Analysis
-
max time kernel
1200s -
max time network
1203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2023 04:39
Static task
static1
Behavioral task
behavioral1
Sample
MBSetup.exe
Resource
win10v2004-20231025-en
General
-
Target
MBSetup.exe
-
Size
2.5MB
-
MD5
1e885823577394ea61ea89438ffe2954
-
SHA1
e53e96f7374790bdad8a614949b398b055c3a27b
-
SHA256
7c0b9bceed390f7f28135431c09ac51469ee8e2b8095fb36a37315d811d9ba9c
-
SHA512
73f600833dad0047b6444110d722dc95237b38bb486abc7fc8e4f59b69e2154c885fb46d65f488d5139a0b6e76ebde33ea72711c7f58436650ef992fb8995627
-
SSDEEP
49152:Lw3ye9SPQ1sjDAVj+JeRanStQyfvE0Z3R0nxiIq2ddAsuysSiSF:4yeoCVj+c6KtQRq2ADSiSF
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
MBSetup.exedescription ioc process File created C:\Windows\SysWOW64\drivers\mbamtestfile.dat MBSetup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
MBSetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MBSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate MBSetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
Processes:
MBSetup.exedescription ioc process File created C:\Program Files (x86)\mbamtestfile.dat MBSetup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133440648035730744" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
MBSetup.exechrome.exechrome.exepid process 2144 MBSetup.exe 2144 MBSetup.exe 3484 chrome.exe 3484 chrome.exe 5976 chrome.exe 5976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe Token: SeShutdownPrivilege 3484 chrome.exe Token: SeCreatePagefilePrivilege 3484 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
MBSetup.exechrome.exepid process 2144 MBSetup.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3484 wrote to memory of 2292 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2292 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 5088 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3048 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3048 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2452 3484 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MBSetup.exe"C:\Users\Admin\AppData\Local\Temp\MBSetup.exe"1⤵
- Drops file in Drivers directory
- Checks BIOS information in registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2144
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff9678c9758,0x7ff9678c9768,0x7ff9678c97782⤵PID:2292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:22⤵PID:5088
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:82⤵PID:2452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:82⤵PID:3048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:12⤵PID:4512
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:12⤵PID:2720
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4688 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:12⤵PID:2220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3776 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:82⤵PID:800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4992 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:82⤵PID:4320
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5268 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:82⤵PID:2888
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:82⤵PID:1184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:82⤵PID:752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4848 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:12⤵PID:3644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2696 --field-trial-handle=1908,i,5907022864974807061,4257463724181731523,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5976
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD50124b315d5b463d9053822741064b942
SHA11b025c7ab35113dec0ca105c27e52b9a31ce56d1
SHA2569e49d5d63593d3af630d18a3c36dfd31670ca66e71ec4107ef6937b731dbe094
SHA5124f56f48b0673c0c4298f2168e67c17d634974ef170a06a8808ebe6ff04f1957915c12eb7ecf117261288d2f2cdd442193fb18fb3267b57997c510006b9d8530f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5980b953ddccd6458860047cc696fa789
SHA1f2fb77065103d251498cd47e9680a66c2f81226c
SHA256bc414ac2057daa3c4b78d02dc1f758ef5ab2fc087b58b161a7c899af6b440c46
SHA5128c3e8306ef3c0fff80c27934aac1e26340fc36edc6d6c62cd6b3b13bc80fdda5bb467ee2389c0a45057d0f7e9c10b1b13c1b9268c8b09f25debd0a5be17f1bb5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5d183a4c3146884c24d71b597d1d75d1c
SHA1e21aa7da4da4a66359bf2c035a867a5401b76177
SHA256182192b854a5997a398d3742378f233f8351d33f08c791626385c01d0a676c1e
SHA512366f0fc72dfd39e1ba62499627f00093fbac6dba739e53b087c1f2e78b0927bf1d290235867aa419619eb3018015b2134a8b602925a0a2160fdb0ed2328fae79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5252826247b400d15e04e4a71495c5050
SHA1f144425b18bc735c2808444216b8f46d6312da7f
SHA256a6c0154cf494a199bf0315234a12073c8045703bc2a57cdf71cde7b503bbd802
SHA5126fc04cc609a375f49f47cd40b3b66764c908474465691ddc0d168c0034f06345a75f1135f5ec5eefcedad811078581151ce1c2c3f0d656bc386c213f8e35d16f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5ec4df4b3c3dac2eb939bd8940af204fd
SHA1473691d9764f5fef19af4fe4d010a4e3b54a1504
SHA256c5ef70e8eb9397f47ca04606065f983bf9847d3ee6c2c746d5e32500c56b8130
SHA512e3b778d06245a918a6cde5d41510968ed9960e8128e3cf0cb1451203692dbe61e8e96dd60f7ad5f6ef521511fb2cce83aee9bdbb94cf4891a8edd22863af7d7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
367B
MD518e8467e8b1d4f6c589dbd75f006c277
SHA108bdab3939275f3df26c004ffe88b17696188a70
SHA2561aa5f863440b623767afeee2cd8a0eeb7af717ae9f77ecc8c96d8c8d7f2a9e78
SHA5122cd067116e2aa58e8b8a2f6ab42577f98c344f97c66af53b2d5f04a530f20232c8d6b0c58b56fa72f29a04986efcdb33440d625cb451ac8b63ad861d447276f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD54dc173afe56c3b2804b673328cf297ea
SHA1dd7a738f1d4dc78f5979d08c92d8fb26adba4b2e
SHA256a5e0214cda3e5ee78a7ae33788de617c99f049e5e28eb738e774c95e7cccd730
SHA51236e98d217a728821de49b0c5218ccc324233a686a80f0406396b3e35ee06f526c9c06e39fe1dd8e37c865a821784a5818f66c99d0c71210b0852e842163cbddc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD59e141b5253a7a6c421d11d564501674f
SHA1654c5efd0d3cd2ea0d8aa98d9f2fce17f82ea3b2
SHA256fd50b8a281de9e5d97799d6ee085ad069de6a5fa5cd177873834d7adb9560225
SHA5123f603e6d71bb3f6e29b8f81a632925d32a621d05667ef3fbd186d102672f4f1d51f71b7fb9b546d9bc4730da841196787e812f0f041a4aa6aa9f4a2c0f8b591d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD56c213a21bdec99cb5303c19b778d0295
SHA118df2731523f36bf4b5deb2a57646421a8ada430
SHA256f2480c3213403fb5563c968f071bd1eb1637f56915e6f6445057a6f0d6f689da
SHA512b613fdeb2e6d5ccde760d09f9106498bc329b465f6240e7531ce32bfc5b87caca0980c7caa75468419c166987e505ec19e3a940d92069d6a45db5630a823a6da
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5abab22c59c1f66089590000aad7b0ca7
SHA106af50d1b898d102ab53229021acf9c6b4862b31
SHA2562dde47be85af51cd082c984a161399427b97a7ea111bb828cf48f74c527c2fb3
SHA512e422bbaeedfe11cb242e46486802bebe6f4b1048538ba98a3c7f2d39eb344a3dee6347ce241c55c7cfed0019afe688bb6b94a41f8da7cebf1ae07a65fdbff4fb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
220KB
MD5eb325a0b5b39f1f7b4a7123de8be0567
SHA1bfb42d1924b063f0a82f94c5a0e50f4fbcbb860e
SHA256c692ef7ad85bf94b5bcf6dd81f549c84fd40b6c9db98f43840c09a22763b98e8
SHA5120924fa49278b62413a47214f03f45407ba6a56b9423b03444ac4dbce807610fa159e20b998bfdfc7e5115b8d340a61dbe9575ed8b6a0064b697d7733bc93f71b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3484_YSVOVXSFUCGTJFGQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e