Overview
overview
10Static
static
10Aurora/aurora.exe
windows10-2004-x64
1Aurora/web...IX.xml
windows10-2004-x64
1Aurora/web...e2.xml
windows10-2004-x64
1Aurora/web... 2.xml
windows10-2004-x64
1Aurora/web/bot.html
windows10-2004-x64
1Aurora/web...s.html
windows10-2004-x64
1Aurora/web/ds.html
windows10-2004-x64
1Aurora/web/index.html
windows10-2004-x64
1Aurora/web...min.js
windows10-2004-x64
1Aurora/web/js/main.js
windows10-2004-x64
1Aurora/web...r.html
windows10-2004-x64
1Aurora/web...s.html
windows10-2004-x64
1Aurora/web...c.html
windows10-2004-x64
1Analysis
-
max time kernel
63s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 22:44
Behavioral task
behavioral1
Sample
Aurora/aurora.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Aurora/web/4x3/MIX.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Aurora/web/assets/Ellipse2.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
Aurora/web/assets/emoji-heart-eyes 2.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Aurora/web/bot.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Aurora/web/commands.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Aurora/web/ds.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Aurora/web/index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Aurora/web/js/app.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Aurora/web/js/main.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
Aurora/web/rergister.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Aurora/web/settings.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Aurora/web/statistic.html
Resource
win10v2004-20230220-en
General
-
Target
Aurora/web/settings.html
-
Size
61KB
-
MD5
3b88dccfbe45812174b6ca51c3518cb5
-
SHA1
819c0c37389be53989ca25c3529c1473bebd0d64
-
SHA256
1b88624936d149ecdea6af9147ff8b2d8423125db511bdf1296401033c08b532
-
SHA512
ebcd9bf0fff3959299be89ca79d7e73968204e367fb827fd4f71f2818aab8fdb6d23d517ee2a53e5dc775e9d8d579753742c9e784bda2f581542bb1ad1169cf6
-
SSDEEP
768:wEEXWWJX+ZFQWbV8KZ8KB8KH8KC8K98Kb:wMWAE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133290171464716495" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2120 chrome.exe 2120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2120 chrome.exe 2120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeCreatePagefilePrivilege 2120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2120 wrote to memory of 4876 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 4876 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 3444 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 1184 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 1184 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2816 2120 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Aurora\web\settings.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3e299758,0x7ffc3e299768,0x7ffc3e2997782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4868 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1832,i,18011566527201606402,17980179631813383778,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\79392d4c-1be6-4179-9822-ca804f6edb32.tmpFilesize
6KB
MD5e78f501afe67bfdf0965c0dfa9043e65
SHA14988c1685c7c011673a7ea10fe15e275ae398591
SHA256a823cdd33ffa7c29e2b7eec9f5c45914bc49a25cfd5c62f0c56177d877ce1a34
SHA5123de2c10084b49a78c94099aef6a8bce50a46d17ba1ee93ef9bd39a8517c664a4b157a8c408aa4d86df3be632d2c0b1300b9c7c56448e2ab5591d8546d659514a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD5b563bf3e525aaaa973e9ee88d5ece9d2
SHA1a98a787d8639302d9c9f894a3ffbb1479a30c78a
SHA2562ae9adce8dcadb57224e95e0c544135dc16d5ffecfb7cb06d24cd7fbfb3936da
SHA51252c417d94e98de3e66cab72b4381aeb0ae3720ac51855df1d6da5177901b47805fdebead3084ff7ae2a5119e021e129c1b422aaf831763347c961661a4488a01
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5ecd8e1d90ba0775f03dd224ec323356e
SHA1f993b29734dac2195ecc89ab0401565f83909f29
SHA256554beb0b57b8ad79dfa6885810a6a210de8613469998db3ba4f7115b99ea9f4f
SHA5121acbc4c03ebcb1312b033a6ce74688ec090658c85930e91ae91a724dbb065cda0786bf34e5117ec739238d5ea6423c6fdd77ab59da7f1010b4fa6b1f5638a3ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5be49b52a6a2511604e42ef4d29d9ad1a
SHA180ef43a570adbfe583137d900d569546a7784d55
SHA256c07d4fdf5dea2fcbbb115e6d6f426e86a09723de71a2c42b5a42f6b759f1c896
SHA512c7175b36e39fd60d5d20b9863f7c5305de6e3be5afed48d448cfdf17cd42fbbd8abb40cf4c592d55a0fceaceee62d0e0f652d2baab2c9bb0a0ee31e8d8e7824d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
72KB
MD58fae5ea3733d24d46aa38d27b52c2f5f
SHA1430c9b993f0a92a5ef02efc799a42cbd6b136279
SHA256a90d18e1fd4a009e1037a1f5241107fca9a26d0b495821cb0b47c41da8ff4871
SHA5127431c0ef248f2cee23a5fb658aba1ee60759b72139c58a258b11bb85a817f3dca7e56256389f7abcbd96fd0fb0d6b5bf89ed3e4d062b14407ede568ad1e51bff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
152KB
MD521192ece2a184bee9c788ca40fb13265
SHA1b7b18cbc12ade64e5085cfa62adc68a95752bc30
SHA256ae55df60f2bd66286f8c53b555f1b8cbdb81b145e48eb496753685bb3b226533
SHA5129b25ad1bc9e0a8ea77fd81a9446d3511cdc8f7d7f7ae2c63c8a7685e4a8c16b524f0e52c2cc43ef5877629442d305e36908b48107e72924283e5567c80ff4204
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2120_LCSPXCHYNXCHGWCPMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e