Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 14:31

General

  • Target

    SkinChanger.exe

  • Size

    59KB

  • MD5

    a3b6cf7735bcd2049725f23999254657

  • SHA1

    260302d5991e3e4991ad57fe1ece51594b736406

  • SHA256

    d02515eeedc5a3208018b4724a7b3e3aef30448cd0a546abeb04143bc36464fc

  • SHA512

    6d05b4c016a13aa0937091c9b410e810dd38a49d8ec980fa14b40e530a376f172adc435b574e981f2690a50f079a095ab175249854a069632fe4276ff93eed03

  • SSDEEP

    1536:3Ri6TC136PY3yrbxqAq4A6fekOYWEiQcWD:n+136wirbx714kOYWEdD

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:21679

survey-dover.gl.at.ply.gg:21679

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SkinChanger.exe
    "C:\Users\Admin\AppData\Local\Temp\SkinChanger.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SkinChanger.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SkinChanger.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2652
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DLLHost'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DLLHost'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:628
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://rt.pornhub.com/view_video.php?viewkey=ph61ebcbfe43d7b
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:548
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feee629758,0x7feee629768,0x7feee629778
      2⤵
        PID:1780
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:2
        2⤵
          PID:2116
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1412 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:8
          2⤵
            PID:320
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:8
            2⤵
              PID:1972
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:1
              2⤵
                PID:1684
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:1
                2⤵
                  PID:1700
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1396 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:2
                  2⤵
                    PID:2784
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2232 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:1
                    2⤵
                      PID:1460
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3340 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:8
                      2⤵
                        PID:2968
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3564 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:8
                        2⤵
                          PID:2928
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3468 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:1
                          2⤵
                            PID:1096
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3440 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:1
                            2⤵
                              PID:1332
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:8
                              2⤵
                                PID:1708
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2224 --field-trial-handle=1368,i,7537999477536365484,15494206799314094423,131072 /prefetch:1
                                2⤵
                                  PID:2108
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:868

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

                                  Filesize

                                  579B

                                  MD5

                                  f55da450a5fb287e1e0f0dcc965756ca

                                  SHA1

                                  7e04de896a3e666d00e687d33ffad93be83d349e

                                  SHA256

                                  31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

                                  SHA512

                                  19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

                                  Filesize

                                  252B

                                  MD5

                                  6fabf4898ad8cd5d70435dad0994baed

                                  SHA1

                                  85c81aa8653293fcaaf9371983ea45a42a63d824

                                  SHA256

                                  c18bad6165c0741c22053c93ff3c54eef364bbdf1c70c86064669cbc3431e3ed

                                  SHA512

                                  5d53252342bbbbd7f3c4e105d2c54798fb7710ebabff366379dbe3e412cc5b3059f17c89870ebb39ed4489e160ac783b0a297bd5192bcd873cf7242648ff368c

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  7deb472fbab1b9555ac1abfa39ffb238

                                  SHA1

                                  5d7f261b9377ed1bf858b2647ce2d42e6f4ed4e7

                                  SHA256

                                  d911534f67f5cf88612a9f13779085128d1d5a4a0ee045ab8edbf84677ebcbfb

                                  SHA512

                                  2fd744ddb7289adebf1b897d0831d108a6f02962d473150e5a71d2bfe7b768e43cae38103ab49a2346f5bf181057011b2ccc25527661f098b646c9afea4ed375

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  e5d47915263a561b3953f14c30ff5f5e

                                  SHA1

                                  05949a6b69ccfaffbfa67d49c5aba3c8336467ad

                                  SHA256

                                  c40cd888eb26a7a27848ae2952c84d19ac102711518e9c831eaf11b35ea7b8fa

                                  SHA512

                                  cd588390cd236fd431d7c2aa653ed4bfb97e743f86b47adef426ddc7a0df3b8aa22063c9d3a09817288dae430ef02307bc5dbc5d6a560c5bb197f4c9a5240650

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  3cef34ff10720a4adadab18c6e328c79

                                  SHA1

                                  76f2cbc83538a89db7d431c306462ac846b49c69

                                  SHA256

                                  21ef5b26e26302c00fe5431940d6d520e1ac404f632a0c806a2808d323b1c8f2

                                  SHA512

                                  01167ea4efc9e545db7700f45487e5d9a96b964f1e25908def64e6251ea7d9ba6c83948ca8335fa3e366c18a01d2c0bebed3530e2e371309d2340969b5f1c619

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  8bbf8a9c40a1a34b0c270d3a3e1aeb13

                                  SHA1

                                  3cca1fca87247c12af3777d7e7e1356be308757a

                                  SHA256

                                  0bec7d1ebeb9dbca94a9b8573fb14bbc0e7149ca4929cce43093f645e2226d2f

                                  SHA512

                                  a4360192a85d6b62c82c8b9e98c61803644abf90300c0ff89fbb356e7c213ca7eca9cb4e350deb9e330a3eacbd72e4bb667de75395bf2103762dd82d000da4eb

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b71330faa1a0b57a38dcc94f30d293c0

                                  SHA1

                                  976579269f440b0d8a2e4a4dd3b66072d76e90cc

                                  SHA256

                                  55dff994dccb800b1750251e373343a8e0782861dcd1e9b3e39d765314fc8293

                                  SHA512

                                  366486cef29501a85cbe2f24ba4f7902436c7b9106e6eb50316b23a05daaa8f74ec0340805632a9b369616ceb8208d41b4a8a7bbd5358e0e5f30cd7ea3b2458a

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  153da00fd629a5bff3a4b846c1881ef9

                                  SHA1

                                  5d8867c238291ef7cd80bcb6e00fb8336f00ecb0

                                  SHA256

                                  a782fb1a687ea8ca17a2a598575d2a3453ed7bf9ee7fbb64d606af23ab3dd4b9

                                  SHA512

                                  bdd64006ea716643eb99af257df46090842df55f16c9c2e766192d4a676eb1eac9ebbb45e7263d90886ac67be64e600ecd56c2aa630d9ba01c9d6683ffcc8167

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  1c3c8839dfd7d9412b5fee2a5e33d02e

                                  SHA1

                                  6532552695a19b5f8d608bba1a8817a344b05e44

                                  SHA256

                                  775e1107dd25219ecfa9253e047d700b041f033eb34548c563f28a60b44e65ec

                                  SHA512

                                  7ca4ba46db18d99466bd6536751d395ffd29b100385c1805ad4a3b2c3b3e173887a9787237abbeb10ba781b0cd931be630c5088924d8bedfb20d1540a372cbfe

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b63434774250bf4e91ea136e0e4e966a

                                  SHA1

                                  888ff3a069955b2b6926cf2274539937e5028074

                                  SHA256

                                  20a21c35a025ef0685e50d2243da66faa79767e382e174fce135361ebeae0494

                                  SHA512

                                  0417f8793b8efb6f58bde73ec023e304f534b41de95e1ebda653c350a06d3cca8142ffcf5d2676cb91e69f090255dfd9a5816321ed9787359aadf6192e399382

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  6fc976ab2841db48c555bf012dc3d1e8

                                  SHA1

                                  0b621979f4e07d92815d7d646d3bb47322da4d13

                                  SHA256

                                  e7eb207d1363e8dafa3ee6563cc7c546b5b5c81ed6497c93a560ba6152e7aec6

                                  SHA512

                                  02f1a1f57eddcf166fff5d5ccafeb17eafce9217b1efb79d2d074409d321ea90030aa86eb6f1441ec6add3760f24f4e18ef2eca3efd70e5bf4992194aec93dd8

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b6466a79c5a99aef1e3d0b6eb0fdd212

                                  SHA1

                                  2d524d3d115081e78b63f25e61a15ef4449f9ab7

                                  SHA256

                                  2aa794556196d4a2a5e872d510c3b67416208b33c95ce4bc256a201c4c852dcb

                                  SHA512

                                  8971be20139e95a4bb440abdbf97f7facbb5c4a46c030dbb0a1d8a2ec7b1f1a32330fef0cfb5d3c8a691289d8b384f6851ed5128edcdbaebaeb9872444bfbdca

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  14557d454f33fc1b41a0ad7d599ea18b

                                  SHA1

                                  8932e5d7df32ebda660b66bd94b3643a51f82407

                                  SHA256

                                  9879e55d8b00e794d3deb9eeb44a845fad23cfa7c1962cdf8fc74b982b58f97e

                                  SHA512

                                  a56b3624631fb7f0269b4bd100dc85beb74594efec1413efce5120a58d148dfa6904d47b7634e317cac1ac035533182f3e0cec5b6979df75846ef739d53ff285

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  e502f282d208ff00c84dd65e940d3bf1

                                  SHA1

                                  1a149cf0d285a3d9e1fe5453148bf65fb33934f8

                                  SHA256

                                  ba9e6a2cbc06bdc9ed51559a9fafb285fd6f1a25b839dd92935f9295b19a4068

                                  SHA512

                                  d72f638f9c5641be36d7714d5f19c0f31e35a08119a70e92e77ee104e8578a2ad1edee28937f525b08223ec2142f88381061c16fceef2635533c4799486e1c4e

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  64602a3350a3f817c327c23b50a97660

                                  SHA1

                                  9e593783e8c22bd580d29faab6bb399a4ddbfbf5

                                  SHA256

                                  3945bd653190e786d0838577a08679084b16948a1b0789f7221d7065273d9c5d

                                  SHA512

                                  e52e0c9500d09ebfa5a98e4422d168c5721ce22d9d02d2660f5a369973b0596603a7fdc98887a37e8b844c6ad552309dc1d4506845c3c9a24d0e52052abe9b98

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b65adae79f79a24e35177f70bd477be9

                                  SHA1

                                  3482cdd7fe975a26a6b8a2c21abd86c7e431859e

                                  SHA256

                                  c46522b564460f2d69967a59b237f947243d79a8ebfd0c678caea9f5a4299056

                                  SHA512

                                  62eafebc01e0a8e6d1220a8c069bb78f6672e20e065fea9781f0d537d548a6595845b3bb8d6708e9eaa39e3ec1c97020e2084bfa78a32bf08b661ee0976c9149

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  fc489edb0d7bb9642d60309c825226f3

                                  SHA1

                                  9d3f0b75105de637c28d637d6c3c412c9ac2cb9a

                                  SHA256

                                  bc3b85ca7f2b87907e74297bde7495cf33cc55ff018e73d49efd5b9649b2732d

                                  SHA512

                                  56534a08f90ff3f43a7c7d0906a2352c8f43d09143a791461a899247930390da8667d8effbae24f4a9586449e05f9db4f9f3af2167feb4dc26d08ad772ad51b0

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  c5048ab51130ad37eeb8104adceec33a

                                  SHA1

                                  296959e4d3efa2008a588334abb8327abfd325e5

                                  SHA256

                                  d0c9e7ff090cc70f09621506f5c502db9e8db993e8a9d70c7dc25db7e89fe2c7

                                  SHA512

                                  2ebd54b5af984a468c411e5ce3b3abf8e5f71f70fae449723967acb3205f12c01da5404c4c0e78a130780dd74e16652f7154df0a9ea4bc16f622032ffa54f2da

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  45e79422d2db4d1a445a255daa4077ef

                                  SHA1

                                  528162fbe3e0a908c9f78e364c2459b7a71d18f9

                                  SHA256

                                  a5b6d898c14bfe6135441fe296b4c29e9a0d023c43e7b1cdef238572a088fa08

                                  SHA512

                                  21bb4838712538a5ea1982f84d81db1efb45604214dfca0854fc98c7b02ffb3340908cd2f59c7a7ec80aa59abf1d0727caa7f8b28b7ad0d55c5943773c29ba96

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  174c3cb39bac51281274c5c823a32695

                                  SHA1

                                  3bd0bcf6dd86bbe582f368b095bd5e3cc4bc53af

                                  SHA256

                                  b4fec66d3d70c0b415412b4963feae0f45495342bce508ff4f4bb9dfb62804f8

                                  SHA512

                                  e6c15b8f97f9232741693eb2a4b4c0f8bdb7a2162e5fbd4864a5615e1d2613f034b06a827ecbc0e77750b85e5130f792faac143d97e1c57a9436b648928ea745

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  77584f5b47da23840d48cfc517133b77

                                  SHA1

                                  375f6810efce9a71dd1fcad468dfdf9b203877d2

                                  SHA256

                                  1cfe57924c7eff3a098075c79334e94500e55ac4399ba05c688aaf95d14a89d0

                                  SHA512

                                  8af84ee10b2088fa7f3fac098b888c2420ac7e95d3fe708a6263254de3a808baeab228ffa5d1d90eb265c6f9bcfa254e609bec5c4b9052dd3011aa542e49c5e2

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  3467fa59f470fc1e26bacd9db85c6700

                                  SHA1

                                  1df1cf8450a973f8cc692dc76a00de4927d1f7cd

                                  SHA256

                                  0fc13ea3606c1c470caef9e797aa30a85af93e7e234669d02c838e264c99aa57

                                  SHA512

                                  d37628199d40717375089430f6a6bdb2d528b2642856c1319b10279a5a1b3e3e7ec7c0ff674a9188775985594d6a38b4b624ef9da0958071c39479e1126bb5e4

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  4b194ce7434db35bd8afe84272d51638

                                  SHA1

                                  21b634303981c68781a9351c5c0ac4dae38d6ac3

                                  SHA256

                                  e29ed0d221ac5d4c736558f7d9898a83e2c0dfe9ef3205c6b87633de7e3e1392

                                  SHA512

                                  6db03ec239352c811702117e9940d65ceb30dd86e18640ffaf95179eb6785e6d65dd766a6f42f246bed8d260a0ed21ffb4125863645b0bd45a527edb869d6076

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  bec828789bef8daa01312e132457ccfd

                                  SHA1

                                  fef5cd32856d153230d29718c66a2886ebc83c77

                                  SHA256

                                  326fadaa061489756cbb07a54d98d74ab89d76806ad400d2052a4933dde13427

                                  SHA512

                                  a9de4580de0e686d488d8d1dbcaec4d647611f6fddff473d6c7b3da97eccf6e756ddca3739a1a067d5ec50a8eb6e6bcf3d0153efc453d2afe4e03baddab101f1

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  c4aa30e81a0103fce1d388b7e234106d

                                  SHA1

                                  10cb57f269ed995869e753ccde52b2f173bed271

                                  SHA256

                                  a2f8e960bf709e642462e0e17055eccec7f33cc1cf268925317f5e451840c5f9

                                  SHA512

                                  05ccf0c3f6eec4ccd6f9cb36849e1b9603e13de980e61fd6be7a810b1fd8af61a825aa2002ef42392a5d1b185607ac1991ed95bc5aaf8508434b32a75f6f5b6d

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  957cee9a080e9d6ade997754fbd5f4f5

                                  SHA1

                                  fa9d03544fb5f07c9adb2d750e55f709ddee53ae

                                  SHA256

                                  8e0b79f08c27f82b1236cbf619d001f9da4ea6386530ea02d6b99c8012f20d7b

                                  SHA512

                                  373604d7ed5ad49aaa0ad2b9894aedee191bfb9b8f87300dcaeda8e4c333bb1141b5fbacd04999279fcfe31e83c898d1445b1885ab34353f00a6d1598bc28955

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  7b396dd8c11a098835fde128e3b87606

                                  SHA1

                                  2bfa9fd07cd35760e284b8986b631f5d13f024db

                                  SHA256

                                  4e87dd1453492dc29ff8f103f4c83379f2ba5ea758f946ee10ab1acc5be8b571

                                  SHA512

                                  ca14813d37fed0c92115f0e51cf250895ce9d0f42ccc205d221fd867b1194f43b9781a06ac70be406a35b603cede716bd7a898652f872f034cf5833357ac1d0a

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  81123e3a9757060198daf54a8f7b69f0

                                  SHA1

                                  afcbf9accd63b1d8d497a94b84e5810a462d77b1

                                  SHA256

                                  1805bca302eef80023cafc7bcc44f5086fa8a07e279f88851f2b3220f99fc60c

                                  SHA512

                                  633228c2f019f056a43dff9ec277e00fdafe55f414dd4b2a9222f236221daff654397cb641b8ae42be2b4832c32087fa22f3a679336b050c166920e5179cb8bb

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  d204ddf3ccdffa7b1b9c9ead4b94a9f7

                                  SHA1

                                  9d7f10473cbc747ffbf21ae21dccbdf7e77fea98

                                  SHA256

                                  193e33af5315f23afa3330e7a517a16914e09ddd05ea87ff17e043971ae54355

                                  SHA512

                                  457006066aa2b10a78dc2ba5e017cf818607c8a4074a78b7d9b127cc9afe9e0bd726a1638c3efd14985be305992c0fd6ea3a773ec0435bf7ecf5f9a8f6624107

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  44fe63581cf5d1da3dc60f821e490ed3

                                  SHA1

                                  f958f94b76ecdbca3e2af985d1caa25e5f514f85

                                  SHA256

                                  8d2bbe25b4195d8d68132fd6cd99079061b98d3c3868bfdb2a6c25a3f179e1dc

                                  SHA512

                                  bb4fd9f610425f4c7559f6687a552885d957e87aa39fcdbf0508019e4c8bfab9f8b4bcbc19e67751778e36c1f61ded5191b65f59572dd7924ee3940485dc6c86

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  1917011d4e595cb28dd0291c92cb0ee2

                                  SHA1

                                  9b8e8b13c846af800fa8195ce4c6bb74ad47b51b

                                  SHA256

                                  1e99a561a139b890ec7a68a3dfe13750d18339f704a7c4e20a80eb1df5c42f9f

                                  SHA512

                                  67cbb65f12ddfb0f46b49e321179434a98706a64da3cb42c0d024c20dca18070c5baa88f68ec71f81c54f2562ad6d66acd9b0997f3ac97a73b274a04d3deb56b

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  80ce8021f7117eab094eae59c3cbe5bb

                                  SHA1

                                  3563a8cb60f2dbb5d4917f3835c4880e07ff0d34

                                  SHA256

                                  7b8b94fde95ee42430239109488de92ba44ad9b68f6b2f963e358b1358851732

                                  SHA512

                                  6d65210ab81bb2e99d0fe71af7a77484597514cb73a77b84448a327d7896f6afc4aa8dd37c7cf1bae5d1aa4d11f741589d10c6cd7184df0f845aef86a8f8b95f

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  1d7a7330cd992a8706de8705e47f7905

                                  SHA1

                                  4d62c03ec84a677ed64f9cb6cfbbdee69bade484

                                  SHA256

                                  52eb0a4fe4e5b7164449c2c7175120be5f827ad29c0a70597a94cc8b20c38521

                                  SHA512

                                  857b4a5246d9a9019e8177575dd6b1b7599849fced1a38af37ced15aef49e687861d33e8f258302fcb0fc53eb87103794fe2154dbcddb5b6852d22dce58d46a5

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\677ef5be-993d-4c71-806e-863a71deb3cf.tmp

                                  Filesize

                                  6KB

                                  MD5

                                  1f3a3235151803fd3b4ed3096e47b9f1

                                  SHA1

                                  7ac849a6607c71ae38a7a1d960cbda5a7bdc9a9e

                                  SHA256

                                  62247a541adc5b83c008b77c4e69a57a39eb948e68d4d9a9d6ea0e07ed9c2784

                                  SHA512

                                  bb9a5d63492b93f13011180bc2e821a92bfdcfbde3b262b8abb68764f4ff930e3943cc00d811df64d7320044776f6b01ddcf70e864779b4c6ec2ccf74f1b4590

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  3a786e68db56a64d729f86bf011ffc26

                                  SHA1

                                  dea33b028aba62873630733ef62aba5b7950ace6

                                  SHA256

                                  d1bac8561b33feb0622fd6b49fd4166d64b022e9ca17148239f3a09949bf8a9f

                                  SHA512

                                  c70c6d3d5a4ce6ffe7c593fbba2c05a5fdaed1ad6ed1487baa861a03bfa86552396a5eb2707740a17fca1e6996f86b5382295e49c4ebaa09062f6c9ddce3fdf9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Temp\Cab21C4.tmp

                                  Filesize

                                  65KB

                                  MD5

                                  ac05d27423a85adc1622c714f2cb6184

                                  SHA1

                                  b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                  SHA256

                                  c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                  SHA512

                                  6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                • C:\Users\Admin\AppData\Local\Temp\Cab22C1.tmp

                                  Filesize

                                  68KB

                                  MD5

                                  29f65ba8e88c063813cc50a4ea544e93

                                  SHA1

                                  05a7040d5c127e68c25d81cc51271ffb8bef3568

                                  SHA256

                                  1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                  SHA512

                                  e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                • C:\Users\Admin\AppData\Local\Temp\Tar22E5.tmp

                                  Filesize

                                  177KB

                                  MD5

                                  435a9ac180383f9fa094131b173a2f7b

                                  SHA1

                                  76944ea657a9db94f9a4bef38f88c46ed4166983

                                  SHA256

                                  67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                  SHA512

                                  1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                  Filesize

                                  7KB

                                  MD5

                                  f51aee7cbf4656968b8ee03e4f7251f7

                                  SHA1

                                  21f91f014d358e547db8ed04349289982c6ac157

                                  SHA256

                                  a2eca4db45589d5979bf4baa06074e6d875bf65f5372541608fd66d79620d527

                                  SHA512

                                  c9c6fda6d8e973b7a5b2a07c2518be41be0db73319eb15ccf94d84905e50cd1f7dab3b0666de16d7bcf8d90a4499893dea838239cf5de5a5eb47a83468afd74e

                                • \??\PIPE\srvsvc

                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/2128-32-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2128-31-0x000007FEF5433000-0x000007FEF5434000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2128-2-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2128-1-0x00000000000B0000-0x00000000000C6000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/2128-0-0x000007FEF5433000-0x000007FEF5434000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2652-16-0x0000000001D20000-0x0000000001D28000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2652-15-0x000000001B5B0000-0x000000001B892000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/2680-9-0x0000000002340000-0x0000000002348000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2680-8-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/2680-7-0x0000000002910000-0x0000000002990000-memory.dmp

                                  Filesize

                                  512KB