Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 10:14

General

  • Target

    Battle.net-Setup.exe

  • Size

    4.7MB

  • MD5

    f7fe24cebbc4b0332c77bce563e11b1d

  • SHA1

    744968c9193e5a1b96941695600d3770e61a6ffa

  • SHA256

    002f33fee7b8a159058368b7e93e492931c4ca72e90660bdb2691bcd62fedd3c

  • SHA512

    a3f1e0d1a2c20dd1c40b5039085abf47a17a313590f40785181a4559c6b53a6622ab23a540fa9d56604ce4d008861558636acf798232de2d6b493e4ac4c71ef4

  • SSDEEP

    98304:F84BwyMWieDN4+F/8njOyiiqTrAGlucx:FAEwnjOy5q9luc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Battle.net-Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Battle.net-Setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\ProgramData\Battle.net\Agent\Agent.exe
      "C:\ProgramData\Battle.net\Agent\Agent.exe" --locale=enUS --session=6750685502550931218
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe
        "C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe" --locale=enUS --session=6750685502550931218
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
    • C:\ProgramData\Battle.net\Agent\Agent.exe
      "C:\ProgramData\Battle.net\Agent\Agent.exe" --locale=enUS --session=6750685502550931218
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1096
      • C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe
        "C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe" --locale=enUS --session=6750685502550931218
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2064
    • C:\ProgramData\Battle.net\Agent\Agent.exe
      "C:\ProgramData\Battle.net\Agent\Agent.exe" --locale=enUS --session=6750685502550931218
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1500
      • C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe
        "C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe" --locale=enUS --session=6750685502550931218
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1492
    • C:\ProgramData\Battle.net\Agent\Agent.exe
      "C:\ProgramData\Battle.net\Agent\Agent.exe" --locale=enUS --session=6750685502550931218
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1908
      • C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe
        "C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe" --locale=enUS --session=6750685502550931218
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1476
    • C:\ProgramData\Battle.net\Agent\Agent.exe
      "C:\ProgramData\Battle.net\Agent\Agent.exe" --locale=enUS --session=6750685502550931218
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2800
      • C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe
        "C:\ProgramData\Battle.net\Agent\Agent.8806\Agent.exe" --locale=enUS --session=6750685502550931218
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6619758,0x7fef6619768,0x7fef6619778
      2⤵
        PID:1776
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:2
        2⤵
          PID:752
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:8
          2⤵
            PID:876
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:8
            2⤵
              PID:988
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2104 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:1
              2⤵
                PID:2052
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2112 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:1
                2⤵
                  PID:2688
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1480 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:2
                  2⤵
                    PID:900
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1444 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:1
                    2⤵
                      PID:1492
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4016 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:8
                      2⤵
                        PID:692
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3920 --field-trial-handle=1316,i,3524302629746247242,10451289067700401299,131072 /prefetch:1
                        2⤵
                          PID:2856
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe"
                        1⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1076
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6619758,0x7fef6619768,0x7fef6619778
                          2⤵
                            PID:316
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:2972

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\Battle.net\Agent\..Agent.exe.26.2556.temp.27.2556.temp

                            Filesize

                            297KB

                            MD5

                            dacbd6fdf0f6d10dc98ae141e13b8849

                            SHA1

                            10cdfe582409b715a4a4e351d98f3e907cc34605

                            SHA256

                            2c520f3a7ba52eb093defcc92db0eb6c13990dfb9947f95d8d8dc44762b99335

                            SHA512

                            c2977e99a5712417a3c7f6d40e386c503bc409c2c2766c387f7ce1e18196b41a5920a2ed1b25138aaedc1817aa46a0367058f63cefb77db021950f053db402c5

                          • C:\ProgramData\Battle.net\Agent\..AgentHelper.exe.17.2556.temp.18.2556.temp

                            Filesize

                            1.2MB

                            MD5

                            c25bff2a228d29df07d622d02621f1bb

                            SHA1

                            53ad00fcd88a6b52a3de8d737b3f434b242610fd

                            SHA256

                            01cabf8c2d26d2befb10356294c80b8b39aa9710287161cfcb14358d969eca3e

                            SHA512

                            d24e0953cf3571110af6ff7d5457976a49c620bad2797b1d602450aa755190b93aeeb4cd3804f81b7b33efe8ab35349fa38c530573f6a20d5a1025d76383581e

                          • C:\ProgramData\Battle.net\Agent\..Blizzard Uninstaller.exe.11.2556.temp.12.2556.temp

                            Filesize

                            1.2MB

                            MD5

                            39bdb3bfaf3ed89fad4865e7c70bca6e

                            SHA1

                            347cedafe1d0a594ac00fc7f512b420c364a07f0

                            SHA256

                            44ebf0cb8e9e3148a57e8767d3a0eaa46cd0180137237b7771fb62e2e9e75dd8

                            SHA512

                            01a1cbe5cdec64c496e737a4b698eca8f3f0bb5883b463304942789898343d7b91a1d5b475f4ad992eff2e14ef0eebd52e135a99aae8887b59d4ab0839d2349a

                          • C:\ProgramData\Battle.net\Agent\..BlizzardError.exe.23.2556.temp.24.2556.temp

                            Filesize

                            448KB

                            MD5

                            19e4267e5d1685d10f57d49890defa15

                            SHA1

                            5b5d3e3503dc94bf1763a793bbf229ac07d9cefd

                            SHA256

                            bc1e5933220c841a38d211d9ffd0a2e6a239169f28bc0be755365bc995ba56f0

                            SHA512

                            c7565468ba414e8af3a2b84c291625d55fb7c752da0d7ad0ecb66140250788c68107fb7944d1a6cc83bb2b0943a602e16da1726d42d5369bc38c1c9ff3c785d9

                          • C:\ProgramData\Battle.net\Agent\..LICENSES.14.2556.temp.15.2556.temp

                            Filesize

                            3KB

                            MD5

                            38419ab362517167eafa313b5821d163

                            SHA1

                            58f2483b959fd19dbaae51b291273556b4f62216

                            SHA256

                            bf0e312d933bc2a2e3869a05b7d760fac5e4e569f4349572c5269683f43610bd

                            SHA512

                            f3cc716e19b18a99ffed9ffbddbdb5246616f19deffb048ae91fa3463359134e1e043c20ee6308e2fff59ad868be839806e89ba9cdb4a59e5d7483610941b3ce

                          • C:\ProgramData\Battle.net\Agent\.Agent.exe.28.2556.temp

                            Filesize

                            617KB

                            MD5

                            bac9775735e1ee08fabce69ab993a3cd

                            SHA1

                            65b3c6f611a073f26fd3ee2c0ae1eef5a9ed2879

                            SHA256

                            874ed99329c3737e0f158f5194d710db02696b5b3f13b05bb4e5f37e10d80835

                            SHA512

                            0c164769c37137305b0c94995d57397fd8b8fb04fcfae1752027eb787fb38635cb63afeb633118423eac544a37f7fa4f6f995d2ea2c057dae11e2d1eefa55fcd

                          • C:\ProgramData\Battle.net\Agent\.AgentHelper.exe.19.2556.temp

                            Filesize

                            2.5MB

                            MD5

                            ed05d4dc29383bf73a4f4d22b63893aa

                            SHA1

                            a5bbae9d3ce03566b46f549f5bed530f371290af

                            SHA256

                            573e4a6572c45027be5ff69a31f748ade2566c4f2d6bdbf0749e661832a165e1

                            SHA512

                            60fed7e88e076b352f727efd74deeb6f84fa041de6c69947959ddf1daf2c6bf6b7586f2c01d7e86e8e16e6fa41e133d1e1d04b9f5ba9e5fc206b33f1d84af40f

                          • C:\ProgramData\Battle.net\Agent\.Blizzard Uninstaller.exe.13.2556.temp

                            Filesize

                            2.5MB

                            MD5

                            b8bb284b7cd26643df6876d665fbde02

                            SHA1

                            998d87f733653d1b44b1f2359892e214faa08fce

                            SHA256

                            117420f75d1d5db1b3908e0728f748198d37894af980f7614226480c7dd7baeb

                            SHA512

                            fc2e4cd8141b24f4225af40183f111f6f27e237a9bae10c896554081b4dd0151839d0e19ea2ae4a0a0c0d72d27028dbd1f79d8aaf3ed15e7c05893d69953c0cf

                          • C:\ProgramData\Battle.net\Agent\.BlizzardError.exe.25.2556.temp

                            Filesize

                            877KB

                            MD5

                            a44a76265f9f22258d7665ffa5262cb6

                            SHA1

                            473f7147369049810cd1299ecb7406594e088b89

                            SHA256

                            be2394ff7880e403a92ad773c675295a47e9fafe330f01df21fc886f5383b21a

                            SHA512

                            1e7c044c64e7ea1c8ae0ee68a688366831d4ebb6353d03f9819ff0839d09b453acb2bf9c109fa501355c6f70e835f2da4fa22b2785faa99c188a0d3b7adf5f6d

                          • C:\ProgramData\Battle.net\Agent\.LICENSES.16.2556.temp

                            Filesize

                            11KB

                            MD5

                            e60c0cc3b71baecc5f08c6158a711c79

                            SHA1

                            c6a430e9e65f4a515849845adec5e6c27e7318f1

                            SHA256

                            4fa74fbb073874153bb338746857bf75ed7be0b436bdede1d8625eed2e6c0f3e

                            SHA512

                            33bc4707e85ab5811dcaa10dc5734630732d7e507e4bca71d0ba47ce52ce752bc4a564332fc49a9e026a168e39f6642a15dcc639555ff568f777bd1ce9920061

                          • C:\ProgramData\Battle.net\Agent\Agent.8806\..Agent.exe.20.2556.temp.21.2556.temp

                            Filesize

                            2.7MB

                            MD5

                            edb9a9f825a0baee34b0d79c17eba0be

                            SHA1

                            a20aad319ac419867f9fcfb60207383c2cc60779

                            SHA256

                            879294936a56779b369dd48d243f7035403035cef6e9ac74b196c454ae61e3dc

                            SHA512

                            9b4354d1c4059eabb9dcac339ae29dfb352944bea45216fec0a9e3f55045a4ab57b2e1559443f9e7162b63a7d50512af1d1384e7f0acc226cc2a49be5162bfa4

                          • C:\ProgramData\Battle.net\Agent\Agent.8806\.Agent.exe.22.2556.temp

                            Filesize

                            5.5MB

                            MD5

                            621bb5298b678b1d9274315dbea26a2b

                            SHA1

                            58c336c2d5300c4a7c004738a0c523b3bcadbba6

                            SHA256

                            c9cbeaa9873a91e26f5b3ba21356981a2db4bedd2f4eefc4f64782b77d20a4e2

                            SHA512

                            e2bc8eb987ebbb8e06ebdb395f283c1fbba51649b2e4601164247488e6973721b256beea2e52f4400d2ebd2ab6904d30a75c8c4309ae883104bd1bd90ad84d2c

                          • C:\ProgramData\Battle.net\Agent\Agent.dat

                            Filesize

                            4B

                            MD5

                            c6036a69be21cb660499b75718a3ef24

                            SHA1

                            1592af7e76a7114b4f9beea0be4746f59ada13a6

                            SHA256

                            829f00a11ddfdebb51b67a913981eddb7937c3f8f01f4140415a24ff1cc29609

                            SHA512

                            70235e0e9330d39254443ce91fbdf97fa965cf32dbdd1266f28caa034956d4b3c20fe4ef0d1dcac26963773f6dd299ae30752815c82fc8833ca69c63a6c5f0c8

                          • C:\ProgramData\Battle.net\Agent\data\cache\bc\20\bc2095f930a0cd551a40c4b978b6d6e2

                            Filesize

                            3KB

                            MD5

                            bc2095f930a0cd551a40c4b978b6d6e2

                            SHA1

                            7f49e7e45842c88f4ffd1611ba8de2ee5f36d7fa

                            SHA256

                            8521eaff77b3e162fb8be1b42c541405e929d2bfbb31fdcf353652f952dfab05

                            SHA512

                            d2704bad722a0731b470a7e99f026adf77b50f9756cc6293c345770d84bf3c78782af1c265ee45147af0af3e2b54ab8589c15480ef7422d8e4cf672513ff741a

                          • C:\ProgramData\Battle.net\Agent\product.db

                            Filesize

                            184B

                            MD5

                            cdd4f857f852e1d655135e71b9007b02

                            SHA1

                            e6b9d8dd4e588b9c081721c7097d5b1c5ac31e93

                            SHA256

                            10c32b7b2093319d1910dcba5d44bb4214ac75fd44d8acd29fe297ac9a5dbb30

                            SHA512

                            144b3f2b863541d4a12809b36892cb7af92d5da497f38414fd7661e5851857f7e7a1af7f3348cf1b96503151ed7fc607a5a378c5b59d7a0616f7c2a6857299dc

                          • C:\ProgramData\Battle.net\Agent\product.db.new

                            Filesize

                            193B

                            MD5

                            9e9f23a393ae4e71fa995ab75890c4f4

                            SHA1

                            56ff1d9a7eb7f6c800c05984867c1bc4628e0dbc

                            SHA256

                            69992f48d4c023543fea017170a89c9ec16282c41668588dd751f3ee0149d28e

                            SHA512

                            c043d778e2b09c942665df06243af2c47a1fe335aaedf164768d74591205e129589a76c3c363a1e1168b410307edd24e18f9593602a84fad4b0a6e86b6a0f047

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\329927d9-e855-4e25-9c4f-7c18167e2008.tmp

                            Filesize

                            311KB

                            MD5

                            b8a94564d2fe664dd54f838ae88a2862

                            SHA1

                            1bc2cecdc7e68f4c7334a28ec239303e5e98824e

                            SHA256

                            4d5319a1f17c22e969fbf25c9bace8e67adb18056795e822f6c6c49dc7cae37a

                            SHA512

                            c2172859e049e8a1f72e14f1ae0fd648ab70eaf95746f52fdb1179be4677c18731ae6add1759cb3bd645a5759d0e5bee36a9cd6be78aea81a7729ce0c01d6a57

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                            Filesize

                            40B

                            MD5

                            73a6dc263cd0733744af3edf0430e73c

                            SHA1

                            627cfa8003fb9e8b263ff4c7d5bd33e6c511af51

                            SHA256

                            c3a51d91384cbd5b6cf6797e9d82c938ed539a333f1909b3d2542d91a23f9300

                            SHA512

                            9387b59fc1767aacaf2995d78ee0cd32b74b040f75fa9036fcf268afdd99add3071e621f5c9748fcffe21c66cf648cd9d2b4c55732487bad3ef78771521342e8

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                            Filesize

                            16B

                            MD5

                            aefd77f47fb84fae5ea194496b44c67a

                            SHA1

                            dcfbb6a5b8d05662c4858664f81693bb7f803b82

                            SHA256

                            4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                            SHA512

                            b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            dcdc8142fa97ec75f7d8fa7eee6944c5

                            SHA1

                            ba05302a9d5eacf071a262d0acf2cbd8fdc5d39a

                            SHA256

                            b76e852806632739ea33b673ced77e8870c8affca74b1cd28444327c48052468

                            SHA512

                            722b6d0e3f7954341428afaba98c890179b6905441ba2895d23bc3fa86a5a014301bc0cbeedcd7c19a80482861ea001abb18066e6af9764892e29430591fa6be

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                            Filesize

                            16B

                            MD5

                            18e723571b00fb1694a3bad6c78e4054

                            SHA1

                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                            SHA256

                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                            SHA512

                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            311KB

                            MD5

                            5836001f513b64622ba2415628c7aff1

                            SHA1

                            40875793352bcc8728c6ec23bd66bc95df63e83e

                            SHA256

                            138bc45df19eb4b85d68a3d468fc9e3b3ce98795ab0e1c9b9f0a3124795be8f6

                            SHA512

                            38d78885051c2c7bb4f7dc832d748a618cd16db4703b845406b24b9bcb4f67a7a87a8fa6225231a21ced8e4468103cffd9bc8f5bb96b025fb51d44b0f743d9b6

                          • C:\Users\Admin\AppData\Local\Temp\CabFEBB.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\TarBB9.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • \??\pipe\crashpad_1480_KRHYTUBDKWXGMAJV

                            MD5

                            d41d8cd98f00b204e9800998ecf8427e

                            SHA1

                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                            SHA256

                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                            SHA512

                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e