0e2038695b5009ed697975c85363217d8a2aba231aefffb0cbce742ceb8dbcd890ada5c38

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          fc867ff6449f2af257bef2d965b44e88

                                                          SHA1

                                                          a14135a78497307853b3444e0c30bf815f8477ae

                                                          SHA256

                                                          aecce6bd81209002c40eac52a9d812c28009ef7f9db0ed4902ea8c65e28c5bfb

                                                          SHA512

                                                          88ecb91288a72cdf144162dab24e16d98b28024b40fb407dcd851a50a791ee680779e40eca8cbcba3b744d031317c4cf06a84bbad22fbc28fb3a8b0b5c4d6242

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          c4d89bd70a0e57a09a3b23c9b5d26f71

                                                          SHA1

                                                          843df0266bd3b06ae0b1c6191099a83a008768a6

                                                          SHA256

                                                          6eaa14a77f10caab3afdd143870586c6e12ed8da83341328765d560d8d1e69bb

                                                          SHA512

                                                          a86a7649d8b7b3503c496e24a1753ca80cb21816725b1bff6ddb08abc665989e647047f396a272f6f4ab8e68a1afb0d48aa2943a59af1cfad655ccfe90a233b2

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                          Filesize

                                                          191KB

                                                          MD5

                                                          29a790c09a347c63a61d0a6cf90b66cc

                                                          SHA1

                                                          a2e32177fabeee777c82d2dfa8c567cfa8e5721d

                                                          SHA256

                                                          92184f1f8c8d3d809dcc23d804b4d0f181d3eaaaac0f5a3b0eba0677521947c5

                                                          SHA512

                                                          0c86693b7c3dd55adf2ffe2746b2043a04c7687c7df24285a01d9cb878ef168d94f2280bce75f97b09e260b7a2199aebd7ba4b90d0b8f43ec057917e02270894

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                          Filesize

                                                          2B

                                                          MD5

                                                          99914b932bd37a50b983c5e7c90ae93b

                                                          SHA1

                                                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                          SHA256

                                                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                          SHA512

                                                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          4aab618ef3d86f2fbf808c4ac50ab083

                                                          SHA1

                                                          3f794d5499a16d7048809b46589984a065164ed0

                                                          SHA256

                                                          4971c4c535809b9ffe1b1d9b22e7d9ade38d51a4406def14c54708a87c2e4dc2

                                                          SHA512

                                                          21adbdb317cb85cbcb370003a09fa6f75fd8ba65b4453d33f6f3abd6449c9c0ce97a9480fd5c058885a264364b2c00e7979a7bd285b76b296c56f85e207babeb

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                          Filesize

                                                          111B

                                                          MD5

                                                          285252a2f6327d41eab203dc2f402c67

                                                          SHA1

                                                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                          SHA256

                                                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                          SHA512

                                                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          fba4e8962d90e78d3548e305e8853191

                                                          SHA1

                                                          db6ff13577c3d189a398542c0dd74bac086388a4

                                                          SHA256

                                                          e5a42024e1943a2ea0a701045af3fb94645f53136b3383adc300c611b9e3c9e4

                                                          SHA512

                                                          81dc536382844fbd83ea1d0b7cadad513e13c723bf69c4c34159bc271af736c91e0e101173696bb6cf100b41b11ac88d4687a66171a478af868d529e44674f2c

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          43af941aab911997c18a099290335a2f

                                                          SHA1

                                                          6b4570a42c33dac651ff65334ad8fc68a7cd835a

                                                          SHA256

                                                          8f421583e55c33735df6ba201763fbe11c21b445fe7f627ec0c3a8ba38a2d363

                                                          SHA512

                                                          0c7cb2c309bd3df3ec0bc702f9d5fc4dbad97ab25d6c2936daaff8272e5aeb84a36c6352fdf5c408749e4995322cef9376bdf91c8efa21d8da5f3343d235c343

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                          Filesize

                                                          24KB

                                                          MD5

                                                          7caf65193db27a3b881dfb25b62ce529

                                                          SHA1

                                                          304e35e18f36b79acae60f4a426f0ab861a651b5

                                                          SHA256

                                                          eaa4cdd8c166fc998235daec7bdc3fc2a9ef1e2207be2f4eabb8fbb564ead890

                                                          SHA512

                                                          96231ea6ea8f879e0d2f48fd7bca3480ef78df283d135a1f631faf701215c4d9477b1a8eb59a24b8f08d060b71e250e04deaf49ea08758993b77199a6bc5cd69

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                          Filesize

                                                          16B

                                                          MD5

                                                          6752a1d65b201c13b62ea44016eb221f

                                                          SHA1

                                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                          SHA256

                                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                          SHA512

                                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          1b0612484fc2a58ef055beffe8f24838

                                                          SHA1

                                                          c14489e8b865cdf9d075b877b7032d2e79aca711

                                                          SHA256

                                                          186df68e9de985db377d09734db0334b5cc5eca93cbf63ca1739bab85e5035a8

                                                          SHA512

                                                          8d00541b4e225d66915358c2e7d8892d8285b51458ff53a6a1222291d431b763c7cf32308534f19a1ab87e668d1a21f592c714c79d9b8836d87db4fd6ce4baa4

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          d94605638e96b7f7992fcea417db0cea

                                                          SHA1

                                                          f02996f8faf774acefd8e4214f11914a9a10afb3

                                                          SHA256

                                                          440a8c7d00bb21b95555eb128c2dab0a5605d70bd0fdce5e208499d0c8a7ef43

                                                          SHA512

                                                          a5deb6f7cce73323ec5e38913401a944ac9a8d6c135f063d641ef2f708aa0fb5213e97cbd38acffa56f885ab9b341371e7c711563ebae3a8679de7edd0d4fb57

                                                        • C:\Users\Admin\Downloads\SHIP DATE Aug 29 2023.msg

                                                          Filesize

                                                          64KB

                                                          MD5

                                                          6ee03bdacfc42b3e2b0f15028264b815

                                                          SHA1

                                                          9c5f8bf454ececcde626f89edc6d0aef5a45f20c

                                                          SHA256

                                                          841f41985edd6c7093e1dccf121712a35e58e209c256cec62156eaad95acf7ef

                                                          SHA512

                                                          5534c71b3a9d190063eb1ad535df2c749fa54e0eb646594d344e86fe7b05aaae80fa21ded678996ed08acaa239e9a006b4ba495bff18fe391331be96e0b8fbcc