Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2023, 03:26

General

  • Target

    AI Verification Tool.msi

  • Size

    8.1MB

  • MD5

    fe32a93b8ed4344e76673a23c604e90c

  • SHA1

    f97f313dbcd04d12d2cf57800c621764be913de2

  • SHA256

    0bfa57b1afc0367ae7663b769bcaacf6d4d59c802a011dd9c11811409a36e342

  • SHA512

    a2f3377e18f31bca7f4e0951d2c8f2f507bf0446e350ae6fe503febbd56edaeb329af3ce0fe1377baac50df7722a674f65c9378dcd0faa88816e1733d41d7072

  • SSDEEP

    196608:9gWlD5FAHHcbU+CNSf2U9Pxmat3sXSbNioZzQ:9nllGcSNw2U9PxmqCSI

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.google.com/webhp

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\AI Verification Tool.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4704
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3928
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Google\Install\install.cmd""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM chrome.exe
          3⤵
          • Kills process with taskkill
          PID:4808
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM msedge.exe
          3⤵
          • Kills process with taskkill
          PID:2988
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM brave.exe
          3⤵
          • Kills process with taskkill
          PID:3104
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -ExecutionPolicy Bypass -File "C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic/install.ps1"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --load-extension="C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic" --new-window https://www.google.com/webhp
            4⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0b0a9758,0x7ffd0b0a9768,0x7ffd0b0a9778
              5⤵
                PID:4856
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1876,i,4298158368098472299,11595238747270236032,131072 /prefetch:2
                5⤵
                  PID:1036
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,4298158368098472299,11595238747270236032,131072 /prefetch:8
                  5⤵
                    PID:3068
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1876,i,4298158368098472299,11595238747270236032,131072 /prefetch:8
                    5⤵
                      PID:2140
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1876,i,4298158368098472299,11595238747270236032,131072 /prefetch:1
                      5⤵
                        PID:3920
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1876,i,4298158368098472299,11595238747270236032,131072 /prefetch:1
                        5⤵
                          PID:2648
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1876,i,4298158368098472299,11595238747270236032,131072 /prefetch:1
                          5⤵
                            PID:2296
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3828 --field-trial-handle=1876,i,4298158368098472299,11595238747270236032,131072 /prefetch:1
                            5⤵
                              PID:1376
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --load-extension="C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic" --new-window https://www.google.com/webhp
                            4⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:3980
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffd0af646f8,0x7ffd0af64708,0x7ffd0af64718
                              5⤵
                                PID:1336
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:3
                                5⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3468
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
                                5⤵
                                  PID:2628
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
                                  5⤵
                                    PID:1348
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                                    5⤵
                                      PID:3776
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                                      5⤵
                                        PID:2508
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:1
                                        5⤵
                                          PID:4156
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:1
                                          5⤵
                                            PID:4776
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
                                            5⤵
                                              PID:5752
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:8
                                              5⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5768
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:1
                                              5⤵
                                                PID:5876
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1
                                                5⤵
                                                  PID:5868
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1
                                                  5⤵
                                                    PID:5184
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3623038419301715749,6840948245324557998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:1
                                                    5⤵
                                                      PID:5188
                                            • C:\Windows\system32\vssvc.exe
                                              C:\Windows\system32\vssvc.exe
                                              1⤵
                                              • Checks SCSI registry key(s)
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1864
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                              1⤵
                                                PID:3120
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:3824
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:3820

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Config.Msi\e593717.rbs

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    8184d103ec01c353c3f40365156bc34d

                                                    SHA1

                                                    be4d32c6fe8b532b5920c440527ac7403863d13a

                                                    SHA256

                                                    e8aef37733ffcdcd806b2a2456969da1cc0a158fc49e131592f46d4f693ca801

                                                    SHA512

                                                    7717cbaf669beea4440e3fcbe1d207ceb16e4c3a63acbafdbfb2944b748408c5db19af36975f3fb069c8076f85ac9206a6cfe80b6e09f02c02fb7c7138a986cf

                                                  • C:\Program Files (x86)\Google\Install\install.cmd

                                                    Filesize

                                                    200B

                                                    MD5

                                                    0a7d6d0a288a233c07e4a662db7693e8

                                                    SHA1

                                                    f404c8e2213baf004b823e1a87e3eece01c36246

                                                    SHA256

                                                    d0b30b5c2b07e0766ba9c3a98c92ad91d3e86e06bb1e237d0c5fc7baeab8c646

                                                    SHA512

                                                    3e751e93d6d64790c4b032458bbb7f07adfe201161089654b1eafe84c3f0692495d6d603e16743c6b76e176347fd2df3b427b64011c9e8cde15ad9eec7df2071

                                                  • C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic\background.js

                                                    Filesize

                                                    18KB

                                                    MD5

                                                    37c3a74f360a113cce683949187d3b0e

                                                    SHA1

                                                    cf15caa5634d64fc5517021abd11697b63bf6b41

                                                    SHA256

                                                    0dfa4f3fc9d99a7e8765f4d116740bafbbfbe5da25fa100682f7896680a09391

                                                    SHA512

                                                    ad67954c51046fb3dcd186094f2f85fa460f157ac35c54e3ce503ca41dc1f72c7d12ec06fa662b1637955a326bff52d4c0688d5086c428cdba74b6d9c29a0e8d

                                                  • C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic\content.js

                                                    Filesize

                                                    258B

                                                    MD5

                                                    4d53e2f9289e4d01cb88e277bba25c72

                                                    SHA1

                                                    a54fc0fd884a33229216eebd93d868f0c43eec0d

                                                    SHA256

                                                    ff5cc0f88e7f10993ac60437a74ca9224ae13c9d15b86677991d053242237195

                                                    SHA512

                                                    25d96794904b7e5401eb6789ea0f2f22b535b9b6aa69d119a5f65115c06556e156abb66de17f889986940400904d262e744057e4e0daa7aba0505906d6b98cff

                                                  • C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic\favicon.png

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    8be1facb79791a064862a61399b6dfea

                                                    SHA1

                                                    93bc1b7172e9a3aa7c7d7b24b7be53c992e4566f

                                                    SHA256

                                                    89ff11a2237f9ec798ed4493738b14be76f11f282c5ab755847779fe241ef857

                                                    SHA512

                                                    6bdbb91648377ff2af465973c85021085ff413ab0b8da3c59127f46e5b58e9116c5227ed4c8e923d98185f8a85471e84007c927b58a21a06f081e702d0e731ab

                                                  • C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic\install.ps1

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    b6ff7935b71f74697671e0f32d8860f6

                                                    SHA1

                                                    516e483421c82aba020cfe315fb6f61dac984150

                                                    SHA256

                                                    1431e81d97ef11f2041dd18731ec23470c8e04480a357d9c723f9cf2e562c9bf

                                                    SHA512

                                                    514ea760d1105c00a7a026ad6e8bd0eafcfebf121b522120d2d02dacf1b333b05553944dbf963c0927d48577c7e45b073b426498c338b8ea25e120927217cafa

                                                  • C:\Program Files (x86)\Google\Install\nmmhkkegccagdldgiimedpic\manifest.json

                                                    Filesize

                                                    714B

                                                    MD5

                                                    162ce37b0f293f4cfad78aeffa7028a5

                                                    SHA1

                                                    4633122a48f30074e75379aee0eabdc2a934846f

                                                    SHA256

                                                    f7ae9888bbfb60d6598fe9247fef9edebc8928593f4e4032292d846e40b50254

                                                    SHA512

                                                    888a4c2e7108ea31d29dab5314daae5729fb1f9e0b538db1aa272443499fe321d95d0e0c912ae262e2058acf81a15adbd5ae64c76485ddd9251bc75e974dbc44

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\45d6c29e-5a99-48db-9967-ab4edd5ada93.tmp

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    a3c71710d50a4d3b9632be839936ab06

                                                    SHA1

                                                    06565d649e6fdf38332137fc44594b91261df5b8

                                                    SHA256

                                                    da1497750a38ce1a8c2b60c620969e4f8a4ea5318e56ca8b930c17be0e578dbd

                                                    SHA512

                                                    01d957d3d493477d9715fcd68ca58908c93c1d18dab5a7b3918eaa1bfbd0b4e8f833a89805fa93ca720c6222e4b6c4526e8d5fc06741d17c6a8587b675a562c5

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    312B

                                                    MD5

                                                    e99d267dd3e770740ba7392ec5b48b91

                                                    SHA1

                                                    810dcd9a7df03618576f49d4d1174cae796621e3

                                                    SHA256

                                                    8618e66b9e0352acc497497ea879bc5a32f17b1f4da709f8293b8019e623e6b4

                                                    SHA512

                                                    9b3aaa621cd678a7381284821d18dfc446ca580e2a9b13d3eec92d4608fdf7bb404fe5a957ed4b6042a18d760ccc5d4efadc136638fc713b6d3b3cc66394ab14

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    46295cac801e5d4857d09837238a6394

                                                    SHA1

                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                    SHA256

                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                    SHA512

                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    1c543e89b102ddfee4a0f254141940c5

                                                    SHA1

                                                    4de6bdb3f23e6132459081c20b57f804b78bd06e

                                                    SHA256

                                                    8276efd6f0ab7765a5654577bce0a4c89b4e845b1699dbf5ce882cd66240eb41

                                                    SHA512

                                                    2631065c2bc3b479f9ac96f6588873287fa63740ccc579ef8fd0c41484552f41675ca8ea31de606e67515b5b1e183a86319dbab85c9902a6b6ffa24a8f80ef2d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                    Filesize

                                                    539B

                                                    MD5

                                                    96b173bfe740515ee294047b5a9db16b

                                                    SHA1

                                                    3109576ac362d25072ac6a3efc17f9814837f2db

                                                    SHA256

                                                    523e8d568201beba82c12408de121c09d7b74a4bc12ecf1f44bdd35998532531

                                                    SHA512

                                                    30f241dfbeb5ba88c69089d4138833f508b28cc13cd5c7dd5e7a0bf5474473beb2aa8faa2af82ad8a8e1d97a525637f95026c0ab4a7e9bec8c82a6fdaaf4bf21

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    60151fd805015b599cdd40199f2a2c83

                                                    SHA1

                                                    c0dee37cabebb66b9cbacce71d77307f593f7c2a

                                                    SHA256

                                                    e88cb7abbd2f61b98bff4cb99c132528ceaa220447879e084de728bfe011e185

                                                    SHA512

                                                    359af1663618f9bf09e02456ffa6e7cc41f0666a611c8b251f491d87240a58af5f0daab66ec579195b5b9b14e3bcade7c237fc1806f578ed508ba6504cdd99c4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    23cd3ad085e1ed7f2267f9cd21e304b7

                                                    SHA1

                                                    c0c96c08664adebc44a2ec8b189abb79b44648d7

                                                    SHA256

                                                    d6836714e700202a6a8de198eb7bcbc1f76d020e7179cc5a3630058f342deb97

                                                    SHA512

                                                    b2dd89993e54cc92b307a76012dec3f65a52700f1226c4cbb8ecd259a4b70416a69c46f30bdeb6ab7b1e585f1e06af0f6a2ba2eec1997b5eb983a67237b3e2b1

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    27e08db0cd9fb9fed96270c21a41226a

                                                    SHA1

                                                    5a9dab7ae6411549b700f2fb979213c0a366d206

                                                    SHA256

                                                    4c538fad95b41c42fa743102130b6a37d011956654956561e90643af4e645257

                                                    SHA512

                                                    c1e369704915753864b87a74fb9d2bd74c378ae6441c613488a5b76807c0e696ba49fab3d66ed2405c0cb6e6e438a6d0f22743333a348e7fbd2d017bd6d7a794

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                    Filesize

                                                    41B

                                                    MD5

                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                    SHA1

                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                    SHA256

                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                    SHA512

                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                    Filesize

                                                    72B

                                                    MD5

                                                    8336c28819d3b753e1259f532483f65e

                                                    SHA1

                                                    a66e90e6e45e1c45b067581bca02e04be040f647

                                                    SHA256

                                                    3c9156905b9937111e064e97e1afbce8ea17d5842304c24db1a2a7f4dbdccf2c

                                                    SHA512

                                                    53806faa5e0b6639df26177d68c96f959e86a22f920ad0445583c89987189ee31d1be43ae43fe17c16c8d4ddf2676fa0a6e475abad7b04e324148b781e4566fd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59c8b5.TMP

                                                    Filesize

                                                    72B

                                                    MD5

                                                    a27b71d681c495ecf329f5292f53e722

                                                    SHA1

                                                    2b1fe21313a693c8728167cc0b904d3e27f02eda

                                                    SHA256

                                                    aa43b4e2953507ec08673ae61086cdc657aa47d857f69dbb7ef96bbfa9811eae

                                                    SHA512

                                                    fec554cfb068179d11866b1e6ae46fe46050a6a9dc08b2cc7a4fd21365b18443dc4d7f4f3bf5a459de697ea8d4fa92213922e0dff7276a291334faf822265b7e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                    Filesize

                                                    201KB

                                                    MD5

                                                    9c24427a682ec43af9f8779894f3d983

                                                    SHA1

                                                    5295cf159a8fc2e829f5c717c47b3ac8a9d16ff8

                                                    SHA256

                                                    7224bd7d2ba9ec5127db53d5de7118a9a0a3a699b269b959385c43232dc2e086

                                                    SHA512

                                                    a114ad4aafa86182a474dbbf33d4b91a5051f9738b841c822076b75f7b9462c8e76b031e01a9a1b74e0d7ff7f8340caa95bcd45d42c6ff8b2b7c9e071f80b0c1

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    3d8f4eadb68a3e3d1bf2fa3006af5510

                                                    SHA1

                                                    d5d8239ec8a3bf5dadf52360350251d90d9e0142

                                                    SHA256

                                                    85a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c

                                                    SHA512

                                                    554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    384B

                                                    MD5

                                                    024fa85e38e09f0f9c7f31689364962e

                                                    SHA1

                                                    67c242e2ee72113b29d1043a9284ba48888b061e

                                                    SHA256

                                                    f1f202de0d4f42b287c7cd71520335c6a955472aa0756bbc9ac1742c2e61add4

                                                    SHA512

                                                    c5d345f26d6793f0730d44f2c4d72af3e74ebf489a8c82916a78dcdf9a3a59f39df0084ffc1848f8987a8d9ec08acee9a7dcdd7775fdad4d12f5aae71f0a4b37

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    111B

                                                    MD5

                                                    285252a2f6327d41eab203dc2f402c67

                                                    SHA1

                                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                    SHA256

                                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                    SHA512

                                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    e5b6f2f6a0ef72bb4c6de337252a4d9d

                                                    SHA1

                                                    9ccb0cfef70d7f335fee76feb49a48d7831e0605

                                                    SHA256

                                                    f80104ca75e09e0a5abb11f343619012026cff7230091fd605942b3865891097

                                                    SHA512

                                                    c6b539375a215ae321f96effdaf1d7240242f790129d4c4de8741a2727c4c92207cb65f97ad3eac6eee21c1e6aacca2549b413f9b94666e061d8ad2a5d6dee47

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    4d9a4a816f6cb0e0b400bc86ac619cd9

                                                    SHA1

                                                    1d0e34968998d26dc05cb132b4356af7c0eb3d72

                                                    SHA256

                                                    375ea75fbc4d0dad8b3af13f35939fa0b84ad887eeab2c066f4d05981c20664b

                                                    SHA512

                                                    ae63ab6fdb15c64e450db89c1e8ce3ccdfbf426e8d0dfe83a5e018f110d2dd27ea9e114bfe688d620811c08515f5dd5d544fbafceb005d78416a57410a6558f7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    348d7c45bb8cd1ee9ed06ebfd27a664c

                                                    SHA1

                                                    a96bb45d2d1e0c763d81cfd2a824c163f59bb98e

                                                    SHA256

                                                    5acd281309291b1f74fd9244d61806ff4a89a95ad361b273986637d38a70d9c1

                                                    SHA512

                                                    9f873b39dbec1158465208873635dd054ce59f1d8449fd989e78f0bfaaa2a3e6a3f8c0b8d0ffc912ea896a322b2441299c241ff3da03692b86e480d8480339c8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                    Filesize

                                                    25KB

                                                    MD5

                                                    b0679fe4048a462f4293d3f27d49c1ab

                                                    SHA1

                                                    c54c435d5cc0a1c0d4b9925b8a646a2d9d732a30

                                                    SHA256

                                                    c9ece6880509100e3428e5c55f7ee44e51c30d708916c0e86e9fa029ec94ad29

                                                    SHA512

                                                    db230328405cd520f454a42906398c90ff57016631c62a00616d6611d50853956d147d525da1c696b3b07deae8fed57d925188c3c1131edf1ea42f04cf5ef792

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                    Filesize

                                                    25KB

                                                    MD5

                                                    0860115917004665f729eda92719e0e4

                                                    SHA1

                                                    bab2c5315c117dc3e225c11e0b892c945cce81a2

                                                    SHA256

                                                    f49de3d6bc04813072220e70c9e263307939d0c00d9105c6d659d8b892ec15a6

                                                    SHA512

                                                    3660af988f7bfc895d62fee601031897b0cbd1b70aac20423269dfea29cf942c72969055583a17540609c37559515d7c9ce635a554db5ddb18230728b2f24feb

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                    Filesize

                                                    72B

                                                    MD5

                                                    bee1867a4d81d86ab646547e018f8459

                                                    SHA1

                                                    b9451720b5d43dde9f998874ff2f82761038d223

                                                    SHA256

                                                    26093d21fdd5f43b3a85dbde0889ebc4c8ac06d81a411e63856990a1bf76d22e

                                                    SHA512

                                                    257f4f26fe532c61725f072018aece945d1646c9525f80e0764518a932b5c4004897197d45067b6842778205af562dc8e73b6c2d436ef07b06de62bba8079838

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59c49e.TMP

                                                    Filesize

                                                    72B

                                                    MD5

                                                    92a46e558b333f8ad2bf5d7b10e48a7f

                                                    SHA1

                                                    abd0419c681b8a4664a4b4add328d77423e44ff1

                                                    SHA256

                                                    c7d19c2c70f8c64c83f0bd1cf0106037f4fcf1acf86010c03a20b6c585d7195b

                                                    SHA512

                                                    9348348d3ef75fbe01d4814562be7e5be03218ec167b100390722816bf4d768604f2caae1c76a9c38561a5b821ed023c48148a3c98503254e85a5b3899dbc76b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    131ac8fc62473248f746316331c68998

                                                    SHA1

                                                    be76d68d329343f855cc77dcfa82c1ba007b4a02

                                                    SHA256

                                                    b9d791e4e5bd1b1094216ae486f352f1098af69b32af43e7318ee2cf18b6d29b

                                                    SHA512

                                                    3abcd6abb87a2cd3c00628deb6a4b74de3dcac433aa21202114befa1944fae57e6cd51dee082f095b5dd077ae35cfd4796f75e81b8043ab70c7d97e31583360a

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rou5250s.jw4.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Windows\Installer\e593714.msi

                                                    Filesize

                                                    8.1MB

                                                    MD5

                                                    fe32a93b8ed4344e76673a23c604e90c

                                                    SHA1

                                                    f97f313dbcd04d12d2cf57800c621764be913de2

                                                    SHA256

                                                    0bfa57b1afc0367ae7663b769bcaacf6d4d59c802a011dd9c11811409a36e342

                                                    SHA512

                                                    a2f3377e18f31bca7f4e0951d2c8f2f507bf0446e350ae6fe503febbd56edaeb329af3ce0fe1377baac50df7722a674f65c9378dcd0faa88816e1733d41d7072

                                                  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                    Filesize

                                                    23.0MB

                                                    MD5

                                                    10ee7b265d83f3331f9f369b1ffdc32e

                                                    SHA1

                                                    36e1bc1689a5891beed6c5465ae9534cd6193d53

                                                    SHA256

                                                    1676dc4ab25bf791a72da48a45757ace864fd204d1b423df85fa4e45b260843f

                                                    SHA512

                                                    4d2a5b89c42eebf9e881cd483d0f5b47af2bcea4f76c832a3538f35ae0064e883ea3aded37dfd97ed278a6c135cdc69491393deecb9d8a6ce629b27bdeab8010

                                                  • \??\Volume{99926f1d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{353c76e2-7bf1-42e5-b633-633d88ada334}_OnDiskSnapshotProp

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    e490b077f9532a27a1a6683b6a545364

                                                    SHA1

                                                    c3307b730682452a55473863b548dd9e68ccf0c7

                                                    SHA256

                                                    2207ab5a04c8358b17bc09fe739aca4d18738807d87b287a78ec490f84317b18

                                                    SHA512

                                                    bc7ec33b87f40299d4ac7b42ea9be958aa05bdb70583e9868f6f5e93c09bd9d0e66ce2978b058f7c95498f0e3f46aa6fafdf38f18ab64dd2314e7f6210fc1ac3

                                                  • memory/2820-53-0x00000238FA5F0000-0x00000238FA600000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2820-86-0x00007FFD0F9D0000-0x00007FFD10491000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2820-50-0x00000238FA700000-0x00000238FA722000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/2820-51-0x00007FFD0F9D0000-0x00007FFD10491000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2820-52-0x00000238FA5F0000-0x00000238FA600000-memory.dmp

                                                    Filesize

                                                    64KB