Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

04/03/2025, 15:32

250304-syy8estrw6 10

31/01/2025, 12:59

250131-p8d4fswmbx 10

27/01/2025, 15:12

250127-slapastrfy 10

24/01/2025, 15:20

250124-sqxpmawncj 10

22/01/2025, 17:56

250122-wjahasypaj 10

21/01/2025, 17:40

250121-v8zcaawjcj 10

21/01/2025, 15:38

250121-s26fxa1ndk 10

21/01/2025, 14:09

250121-rglekaxlcw 10

Analysis

  • max time kernel
    279s
  • max time network
    281s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250218-en
  • resource tags

    arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04/03/2025, 15:32

General

  • Target

    2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe

  • Size

    352KB

  • MD5

    07244d8bbd0721454ea97e696b6e85d3

  • SHA1

    06bc9b13360ac74b019cab18c96cc888474afc52

  • SHA256

    6d4fdb81ba3d3005f83e87f1b28fd48fbfe213a6dd164b95d939b9391faff82e

  • SHA512

    73c5fa9ee0bf8f91daa41f15932b0138329990d192bda0b75b90bd2f70fc8aaab28f509c9562355942a0563c418c96f99c0322e149e8c9b6d8ff83f14e3a8061

  • SSDEEP

    6144:gV3r9iXlkEt9RGv5IKp/ntL2FJGAJRaWJ1rQPNDEDKx22LV:gglkEHshIKpvtg4AJRaWkp

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Chaos family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-21_07244d8bbd0721454ea97e696b6e85d3_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:720
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1256
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:1496
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3352
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:1868
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2092
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2112
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4532
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4564,i,15195321112227810029,13870653243844057049,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:14
    1⤵
      PID:1088
    • C:\Windows\System32\vdsldr.exe
      C:\Windows\System32\vdsldr.exe -Embedding
      1⤵
        PID:2520
      • C:\Windows\System32\vds.exe
        C:\Windows\System32\vds.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:3580
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=3800,i,15195321112227810029,13870653243844057049,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:14
        1⤵
          PID:1956
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe"
          1⤵
          • Drops file in Windows directory
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4968
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff93457cc40,0x7ff93457cc4c,0x7ff93457cc58
            2⤵
              PID:4512
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=1900 /prefetch:2
              2⤵
                PID:2572
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=2140 /prefetch:3
                2⤵
                  PID:1088
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=2212 /prefetch:8
                  2⤵
                    PID:4960
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=3252 /prefetch:1
                    2⤵
                      PID:756
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=3304 /prefetch:1
                      2⤵
                        PID:404
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4460,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=3672 /prefetch:1
                        2⤵
                          PID:3956
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4472,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4592 /prefetch:8
                          2⤵
                            PID:1796
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4724 /prefetch:8
                            2⤵
                              PID:384
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4640 /prefetch:8
                              2⤵
                                PID:4564
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4612,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=4732 /prefetch:8
                                2⤵
                                  PID:4616
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4336,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5080 /prefetch:8
                                  2⤵
                                    PID:1476
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5040,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5008 /prefetch:8
                                    2⤵
                                      PID:2540
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3684,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5224 /prefetch:8
                                      2⤵
                                        PID:3632
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5080,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5092 /prefetch:8
                                        2⤵
                                          PID:2556
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5088,i,8059897669817041842,825307878027527358,262144 --variations-seed-version=20250217-180411.635000 --mojo-platform-channel-handle=5464 /prefetch:2
                                          2⤵
                                            PID:2872
                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                          1⤵
                                            PID:3656
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                            1⤵
                                              PID:5088
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                              1⤵
                                                PID:5048

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                Filesize

                                                649B

                                                MD5

                                                84eb6217c4cc3bc8f04e7c4a8774fe14

                                                SHA1

                                                3e44964680921436338f08e8969da68e503c6276

                                                SHA256

                                                d82274223200f877cd6d2e7a69d8689c7cfd0965008f840804eba08b79181ad8

                                                SHA512

                                                0568d2b52624427a9b7f423b230ed075f594118bd0c0a5502c75ea18a361266ee6d26146c40bc044098ceedd3e205517ae8193d5197406f015299ffd41f7f081

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                Filesize

                                                264KB

                                                MD5

                                                f50f89a0a91564d0b8a211f8921aa7de

                                                SHA1

                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                SHA256

                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                SHA512

                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                Filesize

                                                851B

                                                MD5

                                                07ffbe5f24ca348723ff8c6c488abfb8

                                                SHA1

                                                6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                SHA256

                                                6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                SHA512

                                                7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                Filesize

                                                854B

                                                MD5

                                                4ec1df2da46182103d2ffc3b92d20ca5

                                                SHA1

                                                fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                SHA256

                                                6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                SHA512

                                                939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                2KB

                                                MD5

                                                da67be7a3c2e0e5b2a49eb8cd07e06a1

                                                SHA1

                                                6253ddecf7ef10d112006c0768b9dc971efbfaa4

                                                SHA256

                                                c97975750ef434089e26e56d99a7b2cc4384b31adda94aed3d797d3ce320fb2a

                                                SHA512

                                                fe0b8d92a70aeddc0c4277d25bf4682a96f932ce412c89315b119cffc600d53af8ac9733ab699e48c9eff9690c9f721b8c9d81d3efbfb769a0c452dc93abff98

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                354B

                                                MD5

                                                09506ad10a2ad17ea63b9a7c01dcc2e9

                                                SHA1

                                                275096a32349a4cf64f707420bf2f7d1b6f449b3

                                                SHA256

                                                c87fa604fb67a1b4deeff334e4eed1aadaf4305e58bf88cb03c52615c25cf743

                                                SHA512

                                                f26fdb1e11fc570dc02fd25bac391902a28a0ff5a7029be3c728736b873af886580989a0a52879a576e9e02bb33af82974a80111cab234fcc7e7f99f222d03b9

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                8KB

                                                MD5

                                                8537f90e62e706b266f1195e90776869

                                                SHA1

                                                98965c7aba7b53198fa216970bef17cb810d652f

                                                SHA256

                                                095ca2d8d26a83615c24a3a71fbdeb84865122ed5e50e189de1931f913179628

                                                SHA512

                                                9f6026a09e00ffd61d4dc721d4d2166daee49ac47d2c3aeb593a55fbaa980ea2594f0c8d37cbfe83fe44d2bd2848a2db96b153c3c7000ebea9e16cf794974379

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                Filesize

                                                15KB

                                                MD5

                                                1cf6a8970486e4c0664a8bb056f89d80

                                                SHA1

                                                342ac8e7c29790397bb5e5d06c4168060f44fd48

                                                SHA256

                                                204df95987d3aed3c4ec82e31cda471a8bd29370dd52d23fc8e90871c5d8dd2b

                                                SHA512

                                                0fd208e1abfd5129827645ac11a6dde58ead2bc91a154d952eed05456d7f28a8f121980c99026bc16aadf54b169ea6c5674d6d7442046aa8005008f289610087

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                Filesize

                                                72B

                                                MD5

                                                f7a28d878d46e5171dc74ce597fee6e5

                                                SHA1

                                                b6c6e44f928868feed2f05e9ac1edd48cd120b0b

                                                SHA256

                                                e58a23a73ddb89fe2a7fc5e4daae905cb9c52815d4b1e10e1b199c72f4f75e4a

                                                SHA512

                                                a2b15141204d3572190d83d7d2d4a12f3bf551f5fb0dbb66936645d3d6819a20fbae274b2ec88cba71d42f31e63e179ee3a4b3b3f79a1c0e78debea6b22b8958

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                244KB

                                                MD5

                                                30dbe266b97991562df3d22de770eb07

                                                SHA1

                                                77d35418c9e6374d69db8dab2dcbd3e79a463c25

                                                SHA256

                                                cf881bceb93f471898998df9f7339730c5c2933bdd7bee4cc1dbeaf0e1a4d1f0

                                                SHA512

                                                62e404f2c1e756b22670f553aab057d269dfe351b9746da7dea5e266ac0559d4a520675e3c68d88106c859955fe16c36bc550676385470bb4c4bc0e59179806b

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                244KB

                                                MD5

                                                41508cf1b432a44fdbfa63794b6fe505

                                                SHA1

                                                1de09711022c8dad5a11e0ea61be4c93b9e17205

                                                SHA256

                                                2da2b0256fa04115e1eb0c4a5d1a5b5c8fc63604fc2c31b99626e416aad422f0

                                                SHA512

                                                e1a250591d0fd490ea3fa35804611a331164c895352a56076916bc937280d7653bd9b1594f6e16d17ca18c43ed67b8b29b279f482336249f7c129f62c22bcfc4

                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir4968_2325541\95ed8458-33f8-4e73-8ec4-0247e9ca38ef.tmp

                                                Filesize

                                                150KB

                                                MD5

                                                eae462c55eba847a1a8b58e58976b253

                                                SHA1

                                                4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                SHA256

                                                ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                SHA512

                                                494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir4968_2325541\CRX_INSTALL\_locales\en_CA\messages.json

                                                Filesize

                                                711B

                                                MD5

                                                558659936250e03cc14b60ebf648aa09

                                                SHA1

                                                32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                SHA256

                                                2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                SHA512

                                                1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                              • C:\Users\Admin\AppData\Roaming\svchost.exe

                                                Filesize

                                                352KB

                                                MD5

                                                07244d8bbd0721454ea97e696b6e85d3

                                                SHA1

                                                06bc9b13360ac74b019cab18c96cc888474afc52

                                                SHA256

                                                6d4fdb81ba3d3005f83e87f1b28fd48fbfe213a6dd164b95d939b9391faff82e

                                                SHA512

                                                73c5fa9ee0bf8f91daa41f15932b0138329990d192bda0b75b90bd2f70fc8aaab28f509c9562355942a0563c418c96f99c0322e149e8c9b6d8ff83f14e3a8061

                                              • C:\Users\Admin\Desktop\read_it.txt

                                                Filesize

                                                120B

                                                MD5

                                                8a4a98a8bfe11567dd16d06ddc364346

                                                SHA1

                                                ed94fda66affe31abe3002f8e702c3ddd5e37ba8

                                                SHA256

                                                48236cc3c7a1316f9f61201f2937c9653b9e6c8f6b038f9a94fbe7a3a3153cd3

                                                SHA512

                                                662ae12eee1180e34a41a4e2b018cae970fabeb446a9d8e82c692ca32d52ebadccc8a465b7dce4988af9f37d42dcfaec7b028e6a3c107b9b6cdc81e345770141

                                              • memory/2136-0-0x00007FF925833000-0x00007FF925835000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/2136-1-0x0000000000510000-0x000000000053C000-memory.dmp

                                                Filesize

                                                176KB

                                              • memory/4384-14-0x00007FF925830000-0x00007FF9262F2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4384-69-0x00007FF925830000-0x00007FF9262F2000-memory.dmp

                                                Filesize

                                                10.8MB