Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
VisualStudioSetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VisualStudioSetup.exe
Resource
win10v2004-20240802-en
General
-
Target
VisualStudioSetup.exe
-
Size
4.2MB
-
MD5
b8cca496dc674c18d8f9b7b205c7d339
-
SHA1
62c57e3074cbd4b2f2278d412bd0bfac8d996eb7
-
SHA256
68e6af8e455b2804eed7fb34f68f173ba6d95adfe1f8814a4fc6e7bbe4cd8860
-
SHA512
8a90a406a816477989638e108de369da8e57479b83b7c556789d971681f9a112867e0efa915883103805246880b4e84fec2c90f57eb89c9a135e951f27022b3c
-
SSDEEP
98304:JEbiSkYmlBsMftfJaBjAgylspFqTLGW+Nu+GHtJgRU4eZp:WlmlBs+tfUBjAnupFqTLgNh+izeZp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1800 vs_setup_bootstrapper.exe -
Loads dropped DLL 26 IoCs
pid Process 1984 VisualStudioSetup.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe 1800 vs_setup_bootstrapper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VisualStudioSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vs_setup_bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language vs_setup_bootstrapper.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vs_setup_bootstrapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vs_setup_bootstrapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vs_setup_bootstrapper.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1800 vs_setup_bootstrapper.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe Token: SeShutdownPrivilege 1528 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1800 1984 VisualStudioSetup.exe 31 PID 1984 wrote to memory of 1800 1984 VisualStudioSetup.exe 31 PID 1984 wrote to memory of 1800 1984 VisualStudioSetup.exe 31 PID 1984 wrote to memory of 1800 1984 VisualStudioSetup.exe 31 PID 1984 wrote to memory of 1800 1984 VisualStudioSetup.exe 31 PID 1984 wrote to memory of 1800 1984 VisualStudioSetup.exe 31 PID 1984 wrote to memory of 1800 1984 VisualStudioSetup.exe 31 PID 1800 wrote to memory of 1528 1800 vs_setup_bootstrapper.exe 32 PID 1800 wrote to memory of 1528 1800 vs_setup_bootstrapper.exe 32 PID 1800 wrote to memory of 1528 1800 vs_setup_bootstrapper.exe 32 PID 1800 wrote to memory of 1528 1800 vs_setup_bootstrapper.exe 32 PID 1528 wrote to memory of 1220 1528 chrome.exe 38 PID 1528 wrote to memory of 1220 1528 chrome.exe 38 PID 1528 wrote to memory of 1220 1528 chrome.exe 38 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 2188 1528 chrome.exe 39 PID 1528 wrote to memory of 1508 1528 chrome.exe 40 PID 1528 wrote to memory of 1508 1528 chrome.exe 40 PID 1528 wrote to memory of 1508 1528 chrome.exe 40 PID 1528 wrote to memory of 1304 1528 chrome.exe 41 PID 1528 wrote to memory of 1304 1528 chrome.exe 41 PID 1528 wrote to memory of 1304 1528 chrome.exe 41 PID 1528 wrote to memory of 1304 1528 chrome.exe 41 PID 1528 wrote to memory of 1304 1528 chrome.exe 41 PID 1528 wrote to memory of 1304 1528 chrome.exe 41 PID 1528 wrote to memory of 1304 1528 chrome.exe 41 PID 1528 wrote to memory of 1304 1528 chrome.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\VisualStudioSetup.exe"C:\Users\Admin\AppData\Local\Temp\VisualStudioSetup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\vs_setup_bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\vs_setup_bootstrapper.exe" --env "_SFX_CAB_EXE_PACKAGE:C:\Users\Admin\AppData\Local\Temp\VisualStudioSetup.exe _SFX_CAB_EXE_ORIGINALWORKINGDIR:C:\Users\Admin\AppData\Local\Temp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\getmac.exe"getmac"3⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5889758,0x7fef5889768,0x7fef58897782⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:22⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:82⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1516 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:12⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1236 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:22⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1072 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2768 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:12⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2316 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2340 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4036 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3840 --field-trial-handle=1196,i,11832966305618377620,16408692494515083874,131072 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1576
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2281⤵PID:984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5102faaaef26666b0603c747d47c8d334
SHA18fcf9428dd8579a1b00a023a26072bfdccae1c07
SHA25691c93aec3778a39122f1083c481919f7857e50e8d87fa59d24449dd9011fbb3a
SHA5123b28605d44c995f2017fd13b22b5adb15c2f60bfa39d839d8e135fb85d4c9c4499de862a373c314e1cd1763570c8250a51dac8f26549b00840492a3f8b3e71b5
-
Filesize
47KB
MD5166272be2a096d91ca063d2a2b8a5109
SHA1e6368f257a883a4425b38c480d942c3c71c238d8
SHA256b468a14db93d196fbfb11ad23bd5a5024e5413b32ed08469dea21e037c8e1384
SHA512c84d1eeba00598cff55a6cb2bbdc7a9de7875b4a342a9353736104a9577bb48bcc2520724ef89b48482808491142fc88cca6352a4bba9b8545238b4b6d555b04
-
Filesize
603KB
MD526938e3c4de42c72a093843b11bc0ce0
SHA1f6d93038faa2d6ed5cc1a75f7c31f2afa18b4f11
SHA256d6b0c90791fc0bd8daf4adc7c62ec97fac2af74e4e5bc4d14624bcb672d30a1b
SHA512e69b8abccf5a205048adcf70c6c4a3f14be6d2bdf35515be8abd8c291f45e8ab5266e23555be7d8eb5a79ffa935d5aae0d4e541367cdafabafa19c064335caa0
-
Filesize
32KB
MD5592fb50642c55a8a64789c1e3cf5bf24
SHA18032312683551f22cac3c87544931c383800e024
SHA256caf8a5e03ad55710abd48060865c37b006dba1359b5ae6dab8c12094d225f05b
SHA512a23d322c7931d675d4012c7f49bda458184ef1c37a8335f8099089735ca8673a3d1e01138e03c5b36e164185f4521098f0261f0c232b90e33da93d9fd00a8c61
-
Filesize
32KB
MD511e287ac9d9839e014c454bc130f2aad
SHA1a99317dc7f83459e259621de9c78a8f2d92eeef2
SHA256da1b153ae4dcb954aacf64758db80644b74344de78286b50ca58aa100c698be2
SHA512602608f41fe43a5fcc16cffba00a1b580fd7f71643686875d09e5f3819bd15eeff4b5d1026d62d39ca2718c58290ee08cb9d91de7bc9a799315a58cc2f8ecce5
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf77ecde.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
854B
MD517ac3d89d9a16e86c2c4e250a72513ca
SHA1ffbfc0932ec7f94c5d756317c765e67664584c95
SHA2561cd0d1f4efb2bc5aae7b3b7af4c868352a4c1f52b986f421d0fd1cb7adb4a630
SHA5123a34a3ac35b575090bafb5b9b2810f8fc966112cff85692d6abc7b66aa9970b48450117ac2497e70bc43f0f705be4b273536706355e3e2a6e4b5a4df5cf347a7
-
Filesize
361B
MD581c6808f14785dd10c053345e8dc5f77
SHA1b54be0108d6c51d1607aa4de33dea6753baef332
SHA256c30f305344a29c8770c1e37e9063a975ad2055b76849d7261c0e3e6fcee0171b
SHA512bed8762cfa760d8d371f5a65d6fc225f7e7ab54e4b18f18721607dac3c9395aea08fe4ca8e9ae39544170cd10edb73adf016f5ca75a3dd39b90fc2af50ab4e48
-
Filesize
6KB
MD5221a5d4c042dabe9034d7cedf0dfca7a
SHA1a13fb69711d90df11dfed3d554a17d880049645c
SHA256c3a61bf8aa9b162c8a72f5b966cae9ebb97ca8b29fe105d2f6c98d9fbb80855b
SHA5123099eafe226eaa612f8d9e26d059b15335a54048a4e5dd0b1732ce0f0632f213b8f2b1d58d15866ce9d3d8d4ca0c9fb59907ee4f13d6889e26246df7abd1acc9
-
Filesize
5KB
MD58f4247ba7e2878d479d8a5fc02e46c38
SHA16e97748115454ab04580af740c9374c0cc3c2d0d
SHA2565d181bc619361a3dab1c5b5dee4b62f449acb39128dec4e0a33bf2bbcd791567
SHA51218590ad645016709184b573dd26b134be918249800144008299947ed29eefd002b24663228863e67ef77bcec9ffe80c668b3db2a35081cce1f28a7f2cce7278b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\a7caf188-54e1-4ad8-bab1-d81919256f06\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d6491413-7845-4d8b-971c-0cdc08a39ca1\index-dir\the-real-index
Filesize2KB
MD56d8e34d874cb6212a096688b7c83ca6c
SHA16f6c8d8163db391339639313849678b023b501f5
SHA256e756d931f6063832b6b4ac4b94bc2602ad45da69fbced1b08780e247437011f7
SHA51253ca7c38dd8149e0f58821266dd69385ed214780478e93d73b618a4a94f11e328f11135217f95c8aa92a95340a1a015b90e1b935c03041446541d8e51f1806e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD56ccb7ec1543d28f8ab427d02cc334728
SHA11d541c4d6c99630a1a9d72733eb16f735887d90f
SHA256fc1a7b14b325d207c5079bb2693eac93b7273511e822d496b1c20a16327b7ef1
SHA512daf427ed0c61291ffc579bcd67a9cbffe652dda5bbabd883e118cfbbed2bd8a3e2acb1f9d886ce51fe925144728d6be732e6ef7c460e06cc6de870c8a1797bdf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize187B
MD5d381b9b07a468dba29cdaeb9bcdc81bd
SHA1db42b66c925f4c37fa1ebbb50f0512d7540b4df7
SHA25604a24260afe779916156788daf853a779f7d4c9c7cb266249b3abc2190896cca
SHA512e3310c1bfef70dc12b45e1b85a0fb072e7c0db9fee5d7ccb2a7f9c77e1c93c5f6a643b64051f6335307a663bc5d731a0902ab786d0f007fbfcf4e0b395ad687f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD54890fdd817ae44e4ffaff34d1f0d3e4d
SHA16b11d3b37f2d73af92db5652104d002977abfd48
SHA2569540b3529f19d01fc8c2155ea5496a673e6f07891c9bedc18b04d2f955f795c0
SHA5121b0f5da4b594def0230ee9dc276aabe1de375172909faa798e046be8a5d19b01c7487c6a3c275a158e6d7eb58503ac5d963af02571b381bbb46a83397b9f9d45
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize178B
MD5b8656928983635fa252da46b3c839948
SHA16760dd094cb5847e6ae25851e6d7b7fe061bb997
SHA25676b26d32af4f5b3ec7e51fedfec1a09d7009195c4bc6f298ef24259c55c470c1
SHA512a61658ca12c4b207058cc165772a4ae31b61013805443493669d9ee541ade795879a9681873cead93c191a881ca5edb480e3ee8f3176a8ddfbe58832e54a9c2f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD50d8ffb6f7458c4c9a0f11a2aa2e3e774
SHA193666f04edf06574561877b3d2c11b2fcb5e860a
SHA25692734419b225bd9b84af06ac0c7a3f0574a9b2916b22b01f459b1e198f5bec7f
SHA512e09afc46f211e6f20df0f0d2350ba582e7f36135727860e16d562e5306bf602c50cc63914a3fc681a7f2d97d8ae77de730501926afd628b554a2846a3e070756
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Shortcuts Menu Icons\Monochrome\1\512.png
Filesize10KB
MD57f57c509f12aaae2c269646db7fde6e8
SHA1969d8c0e3d9140f843f36ccf2974b112ad7afc07
SHA2561d5c9f67fe93f9fcc1a1b61ebc35bda8f98f1261e5005ae37af71f42aab1d90f
SHA5123503a0f4939bed9e1fd5e086b17d6de1063220dffdab2d2373aa9582a2454a9d8f18c1be74442f4e597bdba796d2d69220bd9e6be632a15367225b804187ea18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir1528_1837469349\Shortcuts Menu Icons\0\512.png
Filesize2KB
MD512a429f9782bcff446dc1089b68d44ee
SHA1e41e5a1a4f2950a7f2da8be77ca26a66da7093b9
SHA256e1d7407b07c40b5436d78db1077a16fbf75d49e32f3cbd01187b5eaaa10f1e37
SHA5121da99c5278a589972a1d711d694890f4fd4ec4e56f83781ab9dee91ba99530a7f90d969588fa24dce24b094a28bdecbea80328cee862031a8b289f3e4f38ce7a
-
Filesize
327KB
MD583668cf7f641c452bc4a5505087c8e6a
SHA121727be8d16b53d4890593c55df46325721db299
SHA2564dde7bcfc3f09f769e400adbd552855c23acd7b6cc9a08985fe56e97f9a99cc3
SHA51284019267c99ecfc09ad65e8861c32937318207e0ca8734e72db6a76366e78ad2170aab8744d9da33625ce2b5d89c5bc35821635263c2fd3ecba93ca56e24f218
-
Filesize
327KB
MD5aa063d9e04d8c8d8e1dc9d1a3d76717c
SHA1e7658bbe010f5fa4aa0c43f882e565d64e1c0b0d
SHA2569c8c56980cda938d5abc473e22a9e381d4f80d45d8a652a01bc37b44af225d5e
SHA5123bd714b2601248acefc750b4974f7b4f8712d0a981b966a154ba47044329211b77a0507188903bfc5c8d44d630f70604a296dc42300c59802b5fb51fb62f6a53
-
C:\Users\Admin\AppData\Local\Microsoft\VSApplicationInsights\vstelAIF-312cbd79-9dbb-4c48-a7da-3cc2a931cb70\20240921194448_4953b9cbbab2478695ae641f6c4e41c0.trn
Filesize6KB
MD5a61d6dbe11e83538a98987032dbbcd8d
SHA1d28c92bb7f7466974b56f942166661e5ccdc4dad
SHA256dcf5b7d5012c180d94c585bc577618518dddd54699e5cb55c78e42bb209bce24
SHA5123ee9dc75a0b879f3e1fbb9ec7cd1ff1be0198aaaca2e455898bff326ca29710511b426098e7865ad75f615c1ab3066e2193a93ab6b685c65eb36dddb0b60967e
-
C:\Users\Admin\AppData\Local\Microsoft\VSApplicationInsights\vstelAIF-312cbd79-9dbb-4c48-a7da-3cc2a931cb70\20240921194500_f518f79dba39432a83688035ca7b716f.trn
Filesize4KB
MD5565990ca92ec315ce6729f1fefb776f9
SHA12cd9b09fbd4266c4f57e30767e73e1aeb937a54d
SHA25657b63cb70624ea2d6652dd901487bac56354af63f948f96c396db9a33d2197ad
SHA512901f0420afac40744a0622495f7dbcb5e157e00fb198afc10727157408046b8d30650ae837c404327b2196f220f2a92695880f46aaf43cdc7a3f44fae9002ba0
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.C2RSignatureReader.Interop.dll
Filesize18KB
MD56240940009abe0240203a943741f22b2
SHA121d7eaa572a701d2c463f1421b1b4dbb4355e91d
SHA25662d8143505b130e7dcd2488384c19827787f9370c132d0c05957e16c28c70447
SHA5124360785a85aa89aa303fb5a4e15233287457b6c46fb0a96e25b89703cc305fe76d0424fc93187da9dc25596b75c33ac9cc171ae37d599b0d914a3e22b0f0f9ea
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.C2RSignatureReader.Native.dll
Filesize115KB
MD57ee93c9293b25b94360c0bb61a0978d3
SHA12cd3c71473da6f2cff01f63ea3245e0c7794d15c
SHA2567424bdcd743c2784e4043f7c489697b6cae3c7dae17b7190967b5522dd3d9bb7
SHA5120523a771b3685604aab6088d194be5c3555011bd9a57f622f12fba1c6749f7974fc358563a54a85932dfd5be7cf342148fc972bbbabad5d8a5f421fd2e6ca367
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.VisualStudio.Setup.Common.dll
Filesize581KB
MD5b952eda0274f5fe9651312bbdbd35c36
SHA1a1ca4f102124ffed512b2fd818ef21f29a094f95
SHA256e8028eb8af8ccc9b78fc688c96e91eb45add8d9f72ce90c365a1eab1f812fe08
SHA5128192b534adc3442ab23f8c040c4b67a907125ea86ee3f9e6b65f80aa731242b53e174eb394a05599b0e50f6f435f26b93c99b363adcf16724edf83917db79e9e
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.VisualStudio.Setup.dll
Filesize1.4MB
MD527f5c28bb57287a8f0187d7eee17bda8
SHA15b04cd155ee665609cc10c7e8cb72951843d3a5e
SHA256cc3219b8b031286813871debe27e4d1ed3b2d8caac612d30c8a2cfca4806f41b
SHA512d9973d51adcf9b683a1a67844fb81c796346fbe268ad4d85b91b02dd06bb584903ca5bb9588ac64118e8893203c1bb3ddf1a6d1246032c3fd9a82b189f82ecd9
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.VisualStudio.Telemetry.dll
Filesize950KB
MD5903f254110813906331bef23e680bb9d
SHA16e4adfae4281d0b5bd0d8efd8f8eb919e974bd7d
SHA256148081b9aaaee96125f7d2f09acffb95d7ce1c50d4e7b4b3ca8f3e372e2b8425
SHA512150f5b438199faf8922390bc2cf93684de4a134e9c82f0e608954f02c47f630c8be22afe0349bd049bb1bc57dcd0951f9cf119713087940a769e076bae00c662
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
138KB
MD5f09441a1ee47fb3e6571a3a448e05baf
SHA13c5c5df5f8f8db3f0a35c5ed8d357313a54e3cde
SHA256bf3fb84664f4097f1a8a9bc71a51dcf8cf1a905d4080a4d290da1730866e856f
SHA5120199ae0633bccfeaefbb5aed20832a4379c7ad73461d41a9da3d6dc044093cc319670e67c4efbf830308cbd9a48fb40d4a6c7e472dcc42eb745c6ba813e8e7c6
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\System.Runtime.CompilerServices.Unsafe.dll
Filesize17KB
MD5c610e828b54001574d86dd2ed730e392
SHA1180a7baafbc820a838bbaca434032d9d33cceebe
SHA25637768488e8ef45729bc7d9a2677633c6450042975bb96516e186da6cb9cd0dcf
SHA512441610d2b9f841d25494d7c82222d07e1d443b0da07f0cf735c25ec82f6cce99a3f3236872aec38cc4df779e615d22469666066ccefed7fe75982eefada46396
-
Filesize
8KB
MD5782f4beae90d11351db508f38271eb26
SHA1f1e92aea9e2cd005c2fb6d4face0258d4f1d8b6c
SHA256c828a2e5b4045ce36ecf5b49d33d6404c9d6f865df9b3c9623787c2332df07d9
SHA5120a02beeca5c4e64044692b665507378e6f8b38e519a17c3ceccca1e87f85e1e2e7b3598e598fc84c962d3a5c723b28b52ee0351faaec82a846f0313f3c21e0e4
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\vs_setup_bootstrapper.config
Filesize622B
MD582136c052a8447b92a0352fdc0f7c32c
SHA1e22006844cd801941433c9267a192e7790bbb90c
SHA2566ad8507d964b093753fdfed1b7bc97baab572f07c69aa2be25fd1a40cfda4c16
SHA5128fcd425d71f6e44267bbd2297c499997b26697c26ea14b83b5bac1adc48d010361d89773f47b708d619b2d813e9bc34318005fc9823c9a218a82cc09b77201bf
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\vs_setup_bootstrapper.exe.config
Filesize3KB
MD572f9933c6e247a13353d9725cd22c2da
SHA15b76599644e7c70cd5f08e5a80cec225c891a9da
SHA2561f423b67ee6ca6a714507ab08fbd383b6d442bd98d321f0a640d533d5a516650
SHA512afc7b5959506d197246fb482b0a2ca8f1ebfb5957234e547151d1e7a40047a2974768ccdf5c321a984685d99d4f7a1b0fbfb7fe81c40387a229808e45814a6de
-
C:\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\vs_setup_bootstrapper.json
Filesize162B
MD5ad891c3b02a02419dc60db8c273a8315
SHA1141a08ca0e25d56bdb35fc71e1c767667079114a
SHA256186c4b16ee009564819730b358dbdbb0792fc27e602698c5f0a16e20104647c7
SHA51264cdaf1d6d1b4072e24f3926f91103abf946ff044cda34a9070586c2d2927bcdfc53381c955e447a38965ee426373259759025f97b715158afc429080956196f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.VisualStudio.RemoteControl.dll
Filesize46KB
MD5355c1a112bc0f859b374a4b1c811c1e7
SHA1b9a58bb26f334d517ab777b6226fef86a67eb4dd
SHA256cc52e19735d6152702672feb5911c8ba77f60fdc73df5ed0d601b37415f3a7ed
SHA512f1e858f97dabeb8e9648d1eb753d6fcd9e2bab378259c02b3e031652e87c29fbabfc48d209983f7074dfc256afd42fa1d8184805534037771a71db517fe16c8b
-
\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.VisualStudio.Setup.Download.dll
Filesize307KB
MD5484742c8c65f83e4b272692fa7badb3c
SHA1fa16f4159547404ade16f8c1abcc8f6978da9abd
SHA25678531f435198f0b0e0170f1b2d683e7785e5c1ad133b76b6b471a036d6e1d4ac
SHA5121f47ef544ac5837766befebabab6d8122e3e28aef68e877794fa8ef9ca9583be011386c1eb8fbb566cea40b32b9268f3880f3f8f3c9ff8c78b0b3015d99a775c
-
\Users\Admin\AppData\Local\Temp\619c2ed0781db9216756\vs_bootstrapper_d15\Microsoft.VisualStudio.Utilities.Internal.dll
Filesize62KB
MD52dc1dc66b267a3470add7fab88b78069
SHA1dbe80047475b503791038ed7e47389c062c15c72
SHA256b044863f98af8d28f4f2f5e2dccb945c57439e1575afb37110e1eec306a6c89c
SHA51244ef73aab50dcc13ccd94c0353c366818afb27ce73772d722755b04add0c4f294c7814c84da6069d9aa6136f2a48683c25062dcddd1664e8d32fed1b38ceca21
-
Filesize
404KB
MD5e24ef04ddb8a5474314d34cbd3ffa0c2
SHA1399b9c3336116df479793d322f8c1e884e154fff
SHA25649fc3ec8ab51c8f05591ee0ff0d9040bed994dbc3ef9a417a188c6d69a56952f
SHA5127e845f995cf5bc448f9accf4bc6a9c26a1354ec72b138348e0d474465a101cc77ff4f2801c1b58e48819053f80e7fdb0d0cf25664c2483314cb33b0d312d67e8