Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/05/2024, 09:31
240508-lg4m9adg9x 108/05/2024, 09:29
240508-lfyevagc83 408/05/2024, 09:27
240508-le2qwagc55 108/05/2024, 09:26
240508-lep23sgc42 108/05/2024, 09:26
240508-leabmagc26 408/05/2024, 09:22
240508-lcdk9sde2s 108/05/2024, 09:19
240508-lancpaga26 1Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
Material.pptx
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Material.pptx
Resource
win10v2004-20240419-en
General
-
Target
Material.pptx
-
Size
927KB
-
MD5
2cbb0e2816f9c3ec8881272d6b088df4
-
SHA1
07aedc1298c5e5540a03cf40c3a284b238606fbf
-
SHA256
07aa835f47f75648d4c8cc618ce1aef63b52a2ddad6d51779470be906f3a9e7c
-
SHA512
5b9fa6ac27495c1346bd81a3f32fd51f66641ad713acabb224c04fef891cf2f0bc94b4cd59844f321324ba8b371891d0a455129d6dcc5e2cb7d1bc9cc8e11934
-
SSDEEP
12288:Ze7Q5Bvvkx7vjOoYuGWk1iGjWx7izqe2UOsKm4oP7Aqu/wkRxuuDl5685Hferoui:MUq//rkZAibXEPaYx5LfeUuVuGqRRcM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND POWERPNT.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor POWERPNT.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" POWERPNT.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command POWERPNT.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" POWERPNT.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic POWERPNT.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2896 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2496 chrome.exe 2496 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe Token: SeShutdownPrivilege 2496 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe 2496 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2756 2896 POWERPNT.EXE 28 PID 2896 wrote to memory of 2756 2896 POWERPNT.EXE 28 PID 2896 wrote to memory of 2756 2896 POWERPNT.EXE 28 PID 2896 wrote to memory of 2756 2896 POWERPNT.EXE 28 PID 2496 wrote to memory of 2384 2496 chrome.exe 31 PID 2496 wrote to memory of 2384 2496 chrome.exe 31 PID 2496 wrote to memory of 2384 2496 chrome.exe 31 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2720 2496 chrome.exe 33 PID 2496 wrote to memory of 2724 2496 chrome.exe 34 PID 2496 wrote to memory of 2724 2496 chrome.exe 34 PID 2496 wrote to memory of 2724 2496 chrome.exe 34 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35 PID 2496 wrote to memory of 1648 2496 chrome.exe 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Material.pptx"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72b9758,0x7fef72b9768,0x7fef72b97782⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:22⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1368 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2124 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1412 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:22⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1272 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3452 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3472 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1224 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2444 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2608 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3840 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2688 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4036 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2608 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3880 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2956 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=1620 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3988 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=2404 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3668 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=1144 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=4080 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=3860 --field-trial-handle=1324,i,842816286518344110,3958544199404557844,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:628
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513901397e2543ab321c33af943d530c9
SHA13fe938dd25c648f82169619b9a38b4a606d2cdf4
SHA2568660deb6a06670cef3d68b699b51bf81000b9a5b4f291bb875b8d6f58a2218aa
SHA512804aa9ba871fe1fd9f617b081d2bd4f8944e7fb9088428ee02daaf742a1a10eb3046b5fd77a6d95426e2308520cf43dffd7ef7796c7645ddaa202c56b0aea5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c949adc3b7111cb78c786b4e8868835b
SHA1cceab217c11cd2572ab0153df70c4c6e6268845c
SHA25602fdeca3d04256eb3962c21681852234fd67607b18a20e6a04a2c0d54ba5ee19
SHA512d729c3690ed30550b3d5fae51c0f02233212e29f38b2413fe614bd6b5eb52b054974c13b676eaa7738c465843430f0d89befac452f360ed9c037d18058ee7e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5913746eb783b47191cd436a1c0329c46
SHA15209b4c333ea6d2983a18cf8947dd382e9ebf914
SHA25627a0675f35055b8a64046339800215f8e48be17367b1519427702aab75d78ced
SHA51287e2528d3272cf8a180198d757495ec1861edee119f7a175cf094dd63d1211d2fc5b983f84e512dfa78cd2fdade70fc94d21d79b992f735ccfe0557cb952e8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae9c1a29e58ab6653ae00ce3ab80d78
SHA190d7a85e8f24403b3980ac889c2a859e7ad799b6
SHA25677f3a6ec1cfae951f485b8f03e57b6980a057fa02b070e59b24501257de77203
SHA5122f43208eb470b52464a7c77bc459df81de57780bf544b7b3db597dc02aafbc0e3ea420325ff50973c798fd44b32b41f22183af48019bba87a9d99e231015cf11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e46220bbd90ae94a1079350c90266def
SHA1942b539b6e502695d99725081f994c0ea3bebbd9
SHA2569da56fac964b3bffc49141509b91ee3543c952d0c4ad81aa66552e45ea4bc467
SHA512a50854973f9ba994945aafb6a329b956e95e04814022a5dce51495030a78ae466c3194563965db98f2321723f83b526ef6864717daf48ee1187788650be2e2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552ba1fdd7cc551526aa9e753fcaa8af6
SHA148a9e6e138eec9bfcb130c924005a37c1d6f6801
SHA256c61cce5a0ee6af64bd3ae0208ff8660473a3553f8054d9ab339b908f4df63a74
SHA5123b0e05f50e062566adbaaacf62fc5383297e3933f6ddf60daf52d0901951b2464e12ce53bc228e21a9c108d42af2be41c34bc7711933c263bead6fce842d99f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddde146fcd58b0ea225e572f7597a369
SHA1a206b614a05184315572bc572b22ddf76c154ffe
SHA256082d38362772e1e855c876e8e26504359f67c75619e69a695ee0393949fe3435
SHA5123724e589f9b36f918fc9d7ae0ece53424b626bed0f4eb2bfc0347a3c8b7566e9875a66b408cee03c40acdc0d76e34f5396703044fbd345fed5c69a95761491cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5084be952ceb5988b1d015454f5f66954
SHA1f052c9f293a1195d47f1f814a2b3b6181293c8e5
SHA256ad30b8edb7112034368e2d6aede8edcebf09d455289b5582b167017dac4cf36a
SHA512d2d5c07df06c3f195937e3063bdeea029f40244291b72774fb42cd4f598abe253015b4ecd313d9d4ce0088a371d6e0fa39e30a4fbea3a5ec878439a16571300c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e2abaa080fa25eb4e31c4fc8600116
SHA1c5ea8e56544a7256dc973754bc50088b2dd6de65
SHA2561f796bf43224d37416c1a2c49999dbdbc1dc803fea61fe6bded05af40200442d
SHA51243b07b793195c9c7bbecef8c1b3215a370f72f7d63404431a5266dadae9f740816ed87741154ae71ec4a8593dd9d1692a9efe01d34c2c602beca38f4fa7755a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58781639da2bb2327e342dc0854922a19
SHA1ded6dfd844fe7e7aa2c42cc604ca8e09f72e485f
SHA25641c00970c6d4cbc957066de25da523a5b80f75527cbb372a40bb798c29e2b1f0
SHA512452cd00bec5e37182f8286719156b77cfcdb124c564d80e51475920351b195afb6ffcaf5f4b8293989e8e081eacbf727bf99596bc5bf6b44d9307ed67848db67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260807dcdbed86136ff63d548163b42b
SHA140954601ab7c6e7939f9d95859bf8a8a8c249392
SHA25697f0c7dc37c0ec5e4fe3f49b0670eae4e5517998749d115cf42785b36c090c0e
SHA5126b8f3ccc71492ea6c459b30ee5386988cdc7da4e4ddce4603b8337860377e1c43a8345b1b326fe98a07d81db0269d0c653f95f0f3b88b556f2dcb1d0c16337a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5207c65952f1f3a59a43a8f20f1ca1336
SHA1129c75f5d39612d55c654e2949c28809fca6c180
SHA25653cbc9a7b3ad8b2d3e1fe0ccce7b66cc50932d8d51c34ed3146d4ee4cae52964
SHA512f802eb2d9ab988b506411e4335a5c38c9ac930df5dcd43918f6a43ad88498ad12560fd3857e36953d5a7692a02dcd3a48b587920396e912ae59669dfa8c11eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a5ab74295fe0915d99659e22c94678
SHA1505dfb4b818eda1e522400e87fadfafedef43f21
SHA256f7db849f26987acd687a012b684f4bf371071de6692dcedddbf3ad270f38a1d4
SHA512dd948758f9050f49fad02ab9cb0fd31b4e7d092582066036d98671c2ed91873279fb11735c6654557405a8ce1720f20fe140b24b60021b496d31732b8e5c2805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD58bd00eb6eb05a0259457da9bebc30f77
SHA168f5c1cf70bc27f951ee76947c40d33205d52ed9
SHA2569199be50faa8a486b2cc71edb0078a0853e08f8bf739118ae6add72560e1d0e2
SHA5122bab45abdc4da1d6dab8dc1e8fb59b55f57daf7c4bed8785f16fb8918d08412a2da817c66e0b6b1708480075a8e96a7d6796db109ea3c7b6244e4386d8b0f1e7
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
80KB
MD568d571ef48582085d14d92e14776234c
SHA1faffb6855c569e38cd2664967311f6ca408d0ece
SHA2568af3fccc7729f827fcd77a48f40f4b9aa0809ae909cec457051cba4e0bc46239
SHA51293bfb19846e5b252759aff16e015e59ad56889f39b867432f74c525fb9938e1ce8cc760fc34bb2f66e9c9f459535e924989e9183e2e28351e4db742e51cc0bb3
-
Filesize
62KB
MD531e0921ba0a9c1660d413d293d983bcd
SHA177c44c3de3dc67190a79091288f752117e2ed5a3
SHA256aaf44ff8f8661e93c4e174af0695c62d3351d0980caa68a7834a62393fb6e07b
SHA51278d1cc67a1727fe34d01bbea783ee745baa1f9ee331619439fa77a175506542cfaf59731bf5c46be5826d33f5440e294f6a2a2c53489a96853110ef516b6af07
-
Filesize
94KB
MD505ac456d085f3d6eab40ef7dea9d16bc
SHA1e4cfaed2b65da03ac7a594cf108371fe4b3ba1ce
SHA2569a3d56ef8d3b9b6fdea5622e2cee9650800c7b0fc44a1cfa53c5375909f69e08
SHA512a3bdb8a99ef96de7d238f2f0d42a0c6fb41fa12f98386c13ef279a74ed7a2837938db21070edbbb6bcc7ec3a3f0c614870ee1f6af1113d4410149a47c21b9be8
-
Filesize
27KB
MD51d2380b64e8392511f7514d93876e56e
SHA13e0397121f90f03943b4adee98b3ff744b8664bc
SHA2568484a1228a7410ecbbb4633d92afdf7185a519d264df310c8ea9fdf9a185b922
SHA512065641536a6121e0780cda5bc64203afe2219c9f78b99591efe612d17bfa689940ea66b28a9eb61a882e8e5c7eaff7cc9152c9d3947d0ddf942fbc135255c4ee
-
Filesize
21KB
MD5befb217271e2e926c7d898f1c85f6cb7
SHA1b6ca8f0b9eb7ddebc916cbc77eddab8532216748
SHA25621c28b41965eaf22aae5ee670f71227bd2d8fd32a024d62864873f7c8621e8f4
SHA51278adb7e320cb5989042eebe19bb0f080885dda25c03af4a71f6345ad283009458caef898deeae9834ef6d9c2069e43556b5f2979c1b9a2952f10cd81e434565f
-
Filesize
106KB
MD5fb499fcfe21c897f0aa6933beec1d1bd
SHA1e7ac11924de0ea908324ab89e8b62381487c1cee
SHA2563fc4fc69dc6e030dcfe4d4ddba17e59e85b88bd271ff043f5360bb86e8df63ec
SHA512fbf9835f519b60466daf7db03e254777a1e7ae76b33f42e1984366c63d520aca6bf4c1d609b56c86514b13e02c08aac070fa83f6a48d16dfe04b41126ed54861
-
Filesize
147KB
MD52dcae33188133152db3d05c4afd77865
SHA10f34e2d80e8a1c8d29c2440bae482e97c32caa31
SHA256f5c4ec384b5d3b299e0609ab22c9b0d2afa51f56d35384d30b5aceae44b5acef
SHA5120e449afeab66ae8e45f00f7a6e24042e6785ba8d409d1e8669861c131eb34454ff812183864a53377854cc09f0b332c8b2c2f25a0cd481478eae549f5a97cbdc
-
Filesize
24KB
MD5f782de7f00a1e90076b6b77a05fa908a
SHA14ed15dad2baa61e9627bf2179aa7b9188ce7d4e1
SHA256d0b96d69ee7f70f041f493592de3805bfb338e50babdee522fcf145cb98fc968
SHA51278ec6f253e876d8f0812a9570f6079903d63dd000458f4f517ec44c8dd7468e51703ea17ecce2658d9ea1fdb5246c8db5887a16be80115bbf71fe53f439d8766
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_replit.com_0.indexeddb.leveldb\CURRENT~RFf777c61.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD51ae0284b10a584a59c4a875793dba197
SHA1f83194c39dd557c5d7142838b938d2c47c05ff8a
SHA25690b43afe97ca3c473a8b6ad58ca1784113cf250812ee6d682ed67a916440c825
SHA512596ab638d45eec0d7c6e749ec99654881505f66b68a33d1a85e71de3dfab9683cc85e04fe7315e9b62feb3d43cb9f22b5f304b361c27bea5fb8dfe237eede4fd
-
Filesize
2KB
MD5a5019f6eea1e91773d45c4d4813cf586
SHA1906a4e400a74da8480085de824e9d14dc0830f29
SHA256160ac76b337b64779268106c8f6abdaf1a386dafbf55c0a2fcb876a8b55f0e9c
SHA512d0e0d7abf6899d3a3b0fe33d341ba4faa297975436ed40db5cc0db245b60b94d1db6febb7d76e97e6722a35682876d2a00a87965bdf4f41276eaf2497df24fca
-
Filesize
2KB
MD5f7f45ff4482bf640dd8746684ede6a7a
SHA1c619f29209a6cacfc4cda1807ac5d37d23519105
SHA256de59deb9bf9b76a0ab46701cbfbc247c366d428b6a8e1a29e643dbfb67e06d16
SHA5123956b1656b7a19954a4f670223627bde1398906cd034c9999e31d3f2d91e09696224d22f36a485b08615e125612e150ac245f9675686136d5bfe1c6f376aef27
-
Filesize
361B
MD5f353fd009ab25f77df2c26d5dab18a84
SHA188e5e81248eef87870f0cd60a9721fec19696c38
SHA2560e31b70ac378f70e350829c274fc07603cd996d6516baf659d63e637fcf996ec
SHA512371068ea0941b4e826d40bbccaa84d836e7731fc7b6a45ef33f312185cf364208d2dfb733d2739b051f5e071a475aa71ae5d9cda899d04ed8ce982e22a9c6992
-
Filesize
1KB
MD5fdf6b7c01d59ed857ab027f5fd13b598
SHA17f709bb83d68097739d1299dfdbd36dcb13e6a36
SHA256aa8ca3b28a8e177b2750378d8d9e0a666aa2e14ab19e244ab56b0ae0a08de516
SHA51220da2ddb469d9e5e256fd7e360ed8e858e198dd8b522a60d64f77ff94037a863bb14ca547be7a0038a070be69defbac923fd396072eaf8317318a018f0c3a8c9
-
Filesize
2KB
MD593da7f0b5778df0c9fa4b2ed353a8a70
SHA11f6e45d43048bc0c99137a55a5cd373191ace858
SHA256f4ae90effa95826ceb0ff52e302643b2e2d87defe82852c9c8ffbcb04032199b
SHA5126812c07dca64bcf53dd2a6afdf12f4cebc3bb329f371278e91c5df56f6ff557f4692a063a89616b08611ed5b2d0ef70ce21cfbd04eb89418bfe8a2d0dd62382a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity~RFf776632.TMP
Filesize844B
MD5a7284d3c3c2713e338b7aac24862b108
SHA17d5d1997817ac50f09fd40a2032ee3a1f42d993a
SHA256f284f59702f666f92c07e6c7ace75f4be79c3dcce3b8874dba75466847fa0a23
SHA5123a2c2915b9ae2cc613635119333e0f72bb1bc04cd08ceedca4da1972e55c3504f8cc12210255924ea1d260c086b13494d16d1c6e223ec648c7b56532d57089ec
-
Filesize
6KB
MD51c43cd23fccf3dccf16f249e1147e2a3
SHA1023d8c312898982166fa3854fc5f4846c908f22b
SHA256e8b484e649c7d23b86c73dafd6a0faa97818933978087bb248d746c26ad3a825
SHA5128696e1d161d241b08479c5f0cdf44c5c4b79b72fc0c2b217a519a3a808905b5e48aa72c0130f4a39ae5f48617d0380211377cb7a39a7bd2fb9bdc08df5ce4f56
-
Filesize
5KB
MD53c60c318f9804a0f06127114362e41bc
SHA1a62c30ed8fed84285bf6fdab126e57370393eee4
SHA2566d690ba35530ba3f31205380cfeb8243fb85bff17da29c74794e1e5adc476b81
SHA512d0ea8f9abab9d3bc96e3dd37b746bd757715644b6eb2bd02dac9be4b4b2633aad9cd61a5c7c7664753dd0b834db469eeb9f6056a2b39fe03389579e8bdc441f8
-
Filesize
6KB
MD5bdbe73c14172b6f2c43160cf369349c0
SHA157f3a0db65d56ea23c11d2dfd0f95fdf993d7175
SHA2569559d477f03c4cd9363d3a570f8ae8adcf7948e8caad6147c4e77283f816a2a6
SHA512ba56fd4f87a39ca98ec3f702481229c19e58b8e0a9267c9612b31b2432fc43cbd0478e1679b8c82d0f801f8ccd0cef09d7b8eae52844c7698dd30cd0b605a7cb
-
Filesize
7KB
MD53694e5ecf2108e4f6fd8b9e84f760031
SHA1005d57cb57ceb931b1b4f8785317ba559a94e267
SHA2564d57d37de2824ffd0aef7afffaf8f278c8fad8da4bb77a87cdb78a2161c31e7a
SHA5125c72adb3fb7e4286d65820f10dd599ed9e402a27136a78351adba7e29373a388862db1d285a758819aabc5e7aa39cd4e5b31197bd40db3adc60cb4ee48e233e4
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0
Filesize8KB
MD5a20d6a6e12ae2dd32c9408c80ec8343f
SHA1ce9f3f95da2ea742ad0cf2e2967444bce7aaa928
SHA2560e0963708aeaa0a1d85d611977a8238a11ea38f71580cec3c9ad7f0a11a75f79
SHA512f9d5fc23e3af7dfccd23e2e53586f8888566455c913b82b1cad5d28f7b50b99c13ee730866bebd746074c7768c0ce98cc699a1226e4da8e0e9dc2fad848eb0fc
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
75KB
MD56dad016a6f3209add9688ee34b66ae3a
SHA1421e345eb6c9604bf2444a807db9faf2b60961b0
SHA2566d7dfe8879512763f5ae4efa9b42a84fa6bc2d83c1373da0b6645df8361c6214
SHA512bf88b17d54580eccc8cfbc4b05478829ebb87cd6c65b6e8068139a47fcf4ab0528185e6f17b98d4b9e5a2f20d77203ded56f3f1a86b9c900f8e6b0d685b1fde7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a