Resubmissions
12-07-2024 11:28
240712-nld99s1fpp 112-07-2024 07:42
240712-jjwz3swhja 112-07-2024 07:30
240712-jb5x1stfll 112-07-2024 07:25
240712-h82feswdkg 1Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 11:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d3hwtxj0w1i8v8.cloudfront.net/2024/07/2/116/TA.xlsx
Resource
win10v2004-20240709-en
General
-
Target
https://d3hwtxj0w1i8v8.cloudfront.net/2024/07/2/116/TA.xlsx
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 804 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 1280 msedge.exe 1280 msedge.exe 4908 identity_helper.exe 4908 identity_helper.exe 1640 msedge.exe 1640 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE 804 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4132 1280 msedge.exe 83 PID 1280 wrote to memory of 4132 1280 msedge.exe 83 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 84 PID 1280 wrote to memory of 4960 1280 msedge.exe 85 PID 1280 wrote to memory of 4960 1280 msedge.exe 85 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86 PID 1280 wrote to memory of 3164 1280 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://d3hwtxj0w1i8v8.cloudfront.net/2024/07/2/116/TA.xlsx1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9fdcf46f8,0x7ff9fdcf4708,0x7ff9fdcf47182⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Downloads\TA.xlsx"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
6KB
MD576f1b99b52f22dcfa218fea237d98b72
SHA1939266f65c557b4437595a417725166f4073f0a0
SHA25687ca3ee8c27eff060cf07796ca66b3b74b2fd05200ad44b935f43f57cf5593c2
SHA5126723f22fbb35a8a45ea519858f18d5c1240c16f29a81bb7649552becd6b16136e442a0d4e3de2e044bffbd534ee0a47f93c30b3d364a2063031b24800b0757fb
-
Filesize
6KB
MD50d66a6691c561d2c1411ae3db76c903b
SHA1ec7a7a13b51c95f2bf119fdbd4f88610c7a817c8
SHA256a0a2b015a7ea7c4438b8a883a72b50c191c472d59e4d086ef5a6b16f5d65d35f
SHA5129965f86c695bec075113a7f4a8437a385297af5bcba22f76fd3ca72dc3726f23996e969a7ba8ad68e0c6de9added0ee98d338eaee3d9e1f2155cf38f647b8c84
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f91a10d5-fe9f-44d9-9947-6bf13a2d47e6.tmp
Filesize6KB
MD56e49154b8e21f57e22692586a6a29b72
SHA187a933c1ffe9cebd1d64192b96b9bcd4a082c94a
SHA256e5eb8a991636d8a0378643d2617b0dc74147e52608649bdccd34ed5afc2353ae
SHA512c2aa02d7533f523ea2bd08530dfe0373f7540e079aa76fc874a78f2448aff02c1fb52c751533eddfe8e389dd6fd9c215e9f7e3b6422738e66b744e6ffd0f297e
-
Filesize
11KB
MD523a8fe57785c39f5c71cfe1d35b7cb65
SHA10734e3a9ad6d6d8de845486704d3bf22b8fdd427
SHA256c80c44267b9013f618a0634b5e8118d2a42b5950c1ac007d0e1c70df093d5459
SHA512a0f46883fce98578cbef156964592616a748b2bb53e3237465f502e29f5f560a2cdce4b7fb5fff284fe969259a15ded1a7af55aeb10d86f8aaaeecf2f0b75d10
-
Filesize
11KB
MD53cdfa3329ee1ca0e77eb6000304ef514
SHA1013ec76a6d5528d2bf820c4fedc77c2d51477e48
SHA256333de09ca493d63f406c559a914c918c4a5e8dd1c242d7de07d31fc52020528d
SHA512c4be0894f02a93b8a814e9ada54d74621b107238923152dc5cb96366f2999cce4c36c0365926e424aa6d0178329d6608a4eb6346ad9149c4d3942f7750cecc37
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD589bb0bbb60c7a6aab2395f84663ffc01
SHA18a9715be3af5f39eec71cd16ac33201a7ad6ca5c
SHA2565d7326302c026b1c869529f1af5151201ce4e83f92dad57d43044f48de4ecb44
SHA512f1a84b51561ab5683d57007cc5e2de076b4c4ad54f8f180c4b48004544cafd4de3afef1595b81c6c84cf0ab754bc4b54453a9bab1d4a784b09787784086173d7
-
Filesize
411B
MD5c128b6a2d47483022c52c51cec620f07
SHA1e32242ba0b1e51945ac6b6e40cd3d97fb90c338f
SHA25655aa276199051c7b5510a81bd87e3892b9007caa3720aff07c5afc8d46984ff9
SHA512e2bef1583da03d71f2c5f13f3fec5f102e6cd5f2cae65cd5a04e8757acdd33b2ce88c4bad107fbfbd467a8f518a151580d8e7383ac9a3687955e3e1f24bb66fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5a7b02cd8a2325bea2830592224ff1166
SHA19c93066aee33e3509a5ab44c8532431a10201091
SHA256e7ad50dd0859066edb0ff193d0e48a38e6c1b33418354982d7777d50af6b04a1
SHA5121614c01ddc2dea778cd5d5d8c4478a5f8af6ab75f26b042c320cb40252a72a019afffa6975d740161118e42861d019d1d6c622104d17ff035fa3bbd6d1c728c6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD57e380f06f97639bc787d4608d9875d5c
SHA157aeab6eb07b9d80681e58815c0a745f74a154b9
SHA256e5ea58c782aa95a8e4f8d9b95ecbc52e49c0b8241472cf4c1393167e0719d729
SHA512fd91650e2903ac05128a5503dd46e1677dea6e6390ac0bb6533fb3282590d5acb51cb5852ba77a8b265eae2944b90605b3084c715f046841f0867fe709ca2d72
-
Filesize
272KB
MD595bd674471a1dde0b7ce34673a1b640e
SHA19ff7ed92bab683abe58ce6796d0ca7cd840ef6db
SHA256c27950ac4d525c834ace8c52a3d2abbba6e3122a0ef177d82feadb2c38014066
SHA512718072bb08d14644c29522500af328bb1e82affcbd1ed8a14083c6391992187ea3cc08c77fe2623de08acfaeab78f20e16f2b8cbc7639079035b2d51792a4aab