Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-09-2024 17:14

General

  • Target

    Screenshot_10.png

  • Size

    273KB

  • MD5

    ecf6ec480feb44034bc99d60f7723eef

  • SHA1

    bc58ff0d4ea455b944b2615078076dfd3113d2d0

  • SHA256

    77da925157321355fa400b6727269a53fe4bc5c9b269b9a1a1c153656dfb6652

  • SHA512

    7bc8ff3da9421cb4422473012295670f2e3d099f23fb7a40028e29317906b7a8b62f3b75d2697b53e7557d8a3c3b2716048db7a5737a2c44cbd6a69f182dd938

  • SSDEEP

    6144:S3KQgHeQmCNUvJZ5J5zdU0+zNLIPZSx6n4COvKYD0u:RQg+QDNSj5zdmwSk454u

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1279845453336412260/A8ZEV41SqZhlDM114ONplW6YO3ItmaeJxvYHi-I4t5Fx0r_sBuCyg8RH2hoVGdxkr27c

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 50 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Screenshot_10.png
    1⤵
      PID:928
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:752
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80cb8cc40,0x7ff80cb8cc4c,0x7ff80cb8cc58
          2⤵
            PID:3572
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1952,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1948 /prefetch:2
            2⤵
              PID:1944
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1764,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1988 /prefetch:3
              2⤵
                PID:932
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2156,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:8
                2⤵
                  PID:4004
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:1
                  2⤵
                    PID:880
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:1
                    2⤵
                      PID:3016
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3552,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4492 /prefetch:1
                      2⤵
                        PID:2416
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4640,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4472 /prefetch:8
                        2⤵
                          PID:2424
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4968 /prefetch:8
                          2⤵
                            PID:3888
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=212,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4392 /prefetch:1
                            2⤵
                              PID:32
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4624,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4756 /prefetch:1
                              2⤵
                                PID:4384
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4736,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5000 /prefetch:1
                                2⤵
                                  PID:2200
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4936,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4524 /prefetch:1
                                  2⤵
                                    PID:3864
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4336,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:1
                                    2⤵
                                      PID:1708
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5348,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5360 /prefetch:8
                                      2⤵
                                        PID:3320
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3760,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4548 /prefetch:8
                                        2⤵
                                          PID:4716
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4484,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5388 /prefetch:8
                                          2⤵
                                          • Subvert Trust Controls: Mark-of-the-Web Bypass
                                          • NTFS ADS
                                          PID:1084
                                        • C:\Users\Admin\Downloads\merc.exe
                                          "C:\Users\Admin\Downloads\merc.exe"
                                          2⤵
                                          • Looks for VirtualBox Guest Additions in registry
                                          • Looks for VMWare Tools registry key
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Maps connected drives based on registry
                                          • Checks SCSI registry key(s)
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          PID:5088
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1172,i,11378605805602622544,4652119235789407069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4612 /prefetch:8
                                          2⤵
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3588
                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                        1⤵
                                          PID:2500
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                          1⤵
                                            PID:1820
                                          • C:\Windows\system32\taskmgr.exe
                                            "C:\Windows\system32\taskmgr.exe" /0
                                            1⤵
                                            • Checks SCSI registry key(s)
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:1816

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                            Filesize

                                            64KB

                                            MD5

                                            b5ad5caaaee00cb8cf445427975ae66c

                                            SHA1

                                            dcde6527290a326e048f9c3a85280d3fa71e1e22

                                            SHA256

                                            b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                                            SHA512

                                            92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                            Filesize

                                            4B

                                            MD5

                                            f49655f856acb8884cc0ace29216f511

                                            SHA1

                                            cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                            SHA256

                                            7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                            SHA512

                                            599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                            Filesize

                                            1008B

                                            MD5

                                            d222b77a61527f2c177b0869e7babc24

                                            SHA1

                                            3f23acb984307a4aeba41ebbb70439c97ad1f268

                                            SHA256

                                            80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                                            SHA512

                                            d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1bbf1708-1ee3-4beb-94f0-85d42a26aafc.tmp

                                            Filesize

                                            15KB

                                            MD5

                                            a768c48cfc5cbd4861b520b8c21e9d73

                                            SHA1

                                            d69c1f25cd0796c94e930131c3f6ddd7e84b35d0

                                            SHA256

                                            0c11f52ab08fad390e494807e363d1fc40bfeccee158ad0d5683c37fb2c9e419

                                            SHA512

                                            d11df9c7edd2cc7757425f6ccaa6c8d13bf610d03b44f74cf1440d80dae413bdc923471b23bff23eb9df0c8f22672ca51728916223c99808f446160711220bea

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                            Filesize

                                            649B

                                            MD5

                                            e9b9943974d0846ec5fa8a4bdd1a94d9

                                            SHA1

                                            b39a4b5dd96493ef25c8a92df057b4286ca36b1a

                                            SHA256

                                            5cde3889703cbbd70b8c9593a63f1a1e9aa22400d7b14630b86b38485e887416

                                            SHA512

                                            75500822188dcce35ae49d057a9304d4e31755e2ac1e5415a692566aa2401dc9f90ff252836be59dae6e58538095e8bb6c89437259578e88ff9b03680ff77d2a

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            480B

                                            MD5

                                            a3de38ac153350cfb87042e75ca57f0f

                                            SHA1

                                            37550ca03771d59367463bf34f894e489be30e94

                                            SHA256

                                            15a20b7ae654d7a46ffbde50774a652ca34e5ee9f625c07791fdeceae4d7a6b0

                                            SHA512

                                            a2431d78b915fdafc8ae2c254d8ca9e9127a7e9b9c684cb5039c8c2637cec39a282da5532287bd3bdadf1ab3b922d455fc918dc2a47d90c64c2091cc46c1d560

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            336B

                                            MD5

                                            0c8c2a99b72f997bb0e00e096e776e90

                                            SHA1

                                            b7d464eec05fdcefa24ed634c6c7ebd67368dff3

                                            SHA256

                                            39a717983a9593b22983a03835b8cd1211c994cd3d8ad10acdcf1f6f30e1f781

                                            SHA512

                                            75f388a3aa7b08adac474aac5e7c17f4e928fe282897b457cfe6b229bbed8b9f62e90d128178ade5ddd9ed49a2b7c084deed097fdaff7ab9b372a3d3dc11e95d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            3KB

                                            MD5

                                            78c3524d05028d56741e66ee02fef57a

                                            SHA1

                                            1d495d5ddae50b593f0ff5f21b67f45d8692e109

                                            SHA256

                                            bedcd9cfa36c7b688114966d33cc38a882c07af4919140989b5dd8704f3d191e

                                            SHA512

                                            6f949b7a7c1cf6ce786bb0829ff681fbfc28be009ff8f6901975631ccfbe9746ab9852b5bcc7ea004aeef1867ecede10cb148bef849d017ec412580505f8d76d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            356B

                                            MD5

                                            172eb024b22ec4a594956f16792ffca9

                                            SHA1

                                            cb77b07006b02dfca5696b0e31d771e9c132ca01

                                            SHA256

                                            942eb4f15c12bd9c55f4321a76802f9a79df554ef42b71880b6c18f2e663e4e2

                                            SHA512

                                            5fb3414a424eb0f2d38fcd061ad1e1e5c359f0b24d8d22fae0d65cb9b6b44870d49ec14000a8aa35d6c6bab74596429cb30a534a53da0b142a6c10c32e9beb3d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            854B

                                            MD5

                                            7b176509cb3daa8ba6d77307d1aa5119

                                            SHA1

                                            074372fe43a4c6eba0addbf1d1e5109e25e9302f

                                            SHA256

                                            92cd49aa1fa712bba09de442f30afc8117c976ca453c9aa7278de3cc7550bf27

                                            SHA512

                                            d0c1b38a83e0ae772843b426042f770f3c4fe83729be122b106ea2ccbd9529768623a3aa6cf71debe1814749fa1c6b866976617e6da45db6728c8c6a0fcc5087

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            858B

                                            MD5

                                            fb9dffbcacfc1db8f85e1b4fb12ffd1f

                                            SHA1

                                            a35dcea6d9c512d0d018c940f52b7d3e6bc0387e

                                            SHA256

                                            747ed3d067850366ee6fe5f823312554dea551d4bdda27c45dfe6ff323ec92ae

                                            SHA512

                                            92e00abeac06b0d98431fa7dc0660864963f696b57d4027ca24383e9bec065677166935f2b7a9ff34b86590c06ab251b9763d2fd4f434be45319b714f4133567

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            4e685aeaef57b8b3137b592e195d2596

                                            SHA1

                                            df995497471f4cca84900d7f4d07f1f37cf9da53

                                            SHA256

                                            f044640fd3f4969a80221acbc23041f9f9827b726d77df3ca6e5c51ed7fbe78e

                                            SHA512

                                            555aa41d0a7c8996216ffe544bbbf3dfbc0685266672ff8291b93b7ce9a410758f3c527ac7f534a719ce009001e78901c63e92b0a953d4de52698d3c0c285816

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            940934cc01188f2c7fe11051dea6feee

                                            SHA1

                                            31bbdc5880009f2a42451d587cb851512b6549aa

                                            SHA256

                                            2264cd172f419bd31cb18942d25686653a2732ae3e3b56705b99c8136ac0daf9

                                            SHA512

                                            50cac892296dee7fcd70bc6fc4145918687d6d559b0011f8561563dcac7caa93de4eca862d5e3c52cc17d19a978e4a2a38490be62fd2126cc99bccbf75297259

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            387d742a3b5d984990645be2ba0bc3ce

                                            SHA1

                                            ddb7316243e3a6e5a3289eb88b4989edfcba0cf2

                                            SHA256

                                            26b92cb04d38cd0745777cb07f3f2238193471a9e083889236327d910f42260c

                                            SHA512

                                            10505f8a94bfb948c5dde1521ed1016eb86421d5104cbcd1bfc6c3067f7b329c8cde3fd329a200ec3a62f561c55943db9167ffcbd61a586f3af73655ed37c92a

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            22e1ef9560b1d88b7d6406abb37f5d8b

                                            SHA1

                                            84233330118ece0b3503ac2bdc94a107a515e1f6

                                            SHA256

                                            10ba1774c85476830cd256c8b7c4e5835721061c840656aa4645802679949d28

                                            SHA512

                                            23e92fcd72f7815c7ec4addcc1d3c6a624d9e028fc7ec900808d1d9bc898c1702bcc00b1e2ee8573f2d19c0f5bd16a8e2c34348ef29814e52c470df01b01f625

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            0895f2de8eca049af3d302e20e848e66

                                            SHA1

                                            fc229b502c000108ba10182a33f0d03f6435ac29

                                            SHA256

                                            45b0724b77a27a35915cca9f42625c057b10f456b19320b5cb4267ab585340de

                                            SHA512

                                            b171019c8ecb8d6c4be966d4416ec0d627d643344a72d57c3fc822f8b6f125ee83daec760f3b4a29beb7b911ee728e016ea1af828927f790ed08aeba300fa790

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            1f257f26c22e871d8d1223c89aaefc61

                                            SHA1

                                            4c14de19d8d69cc9d049a685bed38e4ee24c8d0b

                                            SHA256

                                            cf14e016e9dbaf043b491f43b7e1357ddd6f105d9dd6ea9b4669060937b82f11

                                            SHA512

                                            424299429f07ea03c0cb5878713f0228771c97326c44877180739092023ed72e070f6b20a33f29462e57bad2d3ac5583f4ab1d08fb9a495e4509e700e6769b77

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            aa3bcb78248ba1aaefc1af02969ff0d9

                                            SHA1

                                            c01d97b6598b300b8237e89c3182c3e5355d9222

                                            SHA256

                                            4cb2b0ba5f5c25dbab0cedf2a72d2356c9c7374e22b3cfb448192a1ee7b62f97

                                            SHA512

                                            a88ea0b2abdb3e2f0a447b2616550e9745bde360cf6f365fbaf41b141ee2923656a8b27bb356c32d5773284492b084b7b3f93bd1e8ab5d3c97ab4bf40f811a00

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            7aac0822c109d3d630fbbf29fc8436c7

                                            SHA1

                                            c010621b307874f7ff73c797b26f3c57b6026915

                                            SHA256

                                            08073f7857dd9622e30429d4e834e02cf1fb1b91a96fcf0624748c196dea0209

                                            SHA512

                                            b51ea1b8d5e3ccfdce4f276b6370ec0318e4d0db32b3b24e8ded91392fc54f2f082c931c412e81610afdfadff03de5ed033babdf8e174cb8975bdbaf3e35be74

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            3d43b389ced934b7cb7ca55b0bbf5fdc

                                            SHA1

                                            459ecdb3c0225354a1fcca855e7a653f1dfa1e1e

                                            SHA256

                                            589c60c76c04c25ee4a8340bcb4b7453341eecccc39444526c70be9176727a78

                                            SHA512

                                            d6da30cc1befed1008c79c862531424581d0c2159198dc4f832e51cbac82c20f6f02e90379590c4262c0f0be4cac0ab691b736776c0c0bc0c2e8cf77a5353617

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            205KB

                                            MD5

                                            29f72ba49124245ea7efe63b818f5ebe

                                            SHA1

                                            0ed6ec6bb598941b6b136078e38612e31b08bd66

                                            SHA256

                                            e3d37ba5b223efdc821a974daaa354c1772b777d9d5d74164d4aecfe1a53bb9b

                                            SHA512

                                            5f116c3bb34eabaf0f706821cbf25a3433c680ae7809ca344878817fa63097ab2718fc2a6bd5109e971c52079207146d5461b64032676e5e2c55ce034c9b1ccd

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            205KB

                                            MD5

                                            1aa1830e590cfff4ffff8cdb1c21ac09

                                            SHA1

                                            144c79094bd794564d19fee74fd50f2f4d8f4930

                                            SHA256

                                            69362fc54eff4f3d04abfe8de730e29413c9eb83b20cae2cf131522a2644d7d6

                                            SHA512

                                            1dd20272e3dd9bd516e6a28898fee26b81654033bda56cdcb7fc93e2a8079daef663837253f0688fdf9c42bd55f846d17ad83a11098e8a87fcdcf78a42087d2e

                                          • C:\Users\Admin\Downloads\merc.exe

                                            Filesize

                                            46KB

                                            MD5

                                            8c356304521d4385dbfb8e9a5bc3279d

                                            SHA1

                                            213eae248f046a9547d748ccd70c32f2b73bc045

                                            SHA256

                                            4e2167bb9329387158d25231f52fb5ae4949d2fcd808f3663448c023b6c8d581

                                            SHA512

                                            c7739c4ed44056ee7fc7a4bcebd7b62ada9c1309a8298af4a7f2957dcfbe0616c606ce3e6f0064fa7035e9e78907350c060a532a51022153966092e027c3ec53

                                          • C:\Users\Admin\Downloads\merc.exe:Zone.Identifier

                                            Filesize

                                            151B

                                            MD5

                                            11eccf60af29ff9422efb035e6a85604

                                            SHA1

                                            ec232309864af131004443b414e3d0ead11fe755

                                            SHA256

                                            f540050cb70db000793dbbf40815cd1420b6606ab1e33105d37d81a585f5718c

                                            SHA512

                                            fa903ab86091762ccdc71b01b67166144bae2d8cea567c784a8df37bf6ec034844fb871af70c320889dc9760236851c4d2822146f782c3eb56f780ef085d7f21

                                          • memory/1816-262-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-260-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-264-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-265-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-263-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-261-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-259-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-253-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-254-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1816-255-0x00000220BCF00000-0x00000220BCF01000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5088-234-0x0000000000E00000-0x0000000000E10000-memory.dmp

                                            Filesize

                                            64KB