Analysis

  • max time kernel
    130s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 07:15

General

  • Target

    5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe

  • Size

    4.9MB

  • MD5

    f901967a06ab5123fc87e606be0b1616

  • SHA1

    894cc947c7b32e20c6ffaeb6fb8ef7c4a923bf44

  • SHA256

    5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396

  • SHA512

    0981a2fa6cdbb7b0e35a6a7376cea6b059c0b431e49bea61565d4a27c56689b78194b7a22211b84547543ef2ddb0267229759f34c0a23ac39db39a940e003312

  • SSDEEP

    49152:aEFbqzA/PvIGDFr9AtwA3PlpIgong0yTI+q47W1Nn9tJEUxDG0BYYrLA50IHLGff:QAI5pAdVrn9tbnR1VgBVmt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3332
      • C:\Users\Admin\AppData\Local\Temp\5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe
        "C:\Users\Admin\AppData\Local\Temp\5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4076
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a2E9D.bat
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4672
          • C:\Users\Admin\AppData\Local\Temp\5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe
            "C:\Users\Admin\AppData\Local\Temp\5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4896
            • C:\Users\Admin\AppData\Local\Temp\5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe
              C:\Users\Admin\AppData\Local\Temp\5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=113.0.5672.93 --initial-client-data=0x274,0x278,0x27c,0x250,0x280,0x7ff6b9442458,0x7ff6b9442468,0x7ff6b9442478
              5⤵
              • Executes dropped EXE
              PID:1912
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run
              5⤵
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:4892
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb2a39758,0x7ffcb2a39768,0x7ffcb2a39778
                6⤵
                  PID:212
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:2
                  6⤵
                    PID:3488
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                    6⤵
                      PID:3384
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                      6⤵
                        PID:3808
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:1
                        6⤵
                          PID:4284
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:1
                          6⤵
                            PID:5044
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3660 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:1
                            6⤵
                              PID:3048
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4808 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                              6⤵
                                PID:2196
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4808 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                6⤵
                                  PID:4476
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4016 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                  6⤵
                                    PID:4924
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                    6⤵
                                      PID:3312
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5280 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                      6⤵
                                        PID:4372
                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings
                                        6⤵
                                          PID:1744
                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x238,0x23c,0x240,0x214,0x244,0x7ff606917688,0x7ff606917698,0x7ff6069176a8
                                            7⤵
                                              PID:4696
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=0
                                              7⤵
                                                PID:3372
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x238,0x23c,0x240,0x1f0,0x244,0x7ff606917688,0x7ff606917698,0x7ff6069176a8
                                                  8⤵
                                                    PID:4124
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                                6⤵
                                                  PID:4048
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5188 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                                  6⤵
                                                    PID:1904
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5348 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                                    6⤵
                                                      PID:4912
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5724 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:8
                                                      6⤵
                                                        PID:4516
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5536 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:1
                                                        6⤵
                                                          PID:3312
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2860 --field-trial-handle=1860,i,18162608208187875668,14308440415072512813,131072 /prefetch:2
                                                          6⤵
                                                            PID:2296
                                                    • C:\Windows\Logo1_.exe
                                                      C:\Windows\Logo1_.exe
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Enumerates connected drives
                                                      • Drops file in Program Files directory
                                                      • Drops file in Windows directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2916
                                                      • C:\Windows\SysWOW64\net.exe
                                                        net stop "Kingsoft AntiVirus Service"
                                                        4⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:4424
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                                                          5⤵
                                                            PID:4004
                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                    1⤵
                                                      PID:404
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
                                                      1⤵
                                                        PID:2308

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files\7-Zip\7z.exe

                                                        Filesize

                                                        573KB

                                                        MD5

                                                        c234fbedd69bda7f01772e5e0c88312f

                                                        SHA1

                                                        d016ab4a3a07bd9d50bbf2ecec1440230549acfb

                                                        SHA256

                                                        f2b7ee7688871677bbc519f133538d67cb5dcb9f3e9442b2ea52130a1e6b3d9e

                                                        SHA512

                                                        b0d9aaf029d6aa1b443961a72423c24af9457e0cc0cd20bf2e853c05bebf345731950c70a68c5151d6563f6aa78c72dbdf1dd3dc8d953f7101bc1a06d67e6bca

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        40B

                                                        MD5

                                                        85cfc13b6779a099d53221876df3b9e0

                                                        SHA1

                                                        08becf601c986c2e9f979f9143bbbcb7b48540ed

                                                        SHA256

                                                        bd34434d117b9572216229cb2ab703b5e98d588f5f6dfe072188bd3d6b3022f3

                                                        SHA512

                                                        b248162930702450893a112987e96ea70569ac35e14ef5eb6973238e426428272d1c930ce30552f19dd2d8d7754dc1f7f667ecd18f2c857b165b7873f4c03a48

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json

                                                        Filesize

                                                        851B

                                                        MD5

                                                        07ffbe5f24ca348723ff8c6c488abfb8

                                                        SHA1

                                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                        SHA256

                                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                        SHA512

                                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json

                                                        Filesize

                                                        854B

                                                        MD5

                                                        4ec1df2da46182103d2ffc3b92d20ca5

                                                        SHA1

                                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                        SHA256

                                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                        SHA512

                                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico

                                                        Filesize

                                                        193KB

                                                        MD5

                                                        ef36a84ad2bc23f79d171c604b56de29

                                                        SHA1

                                                        38d6569cd30d096140e752db5d98d53cf304a8fc

                                                        SHA256

                                                        e9eecf02f444877e789d64c2290d6922bd42e2f2fe9c91a1381959acd3292831

                                                        SHA512

                                                        dbb28281f8fa86d9084a0c3b3cdb6007c68aa038d8c28fe9b69ac0c1be6dc2141ca1b2d6a444821e25ace8e92fb35c37c89f8bce5fee33d6937e48b2759fa8be

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        46295cac801e5d4857d09837238a6394

                                                        SHA1

                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                        SHA256

                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                        SHA512

                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        986B

                                                        MD5

                                                        e9d3a39f581789101daea33364fcfc83

                                                        SHA1

                                                        ae4dc8b06a33c268b2ea1832f77f272b6bb84cce

                                                        SHA256

                                                        d733955c4be16a6dbed9662c90c8408d584e22b74ea1c042ad6e5ed341d89c36

                                                        SHA512

                                                        c416613f3bd84be87978e8ed3f7d21a019952fd210422e26004b731506d268e86532f61166335fa540024dea6c965ffbffe3d7fbf09832dd41e48f025ee685ee

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        ab885994023cdbf979a604055031084b

                                                        SHA1

                                                        87d5629764a2939f7ce12ebfcd3ec0f2c0fba598

                                                        SHA256

                                                        a9666479dd3bff3a4cdaf2c019e217f4c23eda31e03ff474d8560665cf494c23

                                                        SHA512

                                                        9d1197694eff0ba4b7e1d660e7d8cacc215a02be08b312d14f763601e6f2c0d6d1fe33bd57740a7291a563562a1732bd2456b7753a05db539563fb85cc53028a

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                        Filesize

                                                        369B

                                                        MD5

                                                        e9119e4bd6c7b2e58388ef923a124a60

                                                        SHA1

                                                        f0382e487e2410847c83e2f49041c4eff1ab8b53

                                                        SHA256

                                                        8c2749454afe83769eeea4f612a58bd8b33c8c4f83d52475520997c380d7b68e

                                                        SHA512

                                                        4056ac3d192b554ecd42ba214b3485ca1842a297379128a127d3168a8217377b089bee05d2f863bd0a6aa2c3e97cd8ae8830cbcfd0a9aada7349a1ede050c826

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        838f35d61ff20b06c291d1d8551ba5fd

                                                        SHA1

                                                        d1fa63fddfbb65ff28d6ababa48d49048c9686a8

                                                        SHA256

                                                        6d36db2f0c5d32cfb9be53620aec52681a89a062069003ab5781d6ddfd4c94b0

                                                        SHA512

                                                        3ee318d1534a31e1ce336202216fffe56cabd5e322106685e96db67d46e83aa339ff1edccd503b7ed0a424b5cd0a6ed9cc657d48b9ac6373a06dbeeb0c56731e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        325b6a6f71a9140e84d5603fde6f001e

                                                        SHA1

                                                        5f5e745c955dd163c1715bedf4a8371c98fd6553

                                                        SHA256

                                                        f6d4490026e47a190178041ebd5767d8e93cc6587659d4b608ed4eec19d43d2d

                                                        SHA512

                                                        a089cbef51d8f8a74aed1560061a0291b1bc9565b576a0a10e5fb8ba22822e7962c4e9d342157670a6c4f604046af236abfcf7ff7d2d4bd99eff089d20597d9c

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        c038bee4925306e5315a2ae71193c2ea

                                                        SHA1

                                                        0256138d22dfad3c021e79a6f3c4173726b8a5b1

                                                        SHA256

                                                        1436c55c29be930aaf2a940081c3fd3d9a0f162151ef3f20a5a521a0d3216bae

                                                        SHA512

                                                        d645fb8859e76f14470e476c33b63c452adbf734f8b69bcf1298321d31f8d4f59a00ecd519a3b62e4f16ec5c1ad283b033b1ccd6a2e8ae291b0cd410c34f7659

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        69ac17c06bad3739b409d0e67b106e1c

                                                        SHA1

                                                        94e28190ceeb1099ac7bb3cd043d3a1fc4676baf

                                                        SHA256

                                                        3f86f7a2622360bbf3994ca63c733b8c5186cef051fcb3555b453c7fbe3dfb37

                                                        SHA512

                                                        b5f63b67db8c39ac6ce63d885749258f2e92d2ccef234aca4980e092a906356df02c6faa6f886bcb5c679ed50e8181686a359538ee1eaa133d3f16640d051581

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RFe58721e.TMP

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        04695aadffdaf28b5be826d27d48721a

                                                        SHA1

                                                        ce79df7c80926a86b0e1a922a05bcab16c7620c4

                                                        SHA256

                                                        0bc76b0a74faa8d4d25cfa28127c42750e86004af7a10d590e07a33a89726b51

                                                        SHA512

                                                        aa3438c4a09ea9c0c52dccb6cba636ac99c11b47a5b78317869823d6c39bfdfa304f40e67867b8ca9c4269efaba12431ae59a1d54c671f38acb9e4fe3d23da54

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                        Filesize

                                                        13KB

                                                        MD5

                                                        a956e44800d0f4a99d971f70a276364a

                                                        SHA1

                                                        8c0cb5e0fd2c5a7b19d9bf5a2f6ba6ace1981b84

                                                        SHA256

                                                        9b7d049500c4ab0e908e37d5be5fb4619427a365bb8db3b600bc6da72b650f0e

                                                        SHA512

                                                        b993369be08cfa223e1c7f76220feb310a3ef2a9bce5be0738a1588fce3c22dae0373dba70bf1bdea15a3c136ead13047a7ca253d45abb284dd0f1b16e48f9a1

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        265KB

                                                        MD5

                                                        1f21b5e4ed3c4912acd3e1c1b6f7250c

                                                        SHA1

                                                        691bf8d582815a5a5f361da2cfb66b3cfdd78af3

                                                        SHA256

                                                        b52968f9a0f5a6b89640381ea99688bc4ff7df758ff9d1358c5611c821c45d71

                                                        SHA512

                                                        555587d8c3143567185d8eecdc3e4205fb8c3119e41a18918b293f02e7d0ea3ace15d04f12a52ddf5f03156797fcc52b6605b2344387dafa9be20a6666732851

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                        Filesize

                                                        2B

                                                        MD5

                                                        99914b932bd37a50b983c5e7c90ae93b

                                                        SHA1

                                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                        SHA256

                                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                        SHA512

                                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                      • C:\Users\Admin\AppData\Local\Temp\$$a2E9D.bat

                                                        Filesize

                                                        722B

                                                        MD5

                                                        4fd4fe124fe029535471c9b2163dc18b

                                                        SHA1

                                                        ec8fd98cd378585d56cbd53ebb75f161764018da

                                                        SHA256

                                                        5418030cfd4899ae0bf7ca9377c9a5dd02f091344dcba176c804d29a905cec67

                                                        SHA512

                                                        39a87d277de02757603fb7c1faa5986e81cb31c45493ff0dd666501d480d8cac4fe7f9c8a1bb977b9fdcc2560661b71fb34b6f3ebfde9c56c182c677ee286c49

                                                      • C:\Users\Admin\AppData\Local\Temp\5b80c730ab1b5c846be147f226a97299f0fa5898d01bf6453d054e425b285396.exe.exe

                                                        Filesize

                                                        4.9MB

                                                        MD5

                                                        9fa020939f15510299bcf126720347c9

                                                        SHA1

                                                        eb090970a121d687187749e50a7c8aca165d3f5d

                                                        SHA256

                                                        9273866a2c65472475e94c9e35f30d46111f8f3312ad809cde88aa3719cfe72c

                                                        SHA512

                                                        2956d69394c113a0594c6a5452fd035e82f17a4d4382ed639192c7b12453a60e41e3ebe2b1e0df9787ca2e377376c10abd6968ca40132711fcd40b9b731117bd

                                                      • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        790e236a2f514952560e4aed07037c66

                                                        SHA1

                                                        de03bea58ea6cb98ce06d6c01e1c326805de42f9

                                                        SHA256

                                                        f4d0b995c6bcdd0af6fa15c2f94cf1c31417d353bd6ccffdf917690b177591cc

                                                        SHA512

                                                        45b157c5cea5cdb1a891ae891602d5231df5de263ff85437171e37cd5379ec60922174df1465e387ddb65472e4cf9bf3f6b042b5f5708c34b30fbcb272bae4f3

                                                      • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        02745f559231e978cee5a819d5066bb5

                                                        SHA1

                                                        f5af8519c90d5b108f65fbf8ca53575ecf982895

                                                        SHA256

                                                        59ba4db0652330d9b8afa4d1640258ce0ea9c96ff048573faff720ce0994a5cd

                                                        SHA512

                                                        71a3bf2703694293ead57e7e3df69fc4af982f7a60b87b035c653dbba1284285ad2aa9a583abd692ce6c7c1986a1730be64a2580711bc46ab756cc21f5183679

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir4892_687169858\216cd958-e361-4543-8204-0eebe2a99fd0.tmp

                                                        Filesize

                                                        88KB

                                                        MD5

                                                        2cc86b681f2cd1d9f095584fd3153a61

                                                        SHA1

                                                        2a0ac7262fb88908a453bc125c5c3fc72b8d490e

                                                        SHA256

                                                        d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c

                                                        SHA512

                                                        14ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir4892_687169858\CRX_INSTALL\_locales\en_CA\messages.json

                                                        Filesize

                                                        711B

                                                        MD5

                                                        558659936250e03cc14b60ebf648aa09

                                                        SHA1

                                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                        SHA256

                                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                        SHA512

                                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                      • C:\Windows\Logo1_.exe

                                                        Filesize

                                                        29KB

                                                        MD5

                                                        9bcc3e645527978b32c6d1984175f69d

                                                        SHA1

                                                        d9dce23336396ddbfb4e54c207d755e9b8104b92

                                                        SHA256

                                                        3b15b041a301264dac387cd799e223d8d55f3652573aa7048a7bf4c01b5308e1

                                                        SHA512

                                                        a88275729c3768ca2ee9a9373bc5c97f1e70c5488de73ce1c46d5589978180608d44d87fa9e142b5f977d543cdd4130fb4fad1a4088bd65c39d448af1dbb5c6b

                                                      • C:\Windows\TEMP\Crashpad\settings.dat

                                                        Filesize

                                                        40B

                                                        MD5

                                                        0e1a0df5323f02fa141b11070035f203

                                                        SHA1

                                                        4662c48107aebe02429f78dc0ab4328f88ea9e8f

                                                        SHA256

                                                        169bdddd028372b9c8dc1bbc8bc1a48dce9089467cf7c3b5967ebc20713b1bb7

                                                        SHA512

                                                        5ef418e1f48b459f21f15f8462fceebbe5da2e16ff4cd02a614a6a508c1a9e28527c0d0778840600c85ba60d412de91e754b3aa0173ac4db70460367a2abc6e5

                                                      • F:\$RECYCLE.BIN\S-1-5-21-3808065738-1666277613-1125846146-1000\_desktop.ini

                                                        Filesize

                                                        9B

                                                        MD5

                                                        c1decdd7d6df1d9437bb5f2bc5fe1486

                                                        SHA1

                                                        d71402dc8d37a148651cb5017219322267c7b922

                                                        SHA256

                                                        bd6d31806e5ebc86100e3c7ed2cf5348757149082d775fa986d41e8554ce8089

                                                        SHA512

                                                        ebbaed70f5d858508011ec3f251e16aa09c861b3d6dcc62ed28f293b37dfda2434b0e36f898bc62fca3107ee6356c77e5662a76085f191a63913013837cc0f07

                                                      • memory/2916-41-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-517-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-500-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-534-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-537-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-549-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-8-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-833-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-1533-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2916-1534-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/4076-0-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/4076-10-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB