Analysis
-
max time kernel
269s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 04:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.es/url?hl=en&q=https://google.es/url?sa%3Dt%26q%3DWw%26rct%3Dcv%26esrc%3Dhoti%26source%3Dinx%26cd%3DDJCG%26cad%3D2A6N1w%26ved%3DVn2SypKkFKvZkv%26uact%3D990%26url%3D%2561%256D%2570%252F%2567%256F%256F%2567%256C%2565%252E%2561%2565%252F%2561%256D%2570%252F%2574%2569%256E%2579%2575%2572%256C%252E%2563%256F%256D%252F%2532%2579%2563%256D%2577%2536%256E%2573%26opi%3D7264657763966%26usg%3D9TdmvuKPevt4mE&source=gmail&ust=1709019341740000&usg=AOvVaw22mlh--kd9HxYl-j3d0cXL
Resource
win10v2004-20240226-en
General
-
Target
https://www.google.es/url?hl=en&q=https://google.es/url?sa%3Dt%26q%3DWw%26rct%3Dcv%26esrc%3Dhoti%26source%3Dinx%26cd%3DDJCG%26cad%3D2A6N1w%26ved%3DVn2SypKkFKvZkv%26uact%3D990%26url%3D%2561%256D%2570%252F%2567%256F%256F%2567%256C%2565%252E%2561%2565%252F%2561%256D%2570%252F%2574%2569%256E%2579%2575%2572%256C%252E%2563%256F%256D%252F%2532%2579%2563%256D%2577%2536%256E%2573%26opi%3D7264657763966%26usg%3D9TdmvuKPevt4mE&source=gmail&ust=1709019341740000&usg=AOvVaw22mlh--kd9HxYl-j3d0cXL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4188 chrome.exe 4188 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe Token: SeShutdownPrivilege 4188 chrome.exe Token: SeCreatePagefilePrivilege 4188 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe 4188 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4188 wrote to memory of 700 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 700 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3992 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 2240 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 2240 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe PID 4188 wrote to memory of 3440 4188 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.es/url?hl=en&q=https://google.es/url?sa%3Dt%26q%3DWw%26rct%3Dcv%26esrc%3Dhoti%26source%3Dinx%26cd%3DDJCG%26cad%3D2A6N1w%26ved%3DVn2SypKkFKvZkv%26uact%3D990%26url%3D%2561%256D%2570%252F%2567%256F%256F%2567%256C%2565%252E%2561%2565%252F%2561%256D%2570%252F%2574%2569%256E%2579%2575%2572%256C%252E%2563%256F%256D%252F%2532%2579%2563%256D%2577%2536%256E%2573%26opi%3D7264657763966%26usg%3D9TdmvuKPevt4mE&source=gmail&ust=1709019341740000&usg=AOvVaw22mlh--kd9HxYl-j3d0cXL1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xc4,0x108,0x7ff8f71a9758,0x7ff8f71a9768,0x7ff8f71a97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 --field-trial-handle=1904,i,1429215684347377156,12209524444852441024,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
144B
MD5d4eafaea8dab44e8a6aabbf454ea10af
SHA102f1520d1434b137492e97f1fbcac72452af5999
SHA2561f9c9014fcc9e6a9f28a33c6b39c97945b07c07b81ea0747595563dc0f927a56
SHA51229396d5266c5902091e13d7b382d09094b6190333569fa9c5ffb61b4369e297256c97a2f72a14023a569992eced547a20348190e0ddff8cefdc0c097655440d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD54c1d0f7cca9b1c3bd0fccca2bc371467
SHA1e7fc40cf03c77dd49130056c540c2ee585ea34ad
SHA25632ff5afc3f23d0bc0ebfc9d12e2a0f00956a59f4932d31bde8ae04711ff2ac97
SHA512c47ecc4f3c4e3140bf2ee803b90734d3998dfbf5dead79055b828a1243934623525be1abc0fe8cce95c9a5827fcf5a49242fbc3a119fa622a6a43062612d4bf9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5e5852e97744def8d771693667b39c440
SHA1a7748be6e04eb62b1e135916fa066341e9e812b6
SHA256eb6909997d833a1aa6443a6c969eb9f3b94b0d21bcddb4c423f28a8a003e93e9
SHA512a55323514a2b31ce4c8bdbe7a70b320209d35befe5de9d2475159df4f829a20e60657540bbe58f048c97b6f4220e3aeadf700cf016b9d2327d4ef148ac5e8948
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD5be964f952c4ae8b00497734cddd39d6e
SHA1cf46894de99fc91ee861f7ed01cdb99ffc9e9fc6
SHA256ed1d200a319f879853a1d6bd90dab4aae3631a5e8cbfeca5d216dc5789c91802
SHA51297a5e36cb37b324c36cf5ceee55d334b9d2dd57ef3d7e16bbc9696abac465d576cb81157e7ea386daf0bcacdbb3a408480ed24a5a07be0ce89831268da9cb345
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\ca2ddfb2-4208-4f2e-962d-5a5fef2054d3.tmpFilesize
2KB
MD56b14c38a8d3e10753e0ff205c66ada5e
SHA17bb2f9a7c0546cff1868f118e393473313cb9b99
SHA2561cb9380f868943fcbe96ac4cfcbcc8254a049c311b61d769cd3f0a8749147911
SHA512c528d1f52dccdbbb0fa592449e3dbb4ea600ecb1b693db076f3da87ef3a0aafd6afefbf05c69a3a640d9e65b8d138b900a5f8b717b5ea5b374fe2e3d08e5a554
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD53cdf22dfc3f0f2982ff2af6aa1fbb5ca
SHA15d542575e1a3070fecd97f14db86bd3df7abe77d
SHA256115217e3118774da19c55ff4fd983a02c8fba0aa780a97f8ed7ac2ec95570b08
SHA51293df160682085112eeafe85e3ec5c47201e398ae5e8aa9b41d6fa64225dfbad9ce8f6f7fbd6f115242d60455f5cd257c1edf2d4fc775a2843613192103e9b4ac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
128KB
MD57d57746cc32e8c97e392f3c65d4fa7cb
SHA17bb212e0982f3de944cdf7317388220546ae2540
SHA2561ebf4095faf806fed24c19b790a2ebb57abb4eb0bf7eaea282bc176e619a2e91
SHA512fad138ff8c5e622fb8f29ffd9c6d41f67c84f8b8090e4f4a74f78ec970d92539671f3b9fbea4a18322b61edd3afc84ef4b154db01005911c0b56d0e82a936c25
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_4188_COYIKYJSXPLNKAHWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e