Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    180s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 20:02

General

  • Target

    NFs_080_9.msi

  • Size

    4.4MB

  • MD5

    103b8eaccb9689b767dbf221a9936cf5

  • SHA1

    dfd79a7641a8c3f83d198db8138e5f3ae6bd02a4

  • SHA256

    2825f330548a1a0e1297d1196f9ec582e2c0afb57186d926bf35c39629972a67

  • SHA512

    7fa5b9d625f5f250d2e81349864bc23a76cb2482435a1e5317fc5d8961dfb640a4d27942a9f5577b5895017d0983633737d146ab48f2c2e50d3f987190dd9bf9

  • SSDEEP

    98304:FyclEycl/Y5A8c4Ly6BjspUkjVHpCZ0PN3YSwqR:FyIEyIKDJZsBHv13YnqR

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\NFs_080_9.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3808
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7795EF41D3E041BC651B75BBC1FDF2FA
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Users\Admin\KfAdmin54\
        3⤵
          PID:2112
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C mkdir C:\Users\Admin\KfAdmin54\KfAdmin54
          3⤵
            PID:1160
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.exe
            3⤵
              PID:5380
              • C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.exe
                C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:5448
                • C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                  "C:\Program Files (x86)\Internet Explorer\ieinstal.exe"
                  5⤵
                  • Checks BIOS information in registry
                  • Loads dropped DLL
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  PID:5504
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5448 -s 700
                  5⤵
                  • Program crash
                  PID:5616
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C start /MIN reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v KfAdmin54 /t reg_sz /d "C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.exe"
              3⤵
                PID:116
                • C:\Windows\SysWOW64\reg.exe
                  reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v KfAdmin54 /t reg_sz /d "C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.exe"
                  4⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:5620
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe"
            1⤵
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4fb3ab58,0x7ffa4fb3ab68,0x7ffa4fb3ab78
              2⤵
                PID:2180
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:2
                2⤵
                  PID:980
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                  2⤵
                    PID:1936
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                    2⤵
                      PID:2036
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                      2⤵
                        PID:3368
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                        2⤵
                          PID:3592
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                          2⤵
                            PID:1396
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4508 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                            2⤵
                              PID:4388
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4652 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                              2⤵
                                PID:4424
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                                2⤵
                                  PID:3540
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3960 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                                  2⤵
                                    PID:4424
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                                    2⤵
                                      PID:4448
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4576 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                                      2⤵
                                        PID:5164
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4252 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                                        2⤵
                                          PID:5692
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4104 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                                          2⤵
                                            PID:5724
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3380 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                                            2⤵
                                              PID:5816
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5156 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:8
                                              2⤵
                                                PID:5824
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4496 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                                                2⤵
                                                  PID:4396
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5564 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                                                  2⤵
                                                    PID:2360
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2644 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:1
                                                    2⤵
                                                      PID:5448
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5720 --field-trial-handle=1928,i,16228353206100265298,13767546825183728241,131072 /prefetch:2
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1980
                                                  • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                                    1⤵
                                                      PID:1516
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5448 -ip 5448
                                                      1⤵
                                                        PID:5580
                                                      • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                                                        "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                                                        1⤵
                                                          PID:6012
                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                          1⤵
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4544
                                                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4544 CREDAT:17410 /prefetch:2
                                                            2⤵
                                                            • Modifies Internet Explorer settings
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:6020

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                          Filesize

                                                          471B

                                                          MD5

                                                          dddc1fca6dedb2cef3771073e423642b

                                                          SHA1

                                                          51f2fa9aef24520957add501834f221dcaf12188

                                                          SHA256

                                                          b866cd5b457ab2976b47e6ab4e8f4639f10916dde2933fa2aea7c74c93001f2e

                                                          SHA512

                                                          4693a68cf76ed95b49776946bce5d2d4a0282a697443f6843205a69bf1568400b5f00ae88849ff6ecff2b3edb0e3dd662d6992a568e5438c726b00e1acfdacb0

                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                          Filesize

                                                          404B

                                                          MD5

                                                          2ea5611c50e48bc9476e7ce76a4333ed

                                                          SHA1

                                                          e044df048dbbf7ae990d7549a648130b7e1c5c20

                                                          SHA256

                                                          c5512c6824b5ec6c7a13d796ccc90f052a0ce9e5347e29dc94c9f72ee5036823

                                                          SHA512

                                                          40aebe0ef633534ce8e99aea1fbf610991fb05ccf843723a1c483b06ef9e61745f1252bafb60245364d52f92bfb8eb97db7730556b3a05ba9e023dd712ddfd59

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          4067cbcb17ab0e727bf758d0f0c1c3ea

                                                          SHA1

                                                          6de1ff031ea5fc6defccf14eb420f8a794448510

                                                          SHA256

                                                          103e78fd372b44033b8b044356677108b94fbbfc59775bd0957d60ed89af38e9

                                                          SHA512

                                                          6053561261a91b4f8db397b4e70a6378f990e79b355c447459ae78dc8a801c40804ec417d7c8cca05b2e5ee8320ea688a760a571143008b6fb478528b6992c3f

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          480a75d3d14ddc215e78c805218a1eda

                                                          SHA1

                                                          d4040980d3860267d45923ec072cbc689c674620

                                                          SHA256

                                                          cea970558afba7ea905cf6c64afac967b0da14470ea622778894b820010a5d6b

                                                          SHA512

                                                          05b2543d8099830ea7f5a9ae56e7fa1a73983dffe9365ef81430b2580619bcf3adb9926c375604b732a81f0a088ac82ab55b79b948f26e35ff8d4761fdaaf6e7

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          f98d579589514f256c4856153eae173a

                                                          SHA1

                                                          9b21b814d9e11ac95c9e45a591fe5a34e9b9ca89

                                                          SHA256

                                                          5b09bcd822842e9f64731a10775e88a4738f91db8abc885ae182e2d3be60654e

                                                          SHA512

                                                          2f998469685933c1aebfccdff5fa98a928afec92495e229b2792091431a06d235fa5066210edaae741daa71608c852ec626a38d65ab98ab8df38460ca3fc7363

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                          Filesize

                                                          2B

                                                          MD5

                                                          d751713988987e9331980363e24189ce

                                                          SHA1

                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                          SHA256

                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                          SHA512

                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          e8d3d610679357b36c7f67df40d104ca

                                                          SHA1

                                                          963951df6350765099ddbb37bcbd857b86fd024f

                                                          SHA256

                                                          5e79fb20ec255acf5b45071a874a05d2d0fc1679e044578aa144660955a6962b

                                                          SHA512

                                                          34a4d891d58e070a3fa18e1d1879d65830d4a421ca0c8c50b36d797a10408aac5ef8ddca65a4916934d2f0e0479fe657400b361074616dc49b1bb85d7e44d38b

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                          Filesize

                                                          689B

                                                          MD5

                                                          7c495803a24b512409736c1105764ee7

                                                          SHA1

                                                          809b36f5d8da697a33894acae4b1c5cea7bd726f

                                                          SHA256

                                                          18e1d035723ea40dfd41f83f3ed9be1a42664efcc3ba1e2892b8dbdea854dcfd

                                                          SHA512

                                                          2f0f9f6bea63b1320c1a763c77113f20704ec30c72d858abd50131309f9606b0c9fd3bd86fc6603e5f911d50b6c9ec6907765af8c5de435b5850bbd8329d7a52

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          03ccfd41c1b8639c51db9cb101937bd3

                                                          SHA1

                                                          3c8012891295020d7e2636066f8a42c9661790cd

                                                          SHA256

                                                          58a91993547508e3585d09a3f602955ef63a5a2ed61adc8cb6657fa60834a10d

                                                          SHA512

                                                          fa10d13286f64b6f950d7fb4827c0041b99d867f5b052fa668d537566dad1dd8ae9774546871f06b2b0c3feb27daa5de0e8144c853851c9b54fd4d9ddd6eb110

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          70dbae9b9250314da9298074f8759e56

                                                          SHA1

                                                          3685b423ab760d42398feabb6a190b84c534f2a4

                                                          SHA256

                                                          b3046d64428758865b827b769bfb88c638c60b5c0d1fc21e16d184dd8bdff7fe

                                                          SHA512

                                                          de96ade2c5272fc7efccdc8e60cda1ed5decb320ed356a5762fe0eb10f93385e77672b8df6fcd9f64bb5958ed31d70dd55b055ad329a637e319642704ac66d46

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          d6a2e87d923f5a9f6f6f99422f6c5f8a

                                                          SHA1

                                                          a0ad7d53cca45dc24c9520c130e4e70b1ea5df4d

                                                          SHA256

                                                          8eb8027b6e9b1412b39cba252fa21247d29c23b52322cc86ef03d426e067e482

                                                          SHA512

                                                          a2c48ffe5102d1058f52a4933cf146fcc04d7de44287e2bc7dd16358756e311933af0db60136fa013fa16a68c2ff1839713adc45f3c4b551a7a3a26eea5cec48

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          4375a3ba2663163a76e4211f1a970cbb

                                                          SHA1

                                                          f27c8524b67bfb9233ee7096d57376f98ba28c1d

                                                          SHA256

                                                          3f0a8e265ba265819e493347dcfd7186a297979d5aa7a7e023b8ef2babc2b2fc

                                                          SHA512

                                                          23d94f0cd1b23b094a57f4780a700ea65db0952a5e51a5ac9b4d085a9f60b8cd916fb3827cdf18624c4cb3a038d0a7c3e66304180c3fae361ba84b67cf6ebc3d

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          c9239f6cd95dddb7ed83b83b98fa34e8

                                                          SHA1

                                                          e7a7266b743df7fa2c29a2a8320268212b586e66

                                                          SHA256

                                                          15a7ba8a64f7bdd7d60308a667a17469959660fd71bb29c20232be063364d931

                                                          SHA512

                                                          bc9471bcfd9abf0aa1dd98296016a8683d25a2d6abf74c0e044df063cafee8b982f5857bbd3e985aae9180103f4ac49615cf0f4fd76c9c5c6443bbd89e5ca89d

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          ecf8cf6f700670efd60a25cc4b3636a1

                                                          SHA1

                                                          c773d3e4fbfa214a8965fadd24931dfb4d18392c

                                                          SHA256

                                                          21ef9a9777012964201db2e2fd94a3c29fe6c5a0e6b82830d7ab91301e94edbb

                                                          SHA512

                                                          fc03f86d2f149602371e415187f5a0b0e7d38c4e2632664889abec5a113878819a79a867d6100db21b15c098f17c6561e76ce20344846e5313494fd1a21a7b53

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                          Filesize

                                                          16KB

                                                          MD5

                                                          50e439c40cba4eb0b05fc0ebd547206e

                                                          SHA1

                                                          57d73525891f5e4ac075417cfbc853819e333656

                                                          SHA256

                                                          01f9a1497b4ca8fe991ad5b90ed9d931b460127b1eacc9048946f2d168c8fa0b

                                                          SHA512

                                                          27c6fc2128cf6d7c964350cd33881f0f0cb3c0c9f24bbd902481c81bfb81a9193c7a9c6751990db0bb8c62c5067dee10fdfaf90c298a8771ab8e9a571ad29b42

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                          Filesize

                                                          256KB

                                                          MD5

                                                          96635f4086a6658adc16e5e60296ff40

                                                          SHA1

                                                          adb9f15fc72a37d476a3cbe7acbf8c88a1514c52

                                                          SHA256

                                                          7018d92a15a5fd9b9ee02edb30f7897bff42f255475cc125b7c1dabd0bc5333c

                                                          SHA512

                                                          6dff7482dfdc4305436877022bc6c87d733188b97063ae0127a14094aa75ed7f3f900ecb36ca4174b59938a42bed6249a431295d9cd6d5eee962896957628a69

                                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                          Filesize

                                                          256KB

                                                          MD5

                                                          0700347d961402a09e8440e5f8c027e9

                                                          SHA1

                                                          ba44513809e3662d98200554001fe4083473a956

                                                          SHA256

                                                          20fd5fc707382eb885308d5c9b6d8c9cc44b25d9615f5d14500978c40a71bf79

                                                          SHA512

                                                          09bb0c76b84990d5a755121c0aa506cc318935b770c0bcb61e6bf93aad7017aebd493bb9867c536433a0f75bc826675c0fe9cb2f3e20b42a7f75a00af60464c7

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver1E70.tmp

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          1a545d0052b581fbb2ab4c52133846bc

                                                          SHA1

                                                          62f3266a9b9925cd6d98658b92adec673cbe3dd3

                                                          SHA256

                                                          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                                                          SHA512

                                                          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y19NSK22\suggestions[1].en-US

                                                          Filesize

                                                          17KB

                                                          MD5

                                                          5a34cb996293fde2cb7a4ac89587393a

                                                          SHA1

                                                          3c96c993500690d1a77873cd62bc639b3a10653f

                                                          SHA256

                                                          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                          SHA512

                                                          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                        • C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.dmp

                                                          Filesize

                                                          2.2MB

                                                          MD5

                                                          e63fcd95817e8e525753644ab0d37809

                                                          SHA1

                                                          6c0b54c65b2f4536419897abb63469b798ab2538

                                                          SHA256

                                                          b6700c6348158a0a271930f9af4c3dc976ea77813fe189c3789a2d85262478eb

                                                          SHA512

                                                          bbbb36f2fb175fdde19c9d0aba095765d3dd214ab835ebc2c833ced0ff1cb3718649c09f78153cacef0f44c3c2bb1206bc4e4acdc55ceece70c1ca8f0067aae9

                                                        • C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.exe

                                                          Filesize

                                                          881KB

                                                          MD5

                                                          af7c3cfa8662bd7eed9ff0fe83c3756d

                                                          SHA1

                                                          47ad0bb3adb2c184c10d0f6f9abb90eb7f6ff3ea

                                                          SHA256

                                                          573edfe32df21d9fac6f7948899d4dabfc6f82f0895a82566787f3bc7ad83ab4

                                                          SHA512

                                                          ac3eb29a0442d90bada22045249f96115cef35ceb3b8150752a1da3b781e86d5bd4dc06d77708f61d77e25584369658599ebb89090a56063609c340716888be0

                                                        • C:\Users\Admin\KfAdmin54\KfAdmin54\KfAdmin54.zip

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          bc7d4463876a04bd154e13f6e4b9d1ec

                                                          SHA1

                                                          c63f5858dba8c7c9db0bd91d8595e886d6eccaec

                                                          SHA256

                                                          275e91ca6329e87513842aebf408bfd5c39868716076b65c3285df3e45351c84

                                                          SHA512

                                                          a035ffa83beaa077818106e7086a0da1330cdf337be9bc6d74798df655c2aacc3b52739f433c23aae94b4261a95310e871509508ce1f8dce7aaa681e8d2938ba

                                                        • C:\Users\Admin\KfAdmin54\KfAdmin54\msedge_elf.dll

                                                          Filesize

                                                          4.3MB

                                                          MD5

                                                          2c2edf227a8e7015d0fee66d9b16d6ae

                                                          SHA1

                                                          b3d2ae8a9dc291c6fd4ac4caec6dcdf1e9b91497

                                                          SHA256

                                                          ee6a4a1cd9ee6796b30875711a55ce75d7442daba3901ee856733562ba2b04b2

                                                          SHA512

                                                          3d3842a07dad770213d2f77f7b9e3be85207219d90b584bd057d3a8572924eb986d557c97f9d4e31611f57b55a6a9984fda4e0661ae334ff1769791cd60b34bf

                                                        • C:\Windows\Installer\MSIBDAE.tmp

                                                          Filesize

                                                          738KB

                                                          MD5

                                                          8e65fea37f700d948d1b67afd43b97fc

                                                          SHA1

                                                          823d2b30ec0372e0dc36f7983ad2de1ceda4036c

                                                          SHA256

                                                          20c648a2a4313b1b20da50a9b788d8a1b9637e154adae4541b65badaa40266c9

                                                          SHA512

                                                          07faf03685fde9c71f6bc4b3caecfe4d3c707a8bec5bce1a544f59c1f853edde8f37c019c16bffd3e8fbe5c72c0666ffe0e2dffd878744da64f47e52c7625084

                                                        • memory/5448-346-0x0000000071F90000-0x0000000072403000-memory.dmp

                                                          Filesize

                                                          4.4MB