Analysis
-
max time kernel
222s -
max time network
546s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 19:50
Static task
static1
Behavioral task
behavioral1
Sample
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe
Resource
win10v2004-20230221-en
General
-
Target
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe
-
Size
705KB
-
MD5
b7c783df79f96d074affa41b888be8c5
-
SHA1
04f58ffad70797494d0cbacb5607afb2a50e67ff
-
SHA256
2f1aaf153e400de697cdd81e46b8436ff28adfc24ffff27a86e1c43e4034538f
-
SHA512
ae9c52f483a3dfc58c7b9ccf5c8c172ef307aebbba4bf855c9f132f3e2fffa5823d3ab868ea1b68d734ece447cd8ac51a8ca5b5f17efe1bcef7da86e7dce54ca
-
SSDEEP
12288:YF2crHSuZfzDN8Bh6jW+VqnoURMpJwGcjnCwMi0:e2ceUBiQi+AoUmp6vXMi0
Malware Config
Signatures
-
Registers new Print Monitor 2 TTPs 5 IoCs
Processes:
spoolsv.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
Processes:
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 14 IoCs
Processes:
spoolsv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe -
Modifies registry class 6 IoCs
Processes:
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htafile\Shell\Open\Command\ = "\"%1\" %*" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exechrome.exepid process 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exemsiexec.exechrome.exeAUDIODG.EXESndVol.exedescription pid process Token: SeShutdownPrivilege 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Token: SeBackupPrivilege 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Token: SeRestorePrivilege 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Token: SeDebugPrivilege 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe Token: SeRestorePrivilege 1716 msiexec.exe Token: SeTakeOwnershipPrivilege 1716 msiexec.exe Token: SeSecurityPrivilege 1716 msiexec.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: 33 548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 548 AUDIODG.EXE Token: 33 548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 548 AUDIODG.EXE Token: 33 1664 SndVol.exe Token: SeIncBasePriorityPrivilege 1664 SndVol.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exeSndVol.exepid process 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 1664 SndVol.exe 1664 SndVol.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exeSndVol.exepid process 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 1664 SndVol.exe 1664 SndVol.exe 1664 SndVol.exe 1664 SndVol.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exechrome.exedescription pid process target process PID 1948 wrote to memory of 1988 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe regsvr32.exe PID 1948 wrote to memory of 1988 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe regsvr32.exe PID 1948 wrote to memory of 1988 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe regsvr32.exe PID 1948 wrote to memory of 1988 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe regsvr32.exe PID 1948 wrote to memory of 1988 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe regsvr32.exe PID 1948 wrote to memory of 1988 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe regsvr32.exe PID 1948 wrote to memory of 1988 1948 cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe regsvr32.exe PID 544 wrote to memory of 1976 544 chrome.exe chrome.exe PID 544 wrote to memory of 1976 544 chrome.exe chrome.exe PID 544 wrote to memory of 1976 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 824 544 chrome.exe chrome.exe PID 544 wrote to memory of 1932 544 chrome.exe chrome.exe PID 544 wrote to memory of 1932 544 chrome.exe chrome.exe PID 544 wrote to memory of 1932 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe PID 544 wrote to memory of 1136 544 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe"C:\Users\Admin\AppData\Local\Temp\cryptolocker-ransomware-4-16-5-es-en-br-fr-de-it-ru-cz-dk-fi-no-win.exe"1⤵
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\System32\vbscript.dll2⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a49758,0x7fef6a49768,0x7fef6a497782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2212 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1256 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3608 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3788 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3908 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4144 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4508 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4432 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4356 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4316 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4020 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1512 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=792 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=1168 --field-trial-handle=1244,i,16983211309114372165,10923003333937439643,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 45941912 183931⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4041⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e8e1576ac9b487d7b90ca4f9cc8f510e
SHA1b2325a6d5653b6de6a8ecf2678a8081c4b597ab7
SHA2560c151a0e7ee400e485aee1b753a438ca291adaf15284294c456fe8b1c0a3a107
SHA512a010959ccf46d7b84cfc712948e97cea01348d7ca5adbf4f3efbcc2b9e9031e92ab59fc0086aa1d9ec17be8a41b09ddb32c3d7bfd9c3deac2887eb82141d208e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9546295a-882b-4027-a3e2-290b52ba71c6.tmpFilesize
4KB
MD503098ad96dce6e08f23edb9be4fb1461
SHA17a725b6d652ddb083cd03843195b17d44b409718
SHA2564dff275ac7b90cccff10f9e79d7ec1ad7299625942738c71383603207e401e5a
SHA512f584dc265fe7b1fd3890ad2804078893c91cbf5ef4117a2e64fc424e24f443eb080f4b036a3cea0d5749a4f8ac7c230617d8c478ed25dbfe63b69b34ed3905ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00003bFilesize
37KB
MD547ae9b25af86702d77c7895ac6f6b57c
SHA1f56f78729b99247a975620a1103cac3ee9f313a5
SHA2569bde79a1b0866f68d6baa43f920e971b5feb35a8e0af7ffadc114366f8538224
SHA51272b5296e3dd1c5b4c42d8c3e4a56693819779167b9f02bc2d5f5a626b519a9cf10bee59846d614c929c42094b65d13039f6024f6cb1c023e740969aaefd060c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000044Filesize
80KB
MD596872686ab0c4c62d515e449f7b24c64
SHA18391f84133a756fa8d58ebbcbe512db71c053106
SHA256cc5e13752b48847dbfa1b7658ef55fa9a0d874a62678a5d755b1d34a82da9468
SHA512b5a02f189caf347a6b77e5da3a90f4c706f784c892b42d6a6dad1a14a0b984179739ef540b47115d9a99c21922428853bc8a4a60557265c678b795413d3e8455
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000045Filesize
170KB
MD52e5489a7e66b7f4d9034dc274d7dab80
SHA111773675ff597cf05917e898ed424e0725cfea46
SHA25600f8ea545115061c878ab2ca034bd684c4d2edcd7aafe6dff8e065d2026c12ff
SHA512bbc97cf88fa32d016f9766c4a152dc42f328879f7bd2b91d4943977f1c68f059457c4989463e0d16d1de05b8dad89c29c0ddc399efcc25159404f6e7a8140ce7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000046Filesize
118KB
MD52405fefd341356bd5fc8e686e607be57
SHA1370c76e640b4c5c5cfbd44506bdd2a60111e2dd4
SHA2560b402d2371fa62944d88162cf2e1787a37fd5c71c168dd433e5c1e9a42f68dab
SHA512e45c881c27a9945f17afad6f4724ecc966c66c6f2481145fd4ed6f1b747b72cc887ff0de5a896e82a1cb25780bd57a8f2f6bd3a32b4c1c745500152f7f747d03
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000047Filesize
26KB
MD598b19df79aa347d3074d05d5fa64af0d
SHA19e1d74e5b757afb0e5da26a4a81793724c6efbc9
SHA256c6dcb4a3c4229ca7aa12eae10fa21f51f16606adc665490895eb725d2650d02f
SHA512fbf9d6da2bdb46f840914576aca69a451fd62a5039eac0d64e8785f9fd2e0cb46b74ed9e482e2d0b6c09e5b2c3ebf056c2368052e7a8e94a6d97a80dc9fa2e77
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
768B
MD5384ffe2313db21c2824ba86c21c48e64
SHA1fec13d8fcbc1b0b7ceef224c70a758f2e3f703d9
SHA2565e108f480b061401952a26554cdb2283701f709f3c97ba6ba4547dc6d92c9f6a
SHA512a27dd688e4cd6d67513e15409755a0f01860d944386004651fea426b349363cbc81e531329f2a8231e84f5099bc881f0cec05eebdbca87f3865ab64710edf7da
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD516cbf8a4ed1b078c5970e672745d48ab
SHA17416c6fd08410cecd58a709f25aaabdffc6fc840
SHA256a63ba8d68798c58da386da71c84cfd5eaae2b1c453b9865e470d6227cd8c38a1
SHA512d9b9af41d380f59a15503fa9de2e38c73052bc5e65119d03bb2b7838d0a0dfe4831333eb30234d201bd74e64a6450365991f03c4044b8e93511d9aabb68bd905
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5a5e73dbd50085cdd41a2a39cfb37cf35
SHA13dbf3c1fba69b167f9d7920b1542fccdc84b2d61
SHA2566b7269572d0612d0630b0fa36d26e532903e7220372a1ba51f6ef7a8473c2312
SHA512211d6ab0522ca2b3634b65211caf3fca8287b980334521b4907997598ef645043af5f4fbe3c836e1c0642e81171dc98bc7aa148b00001dc52b4770ed885e991a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5d284b4d3bc28c2165e004333f33ceaaf
SHA169557bd89b463834e9f9319c52685c03fe90a8f9
SHA2562f68b2f50d49466eff61bd8d0ae1eb56dadafa51a240768857561417b173a8cc
SHA512c860d5f763eb514947c78775b800d131672705558b97842d1abdf67c9325fa55ba67bf194aa4ffded81a18440e8cb6314e5a5dead5c55f9034b2c4d614506fbb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6e36e9.TMPFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5c7adfb4d6382ba8a1824d0dd47a6fbb3
SHA1ac605c2b148e27a13b3087fc8d1783876ffbb6d6
SHA2561994feb14b2e56cd2196f655e59f2d521e35b87f513d931efe6c33746dbb382e
SHA512e4ce7c65d226dafdcc59a224b59df5a522dc61839bff81724cbe1db8ee8ca8a8c2510f567fc5110f17697211c5a78f987769af1b972c22726c845b54bdff716f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD530c46548afffe88b12aaa5e81a0656e2
SHA18c5cd3ae20d3ff300d29928128c0fb112da7fb10
SHA2569ab9be04e558d92e7d259a595dc5a5ff317ef9496196858f2a8a308684290c44
SHA512fb42f347e0b3c20402099c16e3f2fb73edca4ea7725a276570deeed015288f7fe426f81d8391132c51dacf850bf749ff58ced2eb7659ee43f78add1cbdd9fd9e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
5KB
MD553ed478637831a3db4651469b35e16d5
SHA1edd24fcfb30eebf8ca9c7b03a067a6e7c3dc41dc
SHA2564bc698f9ac291f550065654c3541420896ef1e15e0f3e3033d0dc0500712a18b
SHA5125cdb7ee9c146c5d67dbc9db939c1c54623d067daacb10fb32677c40c1bb53417262a8f529238bfd3f6e02ec8d0e37ff94e9441f142c1ac6087247126c53353fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD53b8055e64f60d0aa8c0c2277edbdb590
SHA17b25785d9d71b2cb0aa527c2cdc47edd03ac310e
SHA256bb80deb7ddbe865685eccf1b1d891300ed77b29aca8b7b1e486f77baeb2cbbe2
SHA51283cb88fa9529068c8f17e74fa6913e4023f420da2034e5e6dbc999652d873487ca09b70722b0231811da79b1d0f56f9b52c26fd102ee4f14f38d21580d2f7edd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
5KB
MD5968139ced569442b7e349d3e4caa73b3
SHA1034b18b597a4098edeb0a26bb7d220ad7736ab24
SHA2566604c4cf3996001819456d77a0e0eb09a33127cfa5b62fc7aac790b8d7d71e4e
SHA51252aedcf7149d58402432a756c71bac9f1a9892b8b89bbbba577df54ba56542c3ed3b81d9f01307b2f898590556b24368aa92d25939c887de30288218d7604435
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5cef6eb77640771d0153754bf739d4917
SHA1eb0bb54f631bfce14b3e5c0ee291cc28b332f0d2
SHA256566f92855b8b9aae0a1937acfcba7e8d386f2838265404a6ed4d4d900bc52d03
SHA5124bb073cb6cfad451807cb49ee493422828e74d68c22313463ff06f607d884531c9df297699d5a4e21b6742be382ad7c3ac15017d8f2c45c9105405545250dc64
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5aa42a4bf2a7cbb5d8a4c257c5c23ae66
SHA15434f6d68799ab8f28c2c62056d6368a7fd64201
SHA25665f89655941097b500ff6c1388696afaac7b8c52b7c736fe497a5397c8ccf630
SHA512765e5b1f47cef3afb87540e7142bf8cfa4ea5d80f56afba8ab6d43e009ece2aab1ba21749c4dccba26821533b9770823817fff64b485a26a9660f2e00d9d9a7f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD57609d815b23fdc170e2fb1bf9b61e5e3
SHA1aa9b18e990c9ab4df68bd76e4e94e82bcaa93103
SHA25613542b443592ec3d1027c0ce331d5dfa360409dbe49eded79556afff870d2cb3
SHA512486975f4ab357c54ee92b9f0b5ad56955a281f47087edc778f9128f62ba0e33ef02499e1ea2efbed5f042dc77572aa8d47d5191b48dd19efcf2f6f2ba903f4c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5fa5bb3797661c496eb11224418284f18
SHA12df6b48108fba49856887eb3c91aad3b29f9a7ab
SHA256aac2b920979a919e89b6db500be0196a0a52413fe64fdde39ce9e47220531595
SHA5128b32f91ee440076952ef622f0a1ee7d46ea557a63ace91f55dac580f8846a1ebdb617a6edb78d7481beda80257939ceed3c3b6ec4694cf27fbcd1dcab4ffb5a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5848090b8bd8f207ffbdb04c4b4491b2d
SHA10ab1679b60dd51a8b7bf60bee6d66921b5c13c53
SHA256aeda78e7621cd6bb4764c6a5b2841af8a9c854b7efbac185448026acbdeedb8e
SHA512c74d70e45a0591eafb5f31218097fc94b136a2060a159a61aece6b115ac53a0d6760405c8c1c1ee1a8d8dcc82246132b9c701b57c5695ce897b4966fbf99006f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5e80b97da5fa75b272bf91ff04eb2e273
SHA1b906ccf1a9d3beb8f38db067b7ead8adcf7cd4d9
SHA256b7aa11e66a8b74d87fff4f7d4334facccf0dd937758a7326ffc8c9d583e9661e
SHA512210f3a58794e69cab2c9fac98a723fde7d9b43f5b80b1eb6dd99d5c863a2fe723be3c9f4ff7ab72ffc23239484d78dd369e279d0b98a46cda621d57f7df70707
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5ba321c739253edaba1b9bf0536a5e08b
SHA12f04754d74644dcdfaf45016dfe526c6002e3aa4
SHA2561cf26c0bcef15b1c7542d86e125f6ce0d1b8a422afdda15e3d8d4c7b3f0040ec
SHA512f34afbc23cf8ba20935dc5ebed0c6a0d569fe238d7dea904ad0c0b7e08c0e888966e6767b321d5167c3e8459323e07d32c41832c2fae9a62f3e504e4890f4e40
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD55389e306026df91a1ff786d42c7681e4
SHA186281c861eaabbb3350813233714ba1ff94034c4
SHA256e3e819981664483aeee9177ed95ec955e7d439fbbcc3fc7391e539ca5449aca1
SHA512086c42d5fee7e47491b62464e771d64b9858cf93baa912807432747d28bfdfce93cb55b623cc8cbb72478982ed66d6b10f029833fe568470ec28dfebf529983d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
363B
MD5d2cdadbe9a6dcab9ad8822b619b97a6a
SHA19d9e01fa38c55532a05bcfa51ffe982fdb7defb2
SHA2560b91a288775225b0e31b28ea7817b602bd94f4f598a9feedacf25f15309c2790
SHA51249ca3eb97d7818b160a70c86923bd4910030a32b21b3dcd1d07de625330ab9c67c1826e33795e1ee6f508d35a999be98770bddc24f0430bad14c15692392393f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD5c25b07c59522d509aee3ae4285c648bd
SHA115ac406457c830e175e0a71179a880ebe52a5cac
SHA256ccacdcfd0601156d9f5111d2c2f70c0d871e0d7bea627a5f29837a8ad230f691
SHA5126b0290ff15b2760ee26dd36afa69854ac874ef9c25a80353bd200bad2b458cd8676a5a816ca6fce508a55592b10bac74fa3dbb231fac4cbe3677dd31c1dd5273
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD5b9fceba33fdc9bd1718c3a9c062f7f6f
SHA1d25e3cf70915ab0d63362dcff31dac102d229ffc
SHA2560e2463060fd87f6e0d54c9c48cbceb70955bbbed9107cc89496fab0c07307903
SHA512e03c358771de58a45e9fd908f0b5d123ad2276403186c2b1d003f4d095e0461d838f528abee59a58536d0648f8656a5de63233c6e169c4533f1f71c49da5aa6c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmpFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f88b909a-5f39-44ed-850b-090c165bdeec.tmpFilesize
4KB
MD5fff3f96ce65ef3a4b966eca8ce85acd6
SHA1a9c1b90a02c026b561343a368142f0b02d26ddf5
SHA2562186475075c2351732db1ac5dc7471633226720c167b46561220d6e8581d16c4
SHA512a5f43cbf6c0b1985fc24341b7a33c4c47a4eb54d14a86be87e4d416358ca6aa955bde74090e560e1e68fc9503b6bb732e3ac389e4c9078efa3f4c9f24a6e7634
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
173KB
MD531076928fc0c90a3fa3063b97a2651b1
SHA1a905fbc8bec252e2cfa0998fd804e2f7a0a050c5
SHA256bc2ec2e8581aafcba4b84fe213c8ef7a0b481041ae143c83a4bcf7395fa2ed2b
SHA512b03ec70ed122e94b2d34ce64e4286840bf83245c75e6022e0bd216842be5324da656583172f3ec2ca8bb3aa4c70640397dc9b2579a9ef8b1c1265f2f345e502f
-
C:\Users\Admin\AppData\Local\Temp\TarCCAA.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
\??\pipe\crashpad_544_XJYJZMRXWCVHNYQIMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1664-96-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/1948-54-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB