Resubmissions

04-08-2023 18:32

230804-w6m2xadg68 4

04-08-2023 18:30

230804-w5zpbafa7v 1

04-08-2023 18:30

230804-w5lgpadg63 1

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-08-2023 18:32

General

  • Target

    http://google.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 14 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://google.com"
    1⤵
      PID:3996
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:520
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2672
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3300
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3556
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4044
    • C:\Windows\System32\DataExchangeHost.exe
      C:\Windows\System32\DataExchangeHost.exe -Embedding
      1⤵
        PID:4316
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4456
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3876
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:2108
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:4732
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe434e9758,0x7ffe434e9768,0x7ffe434e9778
          2⤵
            PID:4460
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
            2⤵
              PID:1772
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
              2⤵
                PID:3736
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:2
                2⤵
                  PID:2308
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:1
                  2⤵
                    PID:4472
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:1
                    2⤵
                      PID:2260
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4432 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:1
                      2⤵
                        PID:1140
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4440 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                        2⤵
                          PID:4788
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                          2⤵
                            PID:1272
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4660 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                            2⤵
                              PID:784
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4928 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                              2⤵
                                PID:212
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                2⤵
                                  PID:1152
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                  2⤵
                                    PID:2868
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                    2⤵
                                      PID:1096
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4564 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:1
                                      2⤵
                                        PID:1684
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2948 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:1
                                        2⤵
                                          PID:5072
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3080 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:1
                                          2⤵
                                            PID:4204
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5248 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                            2⤵
                                              PID:4272
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5324 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                              2⤵
                                                PID:1288
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                                2⤵
                                                  PID:3048
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5376 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                                  2⤵
                                                    PID:208
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1860,i,5321269986457176239,14728466341727496959,131072 /prefetch:8
                                                    2⤵
                                                      PID:5060
                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                    1⤵
                                                      PID:4288
                                                    • C:\Windows\System32\SystemSettingsBroker.exe
                                                      C:\Windows\System32\SystemSettingsBroker.exe -Embedding
                                                      1⤵
                                                        PID:4184
                                                      • \??\c:\windows\system32\svchost.exe
                                                        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s RmSvc
                                                        1⤵
                                                          PID:4772
                                                        • \??\c:\windows\system32\svchost.exe
                                                          c:\windows\system32\svchost.exe -k localservice -s SstpSvc
                                                          1⤵
                                                            PID:3656
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
                                                            1⤵
                                                            • Drops file in Windows directory
                                                            • Modifies data under HKEY_USERS
                                                            PID:3264
                                                          • \??\c:\windows\system32\svchost.exe
                                                            c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
                                                            1⤵
                                                            • Drops file in Windows directory
                                                            PID:308
                                                          • \??\c:\windows\system32\svchost.exe
                                                            c:\windows\system32\svchost.exe -k netsvcs -s RasMan
                                                            1⤵
                                                              PID:2408
                                                            • C:\Windows\system32\AUDIODG.EXE
                                                              C:\Windows\system32\AUDIODG.EXE 0x3f4
                                                              1⤵
                                                                PID:1908
                                                              • C:\Windows\System32\SystemSettingsBroker.exe
                                                                C:\Windows\System32\SystemSettingsBroker.exe -Embedding
                                                                1⤵
                                                                  PID:236
                                                                • \??\c:\windows\system32\svchost.exe
                                                                  c:\windows\system32\svchost.exe -k netsvcs -s RasMan
                                                                  1⤵
                                                                    PID:4444
                                                                  • \??\c:\windows\system32\svchost.exe
                                                                    c:\windows\system32\svchost.exe -k netsvcs -s RasMan
                                                                    1⤵
                                                                      PID:3428

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000011

                                                                      Filesize

                                                                      21KB

                                                                      MD5

                                                                      7d75a9eb3b38b5dd04b8a7ce4f1b87cc

                                                                      SHA1

                                                                      68f598c84936c9720c5ffd6685294f5c94000dff

                                                                      SHA256

                                                                      6c24799e77b963b00401713a1dbd9cba3a00249b9363e2c194d01b13b8cdb3d7

                                                                      SHA512

                                                                      cf0488c34a1af36b1bb854dea2decfc8394f47831b1670cab3eed8291b61188484cc8ab0a726a524ecdd20b71d291bcccbc2ce999fd91662aca63d2d22ed0d9f

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                      Filesize

                                                                      528B

                                                                      MD5

                                                                      9746e022830d8f6f81cfab6b1f915f40

                                                                      SHA1

                                                                      096ee07bf515f13467b9331d623ecf99a0220993

                                                                      SHA256

                                                                      57b1df6cda9fed473959f64a3b764d4aa4cca7a1927dd613be475af03df3f17f

                                                                      SHA512

                                                                      f6bbf41fb2d077842e76c32752b76b4aeeeffebb18fdd61c17d166bade9390f8554c89012b6ee57077d63ac146cbcab76151c0b49b5c3fd019a19324a9de85df

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      872B

                                                                      MD5

                                                                      86ce84200f9e0dbc8faa225161114c0b

                                                                      SHA1

                                                                      e80cbff6da31bb1673a72e0a71bccb27a2cacc4e

                                                                      SHA256

                                                                      4cd18b55f8fb6b62861e973fbcb34c9dbd3211dfe01c25d216bd7fd7d14857de

                                                                      SHA512

                                                                      aa2087d2bd2e8ea39c83eec27f0ea102702b457a6cce53703f23f748a21075bed42a9b91cac67670b3bdde90f6f91c8c2d88288bcc933f2a9a4fc1b03e0bef63

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      172ed86ff8f3df813a637b1824586940

                                                                      SHA1

                                                                      24ed9ca5f9ecfdfbb973e1a0b7cfd09bbc7e1c53

                                                                      SHA256

                                                                      92b5bc3624e2e0d0fcd2fddd940ff6bec68df3f94e44dafb130a83fe78a8d284

                                                                      SHA512

                                                                      650f6fb5810ab05e3c88684eac077d681e0e2f0812dcc8464ee92dbee9334187a3c75080f21684ee17761a7b342fe774a2a0c5ec6246d36c7902a8c25cff311d

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      c695e1d4a483d96a342fd78f612eb816

                                                                      SHA1

                                                                      9819093a2026d519f1c2a975e3f641738d6e91dc

                                                                      SHA256

                                                                      fe70283fbe10f62e2b5091208ed649e614a4f4b2bac5dbc82086b1f8c4205f0a

                                                                      SHA512

                                                                      1aced95552cae1529ab820e5a9108f27457887011b71affc4439aa7a41028a39102de3968fa2f70a9a009059cf0ef1302d7ccd5461321f52ba21308f9e6ac6c9

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      9445e9fc8c7fa9f8d19155fb564458e9

                                                                      SHA1

                                                                      0b442553daa73542b50d218d8cbe0e8d23afc2fc

                                                                      SHA256

                                                                      e0d7af8dc07509e2c5ccc5b18ed8b5ea302ffbb26004e93595f30317109c1d0a

                                                                      SHA512

                                                                      ce1786928cf46d76482c0b4fd8e28dace10f1da3b77ccfd3fa106820b4cb458cb3abf1c573c937cdec3167efc1a333b3c0b5d41ce4bc8d635456b1fdcb935a15

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      c2f45f2fb5fbe01f8e967fbca5496484

                                                                      SHA1

                                                                      3bcdb1b1a8b4e6ef433974a02d9f033f282c4702

                                                                      SHA256

                                                                      cbd6bd2c08d08a1d54367ebff280f4ed3d12b5e3de1f018a765717416a45d5ed

                                                                      SHA512

                                                                      343c86a27689a3d40a6df14edf14b17e6ae11615f8ca04f5cbe98b35eedc2ef87353daf1655556e6c010d4fec55a6f461ef94c43201cf819729e952e6716d233

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                      Filesize

                                                                      56B

                                                                      MD5

                                                                      ae1bccd6831ebfe5ad03b482ee266e4f

                                                                      SHA1

                                                                      01f4179f48f1af383b275d7ee338dd160b6f558a

                                                                      SHA256

                                                                      1b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649

                                                                      SHA512

                                                                      baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe595bd2.TMP

                                                                      Filesize

                                                                      120B

                                                                      MD5

                                                                      6c5abdefa42c95eda9b8b3b5c6f16eb5

                                                                      SHA1

                                                                      b2116ccf94962917787d943d6f6fc20b6488a83f

                                                                      SHA256

                                                                      55a592f906e9531a59054cbe3d037ecffc22d9232bfed64284469f5983403335

                                                                      SHA512

                                                                      eb5bfa25e6c6bcbcfbc2e3e503961c95fb4a0c6200f27c04407e8e2c99e4fbe0622376ffc69a47bdaca24ac0ff701927568d01736891ae16f410a55db18cfb2c

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      177KB

                                                                      MD5

                                                                      7b03802e282619790926166e96aefda3

                                                                      SHA1

                                                                      e04a486f33568de273817fe3c4c487aa56b39621

                                                                      SHA256

                                                                      f8afa158ee3a7adee1ad0f36b2fd0f13ec2b6fbb4e062ea1e26d3dced67e3b34

                                                                      SHA512

                                                                      02f88316ee7f34b49d4a85749b967f454d7a2f147d9a90d5bc1126a8990e759ace622163fe7546271f68c7664e385478f3aa5dfb317867db34640db4acec067b

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                                      Filesize

                                                                      95KB

                                                                      MD5

                                                                      1156b7bd2a58031aa9264d5e02176d3e

                                                                      SHA1

                                                                      2acbaf7178350baba444b15312ac4fb9be0766bd

                                                                      SHA256

                                                                      3e75b678f742ff39bb7cbd457160f9df43d54665df04b16a088e41ff5547afc1

                                                                      SHA512

                                                                      4dfee0289b087ee71e4fe40d2e7561a27bb490dc4ebce0b7f93f0bed57e8b6ca46a23708b0b22f06e5d6b344a9864d6cb4d9c15103a5bf53539b5d80bcb31dbf

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5990cc.TMP

                                                                      Filesize

                                                                      93KB

                                                                      MD5

                                                                      9875520b4f3cabe6ca07596791d2a106

                                                                      SHA1

                                                                      c4a38e3872a1d9fc561d0600559ef3c8c24add01

                                                                      SHA256

                                                                      af31a80b55d3021119e6c8da32562ae9bc8510f1f2dc011a00c2eb89967c3ec1

                                                                      SHA512

                                                                      3d6777cf2a08a12dbda71a0033634f437179e4827b2037810da3063503e697251160ab08d950e4bc52b750eaef319975ac6ac614efab7d3cb9edabcfcd1dd259

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                                      Filesize

                                                                      2B

                                                                      MD5

                                                                      99914b932bd37a50b983c5e7c90ae93b

                                                                      SHA1

                                                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                      SHA256

                                                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                      SHA512

                                                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      f7dcb24540769805e5bb30d193944dce

                                                                      SHA1

                                                                      e26c583c562293356794937d9e2e6155d15449ee

                                                                      SHA256

                                                                      6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                                                                      SHA512

                                                                      cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\LKO40XWS\favicon[1].ico

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      f3418a443e7d841097c714d69ec4bcb8

                                                                      SHA1

                                                                      49263695f6b0cdd72f45cf1b775e660fdc36c606

                                                                      SHA256

                                                                      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

                                                                      SHA512

                                                                      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF8E5F94C5E70B431A.TMP

                                                                      Filesize

                                                                      40KB

                                                                      MD5

                                                                      1107d15e5c2f66f393ad8b678291dd31

                                                                      SHA1

                                                                      c57c705525e0c9c6b18848da370e57127b8249e0

                                                                      SHA256

                                                                      444499172f51375e063e82f742c777d810084d0c6460d646492c3fada54e3bb6

                                                                      SHA512

                                                                      738ed86bbdc04c746664f2cda6d8abf90a9167a7c2b4e540d7c86510502398088ea1e348e19a17334b1ffffecd8c614eb290c8da5b155f1c04058512c1db392d

                                                                    • C:\Windows\INF\netrasa.PNF

                                                                      Filesize

                                                                      22KB

                                                                      MD5

                                                                      80648b43d233468718d717d10187b68d

                                                                      SHA1

                                                                      a1736e8f0e408ce705722ce097d1adb24ebffc45

                                                                      SHA256

                                                                      8ab9a39457507e405ade5ef9d723e0f89bc46d8d8b33d354b00d95847f098380

                                                                      SHA512

                                                                      eec0ac7e7abcf87b3f0f4522b0dd95c658327afb866ceecff3c9ff0812a521201d729dd71d43f3ac46536f8435d4a49ac157b6282077c7c1940a6668f3b3aea9

                                                                    • C:\Windows\INF\netsstpa.PNF

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      01e21456e8000bab92907eec3b3aeea9

                                                                      SHA1

                                                                      39b34fe438352f7b095e24c89968fca48b8ce11c

                                                                      SHA256

                                                                      35ad0403fdef3fce3ef5cd311c72fef2a95a317297a53c02735cda4bd6e0c74f

                                                                      SHA512

                                                                      9d5153450e8fe3f51f20472bae4a2ab2fed43fad61a89b04a70325559f6ffed935dd72212671cc6cfc0288458d359bc71567f0d9af8e5770d696adc5bdadd7ec

                                                                    • memory/520-290-0x000001D10E6C0000-0x000001D10E6C1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/520-292-0x000001D10E6B0000-0x000001D10E6B1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/520-155-0x000001D107390000-0x000001D107392000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/520-120-0x000001D108020000-0x000001D108030000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/520-136-0x000001D1082E0000-0x000001D1082F0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4044-227-0x000001B01F920000-0x000001B01F922000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-466-0x000001B00E0F0000-0x000001B00E100000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4044-463-0x000001B00E0F0000-0x000001B00E100000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4044-469-0x000001B00E0F0000-0x000001B00E100000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4044-468-0x000001B00E0F0000-0x000001B00E100000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4044-467-0x000001B0245D0000-0x000001B0245D2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-465-0x000001B00E0F0000-0x000001B00E100000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4044-464-0x000001B021D90000-0x000001B021D92000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-462-0x000001B00E0F0000-0x000001B00E100000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4044-325-0x000001B022EC0000-0x000001B022EC2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-326-0x000001B023F00000-0x000001B024000000-memory.dmp

                                                                      Filesize

                                                                      1024KB

                                                                    • memory/4044-317-0x000001B020B50000-0x000001B020B52000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-271-0x000001B01FC40000-0x000001B01FC42000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-230-0x000001B01F980000-0x000001B01F982000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-224-0x000001B01F860000-0x000001B01F862000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-221-0x000001B01F820000-0x000001B01F822000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-218-0x000001B01F7F0000-0x000001B01F7F2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-214-0x000001B01F7D0000-0x000001B01F7D2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-211-0x000001B01F790000-0x000001B01F792000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-206-0x000001B01F640000-0x000001B01F642000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-200-0x000001B01F4E0000-0x000001B01F4E2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4044-192-0x000001B01FA30000-0x000001B01FA50000-memory.dmp

                                                                      Filesize

                                                                      128KB