Analysis
-
max time kernel
400s -
max time network
402s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 16:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/nbs32k/Petya2
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/nbs32k/Petya2
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x000500000001daf7-738.dat mimikatz -
Executes dropped EXE 1 IoCs
Processes:
7DDC.tmppid Process 2452 7DDC.tmp -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid Process 2648 rundll32.exe 3216 rundll32.exe -
Drops file in System32 directory 11 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe -
Drops file in Windows directory 8 IoCs
Processes:
description ioc Process File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\7DDC.tmp rundll32.exe File created C:\Windows\infpub.dat [email protected] File opened for modification C:\Windows\infpub.dat rundll32.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File created C:\Windows\infpub.dat [email protected] File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exeschtasks.execmd.exeschtasks.exe[email protected]rundll32.exe[email protected]rundll32.execmd.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEWINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
chrome.exeEXCEL.EXEWINWORD.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133752099157741372" chrome.exe -
Modifies registry class 3 IoCs
Processes:
chrome.exemspaint.exemspaint.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings mspaint.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 316 schtasks.exe 1460 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 5 IoCs
Processes:
vlc.exeEXCEL.EXEWINWORD.EXEvlc.exepid Process 3928 vlc.exe 3124 EXCEL.EXE 4040 WINWORD.EXE 4040 WINWORD.EXE 744 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exerundll32.exe7DDC.tmprundll32.exetaskmgr.exepid Process 4752 chrome.exe 4752 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 1328 chrome.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2648 rundll32.exe 2452 7DDC.tmp 2452 7DDC.tmp 2452 7DDC.tmp 2452 7DDC.tmp 2452 7DDC.tmp 2452 7DDC.tmp 2452 7DDC.tmp 3216 rundll32.exe 3216 rundll32.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
taskmgr.exevlc.exevlc.exepid Process 4492 taskmgr.exe 3928 vlc.exe 744 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exepid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe 4492 taskmgr.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
Processes:
vlc.exemspaint.exeOpenWith.exeEXCEL.EXEmspaint.exeWINWORD.EXEmspaint.exeOpenWith.exevlc.exepid Process 3928 vlc.exe 1832 mspaint.exe 744 OpenWith.exe 3124 EXCEL.EXE 3124 EXCEL.EXE 3124 EXCEL.EXE 3124 EXCEL.EXE 3124 EXCEL.EXE 3124 EXCEL.EXE 3124 EXCEL.EXE 3124 EXCEL.EXE 3124 EXCEL.EXE 1236 mspaint.exe 1236 mspaint.exe 1236 mspaint.exe 1236 mspaint.exe 4040 WINWORD.EXE 4040 WINWORD.EXE 4040 WINWORD.EXE 4040 WINWORD.EXE 4040 WINWORD.EXE 4040 WINWORD.EXE 4040 WINWORD.EXE 1900 mspaint.exe 4824 OpenWith.exe 744 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 4752 wrote to memory of 4468 4752 chrome.exe 84 PID 4752 wrote to memory of 4468 4752 chrome.exe 84 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 2920 4752 chrome.exe 85 PID 4752 wrote to memory of 4768 4752 chrome.exe 86 PID 4752 wrote to memory of 4768 4752 chrome.exe 86 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 PID 4752 wrote to memory of 2840 4752 chrome.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/nbs32k/Petya21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffccb00cc40,0x7ffccb00cc4c,0x7ffccb00cc582⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2232 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4616,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3688 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4920,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5148,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5308,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5440,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5484,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5108,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4792,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1444,i,13338577561615528439,1175701863103323347,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1552
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3460
-
C:\Users\Admin\Desktop\[email protected]"C:\Users\Admin\Desktop\[email protected]"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1148757064 && exit"3⤵
- System Location Discovery: System Language Discovery
PID:4236 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1148757064 && exit"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 16:26:003⤵
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 16:26:004⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1460
-
-
-
C:\Windows\7DDC.tmp"C:\Windows\7DDC.tmp" \\.\pipe\{B34FD8ED-21E0-4717-8D31-9532F88C2682}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
-
C:\Users\Admin\Desktop\[email protected]"C:\Users\Admin\Desktop\[email protected]"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\CompareMerge.otf1⤵PID:1148
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:4492
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\EditConvertTo.mid"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3928
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\CopyEnter.jpeg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:3628
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:744
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\WaitEnable.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3124
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ExitRemove.ico"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1652
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\OutClose.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4040
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\My Wallpaper.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1900
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4824
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\EnableRestart.avi"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD58a30a9b50fedce017b52120d4343b95a
SHA18de5de177d1008f9667108f6b5802a2a52b88a88
SHA2564550fdafe58e9e306e641eefdb4bfd0a0f560bad671dfe5730a4ef029b3ffb3d
SHA5127edf4b47f415103805bf251adb8e135398ca632eced27d87ee5d40f8854edc7bdf06e84173ed537791dd0a56554d6e692e500274f991bec08d408f9dc73cbab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD572c06dfce1c4a0f7bc2a1cc971ec6b5f
SHA1215ddb156700727a5d24d594b58faae698230109
SHA256ab2a7e89c66f2739f545b1c72434511918cb0ada2b48afe8a4ca620a3e3bb055
SHA512c85a8bcb0b9be1cb3dc3a520bf35ab24def7d92be62e08336288c1a78ef54526629d89b089cfab56a08005ab12964f3c9145490e564bfa10980298a112d61a6f
-
Filesize
649B
MD5adf91720546ee484a2f1038ae990f465
SHA1a358312a1a03892c8b69170451325c9785708c13
SHA256e8dfab66ac25554b8e01c3916629697d3a58d9b33efb7e10c7a15243ae9f7890
SHA512ca8693d9bf753855cb3ec3727427246eeeeab9c366d0a15f1cfd9ef549e4426d47230f0421396fe2f591bf7878402189b5f85b2ad575a0773f4c12330d798746
-
Filesize
18KB
MD52e23d6e099f830cf0b14356b3c3443ce
SHA1027db4ff48118566db039d6b5f574a8ac73002bc
SHA2567238196a5bf79e1b83cacb9ed4a82bf40b32cd789c30ef790e4eac0bbf438885
SHA512165b1de091bfe0dd9deff0f8a3968268113d95edc9fd7a8081b525e0910f4442cfb3b4f5ac58ecfa41991d9dcabe5aa8b69f7f1c77e202cd17dd774931662717
-
Filesize
2KB
MD5281056c2796bfd35b3d2ca953068089f
SHA1e54c04f5cc84a97573b2f644ead30dafe7d68ce7
SHA256db5f0cce18518fa9fa9675c563677d13bca18e2fd87d2a1e64c8459fb9608cd2
SHA512ec921d25a8a0ef0dea84cb8ad156cb4656eabd1b6fbde339cc80dc1c26ba84a7c8a41ae2fd02a58bfcc9678d8c7c31e21727161e3ec6394a0a566dd3a0857138
-
Filesize
2KB
MD5cf964ce24fad588f9bd1653bfd1b6041
SHA114bb66b04a62a47e68e16fe248c0b5a0a9cbfa19
SHA2561487396aad4a3a1ad416303c413d96716954fa14bf3ed9ac9075a0822479fd7e
SHA512105b45d10fa601393a362341409979fe6a69903168c26ef6f1b40fa2b167e0ca542acaee44bdd5f8aa17c9bafe866fe33e00979d1ea6cd671d590060e95f626b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\161792cb-1e65-4efe-b6cb-0e8cb478bd9f.tmp
Filesize1KB
MD5624a244894d8e27f7ad95e308160169f
SHA16be905c1909fa1b51114db0525a0ce91f4d2e26a
SHA256941eca2775c30b0d2e40626b97eeee408898447a543a2c90aedabc684da27f4f
SHA51202ee712cf79987c5680c30f585e615e324b83f082d3ee6448486166793c3aac0fe2f329d6bd3fc1fcd77fb905cea566f09e9c88e8f6693929add84f289ce6b3c
-
Filesize
2KB
MD5663f8523fbee57d0a699fce710797d85
SHA1825e9574bf1c6c7ee913a64e7d3f5c4ed3c1d863
SHA2566fee64f6588be24135caba48982c44bf7c358f9c0b487e054e9e34e42fb26189
SHA5121062bd51eb9bc22b8312b2ea4578ef4f753129ef8e1fd72a0dce3682fc5f6d14dcb4facda588d40fb023b2b8c213316d4c05bb8eacae748c5eb509943146f5e3
-
Filesize
2KB
MD57e5a3a146faf569044d69008e8575dd5
SHA1c6d73345c40a5bb1dc8036df026da7e47647fb3e
SHA256dd8c84c39b24567faf6a9f04918d17f946446f3e6ab95751d3e5903adfbe9084
SHA5124568266f416f045710d8b191060dce24cb0c801aae4c1d6e587216db83f0f7994956f8ca973e7873a5cf5e78746bc25c7906613fbbee535dba0fea099d9bd59d
-
Filesize
5KB
MD5038ce63b90ae296ec5360c87817dc356
SHA1d1d8c92aaba7eeb651e89d0df8ef9fc0a7b4714d
SHA256a0ed62a225d970796af9a24c5214e2b2920e03223879827214a8a7d794f1c2dd
SHA512b962a3baa5774fd89f82ca5bfcea94b450ff1fdbed2f5b7a1fab0ca18ef247bf575ee31ab8779576fedb196cf0845dbbbfcbd0e34fbcd9845cdc8a5820a8c266
-
Filesize
5KB
MD54d93b4e728384572fd9af36df9e2ed8d
SHA1b9ff2a92903f2daabf5825d63bb589a7069b0116
SHA256f8e70ffe14c8701abc41b4e65cad23e140a6dc783ba601ddd8a850a0e89cdf43
SHA512e4178224b5c0a37cf64382d98b624f87ad2e8cc0b4d222c22ce243abc3c4980ebead6907c45bb6fdca8d07a420ab948c4b3ae03aef353552faef5727138c42fc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5471175716209da381fcf32b9c85500b4
SHA1c5d9f99fa18fc71770c7e84471411baa3a3467f9
SHA256c84293a19401c3986a375d5c69d202896c675df479e2c45ff54a63ba6d0c012a
SHA512d54fda9ad3df7ba5a701e2cf91633519b22abf10147e2df6896832aa553ba0273e16684244ac6286ee021590fe5a8612afcbdbce613763d6fad607fa54d84baa
-
Filesize
1KB
MD5497b827a66052e5f8561f1b89eedc746
SHA1f8915bf8c183758cf3e2d0a48fb8b68722e8683a
SHA2563249dae6c506d2565d8717075212754bcb20d27da2f3edec9ea3dc00efdd5939
SHA5128c1c4b96baf0dc41dde9935caa91e74adafe61b5c6a38c4d83cce5869b56dde0f60012959fc69ba32227f55e06950349fcdc910164f5bbe5bfd0f2bc63d4dcc0
-
Filesize
1KB
MD5e3020914ec434526479acb7d7d9e7322
SHA1f36946ef7d5cb9fe5dafe00e896205c9679c3955
SHA25653ef76595ecb3d546dd6f6eeef48e12827e1597d7a06e82011b180afd0897f02
SHA512e17f9a9be3ef2d5d25429c84ab1206e526dda26320a6d2a19e4b824edd041c4ac480eb079d29260b3d2e5c601c04796f67868688d1bfc33da1a71e36c82d7d17
-
Filesize
1KB
MD515489d51451c9a528be6b2600de44327
SHA1ef068435edb99d757419097ae5f69ddad6cc64a4
SHA256841b2e6649f9991b1f18c49c177283f7ce4a02f16d1f546fb4e13dcfede3cb43
SHA51252609584a3139d65ff60674441dfbe7c19ba0915dc7db8ee7f83f2ee0e51d36ec05fc74e8ce5ea24479cfbef7e4c43b9c2cfb3c55bcf292730ad77b8d4911833
-
Filesize
1KB
MD50c26c0655fc08791b88c3857cea71d9b
SHA1d30265ed790cf50124e77d375c54ad4587127cfa
SHA2567b4ce50a3310424a1b501da1561788b6350f6f1957a7db2c71e31b74d5284124
SHA512ebaf374b2acb1d20d7a1859c9ed0e0665c614b6b60fa9a51cad5d21a24d93c850d3090ce98dad7873637d9c26bdef0effbce79652147db2f0123360accd2306c
-
Filesize
1KB
MD5eb358b610aafe70b99e103b52c2ea3d1
SHA1ff6929476ae439cff4955b91185ea60fc2f809bb
SHA2568db67824df8274b67fa9fa0a6dc9f8ff83c5b0d2ff8ea04f7124385f7d40f6f0
SHA512a5e68edc0c69c0872b41d5e99669e5f1464176f9d8d900beb4bab14f6e5a526bde63b7cce5d894eedb58b4c95e21557724faa0a4338ff7a63851a0b4cd96f988
-
Filesize
1KB
MD5fd797f52ff3fd197fad3639b96a84d31
SHA1d1aad1989f3dc91ec25c3cbd2911db23e432e56c
SHA2568806e50996e6a5c3bbd0466b37e2d5073aaf0a8be68bab44edc1adfee62fb834
SHA5128b3b3c6ec7420bab569f481ee9f52da774cf63eb3f87b3ebd7ad20d3d129ad14ba567860832d589eb821b4bfc0b451068594adf093a4554705e7eb9997847fe7
-
Filesize
1KB
MD5bca41f4466b6e89284c096c6bd02ec75
SHA101eea9bd7faebcfe96810593ecc91733f983a871
SHA2565881bbe10bdb11764d705dc524fde990d481c3bd42ae21323edc907e949e49e7
SHA5129c71761c9a9703fd641f63541ec21ab335dd1ba7a0128c432ca17c11d8c703a60c21ade3e83c79e0a367102e0923fb3dc68bc200bd890bf5c99f0dbad8ea12e9
-
Filesize
1KB
MD58b83ca74cbfca6ba383e2714c04406ca
SHA141bf64a44d5ae3fd3c4c3ef891c467b87a958567
SHA256130f8837720ba09ebcfd47be30ce359cbe0fa363f9ebc7d6c4c2f54fa1846361
SHA5125817f1c825185573640c9aaf7725b7324b236dc21c07f6dddfa5710aa61260f0d0ebfbad99a33f1c6e480070cc90c64789bf65f6a04f0001b05481d568325692
-
Filesize
10KB
MD562adb52672d8339799d8f3bb30599d6a
SHA11ff41a6700121c6b37a53b47d252238a711793a7
SHA2566e00438c91ac71e940d6c1aa1062d4abb3ba88a09c26fc000f69b8ce616d1eb0
SHA5123e78a5ed6280a83b04dd9823da15bff779b0b079f59885b5e75622d89e79d67baffe143aeddb1555e86014e08bb628711a339c301832999027f61fe7d6fe8ede
-
Filesize
10KB
MD50a7ec87b7d302e0217ad4a7bf11f9f94
SHA12e77d23b6ff014f65e857a03b7f6d956898107d5
SHA25695438b287f2771326f51250b70c8896bdd44cdc1a25a7a1ef939fb1042615cac
SHA512e2deb0d76b54d78d0443e571d818c69ac5eee4c59d1037238283dcd468d5808e7e793c8250e79029036cb52102bd5b2ad2e4c1a212ef9606666944b076b0205f
-
Filesize
10KB
MD58a7720ba0ec618cacb08b13c7b265566
SHA1cb362faaaf7fe8fac8ed0a15b7561b4e542d26f1
SHA256abeb0b411b2a928cbeb1ef8d455dab6b720b2a816ae225008c58017d9f531d63
SHA51204bfd5e19ada9a87327137c6644dfd2ac9b52fc9a610a5ac70f813e53e56fcc623c088ba5dbf28a574d4957c3083f77567a1f218ba7a6681395382267701925b
-
Filesize
10KB
MD59c29b87b34d65d9b288b7ce42490071c
SHA1007432d21e3b8a7ef2292b4b85524d2791c321f2
SHA25659a492bdb1e7c4d4b94614c02d20c0764a9c5159e7bfeb004b9782c870e67f3b
SHA512309f06bd6b028c5a5847aff924119efd3813b25daa955115e4f1dc903d75bb3b214c89522879d6b76df5b05b8c2b14cab65ac28985999e0f575b104afa4d7eba
-
Filesize
10KB
MD5f53fe81276ea52a081ec3e3a89ce6562
SHA1b9923e65e43ab522bfbc2394028afdb4ac772ecc
SHA2562847d2f420f34c9cf99662fdf35f28d8958a9a6d25fdff0245670d8c31026581
SHA512c5d5c86c39593316b2332eb00c6b020f173f242ff453ae4bdd6598a12b975beb72339e3efc6fc726aa916ebb4db3aafde032567bcd371cdff86af066c1c1b883
-
Filesize
9KB
MD5657a9b92597640258c1a93dacd643a4b
SHA13c7c26aa8b524612dafa0edc5d2ab690f490169b
SHA2564af5f0b592ac3d20a101fb6447506b0811ea28ad53aa70bc16b26e49533b9caa
SHA5127d4e2f0455d92362b121343e01fb4903dbd0b6b6d7ae01bed4bbdefd5457b2703009d09cab9bf7fddd7c9b0f27a887981b13e693dd89da61042e9bea98469324
-
Filesize
10KB
MD5e941d5d95f062792e4691e58e207f98e
SHA16f832db746cf62de0f67d72c5003071ac588c823
SHA2569dea2ca1d98a5da3c5ca8808b668311f170e4580a970144800a1d7ce6c19808f
SHA51230c5a95adc5884c7e8c5aa5022fd91b4663940927823dde29607505078cd9fa1e67082a2846be33d966e9b9207d86427ec2e8893ed6574dd69cc1795094f53f2
-
Filesize
10KB
MD59198de39dc3e09eeaccbb433b81b540e
SHA157c9d79eeb6761e6324aa3a9f7463935fa5be0b5
SHA256efc62d36ad927314e1cbe1dee7abe425811d72a4697413899f8cc3ac3296e827
SHA51227fb4afdf2d10d91a7f5a922299dd20b6f9f184f07a46e1f9f8eb06495872c2c71045d9839721debd0a880e2be7d541661c7fb93349f1780f722a5a63b7729a8
-
Filesize
10KB
MD57da1620f60e2fc6cdc97e74a92675855
SHA19bf1c4a0b10e622d1665b456f99303bd707ebc70
SHA25659d1fb9c3717ad7d149089c43c1d5bcc8234be928978e44f2aa45387ced71706
SHA51262defd734badc8ff7fa7f4be2a04d389e3946564c5883f973430255a61e034a545e5f9af4c5eb5ef820ceeb6538f3f2224a11af27de9b0b1207860af898949b2
-
Filesize
10KB
MD573b34667a4961a39391b91bd25e8b46b
SHA11c93bcd3dfbbb6fdb28738280907a2bd09cd84ab
SHA2566851785cd8fb88e4379675fce6676fd3c7a3f7161c60a7523c281f44acfe7072
SHA512eef2a1a7ebe7c1afaaa5ee04b496ec34cdd9aa6f5040484213f5697113f20e401b0f06f7a10666ad7d84e33ddafa1c549ddbe47c7fd6cb97aa4764ede245c9d3
-
Filesize
10KB
MD564d4093a595c443e8931a11e042e2c68
SHA1eff8af7e6e8efd8a09e50d397ce96b1a44722d1f
SHA256c876d2a6b7637cfc4f64c425e8379667a467ef8412bb9805d82a967fc7260e02
SHA5120729df55cbc46478bbfd8071c2f57dcdff825369a9f91977e9c21990a45789b3a858e3d586703215433a194f1a4e6dbd2237b419673c6a88fa77ef17652b7d1f
-
Filesize
10KB
MD59e7e4833dbb4334e66a640501d7e238d
SHA1d698d79c8483390e89dc0287c0286cdef3c47664
SHA2560c44657f62f84806f820807ce7ebe5766527559ceeac8818c7b37e6c98c4a861
SHA512262789130657d71dc6b820374fd99867ada938d2a49e8f0dd56d56bec8e3c15330b7398f3ad1a31fb24f7037d6fcae6aa2fc04f0fdc9d98021a7ad51bfc66400
-
Filesize
10KB
MD5572fdec828a25804305c70a6dcf895c9
SHA1c9a7683c1453f63cd8d895d3509a4d9ac6e0ea57
SHA256b67c17b3f04f78154c2e36d2fc7dcf3b06dd3697f694c7812a9575045cd37521
SHA512cec27da9a3a14d930c00f18c35dec44e6a684daf972e540f8881bb5237f264d2f0bc6e1c1529bb12753d8c2d1263a5e27b04200304aec00fd560784e13554a8a
-
Filesize
10KB
MD5afaaeea0e84b039d9b7e41775c675264
SHA17fcddb2817e3340f724587ea62360bd47bd54094
SHA256974b75b3ab311b4257b73a14c3e629454b24b2588d2290e4fec068aa55880801
SHA51238929ce69270f9649bff28fdfd4e31d7bcf425d77f95e35d2c4916f13ac7f684500e8266383f8f31b373d24cb5463df7495e9bcf185683297fbe90969553f76c
-
Filesize
10KB
MD5f708499e9cd655c74994a1c8c062a8f2
SHA1fcbb28e88b97680d663bc4fb70a8aac8e2365e57
SHA256b6d78bdf3f22e0e2fb05d3bde555ad8fd71c4714c578955abc94c1a2a717393a
SHA51221cf3dc333f10a8fdb9310cba4d24a8b0769ac065072ee9380620b9a1d8e323be1405ba62c50e419118e1df27152e8d43dc7c71342bdd19d1d02f5acf3ad55cb
-
Filesize
10KB
MD5ada25e4982cf77124b6cd9adab3ec1ed
SHA181edd9e1f97779da67e295a69331b60c98c9153f
SHA256bb89525e0cbbe939d83f1e9c4613b3602039d9d6606097c0cd1582a6e2160c09
SHA5127c75eafc5c6532a28ec5fe4a04f1fad03846f02b73ba18a4154dcb720c79c173460d034d8b693a9b67dcf9f7fb8b92543c50c852a76c6b203eec79c48fd7653a
-
Filesize
10KB
MD57f41db718f5f8e8a2bf05346dae57af2
SHA152b0b4aba79ecfbc0da4c83332d02d00614335d8
SHA2560cd96d4db222071bd6b2b1b46c0f0ac8d7cac798612264d8643a307c0527c2d0
SHA5121158004512879d01423ac142ffe83e9d2988a50df115b580f32fa35ad67a89af7b98acee5ce1cc56437629d1f7158caed82570f2773950aa23c3e0a7965a6607
-
Filesize
10KB
MD523dcb49d3ba9a750c520d5eb258ad63b
SHA11a249d64d2a83a349a02bf534e621d730017d432
SHA2567ea9b3b51803a85084904472e81ce3a1e14e6bdec67f1faea3cfdbfb59e070f6
SHA512cce468d7d17bfd3d5877d0c6152630fb24ef9acf3b94029887765f84d629215ff621159ff53cc8e833cde64a37cd2e15f8ea9b9e95d5cc4600790582a92ac9d1
-
Filesize
10KB
MD5891e5242ca9e0b1db9a6f997f9f4427f
SHA1fd6dd902541438b7398f1d4f2278dd7dda02ab57
SHA2566955074026acfcbfe38c56a9c2ccdc0657160c044889ee92793452bd609b9a3d
SHA5123afae064078b83a4b6d580480de6fdc08d6aef487dbefdeb470c987549cb370a5e8393882c77320e0ca5b49be7a690a1001615e91df224fe0c4e47fd7c1b2aa6
-
Filesize
10KB
MD56bf3c86898c1c6e9673b085b757b5384
SHA156dce2d436fe44983fd98574761216b0f8d912be
SHA256b87b0e820f6edcf16bf87cc6f42ae55375ca00ac01513da84ff5dd2f89740263
SHA512d1d57f649d436f4f2b7f4c6046c83783c890caf647fca161619e1e2ad50f916d735ae8edbce249c72498843f64d3eb430cb3ad9dae170f1d57b19e4596704a88
-
Filesize
10KB
MD53d2ea44e69b38054e16d5e24bd639f7d
SHA1e26999a269fec625e7e3d5138041e36ca90e94c9
SHA256364be7b8a23cb422997287b7028f2d059752b0acb9d9fd1d34ada7e6224c99b8
SHA512196a04f28515c2c25dbcf4f35236e3a3bcf6b1b242d821e058a4cfd0c1772dfab68e1840a0fed385b3148075f16c68ada5d1f8eb2b10c6aa673c58cb0e3cc521
-
Filesize
10KB
MD57a3651c0d628658a5f08ea0d2ff156a4
SHA1bd241b0ae740053c9acd820798a117a9f055c810
SHA256dc0a26b3b9271c347b4c5bae41c55cb3056cf83a7eabc6def843a69c695d318d
SHA512e26e4a3dc7e1514a891e4809940d1d23dbb0fd59e5ec64d4e01693d4c13cd0da3e3882cb825d92cb63ca80769e346ef4b85ec934e89c372e8422fb5bdaa44085
-
Filesize
10KB
MD59bdfb24a6c00370d502ebd57c0cd9e75
SHA1f501b299d48e1183ec7d2593191ffb8e578935c5
SHA256514ef25ffc1d31629d539d797dd27afe8eae848c1333409f3d7f849aca96839b
SHA512bcb31d34574f22cde9ac4de680c67adebf54e3cde3bbb8b0b278b0c716f9ff60859369400e168608b210773d4bfd1d3406b9e25b41a4015e44b5312f04fb003f
-
Filesize
10KB
MD5d3088c3561802f51e8ea9c8931222614
SHA165df09eed72e3d740d65b6ba4a8d74048a2981f8
SHA256ad1dae0037b57fef3f3cdcc71714dac9c5d52994f7ed8574626e83ccedb122ee
SHA512b1d0ffca361f796cf754df926692dadc5f1ff1ebdc328d1261bea2ce6f6d475dee269f8fba9ce7e266e4c7c0f3543681a3ecdc3484706f8993ea7d5721c300c2
-
Filesize
10KB
MD50226f4e5a900e438f76d00c0170b0460
SHA1097947fa0df9d11d637dac832d59da3252fe33ed
SHA256b4151c63aacce0e66aecfa02bf78880dac2dfc47adc7e8cf10c3beaf8a8a2851
SHA51247e426aba2f60e150e9737967cfda9611e2251f0abe4f588c2bc20eee44822a4447cbfeccc2839314f95e1dee701373045d34944f4366ae2b233885d4b63875a
-
Filesize
10KB
MD57682ab6cce22844d251cc1b89af03e33
SHA1bd09fec7aad031a25fe6b5bdf552892afa7483ee
SHA2560c46fb0f9bd9c26b650ec13c49afffe320a09e26e3076e0c9a0307e2fc7ac5d3
SHA51218ea026f1db744fe39050878e16b9002ff28c8eb2086ba42fcf29bcb0bc81de2ca754c81e00b8081175d5ced4c4a2c401694308cd30a23da59b3f64beba3dd6f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\c6eb62ae-f184-4da8-a3d2-3f68e8adf7dc.tmp
Filesize10KB
MD5f43c9e9cbdc7b7ff2890c566c81888cf
SHA14ea7f4bf2af93a8618990534163df66857dc02f8
SHA256643063a8d01ec81102501eb2609bc4fa3211430fbb7a8e77585e32927a8e92ab
SHA5121b008ba14ee5abe5bbf97683d10c20bc01d790f93ff8a007e358d82de128c05b0e77a062f99f1cf01c4687224a54aa21b9d173f5b7bdca2bcf69fa16da040d67
-
Filesize
116KB
MD50c672ad1deb3535f5f549553191dc9ca
SHA1d61b13cfc82dc11d37b92a89fff8a5fc8a0f3a12
SHA256f99f14f44cab77de859ad2fa2a86dd066b98cb996eefb1e1f82a94e500cb67c8
SHA51212c5724d211176f5cc6fc5f2c88ae0e81fde2316ba2e32f4674859a5322a49b0a1e2ae99c138dda9194f185bfc76b1f09e7b2660522d8b8076bb33f4ca658985
-
Filesize
116KB
MD56abaccf6836a1b2a55e54b36548af670
SHA1019603f2ccefffd62e01f51682413cfb5ee469e5
SHA256730cc3015a93db2775a8e4245561d8a7d1e8826e4df9de5eb4685e4a8dc7a10b
SHA512927c7a5d70d985582914a582f263ba71a27c910a11f6f127ce6fea937e992492698571483990d1a18291c107dcd04c2ac2ac52d26bba63189f4333de95ae165a
-
Filesize
116KB
MD5a4351d54b0d60b2e36da0bba0b9b3b28
SHA1788794c12e311ff062c6653248173280f7ec268c
SHA2560a937884d8e39120931505910591dce0e74b9071a11e0c15596ebd2efd6296de
SHA512e8c632fac552b336c9b5f9c24f03b1800654e9fcb011f700f7f13456a57132d7b38f10b65d425aa26daaf3a582df879014d897b0dbc5145196b40155423e9a83
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\BA64D4B2-3DF4-4BDE-97A8-38D9DAC25C2C
Filesize174KB
MD52c061e1305646f3f27f33edddb4da8d9
SHA12aaadc8269195d427444d1f77dc9b3b8e3a5f319
SHA2562e899a2c504346648c3509d2e1bc54c253f52db6c272a7553b9d0de766e1039a
SHA5128a5f6ecb06b090a32a563a9cef51329ed5490fc27f6a865a5344b6a996648fe4e0edfede547789bc59288c860dda64fbf1719412f5ab6543d1824e52321d2afe
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5cc9ae398ab5d761b68905db979238edd
SHA1a4a171ff6ab1fb583d393d5300013c4473cabfa3
SHA256182025bbde7cd5349d7355d941ca9180296e952914d071d89d94d148302a15d9
SHA512b7ab6a7ed1540f074782e8d680bd5474152dfaad71bfba75dce41dd12f1111dd95d26c8c924f02e81131cfd87ce82ff01e825980b5eab190554a496156876419
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5fae224d143d59285761a550f62b0b375
SHA12541d453163df5961864f2c668d3c662aa78233a
SHA2563db214771a5a4f20daade59c3f6606a3d2ced3df318548f3613827db0cdc3a23
SHA512b22bb145c0643d9971b8182b8c856f9743de2cf43da1d73fb6684e1b537487635d9cd8ccdc4a8894e0d04e4553e04881ac013b8dc6ab6a95de746185370a424d
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
533B
MD54c41081c4824ec84169a6b8954caaae4
SHA1ca1ad74642984011dfeb66f616eba009b1f972ba
SHA256cea0576c28ba7bd2770aa22981741ca0496321277e1c9320bed8959d3dec23be
SHA512f734ec2d6d65b93ad6ad68d88ddba8c67559305d2438118ed818c5699b53a7f5cc0f3d6c15bf29fd0b5eff7cedee8afc826c37e6ce1faf9fcc7750bb26422e06
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e