Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
National Adoption Service 24.xls
Resource
win10v2004-20231215-en
General
-
Target
National Adoption Service 24.xls
-
Size
209KB
-
MD5
5672a3c88905186a3bf4f1687fa4bd00
-
SHA1
d234af6283e701e9f378c37012d6534f079ff394
-
SHA256
07fb4ef7a3e41d797a3c7fb3b776117a7652ea964da4aa4aea204c7b078bd337
-
SHA512
8c985461750eff7fba43c9a2fbedb9b4d654cbb333cd5885993eb5982ec39e055933633c1c2088930b760d168bc37c7062e1175e0b462415b3f35385ed351175
-
SSDEEP
6144:1k3hbdlylKsgqopeJBWhZFVE+W2NdA8eEOsMWixzJNi7YcHhJGfGXi8:4eEOsMWidJNtcHLB
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 456 840 msedge.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 840 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 456 msedge.exe 456 msedge.exe 1700 identity_helper.exe 1700 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 456 840 EXCEL.EXE 91 PID 840 wrote to memory of 456 840 EXCEL.EXE 91 PID 456 wrote to memory of 2956 456 msedge.exe 93 PID 456 wrote to memory of 2956 456 msedge.exe 93 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 3204 456 msedge.exe 95 PID 456 wrote to memory of 1580 456 msedge.exe 96 PID 456 wrote to memory of 1580 456 msedge.exe 96 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97 PID 456 wrote to memory of 2364 456 msedge.exe 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\National Adoption Service 24.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://analytics.twitter.com/mob_idsync_click?slug=bsBj1OBgEd&idb=AAAAEIDmvoCE23K9GW4os8qcj5Qn4VAP4gVW9hJCuuZaX3Zn_vjohtEHMxEOwb9v68-Y9MpogXDY2-fldgr0e14fn2yqTw3dcz-aBar2FSmyble_vYjHutAUJSAw1pWJFXwSMmk3SMbCnfGqI9yOnijNVdF11uDPZ3clTmeQLe7dUC5Fx2RsJ53bDD5x5U1Nur5OY7WdExTJMHUdDZBRhuE3j5YlNuerp29ig0O3JHCMLJaqtKgSrl-jIt4ydu1B6MgRdyUIfPuTLBPWBxuj3JvEbg&ad_tracking=true&tailored_ads=true2⤵
- Process spawned unexpected child process
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9547246f8,0x7ff954724708,0x7ff9547247183⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:23⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:83⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:13⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:13⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:83⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:13⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:13⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,3899329708974863653,11382594991114371308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:13⤵PID:1748
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD51bac88119d73b08d53ba32ac0ece3388
SHA12c4c95afe28554c557e4635f1e16cc363b8ba618
SHA25698c2db5f24c693e7aec5acf5dd3f6642ed602726fb9df94b22342a5fddd11880
SHA5125b54d45246920f77c3a333729f3c804afcc902385c0334949e2eb8995d551dad9aafbe4efa08e53889f16cca32cc909ce194d2ea11b7d9b48ee50c9eb54ceb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59D76868C250B3240414CE3EFBB12518_DF3455CD7B8392F49B7F67006ADE0E83
Filesize471B
MD5e3a1c94a437640219e2e1e31ac95ea23
SHA1cefed831b7101a9701a2833fcda674e3641bf61d
SHA256c5274889eac6449b26d1d5f84cfe0c423a9ef37e3e9630387104303bff508da5
SHA512811b71e86efe2a476b5c1993bced3cec791d1781b96fc312a4ec04fe5c41169a652e8da75a9cf2dfb2d0c444751f57374ca3f46ef521d2acc3c80554bd2ecb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD5556ebaf88c57a0beb10d754dd380e57c
SHA144119a526e74f79233466ed268569777eaba280f
SHA256c2c3d3fd1815c18c2f57b41192c97cc713a717dc10357339e9cc6cd59c915a34
SHA512b2f1ebc937c4309d53213f6796776cc0cfd103eb403d194b2bfe54f08bc2686c544715ce4f0661fa8d65ca09c7a9b3e45f40e2a643506c566a286e487c4ffd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD58addf6972d5d34e3b41052873a116004
SHA1488bdd410d8e2f0ff47770d5bf0e201aaa8579a6
SHA25617f919198b570957c008b743f3f0882e09717aa78aedb30f8db72edbd3f1bc37
SHA51259d04f3ce5b1a7c79389c4682bb3b17d9c70a1b6c3da48ecca394cb6ad9e12dee7143a3edb2b589bebbeacb8986350b911d74aba5028292ca54769f60bfe3f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_72B4C223F477ECBD63D5FAB4C1AFBCA5
Filesize471B
MD578ba74139cd701c7adf652b268042a44
SHA144b760122c5807ca22007d487a4ebd02167856a8
SHA256128a1413c9442c522628ed75e8e753be21ecc61f1b095c87ea05d8efdfca0af2
SHA51233f3ecd776d39ce272ad6e279db67d94c8ea31359d41d884c7fb85cb28acf65b62aa536ba7bb52b74723ac952685c1ac14e350200175041980537969b6cac01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5c374f682f608c26527ac681ddaa49a99
SHA194dd30885da700198cf51cb487026f580048815d
SHA25644ceb2d5c931c50c9535dea8f636a1a4e85cc9339deaacccaa63452aa3e33df4
SHA512a386ad59af65f34133efc032d83563e414992768d682d0dd6086580b41c54f6ad71ee29d86da922855f817193f4bd1214532619d4e26041bce7669498abad9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D76868C250B3240414CE3EFBB12518_DF3455CD7B8392F49B7F67006ADE0E83
Filesize400B
MD5e3978b5b904bb45e0c95b3e2f4883d0c
SHA1addfab73adca0661a316f0d2c15ccd941334cd12
SHA256c4480063a73106f2fe6479e8e5cb36c26ea6c4c7b376a6750201e6a88807a389
SHA512ba28b1b243fc697882b4759c663dee2b5fe013717af9d63f6aa13e0dc31d7286852f5ff41ea2a5a3145a11c54bffdf654c5bd6bb0ec24de382aa1c8008a6b4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5334ae1a0f917765bb14de793c82ea204
SHA1b15079681389e92b6967e7c17b9cfd61d590ead5
SHA256c604069eb5cd58e52b5a476055957665fb797e4fe817cf793d06d706043a62ce
SHA512b9cebe8379bae966579edb214c4a661fd4899ba44ab8fdd1de1a5b2c64d4b5126f8635602a8991cc5db59c608535f803bffb9143e7f602167125239fbd6cf0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD50879c5ead4a75204e62c6165c594be65
SHA1f249230780a49fae37914ba3ff3aabbdba9c9ec7
SHA256b025fa442dffeebbcf798be1b840bdd48235f610070d7ed5d5c2b998e1c2ae35
SHA512413fb9e351003f42b650d0c63f167baff3987dbe7af171001c4b1f111c26421ddfe8e28eea4f9d7a6236087140bfb1dccfcf27c4405c99530c28e024939c3348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD57ed09206ec4e9ef00d1f5dd40d988f6f
SHA139a3cf1a75fcb6dd5a0f62a57910effd5fa67bd7
SHA2561322720227c940bd7d81c05e907958cd459c3fecf11377e09f60f77f1c0b084c
SHA512ff6004455b0981f6825440e45e231b0fcdb81dc8e0ab045acc62062a4d4ff0836d40cbeff668dd92e7bdab60a7991f73a8b7fd6f6f029d8c21f1dc1effd6c528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_72B4C223F477ECBD63D5FAB4C1AFBCA5
Filesize414B
MD595a4b09088e8f13d763d1cb617820ba6
SHA1a0ffc459f844c22ea3273af0f63eec186aceb222
SHA256e3cd6e34b5928db1e4077258cef47548f136b55648f0f039aef20fcf788edfdb
SHA512890592fc8cfe31bada921c7760f92d4f8a68791597d76deea63a7807692cca91a6c218798c465f4198a53d002abd587ecfc59f037afe3f133645ff9b32079e64
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD531ca334ea705aa8cb74171e93ae7a3e5
SHA1eceaec8a7945012a0a8a07cd8c3b091abdcf69cf
SHA256b6e8cb8380275e462a26dac26005e890cddcb5e05d3c5c1c7d608470df04e7a7
SHA512a65c6dc5bc704fdc89ddec9adee8a34877dc604ec7b4456b012cf9ea1862e54f4ff48ab57ad141cc7fd1490af21992a1e35958a774363644a10816b22b2ca477
-
Filesize
5KB
MD538eab6532c3cc780e4294d7208bd9505
SHA18af593087c72ca021955ae10c2bc299b10988560
SHA256440b7f02b01606fa99da3c3953a92854c3a35180ec3e4a3e9d06363c05d921e2
SHA5120ff3a387e0b306625e1768eba828db538faf9a3602310b0acfbc36155bde0bf024fdf46922faf9e777146a3a238f3be7c45330158f7ba580c4f403fbfeb75b30
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
1KB
MD5cd4b8cb36f873d84f9b57b9569773f5a
SHA1673a5a0618575f4973bfcc54cc66ebde09a56c7d
SHA256dbd3bb3b07004f651015f6ed87a13f1c44ddfab78754cf06c9541d2d78ffbb2e
SHA5123c40bcf1299a7f2716205d86eff7c3de0f844ab4a4def5cffdf252e177799ca75d838514c28f3bf66c3189a57f0fd42685a3416ee2949d1a98886981cfdcf5d3
-
Filesize
873B
MD5a5d9e2621bfeb7e2cdc254d13178cdec
SHA1483f02d0ba4cb00ff41d104b780b5504373b871c
SHA256953d604abd2a1a7820b73dd74e3d9df66002aab5aae82e02c60d47302e6185bb
SHA512be319e2a8dda503c15c50bb04a423d01725dd7e8c016ee25be55796f041038c2a71d3b575131cd362333155f8a3d4fe43e09a49fc9a64cdcf4358b5214118961
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50416ffdeeac73542f1b232f4ea1f25f4
SHA1c4ef78a933bb5e3d70e4adbd502d61cfc4b64dff
SHA256077b447d035246f255e822a9056336e8b569f03b83c15a8c2bb945efee0188aa
SHA512bb980242856e87ad4a6b1d1a5796f9c43f611f327170c0c4d9277ace703883274d0c0e44569a62f29d41652a65d665248ad34dfcee53fdbaa76b2866f5f19e05
-
Filesize
10KB
MD5a78649a0898b6ae8f9b5d670eff48b17
SHA1ab06ea746794c8ce4e44365ca948f02aa24d1e75
SHA256851dd320b243410a5ba4d7b89bf62004f94912a0f838c10d10b8f96e110284dd
SHA51299b37da00d41ef0cdf74d3bd0196511b43135a4dd4b5bf87494bbfb9ad0f3a82286b7d3f7c39e47d80e55c3abce620c26d68cfbf40aa9fa09406683693984e6a
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5cd0435674b95464a00013fa4e4d52a59
SHA18fbe9f1a9ab623baddab7535728b572c516f08e3
SHA2562cac2861a2867e7a95e727ade86b0d097568d556fe1fdb49d525e4ba2d571dc1
SHA512bdb7d3f6f793b48e6c24cf1fbf2fdf420afd7906f9553d027511e1dd84b0d15f4eff084927ca3749db8de431daafe3c7ca6bf756dc2ad8210c4365e0a3a86181
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD59c4880393eb3fff5b93040587ded22c7
SHA12179fd53491298b19d679325b389743bad35e7fc
SHA256e63e4398cf65da279964c95121ea40b9775c2eac71412226aec026058934c896
SHA512f604c043bd1a1b01840f0c133075d723f76f918f4e7094c0ef9eec905f17beed20d2094c259392461a68bd66d480a9590ac400d51216a2b2744197f2dc7bd1d6