Resubmissions
07-03-2023 07:25
230307-h9eytahc25 1007-03-2023 07:22
230307-h7dyqsge9v 1007-02-2023 04:27
230207-e28dlshd37 1007-02-2023 04:11
230207-er315sce2y 1002-02-2023 13:29
230202-qrj4tagh34 1002-02-2023 13:09
230202-qd156sad6z 1026-01-2023 07:55
230126-jsjfcada55 1008-09-2022 09:29
220908-lgbmgaebd8 801-09-2022 20:56
220901-zq1jvadbg2 8Analysis
-
max time kernel
596s -
max time network
429s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-02-2023 04:11
Behavioral task
behavioral1
Sample
PLAY.mal_.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PLAY.mal_.exe
Resource
win10v2004-20221111-en
General
-
Target
PLAY.mal_.exe
-
Size
178KB
-
MD5
223eff1610b432a1f1aa06c60bd7b9a6
-
SHA1
14177730443c65aefeeda3162b324fdedf9cf9e0
-
SHA256
006ae41910887f0811a3ba2868ef9576bbd265216554850112319af878f06e55
-
SHA512
cf8b097e4d8dae444c4759a6588bcc5769694d34675f17fed5ee6d0b7aa52ed44263b0cc73f4ff422182a01ad8d69b18a71110c4fc4e9dd2233e9cfe833cbd36
-
SSDEEP
3072:Yrl2uRkddO+iR7OZOQ+dzeIP9mwUGU3l2bxW1/9JnOC/fhKJ2hXh3lmG:22uyqOh2g8U12K9dtEWx17
Malware Config
Signatures
-
PLAY Ransomware, PlayCrypt
Ransomware family first seen in mid 2022.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
PLAY.mal_.exedescription ioc process File renamed C:\Users\Admin\Pictures\UnblockWrite.png => C:\Users\Admin\Pictures\UnblockWrite.png.PLAY PLAY.mal_.exe File opened for modification C:\Users\Admin\Pictures\BlockWatch.raw.PLAY PLAY.mal_.exe File opened for modification C:\Users\Admin\Pictures\PublishCheckpoint.tiff.PLAY PLAY.mal_.exe File opened for modification C:\Users\Admin\Pictures\UnblockWrite.png.PLAY PLAY.mal_.exe File opened for modification C:\Users\Admin\Pictures\PublishCheckpoint.tiff PLAY.mal_.exe File renamed C:\Users\Admin\Pictures\BlockWatch.raw => C:\Users\Admin\Pictures\BlockWatch.raw.PLAY PLAY.mal_.exe File renamed C:\Users\Admin\Pictures\PublishCheckpoint.tiff => C:\Users\Admin\Pictures\PublishCheckpoint.tiff.PLAY PLAY.mal_.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 39 IoCs
Processes:
PLAY.mal_.exedescription ioc process File opened for modification C:\Users\Public\Desktop\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Searches\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Documents\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Downloads\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files (x86)\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Pictures\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Videos\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Videos\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Links\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Music\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Music\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI PLAY.mal_.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Documents\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini PLAY.mal_.exe File opened for modification C:\Users\Public\Libraries\desktop.ini PLAY.mal_.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\desktop.ini PLAY.mal_.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini PLAY.mal_.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
PLAY.mal_.exedescription ioc process File opened (read-only) \??\V: PLAY.mal_.exe File opened (read-only) \??\B: PLAY.mal_.exe File opened (read-only) \??\G: PLAY.mal_.exe File opened (read-only) \??\M: PLAY.mal_.exe File opened (read-only) \??\W: PLAY.mal_.exe File opened (read-only) \??\X: PLAY.mal_.exe File opened (read-only) \??\F: PLAY.mal_.exe File opened (read-only) \??\O: PLAY.mal_.exe File opened (read-only) \??\U: PLAY.mal_.exe File opened (read-only) \??\R: PLAY.mal_.exe File opened (read-only) \??\S: PLAY.mal_.exe File opened (read-only) \??\T: PLAY.mal_.exe File opened (read-only) \??\Y: PLAY.mal_.exe File opened (read-only) \??\H: PLAY.mal_.exe File opened (read-only) \??\I: PLAY.mal_.exe File opened (read-only) \??\Q: PLAY.mal_.exe File opened (read-only) \??\K: PLAY.mal_.exe File opened (read-only) \??\L: PLAY.mal_.exe File opened (read-only) \??\N: PLAY.mal_.exe File opened (read-only) \??\P: PLAY.mal_.exe File opened (read-only) \??\Z: PLAY.mal_.exe File opened (read-only) \??\A: PLAY.mal_.exe File opened (read-only) \??\E: PLAY.mal_.exe File opened (read-only) \??\J: PLAY.mal_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
PLAY.mal_.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.resources_3.9.1.v20140825-1431.jar PLAY.mal_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Salta.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Moscow.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME33.CSS.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\attention.gif.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107364.WMF.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME17.CSS.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationLeft_ButtonGraphic.png PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-fallback_ja.jar PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_FormsHomePage.gif PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FORM.JS PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\ATPVBAEN.XLAM PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-applemenu.jar.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-charts.xml PLAY.mal_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Bermuda PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MOR6INT.REST.IDX_DLL PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\AddToViewArrow.jpg PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\subscription.xsd PLAY.mal_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00090_.GIF PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME38.CSS PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Kiev.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\favicon.ico.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Marketing Projects.accdt.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\TAB_ON.GIF.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\bear_formatted_matte2.wmv PLAY.mal_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_SelectionSubpicture.png PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD09031_.WMF PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Essential.xml PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBAR11.POC PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WITHCOMP.XML PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Visualizer.zip.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\ShapeCollector.exe.mui PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_zh_CN.jar PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-core_zh_CN.jar PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\SPACER.GIF PLAY.mal_.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\LINEAR_RGB.pf.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_alignright.gif.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\vlc.mo PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\calendar.js PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\tile16.png PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01793_.WMF PLAY.mal_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\Mahjong.exe.mui.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313965.JPG.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR10F.GIF.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr.jar PLAY.mal_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\buttonUp_Off.png PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0252349.WMF PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\LAUNCH.GIF PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.SYD.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199307.WMF.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00191_.WMF PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\LOCALDV.DLL PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR7B.GIF.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Form_StatusImage.jpg.PLAY PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WebToolIconImagesMask.bmp.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.xml PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_close_down.png PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\epl-v10.html PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_partstyle.css PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-settings_ja.jar PLAY.mal_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\THMBNAIL.PNG.PLAY PLAY.mal_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_s.png PLAY.mal_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings_0.10.200.v20140424-2042.jar.PLAY PLAY.mal_.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
chrome.exechrome.exepid process 2040 chrome.exe 1064 chrome.exe 1064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 17780 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 17780 AUDIODG.EXE Token: 33 17780 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 17780 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe 1064 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1064 wrote to memory of 1620 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1620 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1620 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 1420 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 2040 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 2040 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 2040 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe PID 1064 wrote to memory of 780 1064 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PLAY.mal_.exe"C:\Users\Admin\AppData\Local\Temp\PLAY.mal_.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb124f50,0x7fefb124f60,0x7fefb124f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1112 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1704 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3228 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1108 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3400 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3544 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3844 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3816 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1516 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4060 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1096,4769649620445066510,2556526535750014295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1708 /prefetch:82⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4101⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb124f50,0x7fefb124f60,0x7fefb124f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1056,18404227224770190599,9908023565224982794,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1048 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1056,18404227224770190599,9908023565224982794,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1312 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb124f50,0x7fefb124f60,0x7fefb124f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1100,10713488686483493216,642757398752385109,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1356 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1100,10713488686483493216,642757398752385109,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1124 /prefetch:22⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\desktop.iniFilesize
1KB
MD5aa7e206c3fd594c4378dc1205e58b8de
SHA1831f42b1e2941d5c50eab8a74b7eb553f62f452f
SHA2562598deee8f65be16af722d8f4bc68db6fb520fa2c01f49360876795f2a12e5fb
SHA5127271c1181736e1e251f540209fd170c77462954cb5bd18a3b6931f13de5f9ea48f1471f3d9d740555ab839090310607e74e073a07cb8722286e4787be98086ae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
1KB
MD5bbc90c83bfbfc9125a338ecb1c74f45a
SHA1491d0df77250520e448abad7376b0d54244e392a
SHA2568bc64249415419748f072574c0d8ab5263ece3f3c516ec69e54c06430bf206d8
SHA512505dec9b9f494d00b732fce94f590ea049d04e992f2ed96265c48e7ad1b25ac1158212efde55c28192fff0f4e1076195f640d1518554adba088bbcb40dc126f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000002Filesize
36KB
MD51345f1f3670afebc05dd88eb80a97458
SHA1203295599b3e1ccaf73fe16b1fad7591652ce059
SHA256b407151c6e10ca43a435868b5069f09301fff008ebba277a028fd3dcf5e91b63
SHA512d6c51226bb54f530a271448f528757ba84b9bea141707363f4fa5b6ad6a4f784cb9606e9bd34d6e34d92503f2681c9006f7075ac7d8fbcec602279deb8c6dd67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000003Filesize
47KB
MD562663f680f271d383ae7884ad5471117
SHA145e941b13897c7c8d47a84b415ce0464d8eac151
SHA2564601b5e0cad2f1a7b7432ce7c3cf47fdfc619a97736a5385740a8eca15f70d7c
SHA512b02277b50e6a29652c60a921b6f778d4fda4c29fe6966996835d32569d7a2de8e07d12f95ebd2971fbf99d1ee619d213eafa2522e5aa5f448abd9885ef659284
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000004Filesize
81KB
MD5090f4393767000740494abc8ac9e0acd
SHA1d5f5a9f8e30fb75afd284012674911baa070af6f
SHA256bc25e0faebe67fe2ccac8498f13da67573579da6ce0128131c2b65814d1bedf2
SHA512bf4a0e68a8ef85ec86fec34c1ca5b61e1f997f2bd86d6c9d6b7e3c1d892738126c7318a25f1ebb2b99a0710c1a505d604483dc4bdd3ffd28e78f5fa83685f014
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000005Filesize
38KB
MD56a7a29e27d46f7d53da6e36de570beb5
SHA15aae0a324a0be3c19527181c5ccf80933a7445d7
SHA256af5b729040385b5edd6dcba7b27874f54a4957019ce02fad58a39f6fb18f42e9
SHA512615fbc28e671fcb739df48b5e2bdd886037c497a9e8e642c310ad6d38f44ea74b608fdb3a53896708e81e0ca180db624d3f85f17e00734ef0dd32c0cf54ff85c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000006Filesize
23KB
MD5233ba068c7b15641d5850e23fea15be2
SHA19e2bfcc660e9988c7f1a992de0b7d85f4dfd64b6
SHA256e34f43ef0a3372bba59883eb61980c506f3d3f9bf553a39605dc8aee44ce3531
SHA5129fcef792e3f81635974abdd8ba41425292a5af3e0e41770ab2947b3c8c7e4cbb9447d029420efece3f85ec00d41c815f1271fca3a5719b1d52a6bd5bbfff4615
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000007Filesize
1.6MB
MD530dbe919d87ce9ca0de3d33ed5eefd5c
SHA159b5f9e16c50f2860fec436c4b0e787ff4c75c78
SHA256de766942337fcb7407682d40831c046d238f9db2e00435f4d8114c6f28d75805
SHA5123b50eb3b65b0f39fb0016838e83c6041d645b8fb246c999d0ddf0e566a977dbf344d179f0f06314155b2d54f65b1b6b3f0b5040ed356602ee0bc673d49705606
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000008Filesize
47KB
MD5912d820d5777f6d0e4c15aff14b18061
SHA1ad3a97d264eeb3692bffd1891acd73b41c1d69b7
SHA2565b9803e5f48dfadb33b1e6d4fff80caee882ca704c0304ec99f0b2c44de00ef1
SHA51270ae5d23ab8091d26f9dd9199ea8cdd5d9b26ac56d86eaf8a091089835b5040f90d7bd99b845a28224edaf5e0704368ac376bf26ffa0bb7ad69f2f7778a594a2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000009Filesize
20KB
MD5899f60fd1eb5309d31f5672111d0cb63
SHA1175658558e03b083f66bfcb1a70f5793657a2e50
SHA25693c13facf7e56201f8070378a00ba1fd34a22562de32a6308fa0880f0a43cf54
SHA512c46acbf5df3c08b89d26f00c96b6b2ab73c07acc5f2db57bc1cc68f36336aa815411636b2d9d13b01942f8b74c13f0c3293b6c878710dc6807560e0df8a74332
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000aFilesize
25KB
MD5606cf92eba3f7ff61adb476aa7e1a3bc
SHA115420f1db885d536c9ea80c59dcbc6ceb65c004b
SHA256a6a0db375ec265d007c4ab0bc035b150acdcbcf0a9d47e28178189711395735c
SHA51224c5d18ac9c658543ccfa97e2414f48bb2c22ddaf61c2aacc12b85579d70b8be2b7a3fb099cfd2da3a82b4b5d79892ac8ee126a3ce7c3a75729ebe2128d1e452
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000bFilesize
17KB
MD560f8b0f4b671bbb3ce2f7657c1491613
SHA105c75b1324293d0f0455d0fd5daa528b0e43e1ea
SHA256cd8c9acc8abab4f58149d304e23d4709b30c52e1a6d65dcb163269649dd65beb
SHA5126c22d909d52b60462aeaf4123a2496cdddfe0c5800759e74b80bba4535790326ad2edab0244ca125b5bab108208c1071d98dcf9f795741930d583f16dff9d2df
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000cFilesize
38KB
MD5a8cfd764bf5318c3ba10eaf6b23da11b
SHA11a96699b75b528bef52dc7ead7307d0e3fddf69b
SHA256d6c5cd706a98dd7c806ac646d7fabc5166b92d2f2a3495fa885396d0c040182b
SHA51295c99bcb8676cb47ded78620b873f89d1e5271c09215fa8a8931f491f0f85d430d7b1f6c369554653ed974c58890b494a62cdd08d9dd79dfa005a41633f87c55
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000dFilesize
424KB
MD591e837742c96f846b0fe3d472fbd4ce4
SHA14ac0db68c65b9f22d145d1379a8f8ffcd57d2eb8
SHA2564f9f8efde59962e7503dab9abf199d66ec4625e53517fc581fc52302c1e7e233
SHA512640d0569df8f1f9063f25fae5ffa5f9d14f7437d5d71394cf5d29c5ae9c6ce612a900cf9b681aa0c24b4b197df928aabb569f7e029ef0b5cf031dff28417cee4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000eFilesize
47KB
MD5061f61a35f6fb75afe1e93304a6b4663
SHA1677f5f2c34e88115cb068311cbb5ce17cc9531a0
SHA256f207481aefc3c1b9f47ee42ac728bdc111c8f51c6d2aa083675870a78e262f22
SHA5125471c3e72ba8990c6146047e7c48423413d3d81072f0c6dbf184dbfbdf78d4a1f32f6dddf4729f603594990c3ca589db4be99b1cd55570dd24c83da4070cf130
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000fFilesize
25KB
MD5fdbfbafa2ee87e1fa26f0672b8e49057
SHA1c91927a6ac605d64efbb6c561fb19c1bf05148aa
SHA256afb0573af893f27bcc0c9f131c55cd9458561660c196c94983d0d99f8a72e534
SHA512815595b80337499100c4b51489316d029088dd4fd093976e88d19fd0a6727ee894a15ee8a722dbdc6b5ada44c268864db4b120ea8e4024971f1aff65ec6a1c52
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000010Filesize
26KB
MD54777392f8faff36381b3f90a347787fd
SHA1ba570c1aab186785877e9cf5502f7d11e50af3b5
SHA256ddea75e3d46e7bc2f8024b931e65a4e2127640a311bdb660e77c4e1db0feb615
SHA512e28a61fa1df9b65fd6bb27917bbc4197696d9632849ade6ae82dacb8f3b94d2a7f51f7545047107684c41b6c1b49af6e51bd2ed3794ad4db6ae30c1eb3e2bb85
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000011Filesize
30KB
MD56d3930f3ef1bf1732f1bcf3b7732a91b
SHA1497c6dc8734db0d3430a3a3096782e5354c65c61
SHA256ea55f8b760d2c6bd3063056f490bc46c74598d78bd8efc6966b8770a8ad05c0d
SHA512285fe50ee07075ebf3d4bc662c77188058da7ce0435707ed01b8452a4d47836b7e894e3bce1bf8339dfdf8d63d7a1ef5adc2af334b24847e3300d07af84790b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000012Filesize
36KB
MD58fa26213eadc0d209a3f2ed4d1591a2b
SHA147ce3d76bdb3a1781da7cec21aa0b35613930274
SHA256acfb9d0de653e83101ee0ee632c394f1e22e41a2b139263adff2d55121dafeb1
SHA51227b52b655dbd94242170dca556429e20f251238cae47b223ab53587d4c3a558c585a0f5114bf52dc534a875890c1b2659c1b50e2986ded2a1c2a3fc8f1741d78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000013Filesize
49KB
MD598faffc1f5f5a6933e8ffcdcdaef3106
SHA1a13ae00e9baec02cd25b530b075753c68d0b7cd5
SHA256031add3734b54a8751d615922e0fb0586128ef31cbffeaef3903d81b22f13b8e
SHA512b4f171ccac3bf5be9d8754018cc9f9c6e49257ba29731435f6807136f6d474a687e032e82ab0e670214b463a14e0c0bb92d61d9ba5099821b1a4c12396781f1e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000014Filesize
90KB
MD51c98cf5f6eee87cbed45ac8600feb593
SHA15b4775d280a201c3b643a663f0874d536e919a37
SHA256de40cfb55ecf646bfa50f02dcff08ac86b269387aa5ca5384cb241b56b3def8a
SHA512a9a536e8eed0f75a6e840cec55b07ec1baef9906438bc90ddb6cf16dfa57a733ebe4559063dc34914519a9849e7156dd4c518662eaddf32a3a8de8dbd1e853b0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000015Filesize
601KB
MD52b1338a851a62c3021e964120447861e
SHA1d107a7ecb83c62f09497e0b16b4ac534feaac4c5
SHA2564ace3ddf0137f092c14cf956549c093b24915788397b0437ec98b3fc59ee0875
SHA51260b6e8716055866154899f2ee82ffec933b7c08e4e311648b15a950966a732c39cdccb33aaba6be776a82619e61c427179d6d47bc757699f64b005f4fa0bfa41
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000016Filesize
64KB
MD5cf50fc5de1d30cc80ce499173a942c36
SHA104a9cc7413959c4078e1f322cb1eea7818a84643
SHA256eb0e22499d5b3dd10aa3a63fea584c6ce5e7adfc2512d04d3584b4deca15ea56
SHA512bccb8f79db97e3067949f7e9cb6f20102a42f9b8882b66585428619b017cd6dde2995ed40a1aa17acf9eca027c081ed7b842495fc20c1fed5aaa65c93dbd42c5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000017Filesize
42KB
MD5ea55534b79dbf18b229f8289f123a44c
SHA155d043ec48ee05ef12578c5856bccfda08c4e8af
SHA25658817a409fc4e6d0b5e8e16f1ebd1ab13001ea3a3aaef442c6a925d6d3b339ec
SHA5124604f167111b9f6ae9446a7b688d579f9ffd5ae63b64665445f76cae21882107db8f647881e137687a47bfae97da6bb74d722f0e70621f3426cfb42eb5effc9a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000018Filesize
31KB
MD5e169c7a308f0356dfdb69a9792e3a98d
SHA176ccd962c1d628398993a7af5740fafc20014176
SHA256d136c3407f904c3d7e4c5d6dd4d3c8e3586fb77aaddb9afa36e9e7aa590bbe33
SHA51275c6cfbb9f60590f9cd52451216040a7ab24eab081ec11f8ee950cd08462eb72b2fe1ac1dbb1d6dd4506230f05ec85e54aa24481113501bf1a4094f3e57f6973
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000019Filesize
72KB
MD5c924ca2ef898451e4f5b7984d6e5c495
SHA178cf864717fe46cef3efc969039632d85aa992f5
SHA256c91190977e0aa57c84fad90efdc9dbdce7deaa666ccd472d87a2b0c62714c69d
SHA512f39554fa9fb9076b2eafb39892f904c77105fa526d80cbcdac42d320360093721386d9d9e719103b636ea2d7f8a4e5abe601875c93e185cd7c86ef39c6033e33
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00001aFilesize
17KB
MD5213e738bd35015d12d1891ade2d5528d
SHA1d6a712daec9e638c03d2d36d2eb71a58088a6a71
SHA25660de251f6a1c530c6bafdbd5537d707ededed902cb543f3be0aad8a11609b58e
SHA512fcb36619bb4bd5bcc02d528e020ca40bedf66074dc812f40c0ad9a178f6cc930d24fce8eec2a86d60525b178ee9a3521de8e15440ddb46521cdf1cbdc0f9a2e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\12474ee1c6fe1751_0Filesize
1KB
MD5b25d0ec023a157e78f92261e590d5785
SHA18fef02fa12513333c0bf9ee2bfbf3a539bef0f83
SHA256fa1a339878681d9ae1517e72affc0cacc0f24a5f8173189e71ddb4ae55475480
SHA512f56ff5c08d6b34686039773fbcdc5ec046ef6adf6f5443b5fc58bf590d8a0f72613a50e2e7d87bbedc77a47ea2099e5838e484ccdd6a43521dfee92cfc9d2596
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\335e69ddec2b9ac6_0Filesize
1KB
MD55c1322a23501809a6cafb14f6da552ce
SHA1c9550e77573b92498bc93bda8a854db9d048d9bf
SHA2565e5d39f3961246ee8198cbb79763896d303834ca788b1e836f40d89427670f35
SHA51200a72c8c14820cc2a8dfc1fe08158249cb212708e359fa43ceadb53f791436dc05e03531c45a0752ce087d9e607cf71c3a6b083132e48ab57942d6e15e7b27f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\402726a32437d428_0Filesize
1KB
MD5ef2993456bc1e2ce45a415c972e1191b
SHA1427b06f709a55b75d951afd2774c73c381ec59e6
SHA25625debab0a8d086f1a31b0f8306dd1f99810690fe14cd79ead15253c1c5c326b6
SHA5127d654306395163a1e06fecd9ddbea5aea215a8ecc0f3633b51b3f334ba2bc48d6facc972cceb691ba74f8a174289f96a541e5f4cf1dc905e7ff6f72537200b4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\4b8748c31454e820_0Filesize
1KB
MD5bd3209d403211607e45bacc6b4fcaef6
SHA18e239ba8f873d8539a4930cbe842e1f0be4f3d8b
SHA256b6836c12836cae8d04db6c4f836da1383e7f1cafa8027a1f24dfdcc1145a1917
SHA512b94e7763709fff8a042ee792af1907bbad6134effe7c8e39dad50e0bb54575a78d280efe34d7425af5cbab9c38f3a1db829d5e3fc19fb1f677f39156d71f6d2c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\55fa218ef1ee7263_0Filesize
209B
MD599d657c2acd92ab5a14928053c70d017
SHA1f521a4971ae75fd9f8a53207e102d0c748314edb
SHA2560b2414775dbbd69b3b9d4d3f0c8bb3444ecbbaf3316dcb00c0e55c6f92fa4f22
SHA51214fa919cffef6a28df350476e6992c1532ce790aff6dbadc19797d755dfd9fc8b5b2a392a5ca1ad67c209c2e0c4106d6ddbba5d29c38d11e7270eaa568d5afc7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\69b170b92e386d07_0Filesize
1KB
MD573ec314e5f6c69edb61ec443c71742e8
SHA11668608cf55ef66d168e36f8fa4b9d4e17fce7af
SHA25684371598396d757ac95562fe7ceb553e8db0ecff8303e13489aae08468a48202
SHA51213d60835e6b5ef4f2ea221e544558ec63758261854d1e111d69a52b53f4813278b6f5eb7d7204ce155ec3c8babb115e563af0d5b06e858a1991a3972f34652e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\79a2816e56cd3e05_0Filesize
1KB
MD510d644aa01b426b0e0d37357c2a89f25
SHA18f0aa36caf700abcda3c97c7df2346726dab600b
SHA25685689f18f80d70dbf282abaafdce880424d742070ccd59a0144fc402f7bf4194
SHA51296d7bce1aea6b9d4410356826c0d2bb0b278b140f8c89b45d0be8c629702b6ffb03a5fe15197a560ef335b53ec6e4fcc2bc2e1a138d728ccc701f733050d7c5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\7c50cc06aaec32fe_0Filesize
1KB
MD5b70b4769b1c9ce5f4e824de73a9a82d7
SHA191320e59e471037953692be354b63d300146ab0b
SHA25691df68de6cac6889fc67612f41f4aed687c1beb68790d46e1948300457c0ad78
SHA512874ff768f3f8df695b793b811ece1339e3fbd218c6dc9c63cc8505b5c935721b799e359417fa6b8dc832ed806ef037aae65eacc9fa02bdf9259a5bc3e6ce1bfb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\82e6ed5aaf81651c_0Filesize
1KB
MD5d33f004d704551decaedd1e3e8a59f41
SHA12f944fe10185141ccca18a96e132d053b0194bd4
SHA256f98fd1e61fb9310960dc23f65f9de0fbb3c6622b653f1ec10de7ce3a0edaeb69
SHA512cb6ac1a19b6a94ce0d0664ccf9de3500185fb90286e47fdc2ca88b610bbf43f466bcbc99ca86c1d81e5c0dd6c9a2c6efc29361cc1cc17e95bba675c60fcd3b0b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\953e35cfa44674a5_0Filesize
1KB
MD5cc0a2fd532c93dfad1b682b1799531de
SHA10e6fe646899da5c2c25814c842cbfcb9fc9de905
SHA256769a6efc02aa329e9923e054b161f29f78803b5e6bdf1b8a61a697bf27c86c88
SHA512b0ace32501f43c9ae0d0b9b3fb329b191ed0171cfe46a2fafb52a59312fb55fb34297dc81aca772bb41b1a2fa932823195a0d754675c2da3ed3b8b34d2513d67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\9a26b213f3f55508_0Filesize
1KB
MD57a06b6310e1d94a2d128e829a5ba583e
SHA11cd95af0aab20e2f35ddfd7b0127e1768da37dc7
SHA2567a5f44e41f041f2a5359ec8e1bcf582ebdfd4e07a46fc23c004ae9aa8f08547b
SHA512c896193d373819a8464824f1c072881ea685c152d32a85e1ac56995f722210aed834f1cb24f433d0809a82aeac063ca914d7a49cf3a48cf40b3df8a3850c0cfb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\c8e3d243213c2816_0Filesize
1KB
MD5dae8ae92d54d2ff2f9aeaa12e8488d37
SHA180ed61a1553cbfa38de01988538425c57d8802af
SHA256d651cd4902e25b48af2ba9761200622d3ab83137812803daa070c08fba1b0a40
SHA5123a2d8dbffca0011293412381a1edbee51bd6ecc9e43405283e571bb6af2072f0f23952df764623796098b70bbda70a0cf8fbca8d01d14a960e314fa00ca83d0e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\cc8875f6326f279b_0Filesize
1KB
MD528e5d441659a16ced9615687e10d02f2
SHA1b0b06b6193f5e4a349665f5cd9ed5ce52e1b487f
SHA256a803bae41a4f0d4e511cf5135da470e309f7ef9777894eb6c0e942c3a9e6edca
SHA512536d58440367ed54508b488804442b9d0200d160c07d618f1caa12327bd3f9e6748d004adf6555877d31642affea282789280e9a4ac1993a8ba8b24cbae329f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\e95982c1b557162a_0Filesize
1KB
MD5fec01bd91f1817245d597464d5ae964c
SHA16a22c69b082fc1ebf5ace0d8c8060b9f33732db2
SHA2561ca25418e281cc1a14d8b431b537bfb8058d3c558f9b3fc254a62c19e0998e9f
SHA5127597a2d685590d59d87992daefb492198773ef1cfd94f50196b03421e6903dce96fc17c459d15a163af09dd2155232b7c185296dad037fac9b6a3cc822660ed3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\fa45cf87ac1069b5_0Filesize
1KB
MD58e135949b5fbe8cbb1de70f561297d20
SHA1165a2b54ed75887597357b5d3557cee61bc7f7ab
SHA256c84034ea748023a7e4adb0136995c698626d65fcc84c10f96b667950ddeab460
SHA51288e08af64f044c144140a5a4e66dfe1fff267195ba9a0787e83c4de81d361a7e226c6f8ca6f36496eae37363fbdd2121064a841ddafa3a6d33ecedc99e15a779
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENTFilesize
1KB
MD5ee5738228106e20cfc64c16a080ebaab
SHA1b1a874d75319e3c98b78991badd4d7d3fd7c18ed
SHA2561f1840eaae62647a83cf1318178404e0be3b6c1b229e06bdeae0943a71efcfc3
SHA5124408f08ebef21d3b679c6f0e0347e1453eb3ce002a9f62378a16110fd1c64fb0725d0157edfe76328e79134092e350268aa5c83205590e8775a7785e8a0d4af2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD55f280d238b92db6ac9f9c3d1bcebfdf5
SHA19103260bd12acb23af9d185bd8a39d34dda06ab0
SHA256784574c96f865404f0dfb2ec71d60443449db815084433a67d93fd0728fda02d
SHA512115b27351184a4f0fefa3068dee9b761a5468ba8a93d52f57a42655a14935fce125b55d506306e4c902d5e7e366e9f5ca3b51bc106e62ca269c4c05e976494d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD55794f0e73b2339b8bfd72fa07090ca8e
SHA1aed8fe27f36ac94c44747c01f1f1f124268fbf02
SHA2565b1d273158ae8d2c40a3abeceafcace3a6899b2b508e083f19efece5edb32980
SHA5127be75cb615898908190fd2371f23a4706f7d7757a297cf486130e692cf29b73900dc6e5d2d9d35895e3609d44a1f130c2a59150c79480a18c92d03432bbf10c7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d9c2856b-bf58-46f3-a2c4-302312851171\04fa826c9af08c57_0Filesize
51KB
MD54763d2db74d6b78aa6a54906fddedd1b
SHA181b54ceba0199cd710cb8a6593e93aec11686f14
SHA25607ffc4ab6b5f63e8e9bcf7597faddca82440e0ee175f3cf2117e461b564cd738
SHA512c5c7364bb4b48ac1f7b00146b7b4a833c83a59406eeee925b76eb962b91ebbbf76fbf4a1b358ddb2e4f24ab1f8e1060b5c970e7f08cb16ddee83cf004fe3caff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d9c2856b-bf58-46f3-a2c4-302312851171\04fa826c9af08c57_1Filesize
104KB
MD5fd60482ee6f77ac3086146311bda78ed
SHA1cafc1885487e0d2e882d9cf9ffc49a9fbaad11b7
SHA2563254bee9aaaf0f6ac7aea24aea38812b236e8639059c6395acb05951a809a1e9
SHA5123fa61a27f995c83b30b3f33a9872e95598a2709ce9e745aeb7adaa6172155a3b4f0d7624c470c41bcf51c4fc2da3f695b862a31e246a6d5265e492f780423982
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d9c2856b-bf58-46f3-a2c4-302312851171\09f067df74fae8b0_0Filesize
7KB
MD5356a5afa80e365c02959c767607aa228
SHA1be05f8993c34b3f45dcfffc071fc0312d08fce38
SHA25671be0c1cf3a95eafe58376ff0f9df1b01758f67a6d54136e7c81c9336c04db8a
SHA512ac1acf24a0cb84c1a92aa090d8823de071d147451edcd79d2fae12a3fe9bb22dbe09214d659df3d37d6814b6720b2cef53efa4ca680b8544f9ea8e66822ee28e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000001Filesize
1KB
MD53caacc8bac6eca134091adc713551c5c
SHA164f44ef02d194fd6d937e0a23a9d0747ff8b88fc
SHA256e6c14ce15f69ee8e4f53487e717707fd35eb1d4c290fd4388a4791ac69e6e4d2
SHA5128922cb1343febdd484f963f6ce77a3a1b6d6cded89828847d6755bc330c9761b320df8e091ea8cffd1b19d9feae8cd8ac7ecff49fb83ad7efd4d6df0f046419e
-
\??\pipe\crashpad_1064_NIGCBHDFGTMBDXZDMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/968-56-0x0000000000260000-0x000000000028C000-memory.dmpFilesize
176KB
-
memory/968-55-0x0000000075501000-0x0000000075503000-memory.dmpFilesize
8KB