Analysis

  • max time kernel
    446s
  • max time network
    448s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-09-2024 17:45

General

  • Target

    https://bazaar.abuse.ch/sample/f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d/

Malware Config

Extracted

Family

gcleaner

C2

80.66.75.114

Signatures

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bazaar.abuse.ch/sample/f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d/
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5772
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff381ecc40,0x7fff381ecc4c,0x7fff381ecc58
      2⤵
        PID:4244
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1844 /prefetch:2
        2⤵
          PID:2196
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2128 /prefetch:3
          2⤵
            PID:5644
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2184 /prefetch:8
            2⤵
              PID:840
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3076 /prefetch:1
              2⤵
                PID:5728
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3116 /prefetch:1
                2⤵
                  PID:3120
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4304,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3496 /prefetch:1
                  2⤵
                    PID:3468
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4676,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4688 /prefetch:8
                    2⤵
                      PID:2340
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,10586101167318709894,18106880645081335538,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4220 /prefetch:8
                      2⤵
                      • NTFS ADS
                      PID:5500
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:2484
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:1048
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:6056
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap27951:190:7zEvent10197
                          1⤵
                          • Suspicious use of FindShellTrayWindow
                          PID:4128
                        • C:\Users\Admin\Downloads\f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.exe
                          "C:\Users\Admin\Downloads\f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.exe"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1352
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 772
                            2⤵
                            • Program crash
                            PID:1476
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 812
                            2⤵
                            • Program crash
                            PID:1616
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 772
                            2⤵
                            • Program crash
                            PID:2976
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 864
                            2⤵
                            • Program crash
                            PID:3688
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 960
                            2⤵
                            • Program crash
                            PID:4400
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 964
                            2⤵
                            • Program crash
                            PID:2304
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 1428
                            2⤵
                            • Program crash
                            PID:1908
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c taskkill /im "f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.exe" /f & erase "C:\Users\Admin\Downloads\f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.exe" & exit
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3952
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /im "f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.exe" /f
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              PID:5132
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 1496
                            2⤵
                            • Program crash
                            PID:4556
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1352 -ip 1352
                          1⤵
                            PID:6048
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1352 -ip 1352
                            1⤵
                              PID:2276
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1352 -ip 1352
                              1⤵
                                PID:5376
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1352 -ip 1352
                                1⤵
                                  PID:4404
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1352 -ip 1352
                                  1⤵
                                    PID:4408
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1352 -ip 1352
                                    1⤵
                                      PID:4288
                                    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\TestConvert.xlsx"
                                      1⤵
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:864
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1352 -ip 1352
                                      1⤵
                                        PID:1260
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1352 -ip 1352
                                        1⤵
                                          PID:980

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                          Filesize

                                          649B

                                          MD5

                                          59334cae9db1a79b0e8b5dca4d75fc75

                                          SHA1

                                          34ea6ee0244c8c039237bec9510d8ff87eed0cfe

                                          SHA256

                                          4e1c140fc59b340d97391bbb714ad80c5cf4e6a1f48a01125253114f8bd9ef50

                                          SHA512

                                          9b483b82ed0743f494d4899c1b70b7fd70c71ca52db72966f53fc133d85a3a6aeb38bcbfe4f4592acdf983740f1ee7a196c0656aec331a5aeeda4446365d88d7

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006

                                          Filesize

                                          212KB

                                          MD5

                                          08ec57068db9971e917b9046f90d0e49

                                          SHA1

                                          28b80d73a861f88735d89e301fa98f2ae502e94b

                                          SHA256

                                          7a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1

                                          SHA512

                                          b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          312B

                                          MD5

                                          25889058b9924be98e620bd61546655a

                                          SHA1

                                          f96ec227462bca10eab445eea78662db277d52e7

                                          SHA256

                                          918df0ef714cbf313f685446159dc1a7a3a216390f528d9107479bc1fb3e361c

                                          SHA512

                                          6196c60d51c2ac7ede20aa0889df1ebe7aee79c131bd81307a97e57cb2e38697b26c06f45319ae92ce11e0fd946378ce4284f62134ec5b4546f526a792e4d797

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          480B

                                          MD5

                                          e398a0a5f3e9be7f0c5beb47febd0eb5

                                          SHA1

                                          40bba6625e30cb086b23fccfa7afbdae60d117db

                                          SHA256

                                          031bdec7ba4c30b505a1a8d7868a8a0a44270c47ffb11c357531ad925221b582

                                          SHA512

                                          c311078034190b21345711e30d7fd75ee7827f66d0297a07b365ce92284739e39f60d9acb5ac5bb7edffeaa469f683561342a94708c8e790e909ca2bfd51427c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\954acbe8-5e53-4319-82e8-a8992ffab96a.tmp

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          2KB

                                          MD5

                                          796b84974ecce45ba7960e67909a7bcb

                                          SHA1

                                          88461c4f88211c9bc0065c6361db4139bce23489

                                          SHA256

                                          079c15eb4df41e7958e8c6be76c7f8cce5016db2534a0ee73744baf4c27edce6

                                          SHA512

                                          15494ccd81318f8d862e49f5d5850b4bba7ff3fa8aa5e505a852d086828ece2ba4c138fe40920e8e375527f77c03ffaa57d5005c6d0cedd45b81cc90610e078d

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          684B

                                          MD5

                                          8521cc39d0f03eae4c87269ac20f94ee

                                          SHA1

                                          e727b2d8012e0d895ca6e1652505e9db6c4984e8

                                          SHA256

                                          8a8d637a7003fb376fa56982f31562e1035247da4221334be993a5498cb307ee

                                          SHA512

                                          70169477ad0389f58f4d88d0b37eb8fe3b0dd611d55c79deacf084d4a6bd0afb1e3b0c4a2b6039932cd59c175f453afdc177e463304595acbfd03250be0b96c9

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          684B

                                          MD5

                                          7ddfd64835ef16a656ed69c24dffcf19

                                          SHA1

                                          4f93b620fce0cfef6f86a3d0ec621e79aa259722

                                          SHA256

                                          6a6d06fe5fa2ec22aed2aa069c70f20c611ec35a2672bce70b6c8383f93b3384

                                          SHA512

                                          9333e8b4efb73b0d3526a9168a8f6cf7e24904753e6759cf5ce989fb40299ce918adc042e7883ccdecf747df73740cc6c6754745465fe4e97774dc0a03fe8512

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          684B

                                          MD5

                                          ee5f47c0fa5447aa09b8f49001551452

                                          SHA1

                                          6853ea35ff195aa11a6c41fa5f47bb045190a8bc

                                          SHA256

                                          07615805aac275e1e610693e39390905f829f7f96890474aa66932ea5ecdd92a

                                          SHA512

                                          1ae68dd5f5a7c3a0ee3344c77f93e8e8b47b78f6c058de77a7e65fb02a5a7a64da4f95292c9288658b2e66ca2ba46c3507bc01fcb3ce738a6fc04994212d3b23

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          4cee772315c6c89cf87927e3c50b3f6e

                                          SHA1

                                          c675aa637360043ca7586ba39a469c54cda07632

                                          SHA256

                                          30623236562a34dc892fa40dbe35463db778dad982426d717207828853df8c61

                                          SHA512

                                          b052884b39cdd539da8a630b3fcb87defda611514558e22118061816927c86d8bf28c59b16fe17f6ebff8d421b0b448198ca17eee0e3475f9b4b92d7780f3266

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          5c1beace1fb727567a5525f940824aa0

                                          SHA1

                                          88ca6762d472fd81d3ac36b8bb0170d0fbd1a040

                                          SHA256

                                          0e6a6dfa155839e58d7e83ac41328a8a4eee402b85694fa199b3aa079042167f

                                          SHA512

                                          29db09edda8ab22677e1162983d9fb7cce8070e7b7138496eae5549ec81c3807bea6511381179fa4944de65dac0309f96e97517961332c286b433f59d0e7a0fa

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          92c259b440ac819d135c97a20db2f078

                                          SHA1

                                          28358be377431d60df7e6806557cc63f740c9318

                                          SHA256

                                          289e14eba49a1d079d7d8fd08479b8a4b341d323c9abff61a73f011235a18cee

                                          SHA512

                                          ea7722d01f0f03c19626d0e859485f012adf1fbb5c97d3a1ccf2dacf9396fa8f7b156dddcbd005eb7b377494afdda9bdf472bc6a08ff1ad46579400ea9a379ad

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          f88c9f948be049b15617f8e727d0e042

                                          SHA1

                                          be908be91d98689e3c3d9e9e2458fa8dab232040

                                          SHA256

                                          8fea09d5e3ab683f9de3d0231d41507ed1f2ec73f6180eee7734c37eb2c6677a

                                          SHA512

                                          7043808764341918ddbf28053bf756f4c9566e6fd2a86192b101b73043dd7d2925a8e0321699d419b100672f511faf215dc767b6a711f2511e85766abf918866

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          99KB

                                          MD5

                                          4c6ed23f418e4554d4e18e649abc54ef

                                          SHA1

                                          6af098fb108c05e44d50e05038d61a7bb964aea7

                                          SHA256

                                          af7acfd89d67231d0569715a9aa9406606b432fd623d702aacac3316c4b97dbc

                                          SHA512

                                          ffe0c3ce8bd941c5617e9c380588e1a1b8680583252dc74af5a7b31b03e3915075b88822e7d22aee23e086f8104afb3234dee29e99f96eefb594d99ba6430c47

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          99KB

                                          MD5

                                          6f03705189e869aa4ceee2e35fdc47f8

                                          SHA1

                                          7dfb0c8841e5e35f80306ad42228acc1dffdaae0

                                          SHA256

                                          4852c685c3e122bcfb7ab5a9b7d04655b6333cee01706f002aa9cf715bd84fb8

                                          SHA512

                                          fc60b7d426a926737b848aaa18f61e5d2da1d2a7d273f90d6f6b159341efdb96817e9291398de09185de49e1433584829b6dd3b3b07a98d2b21b9fbd11907fed

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          99KB

                                          MD5

                                          1b753172fb24e1d4bb439d66093c4207

                                          SHA1

                                          765fbb185f2b940d6315ca98d0abc96b8f6b69e5

                                          SHA256

                                          a23ebb7b21dfa23679a057ae70a2ac58f57078b2708b54fe298f94a47437ee18

                                          SHA512

                                          8a1505ebfdaaa76c6141e5aec9a70524b4bc751e928f6342a8b5be9a3adfeb14d868d212466cebf8a105288bbb64de6c5c72320e56077faf237e25494701a44f

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          d4cf606b0f7253f92b6c0afeb1166645

                                          SHA1

                                          12b50cc16e1dc2f3a374ae1a42cf71f7f9474107

                                          SHA256

                                          dff37206e6fff07adf7b24957a302da04969e4edeb841586ed7dcc2600d31ca4

                                          SHA512

                                          7b50f91db2f129d4d95c630837dcc270facbec515bc51ac9fabb57e118a1def279502dca6de5fcfb5b33b8fb1be6681f5b9affc2701e16d908e96da2857d4b88

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M3DUQV5R\download[1].htm

                                          Filesize

                                          1B

                                          MD5

                                          cfcd208495d565ef66e7dff9f98764da

                                          SHA1

                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                          SHA256

                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                          SHA512

                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                          Filesize

                                          262B

                                          MD5

                                          d687e0989c81c372a6a226f26c84e34b

                                          SHA1

                                          ff4c9c0b981e76bcc8e582e9b88005619a6a6c03

                                          SHA256

                                          2ffece23e3f8232acaf4a4f48d87bccc52b76362bef5227f35ebf50b38d751e4

                                          SHA512

                                          a98510d5e83cee7ccbbf90aa507beec7be2480dd63d9ac593b067febd007048999c9fed911626240ed046a621dd36d144ccc073cf2fef3486ef85a8a6e633c4a

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                                          Filesize

                                          1KB

                                          MD5

                                          4c274ec3ad94badf7431bf08a911f9d7

                                          SHA1

                                          f57c0ccbfdfa9bad6500213122956ebe7e7d8484

                                          SHA256

                                          e46e847fdc834585b3c71523e93c93a97afb9d3eb34988ebac2b2f191f3195eb

                                          SHA512

                                          2a304d92f2392d40a470bd03e69021d0e3c1ac254fcc2d06200a05b550d4c984eb46187f536447b94fc176306c2352e7dc8c4e6856f1051725411df25510853c

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                                          Filesize

                                          1KB

                                          MD5

                                          be8e8ed88bb40fc6c0b57d13cd81326d

                                          SHA1

                                          f3df152b2d612fc6bb724a35cd1c1bd349a21c23

                                          SHA256

                                          817bd5c38be01de61d4e1190034dc960c5bb55e699b14c419ecd17af13207544

                                          SHA512

                                          8fce3867fa0f6046c23614df3555caea6ab429b55000f649e93c8872f3390aeec553eba40dcd5a1f0b8eb974f17e0fb3d45e908053a17604b5d605cf2a4c595e

                                        • C:\Users\Admin\Downloads\f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.exe

                                          Filesize

                                          303KB

                                          MD5

                                          8fe039aa5103fcbc29712cce73c35267

                                          SHA1

                                          c12df2f751445a2aa03ee15b6c0275765ce70285

                                          SHA256

                                          f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d

                                          SHA512

                                          d06728b6f4f7dfe6a9663fb3c0c6200f6699e6ed67d89d2adebe1560791fb82500cb333ffc94294dafc73d55af8bf706967870f8291edf352989277a30f22408

                                        • C:\Users\Admin\Downloads\f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.zip

                                          Filesize

                                          188KB

                                          MD5

                                          3b3350d7a1e0cf5d038fc91f75be9529

                                          SHA1

                                          9cef789ebe95f0582e600bb2d02928c2750adc5b

                                          SHA256

                                          1b4a767f7e3d5a4854330067863d812547dbe9c856f8d6b0a8610aa38b73dc36

                                          SHA512

                                          34f118647361a20a2bce1c7e3966d1e8b63405d2fbbcb00d229f03675fd4e257d7b508b87c4945fa96cbffb9e66433623f77a0163e8c091bc53ee44ab569e97d

                                        • C:\Users\Admin\Downloads\f008899dac52a14491523f997279392bfe562bcd17aa478313e1b627e43d682d.zip:Zone.Identifier

                                          Filesize

                                          202B

                                          MD5

                                          4f2891b2d47a587208d2b43f2b9cfd5e

                                          SHA1

                                          685eb6725a3cf510259fb06aed2c999bbcb11670

                                          SHA256

                                          d5a4bd4c614e6caab803ebf80d2bcdbc55d0b56776ca2cacddb27adc2535a0cb

                                          SHA512

                                          2643c55e3eacebde462c6b06e214c5a35392bd2326f31054c2f9508e0717139686c7c53a49ee82c19817b15ed5a8877a935da81eac8bdbee93d1b35130ec9902

                                        • memory/864-292-0x00007FFF072B0000-0x00007FFF072C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/864-294-0x00007FFF04C50000-0x00007FFF04C60000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/864-289-0x00007FFF072B0000-0x00007FFF072C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/864-290-0x00007FFF072B0000-0x00007FFF072C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/864-291-0x00007FFF072B0000-0x00007FFF072C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/864-288-0x00007FFF072B0000-0x00007FFF072C0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/864-293-0x00007FFF04C50000-0x00007FFF04C60000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1352-280-0x0000000002250000-0x000000000227D000-memory.dmp

                                          Filesize

                                          180KB

                                        • memory/1352-279-0x00000000006E0000-0x00000000007E0000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1352-305-0x0000000000400000-0x0000000000547000-memory.dmp

                                          Filesize

                                          1.3MB

                                        • memory/1352-306-0x0000000002250000-0x000000000227D000-memory.dmp

                                          Filesize

                                          180KB

                                        • memory/1352-312-0x0000000000400000-0x000000000042F000-memory.dmp

                                          Filesize

                                          188KB

                                        • memory/1352-286-0x00000000006E0000-0x00000000007E0000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1352-281-0x0000000000400000-0x000000000042F000-memory.dmp

                                          Filesize

                                          188KB

                                        • memory/1352-339-0x0000000000400000-0x0000000000547000-memory.dmp

                                          Filesize

                                          1.3MB

                                        • memory/1352-340-0x0000000000400000-0x000000000042F000-memory.dmp

                                          Filesize

                                          188KB