Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/10/2024, 13:14

General

  • Target

    Lowx ULP (3).txt

  • Size

    193.2MB

  • MD5

    e10c6ea5ab170c21210bb2118994756c

  • SHA1

    6fffa814632f89ed586f4378ae136cf69b4faef4

  • SHA256

    37b5e44f7394fbc1263d053482c71406e8dcac97ede0f682750941227868a186

  • SHA512

    f310483b6404850b91eaedc6c4b55e5bb294f8713f5f16d81af129bca73b157b22675ba93023f9ac1dcba6e3b209df99156d58bc3c12c71882d36c4549da3d51

  • SSDEEP

    393216:eNvyHFXclcqMb1Z75dttWJzMe4eIencimZkJ/2SI34+JZrF:MvyHFXcrMbn7Ptt4zMe4ehnL3ZwlZ5

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.56.1:4782

Mutex

93eaae4f-2916-40db-9679-8f9946015308

Attributes
  • encryption_key

    906C0450C271523704E6192252A966F36F9EBE6F

  • install_name

    Windowupdata.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    windowupdata

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 7 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 61 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lowx ULP (3).txt"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Lowx ULP (3).txt
      2⤵
        PID:4356
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffe3133cc40,0x7ffe3133cc4c,0x7ffe3133cc58
        2⤵
          PID:3572
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:2
          2⤵
            PID:2868
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1776,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:3
            2⤵
              PID:2076
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1976,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2220 /prefetch:8
              2⤵
                PID:4512
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3124 /prefetch:1
                2⤵
                  PID:2936
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3348 /prefetch:1
                  2⤵
                    PID:2992
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:1
                    2⤵
                      PID:2044
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4524,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:8
                      2⤵
                        PID:980
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:8
                        2⤵
                          PID:3084
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:8
                          2⤵
                            PID:1600
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4612,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5028 /prefetch:8
                            2⤵
                              PID:1472
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5108,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4324 /prefetch:8
                              2⤵
                                PID:4016
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4736 /prefetch:8
                                2⤵
                                  PID:3584
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5028,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:1
                                  2⤵
                                    PID:3548
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4516,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:1
                                    2⤵
                                      PID:760
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4592,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:1
                                      2⤵
                                        PID:4280
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4860,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3412 /prefetch:1
                                        2⤵
                                          PID:3808
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3472,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:1
                                          2⤵
                                            PID:3416
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5328,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:8
                                            2⤵
                                              PID:4760
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3284,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5404 /prefetch:8
                                              2⤵
                                                PID:2404
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5292,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3456 /prefetch:8
                                                2⤵
                                                • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                • NTFS ADS
                                                PID:4948
                                              • C:\Users\Admin\Downloads\latest.ver.exe
                                                "C:\Users\Admin\Downloads\latest.ver.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                PID:996
                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                  "schtasks" /create /tn "windowupdata" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe" /rl HIGHEST /f
                                                  3⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:3932
                                                • C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe
                                                  "C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3264
                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                    "schtasks" /create /tn "windowupdata" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windowupdata.exe" /rl HIGHEST /f
                                                    4⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2376
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4948,i,17908690104942229099,7765307325520155156,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3856
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                              1⤵
                                                PID:4476
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                1⤵
                                                  PID:3004
                                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1592
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                  1⤵
                                                    PID:3576
                                                  • C:\Windows\system32\BackgroundTransferHost.exe
                                                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                                                    1⤵
                                                    • Modifies registry class
                                                    PID:1580
                                                  • C:\Windows\system32\taskmgr.exe
                                                    "C:\Windows\system32\taskmgr.exe" /0
                                                    1⤵
                                                    • Checks SCSI registry key(s)
                                                    • Checks processor information in registry
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:696
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:4072

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                      Filesize

                                                      64KB

                                                      MD5

                                                      b5ad5caaaee00cb8cf445427975ae66c

                                                      SHA1

                                                      dcde6527290a326e048f9c3a85280d3fa71e1e22

                                                      SHA256

                                                      b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                                                      SHA512

                                                      92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                                                    • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                      Filesize

                                                      4B

                                                      MD5

                                                      f49655f856acb8884cc0ace29216f511

                                                      SHA1

                                                      cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                      SHA256

                                                      7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                      SHA512

                                                      599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                    • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                      Filesize

                                                      1008B

                                                      MD5

                                                      d222b77a61527f2c177b0869e7babc24

                                                      SHA1

                                                      3f23acb984307a4aeba41ebbb70439c97ad1f268

                                                      SHA256

                                                      80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                                                      SHA512

                                                      d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\728fe350-bec9-4592-a019-664e62886dbe.tmp

                                                      Filesize

                                                      649B

                                                      MD5

                                                      93ca870bafdfcc0b268f12fae26438a1

                                                      SHA1

                                                      c3fc8c893c2ace109b6d4d779bde1fbe4901395a

                                                      SHA256

                                                      fa50990f68795d7bc9d0c38a419f82683ad7ef4101ad72db5bbbb13fe46b03ae

                                                      SHA512

                                                      348cec1cc7142e35b0b6841dc8c997d5a6d6472dcb6037373cb8bb1fd75f92a10be9f324879f0008235f6366d8fc803ec249af9d297274089139944428d190a3

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      480B

                                                      MD5

                                                      2e087d17385b6c6e2eef314a4b628ce9

                                                      SHA1

                                                      906e716b6935f8e0c2e4d161ac323378666717b7

                                                      SHA256

                                                      b7cf39b8c05d4e2148a79b078808e030b2a4c05c7723ff9d516e9c3b256a1fd3

                                                      SHA512

                                                      0d73b997fa761ff71f30681135584d8d7eedd3e2ae120b09a743bbac53733849c1da239151be88cbbba5a6c3fcdecca8813620c380ebd4e4e43b0a174014f123

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      1fb5fee34384511a9adfa8497fdcabdc

                                                      SHA1

                                                      53d7f2fc321b1c0da266a377973972a268650a08

                                                      SHA256

                                                      6c8c0ec6251feac9655b837bb97d8868b2ae7fd421d93a6a866dae2a5a59d9d2

                                                      SHA512

                                                      c24e833d07a1b6b2f1b04d3921f28a9ac5dd6892196bc7ba7c73d584b09d5f8f5bf648c6eadeefdd807e4472e7b4b5c86bae530de1426f91d9c0fb226252bf97

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                      Filesize

                                                      2B

                                                      MD5

                                                      d751713988987e9331980363e24189ce

                                                      SHA1

                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                      SHA256

                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                      SHA512

                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      356B

                                                      MD5

                                                      4291b590999cacce8bb765eefc0cf3b6

                                                      SHA1

                                                      138080c71eee4c8690389e3188e9c6b53b8db681

                                                      SHA256

                                                      702339a371286e14c1646c4d6fc9bb0655db610a2dfdd3d6f8ccd9da0d2a135b

                                                      SHA512

                                                      83fdc430979e760dcd29b0915e9d77b311320a87d3c5d6720a8babfd90c994ff56ba74831a2d07b8908ddd4554b097478bf2b894189068fd743194c6809ca775

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      690B

                                                      MD5

                                                      64f209958371338e6ef8964cf89954b4

                                                      SHA1

                                                      ce5ff7ad7ade9de0d144c0a7f7a1d0d2914d2133

                                                      SHA256

                                                      ba9347e9a04710a8f76ded52c329baf8b5417b482dbde030e59e02fcb66c5e37

                                                      SHA512

                                                      115636a256fb5a8b56be39c4bd7d591b1fca78a2b65c0cca08f8b935efded316c7dc36b2512a35aa3a29f91c6ccc1f6a3e26432753aa4b2ec9d4debce80d7f8e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      858B

                                                      MD5

                                                      3fd1b0375faa875ce616a6c6cb71ec69

                                                      SHA1

                                                      f0b62a380a826328a9a6bee75a2eab134b0446b2

                                                      SHA256

                                                      1d434f7a7229cf0dda7fd8592d03d226f9327a36df9665e33adb3131a230b3c3

                                                      SHA512

                                                      39be50678bcc46248122633d782677af04fe4e7e0c0d54e4e03db7dbd652e6fc730fec36d4ce7ad9522ec3514f1086258ee321752227ae1275fee4e3904b2a9e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      eb4d53f2c6cc5900e34eac9f4f001726

                                                      SHA1

                                                      f7ddd0bc1c7903cb57bbc89090364cfd963bbbc1

                                                      SHA256

                                                      5985325dd583a1d2c48ebd337f872e82b6491ff0e7cf234364f834826f7e79fd

                                                      SHA512

                                                      460a7ac96852f27d7242576ee2455134ad15b294610d721b46daf812d6be142dc70a488758ab0e4b1c459d25fcf3b76a724719e4293d7078ecaf7e9692ccf03d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      874184dad987efd5fc8a859179a6d7f8

                                                      SHA1

                                                      ad2e3df877b872d2b6c6fa7d26fb1640b97c0652

                                                      SHA256

                                                      9102df4d9ee92ea8d121dc06080bb64bf4c6c92c680f8a0749468aaa606a65a6

                                                      SHA512

                                                      dceb40e7956f9f75e3c3d0c914c449fca71bba94881c9b9ca42d1ad991209fd805a79a79adecade1365538c9cc28bf4385c275fe90cc448d3470c2f7bd1d0913

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      42a8a13110bc7912ba4ab56e3919d352

                                                      SHA1

                                                      b0d86598c017bcf816904c98e7e02ae4fc4a5689

                                                      SHA256

                                                      d45d09cd33c1214e22381b62b9e8abc18735c32159820ef2cca23992fefce17c

                                                      SHA512

                                                      544813972ece57e3acb4f024a650eb98d16f4f03cdc18db33df4a4ab4033af1fd31014d5af6ef8c74c286a71cf0298bb9e222300721616c06c597fd26d84b072

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      604a4a741fbd6557420af9ce75de2bab

                                                      SHA1

                                                      d2f7c167d814f53d3c73315845e3f1e47f600d08

                                                      SHA256

                                                      7f4ad9615f67abdc76c2588f376faa11ac1be4ce5429fd4cc752fcb0865df637

                                                      SHA512

                                                      ee0c012e81d9a0d39b4575672dbb463ba547da7718e2ecfaacb9057df12db5d092fa274e25b000bccc95f02a91b59085b14b62e3a5b0a468616fa79837db970a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      a5098d5957bd7f7f3b8ef75312c5adcd

                                                      SHA1

                                                      f4b956e78e427c74dd1336186d30b6eebb378aa7

                                                      SHA256

                                                      82d38bba1e8d8b222b1881314bf9eac6f04485e162beb3a53b914030f5313207

                                                      SHA512

                                                      6a3df240d9ea9f7649694fe2e999dc670d2b8d7fbfc0cda87a1819f6be3093b6df49e69f5173d7d59441f081427c281ab2ff2c69f81f66971361b3f878c9fefb

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      74fd3c6ba62f804650eee4210a8f3332

                                                      SHA1

                                                      13b1e069c1afbc50d6474012bf79bec2671b2219

                                                      SHA256

                                                      02ab47f96c0852c31fcab1892afa07fb3fe0fb50d06ee8c1105b9cb03eff0649

                                                      SHA512

                                                      36eeba2ac4c9c73820c4498733646584c215ebb76851c0984db8a9f3c7cb3390b3d7b98e4cc8900462cb4f29b1727910bf36825ead521a55a0300227e0797919

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      3b22cc97a6195c2f877ff7fad093dc8d

                                                      SHA1

                                                      dfe813173465e126b624428a3648e28c1e90a414

                                                      SHA256

                                                      6eff4b1b144ed5c676c1cfbc0f3af613bffa5393b4dd86e128fffedb4450529f

                                                      SHA512

                                                      1d46d8b75a165e494586530558428460352e4bcaeb2e1ccdac11c661e921a7c2752fd6236306c5f9da1aab6aa5dfdbdd452a3cbc3f3e250b0b85ffee172b6c20

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      eff55c638c737405d05e19ba53d934cb

                                                      SHA1

                                                      0bf71e535c1a8f95af7699d1390935a42818ebc5

                                                      SHA256

                                                      747a7517d5ce2cd525235ac8dbc09b5d9d9d792156ae0494a810d4f2414e62c9

                                                      SHA512

                                                      8fd12ebf3cfe253b8fba51a05b92fa0a4790abff6f9def4e6e92cc4162a4dc5952772e60b963bf4055ee579b942ef600906f1f3318cd678ec8b4b6c12888f55d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      bb357181a5cab3b9edee62e6ac918c78

                                                      SHA1

                                                      80ea5e7a5c14639223eda324e1acc867947848dc

                                                      SHA256

                                                      a3cd628bba9845e74fa6bcce1a7795e893d267a137822242b68bcab75261bf67

                                                      SHA512

                                                      04b3a4ef3f286fc0c5baa7b6315c78a358a5a62e5c516690de8fe8ee3c19d62e0bb8380be70fb18ba912611811c12491aca8deb1702ba4353a7b16904fe316ed

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      0aa3cea9ed94af794ae20d94fc2638f1

                                                      SHA1

                                                      38f15116201e44013309f0e331d281a4048fae34

                                                      SHA256

                                                      1572fa01f56614bc003b9d8b66d2585b48e59dad6439c09877e88070c223be0b

                                                      SHA512

                                                      30edd4da19eaa482663f1f1b7d6a7c8a2400012783259f027dd19113f9de53a63dc9725eab8312f4accc4d3179f263d0a20f82ca8e3658fa339af0f3d2067ad6

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      b924cd6c0ae589e74644c509d69da6bb

                                                      SHA1

                                                      97495065cd79f18f23c827f3999554d90585374c

                                                      SHA256

                                                      1e609a4a2e34ec218cff6a141c98623f694210d9f0441afe6d2987f659c648b1

                                                      SHA512

                                                      d9699b847a935be93596af5278e9de01013e5aebdcc7c46a958ccba41a03cca4ff8f8a767d056ceaa1309b674b16f006fdb7481dcbaea9ee1afa6a80ca5d61e8

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      231KB

                                                      MD5

                                                      f71713eb5b747d8f429c03fb75e31b53

                                                      SHA1

                                                      f463d1a776d4a8c046a96657bf498ccf4407e47c

                                                      SHA256

                                                      f9a1f3a6238fe269b0cd3e9c2a944cc254ff45ce0f9a8674a2e253be5b26fc8f

                                                      SHA512

                                                      01a2b445258e1e4626540059add537f4ade20bbb07195b2672342623f43eaaaba1e8d8e208c843005d9465555650cd957667d025a1e8d9fbd7843440211f9af5

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      231KB

                                                      MD5

                                                      1d6fcbbd6f52d309f1a6ec53972e155a

                                                      SHA1

                                                      b627cb066ec2a0853fe37fd8e5368e9b38d9d674

                                                      SHA256

                                                      00521ae0a6a3445b362c458221000b5738f1e323895ee26afecf8d334b6efaeb

                                                      SHA512

                                                      c6530a9966290227bf940bfc167d7a3921d77e78bae22eccbfe8d59574e091e62f95168fd4565c6873c0ad3fdc09c6e8d9682dceae0307383be5eba2a063137a

                                                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\b43be17e-76b0-4ac7-a3ba-30e7d438c30f.down_data

                                                      Filesize

                                                      555KB

                                                      MD5

                                                      5683c0028832cae4ef93ca39c8ac5029

                                                      SHA1

                                                      248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                                      SHA256

                                                      855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                                      SHA512

                                                      aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      327975ba2c226434c0009085b3702a06

                                                      SHA1

                                                      b7b8b25656b3caefad9c5a657f101f06e2024bbd

                                                      SHA256

                                                      6fa9064f304b70d6dcebee643ca017c2417ff325106917058f6e11341678583c

                                                      SHA512

                                                      150a57c143fc5ff2462f496f5a9451310b8d99e32c4d570641204c8062a78590f14bed438ac981e8b0609a0c87b859a1f8502a78687bc36c3a9529d633a58e51

                                                    • C:\Users\Admin\Downloads\latest.ver.exe

                                                      Filesize

                                                      3.1MB

                                                      MD5

                                                      caa15ef5ae634f3cd954ea48e3de19cc

                                                      SHA1

                                                      89f07d4e05af483ad3853656090c1d6266a07bb5

                                                      SHA256

                                                      a06081a7f02734ff073c7746db76d57031cab7b6ad9c591256d3e6c98fd51373

                                                      SHA512

                                                      cf418a9d1ead95fa71540fc0b1b1a6524149441be439878490fc810237e6e31eaa5abce2b26ad53952dcad1f6adf3f1e0a0b2ee2db978615fd5a7a8c3ad70320

                                                    • C:\Users\Admin\Downloads\latest.ver.exe:Zone.Identifier

                                                      Filesize

                                                      26B

                                                      MD5

                                                      fbccf14d504b7b2dbcb5a5bda75bd93b

                                                      SHA1

                                                      d59fc84cdd5217c6cf74785703655f78da6b582b

                                                      SHA256

                                                      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                      SHA512

                                                      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                    • memory/696-296-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-304-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-298-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-308-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-307-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-306-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-305-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-297-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-303-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/696-302-0x000001AD82CF0000-0x000001AD82CF1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/996-219-0x0000000000110000-0x0000000000434000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/3264-265-0x000000001CAC0000-0x000000001CFE8000-memory.dmp

                                                      Filesize

                                                      5.2MB

                                                    • memory/3264-245-0x000000001C2D0000-0x000000001C382000-memory.dmp

                                                      Filesize

                                                      712KB

                                                    • memory/3264-244-0x000000001C1C0000-0x000000001C210000-memory.dmp

                                                      Filesize

                                                      320KB