Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 04:26

General

  • Target

    cchromessetup.msi

  • Size

    20.4MB

  • MD5

    fcaad59c22e7e848f387089fe25f0765

  • SHA1

    21e188214f1ed9ded574b139c55b2b70c99f1d2e

  • SHA256

    57bf74232f2bb8240c9c407b9677961a81ab90d539dd330de4c5ca100e4f24c1

  • SHA512

    7af62c1e5dd1cd91d2327642e9f931bf46b9aa40cfcfce988dffcc323daf7ee04516c4c3a28b509907d62c7aa909dc056d1e788521ae9dfcc6c53d635e40d5d5

  • SSDEEP

    393216:nQ0Frf5krXSujsF8dzTZJPGQUP995v4VXwalKOymRJgNN71TXibbeKNugW8XMgfx:nQ05JQsmF3hC6Xwal5pc7hMlbXM+L8aD

Malware Config

Signatures

  • Detect PurpleFox Rootkit 3 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 11 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 40 IoCs
  • Loads dropped DLL 41 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\cchromessetup.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3316
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3572
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 263E456A312C6A76B34C561C6E9A742B E Global\MSI0000
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:4488
        • C:\Program Files\ImproveOrganizerMagnetic\OtapxNTOYhmF.exe
          "C:\Program Files\ImproveOrganizerMagnetic\OtapxNTOYhmF.exe" x "C:\Program Files\ImproveOrganizerMagnetic\ICXslERhfXqJTZMhevsa" -o"C:\Program Files\ImproveOrganizerMagnetic\" -pfEsefKyAWjCaZCRKYPPi -y
          3⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2880
        • C:\Program Files\ImproveOrganizerMagnetic\oRqsGHUxNM16.exe
          "C:\Program Files\ImproveOrganizerMagnetic\oRqsGHUxNM16.exe" -number 281 -file file3 -mode mode3 -flag flag3
          3⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4160
        • C:\Program Files\ImproveOrganizerMagnetic\ChromeSetup.exe
          "C:\Program Files\ImproveOrganizerMagnetic\ChromeSetup.exe"
          3⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Program Files (x86)\Google1088_1981183042\bin\updater.exe
            "C:\Program Files (x86)\Google1088_1981183042\bin\updater.exe" --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={FD39FE3E-F972-AC55-37EA-CE3FED473068}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-statsdef_1&installdataindex=empty --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=2
            4⤵
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies data under HKEY_USERS
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4612
            • C:\Program Files (x86)\Google1088_1981183042\bin\updater.exe
              "C:\Program Files (x86)\Google1088_1981183042\bin\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x119c694,0x119c6a0,0x119c6ac
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2176
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
              5⤵
              • Checks system information in the registry
              • Drops file in Program Files directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:4500
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=128.0.6613.139 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe68d76c28,0x7ffe68d76c34,0x7ffe68d76c40
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1888,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=1772 /prefetch:2
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:2880
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=2204,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:3
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:4784
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2352,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=2528 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3572
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3032,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=3108 /prefetch:1
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:2972
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3040,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=3132 /prefetch:1
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2020
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4032,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:1
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2268
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4576,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=4748 /prefetch:1
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1124
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4684,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=4780 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:5172
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=5032,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:5424
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5160,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=5172 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:5572
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5036,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:5628
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4768,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=5444 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:5668
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5024,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=5168 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:5936
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5440,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=5576 /prefetch:2
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:5424
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5064,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=5576 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:3588
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5588,i,14756517173458535818,5434622876098857569,262144 --variations-seed-version --mojo-platform-channel-handle=4904 /prefetch:8
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:4048
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
    • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.exe
      "C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.exe" install
      1⤵
      • Executes dropped EXE
      PID:4828
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update-internal
      1⤵
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
        "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x6ec694,0x6ec6a0,0x6ec6ac
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2696
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update
      1⤵
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
        "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x6ec694,0x6ec6a0,0x6ec6ac
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:400
      • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\128.0.6613.139_chrome_installer.exe
        "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\128.0.6613.139_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\9b88db8f-0737-449c-afef-d24ccc6f4df9.tmp"
        2⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe
          "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe" --install-archive="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\9b88db8f-0737-449c-afef-d24ccc6f4df9.tmp"
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Network Configuration Discovery: Internet Connection Discovery
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4008
          • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe
            "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=128.0.6613.139 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff6582846b8,0x7ff6582846c4,0x7ff6582846d0
            4⤵
            • Executes dropped EXE
            PID:4932
          • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe
            "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
            4⤵
            • Drops file in System32 directory
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:4132
            • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe
              "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=128.0.6613.139 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff6582846b8,0x7ff6582846c4,0x7ff6582846d0
              5⤵
              • Executes dropped EXE
              PID:2988
    • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.exe
      "C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.exe" start
      1⤵
      • Executes dropped EXE
      PID:2132
    • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.exe
      "C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Program Files\ImproveOrganizerMagnetic\oRqsGHUxNM16.exe
        "C:\Program Files\ImproveOrganizerMagnetic\oRqsGHUxNM16.exe" -number 195 -file file3 -mode mode3 -flag flag3
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5032
        • C:\Program Files\ImproveOrganizerMagnetic\oRqsGHUxNM16.exe
          "C:\Program Files\ImproveOrganizerMagnetic\oRqsGHUxNM16.exe" -number 362 -file file3 -mode mode3 -flag flag3
          3⤵
          • Enumerates connected drives
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:1408
    • C:\Program Files\Google\Chrome\Application\128.0.6613.139\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\128.0.6613.139\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4600
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
      1⤵
        PID:5512
      • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
        "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update
        1⤵
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5572
        • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
          "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x6ec694,0x6ec6a0,0x6ec6ac
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57f84b.rbs

        Filesize

        7KB

        MD5

        634c1835202b6ccc5a0942d125bb80ef

        SHA1

        2fbf5f2a27b9fcba61142e081c00774a9a9d2ab6

        SHA256

        b302c9555eac720aa6af01abdaa0bf9cd07c22bc58269c1a77995d810cd82314

        SHA512

        21a4cbc5e25e69a6a90dadb6b6564b4dc9b6bf8562e33f6f8ace92f631407325e787c2a6602d99f688fdf578c5bd3f4a42738b896a258d5c817b69903e089408

      • C:\Program Files (x86)\Google1088_1981183042\bin\updater.exe

        Filesize

        4.7MB

        MD5

        823816b4a601c69c89435ee17ef7b9e0

        SHA1

        2fc4c446243be4a18a6a0d142a68d5da7d2a6954

        SHA256

        c2a7c0fa80f228c2ce599e4427280997ea9e1a3f85ed32e5d5e4219dfb05ddb2

        SHA512

        f3b38807ed1eb96c932e850b9b37551554408a628bedf12aa32bde08c442ff3663bf584335e7eab193ce2cf7552bce456737c96a2ba9faa953150e6304068fc6

      • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad\settings.dat

        Filesize

        40B

        MD5

        80b89983e6909619750fd50f9515deac

        SHA1

        9aa3dcab1dfa7503f79469257ad94eae1f670892

        SHA256

        1be5ad18c14c68c38f02e5f04aec84c250f3ff744a739046cb210cea38554e44

        SHA512

        7ff77ec70a7cc3325e1385a7395b068bc5b49258dc12099d211d109f6f40e5c5a4be2d1e4f8dfcbde2bf167adc960e2617b465492aa451a836bd5f5b1cd82df0

      • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

        Filesize

        503B

        MD5

        d3a04e29db41fb1272e2007be202bbd8

        SHA1

        dccf138d8ca1aceb346b5721abf30d42491bd9f6

        SHA256

        a69ac935d80b766f8e4d890476ba5b94af26ed2d5ba3551551e23345d0bdefef

        SHA512

        6ec8289f09d1575b5c37c05e232ed35122ade4febd46fcf0e9860cd871d71e0e79d1c7ceb6efeae48efb9eb3584af2516609b7db6c52bf033f7069a80940f4c9

      • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

        Filesize

        354B

        MD5

        d4927578fc92dc543365aa4e43b202ba

        SHA1

        5e1aeb950ac6ac3f071fa02f90a4fbc0c8e5304c

        SHA256

        4ac029c04a6e82f4c588237f57a798b4285c818bdbb4250c20f11a5b95d4ecd1

        SHA512

        4c6cbf4bfb4279edc6d6bd816ca4d1d4dbc8b7f06d875493ffeea3a8782568f49911db28aae743a41962bbe4fe34afc531e119be58888a2acf0623e99df38e95

      • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

        Filesize

        603B

        MD5

        fcf32f3cbb4b43d1f574643764fc916d

        SHA1

        83874362cccfed0c4107ad17e0ad469203a55778

        SHA256

        d771fe5a882d7eeb54fe4c404443ece1368ff63cb7acf7cecb4135c54f3d4e06

        SHA512

        bea6b991e46340d8d80777b6f81278d248e14b9a07e1986e01bc20753e7d3a60657cbc5419ead4c47b8773616b1957042fb1333a7b34153c6000193ff92317a6

      • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

        Filesize

        603B

        MD5

        5244ce2904e821147897fc3ecda9b3bb

        SHA1

        9292a68d677a99d42459ff170f00313d0e417bd9

        SHA256

        d5ae965a490d486d26559dc51f10e45a0acb307722c918914443d242959b43d6

        SHA512

        43c42523636d919c1e3e9b8ca5c5639e41da1db1aa672fa78d8961ab81c000842e5ddbd76726c4c361bddc49859cc9d33eca561462e50b42ae2aff05ae19fe43

      • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

        Filesize

        49B

        MD5

        7b693a82168c33ec9e8cf276859ddf7f

        SHA1

        d396dbbe299fe7754a6244d01e97cc4edd0693eb

        SHA256

        84a9a7f43db56cd6e9a408f88244e8ba5efbe48a5b5168d321f112b8c8fd8e3f

        SHA512

        4064c158d753d19a72e1be1c8bd5fe7f22e2032d67d1dd7ea1d85ce652d63c69b85a4292c4403b0f7729b05607f3d1ccfaf4d27d04ad09ffcec70082450320ab

      • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

        Filesize

        1KB

        MD5

        0d0917995b2e828ebe4fa44ee6620581

        SHA1

        127cb448ac96bf9f7a64366ff461382c25a19214

        SHA256

        3917361fc7ef5db7ecbd6a72b4b5346bf3434830a0d845b7a49a2d51e3b5f52d

        SHA512

        184084dad1deb3edb1542d7c0c6a2166a2320df3285691994b7c8bec3a2cb1507518c16f03590990197b13bd727bc35bfe61c627d0bf161d760fa2ae3984fcac

      • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

        Filesize

        2KB

        MD5

        7a066d0f632012fc205f86723dde27b5

        SHA1

        13c15585c459cb9cf5bcc4083230302c7f561663

        SHA256

        f541e8d166a8f8d9be826c98fbeae17f4ef610d2a493aef20b76a89d12560f94

        SHA512

        0e7d39fc4a14f7d8b8e5695200649aec1b60416c2a7ea11f29b7bdf1b5d45c9e24dae4016891b9cf7dbce32f34da8ba3150085d987ee1de7644da63f927ef1b5

      • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

        Filesize

        4KB

        MD5

        d5d97e0a49c2576fa16e619287303203

        SHA1

        fe551725c1e0ec1f32324873dbbe7dfc9fd534a8

        SHA256

        ff505845f0acccea92f2b9fca0bcf23ba37d277ec8a88607876995fc81f572a4

        SHA512

        1cfee9d030a389ec7aa41295aa1a31f9941de77e557b99aa3ef1994fab0f6ae48e144cebe9254ef6c6b89943fda10bb75eb22e45d9a370a5c7f69805068203c3

      • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

        Filesize

        5KB

        MD5

        13d972501ee2d6a1a15c913c31e736ce

        SHA1

        c0b322f331ae3ccc79bd860554f35d47ec28dd90

        SHA256

        2d68a56c24b171dffa47fba021223a9e4e4bd7ac6ed825809f308befb095e5ba

        SHA512

        11442bdeaa485918a30aaf6089f42f5bcd9f6e96ddb45bd39317b2919ee710653446965a0649264782dee2b5a4f6b3d1747081963643d16ec72aed0e6e068116

      • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

        Filesize

        9KB

        MD5

        913a6eda16736edce3fb7a06cb03014a

        SHA1

        d4e2d9b66c5a490a13c591dd81bea4b45b68963a

        SHA256

        fc148ba8fa7d60d81cba44e55bac5ef42d75cfd06edbe13e990c89b1b1d49eaf

        SHA512

        62fafce16d24ca1248ab0e7157053bf95796e903df066f5ae3632936906263ddf63a17ba1cf896b35e7dfce49488a71f86749328b86b30a3de34557995cc6481

      • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

        Filesize

        11KB

        MD5

        f04fa110f5b6779ad1adae384aed8f0e

        SHA1

        ff9128625ea52bcde2a93891687c75caeca4f03c

        SHA256

        2265adc9136d4f4d611817a5998adc4fdabba5b649fbd8083b090f9350e418ab

        SHA512

        275d73603f567bd62729c7bf161768a6e1ddd7179904b36e4725eb097368e9c2e2fb4c97e1cc022b7383410095e3dc889ca82cc9485c4e57c81d33f85292181f

      • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\9b88db8f-0737-449c-afef-d24ccc6f4df9.tmp

        Filesize

        679KB

        MD5

        90367fd7411ea4c67700827a401a786a

        SHA1

        104b55ba761da2ad16906d20751a4907e4e5463d

        SHA256

        0135a0711e1163d4b293720755e4055aa195e46f5eab22c070c14fae4c9c4d9d

        SHA512

        73ae8354d68a1e43205a09915a9a4ebd198e6e63b23730b780d7534ac9615bc43cb72a8173e10639ac01336e5476f624cfa8272ccdae7508508f8111a17445ae

      • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping808_132633389\CR_E0939.tmp\setup.exe

        Filesize

        4.1MB

        MD5

        f7c506342f66798fb87a8cb850774a64

        SHA1

        b58ff52a695c948ae7922e00ef6601ad72b2f41b

        SHA256

        ad141017940f7e64d99e2afa2d6f1edcd3cd4ddc4795632bae764bc47c2868b4

        SHA512

        3c662df3e9f46539b7da5fb3f02c1049b0820088337b216713d4f553559266ad2c08d9552d5f060ae336214aa6221e453c3f92fac27f52b905064b0e65842df6

      • C:\Program Files\Crashpad\settings.dat

        Filesize

        40B

        MD5

        8fdba02dee6bc2f0582aae48013c3868

        SHA1

        2b563f9c1583c529a88f486e02a5fcf86fe149ca

        SHA256

        8219145a2984575fa6086d99e956a6b12817cb1dec5cf8607740330103c88d1a

        SHA512

        8b2b41512897ae9a36625987403d05007b07133fe2012703b812b0573c8d7419f9968b40e3f712437621fd60481216345589d93095c1b61ff5ae07439209622e

      • C:\Program Files\Google\Chrome\Application\128.0.6613.139\chrome_elf.dll

        Filesize

        1.2MB

        MD5

        83b87dbc906faa185bc560a194fdd3d6

        SHA1

        9c9c077b045dc49aa9ce6cf9f9d000a0deaa86dc

        SHA256

        6b7fe45828b07a5490351f46a6515d539c46220df62573c0d8e500d810b6d9ff

        SHA512

        f8d21254b6573c2f133b578ac849523f9055727657e92f626b9192efe0b5a0a53170cdb6c314046592bbe82634536d071e1cb5d695cecb9eea7f5950b6d3ebc5

      • C:\Program Files\Google\Chrome\Application\128.0.6613.139\d3dcompiler_47.dll

        Filesize

        4.7MB

        MD5

        a7b7470c347f84365ffe1b2072b4f95c

        SHA1

        57a96f6fb326ba65b7f7016242132b3f9464c7a3

        SHA256

        af7b99be1b8770c0e4d18e43b04e81d11bdeb667fa6b07ade7a88f4c5676bf9a

        SHA512

        83391a219631f750499fd9642d59ec80fb377c378997b302d10762e83325551bb97c1086b181fff0521b1ca933e518eab71a44a3578a23691f215ebb1dce463d

      • C:\Program Files\Google\Chrome\Application\128.0.6613.139\libEGL.dll

        Filesize

        492KB

        MD5

        e27f8d91e390a12a4434f54bfdd99934

        SHA1

        1ba9dee46af55bf60fe51671b25abeac36ea91d3

        SHA256

        9abdeadce73744a8d9dbb0623c67eef4028fdbe624c0187baa6cc7f27aa7d291

        SHA512

        b226b534df356c45af0b20a0f235610beb191e7e3bb3568bab9d9948faad0417bb5eb1f14531f350a3a8dfb815e966d2c002a02564004746e29f0c321da91f4e

      • C:\Program Files\Google\Chrome\Application\128.0.6613.139\libGLESv2.dll

        Filesize

        7.9MB

        MD5

        3b5ca701e384b6c10b2d680a07dabb11

        SHA1

        218a598f5cfedb756135ed31d63a0fe79d9c586e

        SHA256

        cd8a5915bfb7db8c8750c3933f72f924f864574e43766f07733b75cb81bfeb06

        SHA512

        29c1e821f58e335f681f9bc5d77e497297942dd13e733d796631fa7dd43eb5f077e92364ef81c80cb6f7c1f3739ea842b120c1bbe2b8b682964b8e8c60c96c36

      • C:\Program Files\Google\Chrome\Application\chrome.exe

        Filesize

        2.6MB

        MD5

        0459c9d46683e9f67ca9975580331da2

        SHA1

        9505f3cc6e7224b290c8b50d33577333965675f2

        SHA256

        f5b88cf71c76904dc9b359e49d4ea69f95264a002354e17a030d2375268bb992

        SHA512

        ec3b6c6c9a12f00efdd0b82e07399b3281c5617b5a439176b5bf6f32596989bfa75763ba4f6dc2fd5362080de8e33efe21a493b04620f32ef216f2de6c6ce319

      • C:\Program Files\ImproveOrganizerMagnetic\ChromeSetup.exe

        Filesize

        8.5MB

        MD5

        5adff4313fbd074df44b4eb5b7893c5e

        SHA1

        d27388ef6cf34d40e0e7666f6381fcc5bbafa0f7

        SHA256

        d0c7a4390bdd6b442b96fc76f8a38f7b756ba2c16752ea259844420161865cae

        SHA512

        f5d639922b91878cf83d97563288a3aa4cba94db3ad5e8ac11d24ef7c44b019383a4414aeba6171b4c7bfa83ea1eafc1231cc9233e3b82b5ca7dc0b3ffacbf60

      • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.exe

        Filesize

        832KB

        MD5

        d305d506c0095df8af223ac7d91ca327

        SHA1

        679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

        SHA256

        923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

        SHA512

        94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

      • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.wrapper.log

        Filesize

        646B

        MD5

        bb445a7b7c32fbbb4730c964bed1d59a

        SHA1

        6774790a5211d8730abdfb24aaf798d0d2feb0b4

        SHA256

        c911679cad3a367840d4bb804f2dd03a513d418f739bf83bf1630f907d06d4c8

        SHA512

        ece67e987cd950016334616031e267132ad75e04bd8562ac5709e32e98bbcd724a9eda506480548c06d88ef3030e30e2579c5b0c739891628743b67af033f7af

      • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.wrapper.log

        Filesize

        268B

        MD5

        0cd9b4f12ebb5c7b7d21f9740e600041

        SHA1

        29fe916379f82d4ed1f0d256043bd788d22597fa

        SHA256

        7552e480ec8d6a61fb72c32c63e38779338717799359c42699c13637b9fd179e

        SHA512

        12e38e6bddc09c17a9a206150b69f7c2b5ed70bc014f2774b61e08dad395dfafa0c86b6f48786a06096a41be4e53362ff7925dfa923649f5fec4f91d3ead9e13

      • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.wrapper.log

        Filesize

        592B

        MD5

        0430da45552b3206ebbd253f9d915e49

        SHA1

        dd76528d6431c054dd42131108db2bd4ad7c56d4

        SHA256

        03190a5515de05171e5900148bec9fed1e34353602fc4c9a4776c35705fcd52e

        SHA512

        9e1ae35ca153d962de427b28d60f4d8faa62aa11b644bac141a93824c9976888febd3349befbf049d77f6ff90941d88f2d76d2cb59ca02461ed8e9368c1f50ff

      • C:\Program Files\ImproveOrganizerMagnetic\DacdWcPDgGtK.xml

        Filesize

        444B

        MD5

        57cbbcc41bb2e5d48350dcde34bc11fc

        SHA1

        25802cb4a4dd5dc1db6a70cc9bcaa0d470058d25

        SHA256

        ae7ad437252fa0fe033bc6f7a8c3db69b9fc0287b148b5c762c9e6d8cba387e9

        SHA512

        b0148f7e80564ee49c94aca87b66f87555831c54e37480af8d6db4f586e982703366babfc36a8e36d10cad53b6ed03fa4f0d6d2e1147103169bb185f51d21018

      • C:\Program Files\ImproveOrganizerMagnetic\ICXslERhfXqJTZMhevsa

        Filesize

        1.7MB

        MD5

        3e8e70417e8f5df6a3e1235506c12655

        SHA1

        482b4d16fa7f8d25d482ced7ea3a1652a3f5915f

        SHA256

        feec00f05e0ad1ce966a03b67d17114ef0c2d4880b25d62c295df267dd48d3a7

        SHA512

        f78c352c681fd07e80f62eb017fca9188e88f9a6781e395bfe411d923c91148e87d65e40f598917c2bb6eb7e1a48de56abc4c4d59a23a29f17565b652d6523b3

      • C:\Program Files\ImproveOrganizerMagnetic\OtapxNTOYhmF.exe

        Filesize

        574KB

        MD5

        42badc1d2f03a8b1e4875740d3d49336

        SHA1

        cee178da1fb05f99af7a3547093122893bd1eb46

        SHA256

        c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

        SHA512

        6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

      • C:\Program Files\ImproveOrganizerMagnetic\oRqsGHUxNM16.exe

        Filesize

        2.9MB

        MD5

        019fd1a681f7d86fe351082f021f1e17

        SHA1

        ddacb8842f1c52ed9b71507ea59fd8a324e6a2bc

        SHA256

        30299b86f1a081ec5ea7c0d3c84d3286ecf6a743923c8f0d935943dd6c1c0df2

        SHA512

        e8b99c2a3805f68b473f35604999d8ed36423bae4bcc808cedf26a4e4f8c48606022dd2cc98d4f7ff1be9855cde63f6f6ad3634d24e6eccdb40e68b3b2c7f2fa

      • C:\Program Files\chrome_Unpacker_BeginUnzipping4500_303443572\manifest.json

        Filesize

        94B

        MD5

        2020de608b771d4b0d4e72b322e21736

        SHA1

        8c3dad3308ca45b1af3e92faaf89f098888b558f

        SHA256

        421bcbc169cf3ebba811d37d29287cbb95205395376f46199f692eda63949806

        SHA512

        2f7f35831c1b17ba172a01fdf4f42ac4e4dd585d38323c343f1afa8578ca2696cfe4d15af75eea9a96a9a33f58d127a3633554e08bcbf4fa521191c31d96ad4d

      • C:\Program Files\chrome_installer.log

        Filesize

        21KB

        MD5

        09745c2cda4081f8338be97eaf838f67

        SHA1

        b836c8628a610cff7af348be74dfa95059184ac2

        SHA256

        cc62038a1860951cdf701b4750588c15fe94534842265f4ba623c1d2eb892e95

        SHA512

        2b0ecd55b2e53105d441ea900a9ef91a67fee3fecb8529ae93dabbfc9a50f250e73c31cc2bb949a8002980c8bb71d7bd223ee2cac29de21329c4713414465a92

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\CertificateRevocation\9133\crl-set

        Filesize

        503KB

        MD5

        e442c9fa1b29537d295f55ce9ca2c947

        SHA1

        641cd6b894876b0e8159fd78751d61c1e6eb6dc3

        SHA256

        5900182f57cb8f7d2a73020aecbe29926eacd4bcf2b5674b93df32aa8345281c

        SHA512

        c52f8c24ed0577e1eb9538565139368aa51fe06f1fedcef06c281e459d4f03f84e012e381d74f8f4c5b3f2fc1470c4fc4e7c3922c7f915df9da491b5cdd56c3f

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\078320fb-c655-4c06-92a8-4d3ad0d7c77f.tmp

        Filesize

        38B

        MD5

        3433ccf3e03fc35b634cd0627833b0ad

        SHA1

        789a43382e88905d6eb739ada3a8ba8c479ede02

        SHA256

        f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d

        SHA512

        21a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

        Filesize

        649B

        MD5

        1d776b92120fa31acfffe04389055521

        SHA1

        6954af1b7af46d4fa70817dc51b8de402a8cd5ff

        SHA256

        8b03330dd1eed6aabe020c82da72e17469a4d1cd0011278d799a5f5997d12d2e

        SHA512

        22fc43d2592249c30d9e2d7ddc0985e45ad261df7c2b4b84032845845b3427d053588cf48548c8df422f72d4bfce088170520c439bab73d5b30b895cd54fd2fe

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en\messages.json

        Filesize

        593B

        MD5

        91f5bc87fd478a007ec68c4e8adf11ac

        SHA1

        d07dd49e4ef3b36dad7d038b7e999ae850c5bef6

        SHA256

        92f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9

        SHA512

        fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico

        Filesize

        192KB

        MD5

        505a174e740b3c0e7065c45a78b5cf42

        SHA1

        38911944f14a8b5717245c8e6bd1d48e58c7df12

        SHA256

        024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d

        SHA512

        7891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

        Filesize

        1KB

        MD5

        3deef8caa6fae1f8a0a3e636cdfe98fb

        SHA1

        c7da5047eb549797444e71da54f5e99f46c05262

        SHA256

        d557a1ac6b90c53856499e622a9812be140e0a965ee2e61741e38589e66a8bd7

        SHA512

        0faf213e8a8cd34de310f034f52303002921bfc69c3aed3885e429d9d2d33c62f0082df0f25941a698b7c866a950e590c7edf2a3af5b39356efaab76a8ce52f5

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

        Filesize

        2B

        MD5

        d751713988987e9331980363e24189ce

        SHA1

        97d170e1550eee4afc0af065b78cda302a97674c

        SHA256

        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

        SHA512

        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

        Filesize

        356B

        MD5

        a5e5f0aaf5afaa8d4678a5e5658ce219

        SHA1

        028b6e09893bdb38520f0dcad632572c156235ff

        SHA256

        c051886585709acc058761b1bc12fcbfea5d3428fd8850aacde1d092c544e486

        SHA512

        15c8787881ebf1820ac5ee427c2431b889f37cdee3eab36bce32c4ddc176ea8b39bcf868ba18b4c9db298e8d0cf6178ef35d633ac531de1900c25a34f468e67c

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

        Filesize

        10KB

        MD5

        d734698de649caa9072bd5a644674b7b

        SHA1

        7f3795636e1a4d7cae0c0100e4cfafa3652f1dce

        SHA256

        4869ee0c44637e19ae8b6b877ba0644f336e9dabe4cf4f5c5b2c9a1d73b6bf0b

        SHA512

        780d04a623c33ad9f434c750cac219a799ee88b710b4dedcb5be1f7cb16020b64cec7602b18a80cf93444188240428f0e1cbc6422993764c56b040957c0a07d7

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

        Filesize

        15KB

        MD5

        401048db1b0584cc586fee996e0a5f46

        SHA1

        33762c09ea6d8c5a2d07b6e8dabddb4201caadf7

        SHA256

        0b4e484635cb181149b549e0ca4ed533f456c77eb9a694f6034cc1043c49ab72

        SHA512

        08b9e18d756907fcbd67a848d2e971d745b4c668d2cfec0a8dbb24f981a22f7b94180886e77726216c7234aeaa871afb91acf16a4708c5677cb8bd6b05301ae0

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index

        Filesize

        72B

        MD5

        c2b1b3222d2cad0917e03bd7c00c0dfe

        SHA1

        97083bec2d24ae3a9c9003d1b242d8091e2d3c67

        SHA256

        95e47660b80c135c678714956b36f42d51e9740dd780c43b33dc6a0ba0dccc37

        SHA512

        5335b13c88405f5072bed352998797597fe2ec12cfe22c08514853058b9a59a95b905e27606e65469bf6792248eb7f85056e309d979889effc52c74962e5d6b0

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index

        Filesize

        48B

        MD5

        4550591673f2bca208547fc60b37570a

        SHA1

        2c4ad5851942630a2d56b4b0166af901dfc5f681

        SHA256

        a49f4c11bcbbd30aaa49dfb07aef16cf9d49e29b3fd738c3ee3d224ad0c15b83

        SHA512

        1d64fa9df573458e87103d575c9d515e8371614f9fb9df1368edc727985de2a3868d1d361dee379ca627b54a60a340f84fd4ac54cd8492f8e878841e3d83fcf5

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_0

        Filesize

        8KB

        MD5

        cf89d16bb9107c631daabf0c0ee58efb

        SHA1

        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

        SHA256

        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

        SHA512

        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_1

        Filesize

        264KB

        MD5

        d0d388f3865d0523e451d6ba0be34cc4

        SHA1

        8571c6a52aacc2747c048e3419e5657b74612995

        SHA256

        902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

        SHA512

        376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_2

        Filesize

        8KB

        MD5

        0962291d6d367570bee5454721c17e11

        SHA1

        59d10a893ef321a706a9255176761366115bedcb

        SHA256

        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

        SHA512

        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_3

        Filesize

        8KB

        MD5

        41876349cb12d6db992f1309f22df3f0

        SHA1

        5cf26b3420fc0302cd0a71e8d029739b8765be27

        SHA256

        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

        SHA512

        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\MANIFEST-000001

        Filesize

        41B

        MD5

        5af87dfd673ba2115e2fcf5cfdb727ab

        SHA1

        d5b5bbf396dc291274584ef71f444f420b6056f1

        SHA256

        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

        SHA512

        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        189KB

        MD5

        8b53d687a707d90b5af1be6c59386e7e

        SHA1

        988de2c1e134832a5a35fe088120a5ff2510586a

        SHA256

        a0a20560b50850af67e667ff3c08b9f575e7fd6e47e0019cd5f94b21b653ca4d

        SHA512

        c871cda331245e5f4e603775a5e592cd28bd4b2e746475e0a2da4c0df8c17dfa9cd00d6604d67d5d6f4c1a947ffe35eae6af12965976720da58058f8d8d0009c

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        99KB

        MD5

        2ac068e354445c1a9effdf74f2d0b2d7

        SHA1

        2bcdf59055dc06ec47e6b4b6d9f7e667f86bff4d

        SHA256

        c84c200c1d2e5ecf0d6b485eb0b59274cc68bb571ba4e177d96609826d0d3a39

        SHA512

        64e5d90574afddb1c0b21aaf2253a47d55432a29dab2db0a79046f756bc6c2cdd28f1d3c6c9d3ff91de6beb97916a407c999cce113c542fd3b1b5ef78d547e52

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        99KB

        MD5

        28df50755cf21f9cd838861f4880f421

        SHA1

        cb7039cfb1daf36f8afa39627935abfc1bbd85b3

        SHA256

        d2234ba68acd2e3d6740e5bd45b5fa450010e3f79416bffa31a0d3194545b624

        SHA512

        001763323c401dfa9e68311c49baa2af1eacdb753076e5264879665346ea096b64bcd926505e6838e447131f4f9426844babfea7f2ad4c03053df4b142a60a65

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        189KB

        MD5

        3d8fbd856e6250005924f68cf4943100

        SHA1

        fbf87c50fe0bce43d2a225c415acf966bf00e571

        SHA256

        20c4187cb49034ba9aa9332370462f08ec94db1b03e6d1cc589639994ef7cc12

        SHA512

        7899db42bf15923c4f132dc81a8f91584e15090bda85da51a2763c9523833521d3db4a5d04a151ab0715959b29288a3f4c11bf783883e7c76eab9e890c8d095f

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DacdWcPDgGtK.exe.log

        Filesize

        1KB

        MD5

        122cf3c4f3452a55a92edee78316e071

        SHA1

        f2caa36d483076c92d17224cf92e260516b3cbbf

        SHA256

        42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

        SHA512

        c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

      • C:\Users\Admin\AppData\Local\Temp\258cada4-2263-4295-a111-73908de14032.tmp

        Filesize

        242KB

        MD5

        541f52e24fe1ef9f8e12377a6ccae0c0

        SHA1

        189898bb2dcae7d5a6057bc2d98b8b450afaebb6

        SHA256

        81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82

        SHA512

        d779d78a15c5efca51ebd6b96a7ccb6d718741bdf7d9a37f53b2eb4b98aa1a78bc4cfa57d6e763aab97276c8f9088940ac0476690d4d46023ff4bf52f3326c88

      • C:\Users\Admin\AppData\Local\Temp\scoped_dir4500_367562753\CRX_INSTALL\_locales\en\messages.json

        Filesize

        450B

        MD5

        dbedf86fa9afb3a23dbb126674f166d2

        SHA1

        5628affbcf6f897b9d7fd9c17deb9aa75036f1cc

        SHA256

        c0945dd5fdecab40c45361bec068d1996e6ae01196dce524266d740808f753fe

        SHA512

        931d7ba6da84d4bb073815540f35126f2f035a71bfe460f3ccaed25ad7c1b1792ab36cd7207b99fddf5eaf8872250b54a8958cf5827608f0640e8aafe11e0071

      • C:\Windows\Installer\e57f84a.msi

        Filesize

        20.4MB

        MD5

        fcaad59c22e7e848f387089fe25f0765

        SHA1

        21e188214f1ed9ded574b139c55b2b70c99f1d2e

        SHA256

        57bf74232f2bb8240c9c407b9677961a81ab90d539dd330de4c5ca100e4f24c1

        SHA512

        7af62c1e5dd1cd91d2327642e9f931bf46b9aa40cfcfce988dffcc323daf7ee04516c4c3a28b509907d62c7aa909dc056d1e788521ae9dfcc6c53d635e40d5d5

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.7MB

        MD5

        65126a3ce858625448a5459614d7a644

        SHA1

        d315d65faa170e77ae1bff82129f2e28c428dea1

        SHA256

        21c4345f5bc37eb9ca11bea39955756a89afee6a5135824d481e57ab5094f5f1

        SHA512

        e01f9993a0fcd90f133e7c4b2d4d38f682eca9f427f8b0f7b34fab9725a70186fde4d011bdbc39378477b96af345492dd42e444c2bd27b78d861ee43ee5b20f0

      • \??\Volume{851c08bf-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{d4b94c17-896d-4b76-a489-610902724915}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        54a64ec7714e73ab30b8579e375161e4

        SHA1

        df3a039ee9c95341e1ad194dc85752aaa3d60589

        SHA256

        afb640d5ba9ff7b8850bc534eac769e6c1791db9929bec0849a08bfd129c5ac4

        SHA512

        60ab52f57475d4a6193514efd195a74d61dc01af0174adf989c1becf5eb3159eb62606573baa8590cac7c79ebad6da585bb834bf34a45e2847ddf789f2d1f388

      • memory/1408-124-0x000000002B7D0000-0x000000002B98B000-memory.dmp

        Filesize

        1.7MB

      • memory/1408-123-0x0000000029BB0000-0x0000000029BF3000-memory.dmp

        Filesize

        268KB

      • memory/1408-128-0x000000002B7D0000-0x000000002B98B000-memory.dmp

        Filesize

        1.7MB

      • memory/1408-144-0x000000002B7D0000-0x000000002B98B000-memory.dmp

        Filesize

        1.7MB

      • memory/4160-25-0x0000000009BD0000-0x0000000009BFA000-memory.dmp

        Filesize

        168KB

      • memory/4828-65-0x0000000000290000-0x0000000000366000-memory.dmp

        Filesize

        856KB