Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 11:37

General

  • Target

    googlups.msi

  • Size

    27.6MB

  • MD5

    1360b4beaf800c3ca4be311301cb2cb7

  • SHA1

    f4d0724cf3df9d78779a5002c0414b1fcd76cbf8

  • SHA256

    60ccad58b390a02fdf64477e6cbfd545c43788c7abaeb1fbe4d26099e178fe4a

  • SHA512

    7e66cae3bbc27d7e55871e7ed06ded74b5aa222d4e21a0ed37b55b0c00fdcbd3817abc5ad303bc561ac54bb0bfa2a0cfe441226638f364ea7163977856046ab7

  • SSDEEP

    786432:wURQ1YYLOtsId3pQof4c0RtYhGYrCw45almp:w2U9XeI8bwala

Malware Config

Signatures

  • Detect PurpleFox Rootkit 4 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 11 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 40 IoCs
  • Loads dropped DLL 41 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\googlups.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4892
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4112
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DBCDD39E757FF829CA978607FE39121B E Global\MSI0000
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Program Files\SecureRetailerTrusty\ivfFOaaBljLY.exe
        "C:\Program Files\SecureRetailerTrusty\ivfFOaaBljLY.exe" x "C:\Program Files\SecureRetailerTrusty\EvUYYnXAbyuPvELXKSQP" -o"C:\Program Files\SecureRetailerTrusty\" -pFpTMTtJmTTolePKAwdwa -y
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1568
      • C:\Program Files\SecureRetailerTrusty\EDWJLBYgUE16.exe
        "C:\Program Files\SecureRetailerTrusty\EDWJLBYgUE16.exe" -number 123 -file file3 -mode mode3 -flag flag3
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4124
      • C:\Program Files\SecureRetailerTrusty\ChromeSetup.exe
        "C:\Program Files\SecureRetailerTrusty\ChromeSetup.exe"
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Program Files (x86)\Google4608_347108773\bin\updater.exe
          "C:\Program Files (x86)\Google4608_347108773\bin\updater.exe" --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={FD39FE3E-F972-AC55-37EA-CE3FED473068}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-statsdef_1&installdataindex=empty --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=2
          4⤵
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Program Files (x86)\Google4608_347108773\bin\updater.exe
            "C:\Program Files (x86)\Google4608_347108773\bin\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x90c694,0x90c6a0,0x90c6ac
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4528
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
            5⤵
            • Checks system information in the registry
            • Drops file in Program Files directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1512
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=129.0.6668.58 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd00ee7bf8,0x7ffd00ee7c04,0x7ffd00ee7c10
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2652
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1648,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=1636 /prefetch:2
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:1496
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=2208,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:3
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:4932
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --field-trial-handle=2336,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=2520 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1840
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=3152 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:220
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3052,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=3180 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3728
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4336,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=4372 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5196
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4568,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=4612 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5224
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4708,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=4564 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5244
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5304,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=5316 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5708
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5444,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=5456 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5816
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5720,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=5472 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5912
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5652,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=5740 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5952
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5300,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:4992
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5884,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=5924 /prefetch:2
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:6004
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5760,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=6000 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:4444
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5960,i,18224741399846043087,9124712276882001466,262144 --variations-seed-version --mojo-platform-channel-handle=6116 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:4316
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3372
  • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
    "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update-internal
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x53c694,0x53c6a0,0x53c6ac
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2192
  • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.exe
    "C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.exe" install
    1⤵
    • Executes dropped EXE
    PID:1500
  • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
    "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x53c694,0x53c6a0,0x53c6ac
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1984
    • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\129.0.6668.58_chrome_installer.exe
      "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\129.0.6668.58_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\5035074c-04e8-4839-a2b8-642621a472d9.tmp"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe
        "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe" --install-archive="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\5035074c-04e8-4839-a2b8-642621a472d9.tmp"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Network Configuration Discovery: Internet Connection Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe
          "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=129.0.6668.58 --initial-client-data=0x27c,0x280,0x284,0x258,0x288,0x7ff63e21e628,0x7ff63e21e634,0x7ff63e21e640
          4⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          PID:4900
        • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe
          "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2300
          • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe
            "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=129.0.6668.58 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff63e21e628,0x7ff63e21e634,0x7ff63e21e640
            5⤵
            • Drops file in Program Files directory
            • Executes dropped EXE
            PID:4996
  • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.exe
    "C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.exe" start
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:676
  • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.exe
    "C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Program Files\SecureRetailerTrusty\EDWJLBYgUE16.exe
      "C:\Program Files\SecureRetailerTrusty\EDWJLBYgUE16.exe" -number 184 -file file3 -mode mode3 -flag flag3
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files\SecureRetailerTrusty\EDWJLBYgUE16.exe
        "C:\Program Files\SecureRetailerTrusty\EDWJLBYgUE16.exe" -number 362 -file file3 -mode mode3 -flag flag3
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4892
  • C:\Program Files\Google\Chrome\Application\129.0.6668.58\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\129.0.6668.58\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:4992
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
    1⤵
      PID:5828
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update
      1⤵
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5048
      • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
        "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x53c694,0x53c6a0,0x53c6ac
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5795d8.rbs

      Filesize

      7KB

      MD5

      edd85a2b88e47b30cd96ed9315f4de8d

      SHA1

      3460de327ff320283694e98b8e22add4288dadcb

      SHA256

      6b904150dfc6228afa5d21d5de2ec91772e873db5f37a8082948a7c0ee5fc5e3

      SHA512

      dc61476351a75a0a52b2bf40ccfd0a062509badca1612982afb949f60a99355fad8d0059f2858662256a1a4a58fe9346cd68f32f5b0910f456f2f9cd6a92a098

    • C:\Program Files (x86)\Google4608_347108773\bin\updater.exe

      Filesize

      4.7MB

      MD5

      823816b4a601c69c89435ee17ef7b9e0

      SHA1

      2fc4c446243be4a18a6a0d142a68d5da7d2a6954

      SHA256

      c2a7c0fa80f228c2ce599e4427280997ea9e1a3f85ed32e5d5e4219dfb05ddb2

      SHA512

      f3b38807ed1eb96c932e850b9b37551554408a628bedf12aa32bde08c442ff3663bf584335e7eab193ce2cf7552bce456737c96a2ba9faa953150e6304068fc6

    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad\settings.dat

      Filesize

      40B

      MD5

      9f21a25b207604ecf3459611c160d881

      SHA1

      2a27a43e7d10b1f94182770b55b61194a6ea13c9

      SHA256

      cf389bdd10ad0b469953420a1a3d146d9bf9b5b76ad0ad75bdf33123ff2dcd7e

      SHA512

      11cdd930e82eb6d3b3f56d27c1710089c433e8eacc8a87e2ae26879e501250baba738c0317605f1d1e08e2f3835907a25431a34da32b62876d05b7ff6510cbb3

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      511B

      MD5

      6a12645a3fc9df71e5bf0a9084d5ebd8

      SHA1

      8e0225b7adf5fe958b648f8c67b790200546fdd7

      SHA256

      351438b4e7ade767d6e1645ed66308fc3ed9a0787bf1a1f03b5504a89f205226

      SHA512

      f22de4b137d02711582f9ada8a7f48d07fa238a318b29602bce9cbc609327c6f6aca315c3f0dfd0365a0938a9439d41cda205208d4ea3f336df447238790171e

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      354B

      MD5

      d4927578fc92dc543365aa4e43b202ba

      SHA1

      5e1aeb950ac6ac3f071fa02f90a4fbc0c8e5304c

      SHA256

      4ac029c04a6e82f4c588237f57a798b4285c818bdbb4250c20f11a5b95d4ecd1

      SHA512

      4c6cbf4bfb4279edc6d6bd816ca4d1d4dbc8b7f06d875493ffeea3a8782568f49911db28aae743a41962bbe4fe34afc531e119be58888a2acf0623e99df38e95

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      610B

      MD5

      5ec9e31a89d43b835ec2b6dc10cb52ec

      SHA1

      9fd77949de8f0adae322bd42894674d87139e22d

      SHA256

      309feeb0854229d55058416e76be288030ee629172b61444092aac6fa98b512f

      SHA512

      f6406aac7d37e968827f18b41e4bbe935bc39ff9f40edb3851940e3a1b00c1eb107be6947bdbbf5d39a74055f01a05c8f85409465a6e2e07301adb3909c7919a

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      610B

      MD5

      7d015ab0d8ac8cd72d2ac28e8362decd

      SHA1

      b8d1428622276820111d07ae1eaf0b8225d51ad5

      SHA256

      19443f27363fb88a07ed539939811e1a6a22aef129786ef7e5e8b2343b5dd4d6

      SHA512

      cea791ebee857b5f2d829c322ca70825d8fe062f232860588f4d47b9dbb8d513e62bf81421298b48c1038e8f880f02eff2f5882ca3f04e7590697a30b6c2b73c

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      49B

      MD5

      7b693a82168c33ec9e8cf276859ddf7f

      SHA1

      d396dbbe299fe7754a6244d01e97cc4edd0693eb

      SHA256

      84a9a7f43db56cd6e9a408f88244e8ba5efbe48a5b5168d321f112b8c8fd8e3f

      SHA512

      4064c158d753d19a72e1be1c8bd5fe7f22e2032d67d1dd7ea1d85ce652d63c69b85a4292c4403b0f7729b05607f3d1ccfaf4d27d04ad09ffcec70082450320ab

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      2KB

      MD5

      fd01af78013f452b706c0b379c91240e

      SHA1

      4f1e6c05f9e51986306d01cd8b6d106595aec6c9

      SHA256

      13add113f62f43c8240bd6e423b7789f1b3a7e178e09f048c1e4d9f77f0367b7

      SHA512

      e2dbea38fc8d008102849ac3b00dfc7ac8bb1bc9310407de36b05abd68347c36990312203a23bc1185f2e4845e172c619fc6898841fcd7fcef14ef38a64da5f1

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      4KB

      MD5

      378468bb23c62c642e61c5a4d3724ba4

      SHA1

      1a9b64c0a4fa087696b523beb9f02ee70e6d83f7

      SHA256

      f2fbba503eae04d25cf07775ae7622dbd75d2a8ef0981d496f4d8a75646cc5d0

      SHA512

      96d24747e99b1a7cd374607738a307cfc4d5be7dd6a0ea4e8b89a775d7066d794df1c505e83709efccf0ca786b3a8493d9969e243eca7be27d9a2758870f1f7b

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      6KB

      MD5

      4dae23e0114b76bcf73f482b02681e5d

      SHA1

      4cbf7502570dbea3fd431090a11854b41eed0136

      SHA256

      f9b0b15f25fa952925c87da4c73d95e7b3f35b70b34ce38b00f1701840dae4eb

      SHA512

      eb3c97ed4d8090d64e5dfe39db98a962bfa38a88cc77b33acc1bd63be945b8d0f46c71b0f931048d5a6fa63e9962ebb5cd4626ecde7aa370da88f498468730b1

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      9KB

      MD5

      e7fabe2dc06dc0ad873ff672bb3fa7e2

      SHA1

      61dd94c79060b4dcce9657d2106e338f7c9f9168

      SHA256

      f4656630e67235e8bd60fce06d1d394a4c131a84f789d5460eeeed1f9adc6ebe

      SHA512

      d0b94cb5f3663b76c297906b9c4e6a20245063c2ddcd5a96c8366c4b8c08666ee5c14d42a7449b38c5cc3db4af98870eda98a989875e856d78833c3da49ca236

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      11KB

      MD5

      3572df2f6260ea3cb4f1541391071978

      SHA1

      065e09517a0629f3c1e4b69128d9a58239b207a5

      SHA256

      8b1f962c6cf3eb37d09654454f159152042448794164aca254342f86fae68713

      SHA512

      41085863256e544f2d814e1bd5bc048296ca0d92e794173ffeb2818e9348041318f3e7d9f8dbb771c64ca2922765e436a6881b0e1a19d20d4fd76f68700edd75

    • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\5035074c-04e8-4839-a2b8-642621a472d9.tmp

      Filesize

      680KB

      MD5

      812d91a558285499df51f3a4e24c2ca2

      SHA1

      9331f773a25ecec1b3c2876f3d4b5ecd228fb899

      SHA256

      cc2d9a74e4733effb40f8a65caf2f796219bcc0faaa36a4b579356d6c983bf1d

      SHA512

      1a4adbb7a40af6f558270fff2fb5a1bd9ab239bf945507a53307d523af56fe01795ebe04cab3fa599aa2cca3fc74c90a512584946ef60a895e60eed1fc05c0fd

    • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4768_1363085242\CR_23FE5.tmp\setup.exe

      Filesize

      5.8MB

      MD5

      5283ddb7f5ad9dca6e870c873048f209

      SHA1

      fb55fa7674bec27612261a38cfaa6fb19aaf1f32

      SHA256

      19bc0a8fbc0ab7a011b1ef18e83615c0f87bc0bdc0a09801810835add1db26d4

      SHA512

      ceb08e687c457bf1f84f3c6a695aad2328b8c42360c643818a864316dd5fd4a69d56c5ed5a0a5fc569a40d3f8206862df253e2dcdee96f6f7ae7755926c3a611

    • C:\Program Files\Crashpad\settings.dat

      Filesize

      40B

      MD5

      8fdba02dee6bc2f0582aae48013c3868

      SHA1

      2b563f9c1583c529a88f486e02a5fcf86fe149ca

      SHA256

      8219145a2984575fa6086d99e956a6b12817cb1dec5cf8607740330103c88d1a

      SHA512

      8b2b41512897ae9a36625987403d05007b07133fe2012703b812b0573c8d7419f9968b40e3f712437621fd60481216345589d93095c1b61ff5ae07439209622e

    • C:\Program Files\Google\Chrome\Application\129.0.6668.58\chrome_elf.dll

      Filesize

      1.2MB

      MD5

      62271d1348594f75d2484985277979ce

      SHA1

      d5ebb8bac2f7731eed6b260d9d6897636ecc1c54

      SHA256

      2b9fe223710fdc87aef4b10f1e24c7f3129b68a85695a35537a12e3e69e03cad

      SHA512

      ab95ff275dfa9a6a758fc0c493a9920cffd11a5deaa9241648884aa73dbc8e2b973516a310389743465b0c6f5ede9abe0c8becb07d2be609bfe441b61d436733

    • C:\Program Files\Google\Chrome\Application\chrome.exe

      Filesize

      2.6MB

      MD5

      ecc33ca1ddd5516c4bc6208aed0e0b4d

      SHA1

      996d801c49041085457589578e5edadc742602da

      SHA256

      47ad79ab69857ab4b497e95814c2ba4aa65428f18a3d4e554d501f1751fcccb7

      SHA512

      abd02042c3899816ab519cab6483de7ae6c8996f19e266ff815ec5185fa4c95f8473521644a6b4ebc57f98dd768158f3709d5d54615f82e4eeeb9d64d44a6115

    • C:\Program Files\SecureRetailerTrusty\ChromeSetup.exe

      Filesize

      8.5MB

      MD5

      5adff4313fbd074df44b4eb5b7893c5e

      SHA1

      d27388ef6cf34d40e0e7666f6381fcc5bbafa0f7

      SHA256

      d0c7a4390bdd6b442b96fc76f8a38f7b756ba2c16752ea259844420161865cae

      SHA512

      f5d639922b91878cf83d97563288a3aa4cba94db3ad5e8ac11d24ef7c44b019383a4414aeba6171b4c7bfa83ea1eafc1231cc9233e3b82b5ca7dc0b3ffacbf60

    • C:\Program Files\SecureRetailerTrusty\EDWJLBYgUE16.exe

      Filesize

      2.9MB

      MD5

      9b00446b1873b8f20daff14b661bbacd

      SHA1

      42e34fb9765eb68e778cc563c0785a40c7d2bcb0

      SHA256

      d982712ae57d4b1110392d310eca2b45ab147daabb9d40ed88880b7dca32de6b

      SHA512

      c81ad99db9bdaf36814447041616f0d06562062d910e0b4a61666f1f60eae6af9494f214e8e21b0d61dd6157ee920871846ed825ed3c22e2b87a0effe2c06a6a

    • C:\Program Files\SecureRetailerTrusty\EvUYYnXAbyuPvELXKSQP

      Filesize

      1.7MB

      MD5

      206da7cd1a42c14a1be878ebc5364c48

      SHA1

      3291599dfd884ea782fee8a061c053a1c7556718

      SHA256

      fc4190690f79d82f665c3f4ac2c6061b0f89d3ad7667d327e22f40f0d9de8c30

      SHA512

      c46cf62d59d7c340087bf1a45fcbf76b796ae50a8ea737cb3b47c01899e691373f49767b574a0efb2c849fed4329fe8e9f1186b1b8995d0dc066c251b039ace8

    • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.exe

      Filesize

      832KB

      MD5

      d305d506c0095df8af223ac7d91ca327

      SHA1

      679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

      SHA256

      923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

      SHA512

      94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

    • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.wrapper.log

      Filesize

      264B

      MD5

      e852f6cb7bc43442dc5f080ec226c576

      SHA1

      676acd79ab52abb5c0103c59b87f418609c0bb14

      SHA256

      4b715cb13e8ccfc8de7d43949607534b0f4e546d54c846069d46d5e399eef052

      SHA512

      c8a5cc5f4a2105ce992310f8ebfd68241969070c7735df49bac2c74b758b8614a41fab98dfd198601e91b13a1f4b8771895b636f8d3d64d3bf9cba72e38b7658

    • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.wrapper.log

      Filesize

      419B

      MD5

      28667616ae78e3a7463ae78832215291

      SHA1

      dd61487645d285ac5d5a3172368cd5fc68763742

      SHA256

      faf60ea28ee7ee73f3d7c619e53e71a8dff29e2aea81ff5c14f0b331025dc79b

      SHA512

      43016e154380e16b7f78a29f7917285b749d48c405b5a9395e6a508bf9b7584166d5be109091bb4cbd9c0693f540e086f7cfaad9ff7db3f45a6bd0e0f004c550

    • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.wrapper.log

      Filesize

      584B

      MD5

      51c0624f59f0a38fc944c1b1cc37a2aa

      SHA1

      f09621e17b8487c1f3da11ec3cf9f308dba86578

      SHA256

      a5f6593b147bae007cd15d8c112b6349af8c92a2802477d3fff88bfcea1fdf36

      SHA512

      f6d09542b24076db0316758226e65d16a2f805708743c87a089d768b19b42260911624583f784e8c79db138d2fb8b07cc7d4c0c50eb3695e8cbaebead72efe82

    • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.wrapper.log

      Filesize

      729B

      MD5

      fec9fffc5eedc77316fed2d2f5bb9e6c

      SHA1

      7aa52b528587fe14a7411a92212d1ddb90b712e3

      SHA256

      fc6aec893f342d46376fd2f682203bff74a9061ec5fba4439dfaecb502da37b5

      SHA512

      ca4ce2840f1c60844bc183dcea03ceb26faf23463e92f045935c288256ef0d28ced12bcb3c3693031045c84e8ccef7122697556b5f9e711e088053bc1a6fc9ea

    • C:\Program Files\SecureRetailerTrusty\IVgmTTGSKQEu.xml

      Filesize

      436B

      MD5

      63c6711f0453c3ef2bcdd751bd3ebdcf

      SHA1

      7230aff7a7ca03a71d2ceacbbca65af4098cdde1

      SHA256

      a60da9ccb1f3b0cc2ccc89d0931367ce546f54e60d1c2242b0e88c1a0d5c9aa2

      SHA512

      0a8c6d93b923124895f75a40b73549841bfcd556443b4f2226a9fb6425da974fed56305de09be19e23961844f1284f678440e192396a20fe52b518e5cbbc709e

    • C:\Program Files\SecureRetailerTrusty\ivfFOaaBljLY.exe

      Filesize

      574KB

      MD5

      42badc1d2f03a8b1e4875740d3d49336

      SHA1

      cee178da1fb05f99af7a3547093122893bd1eb46

      SHA256

      c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

      SHA512

      6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

    • C:\Program Files\chrome_Unpacker_BeginUnzipping1512_1979673730\manifest.json

      Filesize

      114B

      MD5

      3448d97da638c7ef0fbca9b6949ffc8f

      SHA1

      36d8434f26f0316fab4627f7856fca7291fe8adf

      SHA256

      1700a11fd1e58367b450a41b2ae5fd26ecb5cdb459869c796c7dde18f1d30f73

      SHA512

      9bf9055b2ef82bd1d2a1e94009fed2d3481fe2dc336d306fa0db786658efa5b72c9a9a214a829b9fcc4222476051871ff012009c64f09b9109072abdf3def8cc

    • C:\Program Files\chrome_Unpacker_BeginUnzipping1512_573002013\manifest.json

      Filesize

      94B

      MD5

      d37f53ab33c2c15d9cf06aa71b8bbaae

      SHA1

      51f33ada360a89c94991efbecd667e618230fc84

      SHA256

      f63566bb61e4823f55ccbb90875ad08a3bbaefc8620dbb0e115372bb72ce4a15

      SHA512

      82e2a36e56d8730b26d7d64aeee10fecae1ad0cd51d4d567aded5def1b00426b3990cb84aa050f24a6adc1e50afe977811084b1b8705582a75a848f435294b6d

    • C:\Program Files\chrome_installer.log

      Filesize

      21KB

      MD5

      3d77a2dd2c33819132e691a72c630480

      SHA1

      0151bef599c0b5640ba86937304fdccff14d55c8

      SHA256

      b7ee06d26972bef1641943e44dc029f6eadad2e5a1e31687cd4fd29e2a648ff1

      SHA512

      f8d350c945dd321504b2bc19b116eed93aa46c49f7756b8cf60c2c206cea34fab48836db342d5a0a8912ef05185db50fbd6757656ccdd770e4a182720dcfa64d

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\CertificateRevocation\9140\crl-set

      Filesize

      505KB

      MD5

      d34d6cd6288671a5957e8e0b3834394b

      SHA1

      106c26c8f4666abaec313a1ebc99f30a21d5e93f

      SHA256

      65f072ec30f655529934a1c348b2c42f23c0c06dee5468697eac4fb677dadfd6

      SHA512

      0b4fa856893d0c74b6ace9752266db22e04edf6f5dd5f78330578f887d6a7669e9e4de8bb4a8d3df7254b5f9f72d3e1500a5ab4c823d6c00f92ab28a18f8351b

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

      Filesize

      649B

      MD5

      13a3a4e5c2fbdfe3e2da3dc28c83c853

      SHA1

      6e58838d6825267be5570d9ce74659283a0d99ba

      SHA256

      58fbdf6f6cb3692c9e1bf778d45190949dd96541538461acdc34bc8880165045

      SHA512

      0602b6cd41a348b1a26edec3486f4ab4c4612fd4bda2980e20844ac36ed3718879c6060046a31afc602c839ca90df40831ca81aac1f079659b2641fc407f4332

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en\messages.json

      Filesize

      593B

      MD5

      91f5bc87fd478a007ec68c4e8adf11ac

      SHA1

      d07dd49e4ef3b36dad7d038b7e999ae850c5bef6

      SHA256

      92f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9

      SHA512

      fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico

      Filesize

      192KB

      MD5

      505a174e740b3c0e7065c45a78b5cf42

      SHA1

      38911944f14a8b5717245c8e6bd1d48e58c7df12

      SHA256

      024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d

      SHA512

      7891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

      Filesize

      1KB

      MD5

      048ba88846e4b40b68c0604620c36f31

      SHA1

      ccb1a15dd343403580204a63af00fad04dce2d8d

      SHA256

      4c7fe38137a3afd48dfeeee4e5a0201ddbb4afcf374788191c7ab10c998e377d

      SHA512

      a3dce322a49acff780c1cac22f8c2f62411bbc198fcc72313263f481206a2281585d2642e485879e52fcf11e1f4c178f7c5b3b996aeb200f6f0fb85d9afd1b16

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

      Filesize

      2B

      MD5

      d751713988987e9331980363e24189ce

      SHA1

      97d170e1550eee4afc0af065b78cda302a97674c

      SHA256

      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

      SHA512

      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

      Filesize

      356B

      MD5

      3617734a93b08d34399999dd4d8e8d2a

      SHA1

      3ad79f1f51eb90538bcc92ec45741bb4e7b529b1

      SHA256

      2d05024a99116cc5462996b30c01fbde0dc92e5038ab3f247637b85ef1d86517

      SHA512

      f822fcffd83f0abc37f9f067f4e9557e4e5fd2595b4967248910234ae348c364623f66ac4005a9e424ae3cc7fbfb6bb169e1e530f7de8ab3d14813656fad3aca

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

      Filesize

      10KB

      MD5

      9690996095118c5de20775b3d8fa3fd1

      SHA1

      f0210f5c17def74b5c9acf901c483b67a8a2b0a0

      SHA256

      de055a97d37591cbef26e4b142fc77925ad63db34dfc33fde7ed39b005c48ddd

      SHA512

      1826949048dee5bb9b1500b56bb402567552d6971119bed325dce2406a2f5b37cf587104daba7786a3402c8192712727a11aa601775965e25389a2e0bc1db9ec

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

      Filesize

      15KB

      MD5

      9330d083a56fd340750926dc0a8c1b75

      SHA1

      4981a51e06853eb45025a1e5a05d6dd8618ed5ba

      SHA256

      e1cd62ab6456b24656d93059edc114ca774d5763ba465d032fe8dd6614191b8d

      SHA512

      3666fd7f4c3ab9e146fd15cff26941f55758d2f8dc8b7340d5a866619c9c09de05b0b02b07d7336812fdd97b6c7284ff06bbabc9c7534638bcc56c9b21a8cedb

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index

      Filesize

      72B

      MD5

      c45e3fc3817f600de2294db26be03cfc

      SHA1

      f5df6030eb669f99f4330ff7eaba3a40a4e390f8

      SHA256

      4d3659537adc7d108a000b85e5ca3063066d4e6beac6f998523b7ddaad5e90cf

      SHA512

      07d44e4b5b99abbdc5730628c02bfa4455f99a8191189999214ae24b14aed244235668664f0d4852636e7300c9754f9c72193aa35806232dff168638fb1a3749

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index

      Filesize

      48B

      MD5

      6678c9af06d61dca6838ac2f11fad73e

      SHA1

      88a5a721d7f307b7aca2345de26bcb9a8143fb3c

      SHA256

      f6b3c72ffd62184ed3505f80cfe4f7d55c96a4d354f3bffe2d0a7e76c88dd696

      SHA512

      e13992c9a06ccbda642686dd26bada640c4193c567b994bc8dacfaa88c01063d7749282b2f40ea5686264d00705e6846fb273115f13161e80795851891baaa1d

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_0

      Filesize

      8KB

      MD5

      cf89d16bb9107c631daabf0c0ee58efb

      SHA1

      3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

      SHA256

      d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

      SHA512

      8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_1

      Filesize

      264KB

      MD5

      d0d388f3865d0523e451d6ba0be34cc4

      SHA1

      8571c6a52aacc2747c048e3419e5657b74612995

      SHA256

      902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

      SHA512

      376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_2

      Filesize

      8KB

      MD5

      0962291d6d367570bee5454721c17e11

      SHA1

      59d10a893ef321a706a9255176761366115bedcb

      SHA256

      ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

      SHA512

      f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_3

      Filesize

      8KB

      MD5

      41876349cb12d6db992f1309f22df3f0

      SHA1

      5cf26b3420fc0302cd0a71e8d029739b8765be27

      SHA256

      e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

      SHA512

      e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\index

      Filesize

      256KB

      MD5

      029de320751dce7fe7dec49f98d756c3

      SHA1

      b86421d02fa4affeb2bcd7babb9ea263513074b7

      SHA256

      b8234ee200a72db4c19d9a21655f97c3b6e9415b294cea283deffc36a8f7ac47

      SHA512

      712d0be53a4cdf45fc0c71aaa6fb6fff544f1afd5740d507ad3ae1270a4ea122d5f3d1d4bb4e9bb01445ba1a4bef4e807d1c56bd86680e18d5c6a28666356953

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\CURRENT

      Filesize

      16B

      MD5

      46295cac801e5d4857d09837238a6394

      SHA1

      44e0fa1b517dbf802b18faf0785eeea6ac51594b

      SHA256

      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

      SHA512

      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\MANIFEST-000001

      Filesize

      41B

      MD5

      5af87dfd673ba2115e2fcf5cfdb727ab

      SHA1

      d5b5bbf396dc291274584ef71f444f420b6056f1

      SHA256

      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

      SHA512

      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\trusted_vault.pb

      Filesize

      38B

      MD5

      3433ccf3e03fc35b634cd0627833b0ad

      SHA1

      789a43382e88905d6eb739ada3a8ba8c479ede02

      SHA256

      f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d

      SHA512

      21a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      183KB

      MD5

      315277c1fa2fa7676f6df4a044fc9d12

      SHA1

      977dfbf00e154200c34fe8219f2e40bf3061bff6

      SHA256

      c279f0a71d00135b8893813e1e83d572b65fcec7a61caa6240f4194db05c6ff7

      SHA512

      3bc0e123391be69dc4dc482bef13b315a855560dfe6609c2fdb69645c5cf956135d745d4ad931d4e59f6f5d92e9ba1f7bece6018ea1ef0314c0f213b32ea6ca6

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      100KB

      MD5

      11eafbdd57011ad2555810e68290d22a

      SHA1

      450678f44055e22577ceb35e0d3775a5d201353d

      SHA256

      a7e760285db28ff2596aabdddf3ded9aceed4ac002b8d3e4da9183ac13ea2cee

      SHA512

      d623172ad37ada607ccdbf1d0437cb940b0db028bb8c3fafacc1590a0b5327a127b18a2db465126b2ddedf2771f6172888898e94507ec77cf3b8e49c3ed79c56

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      99KB

      MD5

      da4cc05a9e632620cb137bd3d848c8cd

      SHA1

      aca3371f00308f6ca464ac6ff02cc2483b5d6d62

      SHA256

      59ce062eb84400f1a416ff23310bc147378c48f868ec550dce2c453e418861e5

      SHA512

      b20e46acae0c9560559d2c7698849842ade4579a4f94bfc27ff44d3100e295fabd458fbd3817f98a64362a64ef8416305945b7f38040f86ee66889de60b4b705

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      183KB

      MD5

      6964ecf498714ad7e286ba7e41bb4c75

      SHA1

      b87ee5a8cb65d283d45791185863c408c707b790

      SHA256

      303f4d12ce526725d13b8c25b81681331b186680b0d55824ae10902384ec49b3

      SHA512

      b1cb5c30ed28cc28498a6ef71d5839436cf945bae7bbb8f87f12f89126b0a5d723cf71557b05ce025f2396b837a59ca82c98afc08bb51f7fcaf0d718017e6481

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Subresource Filter\Unindexed Rules\9.51.0\Filtering Rules

      Filesize

      72KB

      MD5

      b23dd5b6eccb460003ea37ba0f5e3730

      SHA1

      fd444553cb7699f84ce7e5664232771673dcf67d

      SHA256

      7f7f432c27d97dee184dcd3ea20f731674c008be849c0136f9c5358e359f3ea9

      SHA512

      7e47bd172c4bd4c65f063a8fa3fb33ed47f29156eb20e42d4e8ea73c6f02526a30ffe907be5b7c1406d4eaa71fbec7c0d557c376dccd0a1a961e2f61b3431181

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IVgmTTGSKQEu.exe.log

      Filesize

      1KB

      MD5

      122cf3c4f3452a55a92edee78316e071

      SHA1

      f2caa36d483076c92d17224cf92e260516b3cbbf

      SHA256

      42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

      SHA512

      c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

    • C:\Users\Admin\AppData\Local\Temp\scoped_dir1512_742710631\9db5cf19-2be6-4deb-a3f8-02b9dab72ada.tmp

      Filesize

      242KB

      MD5

      541f52e24fe1ef9f8e12377a6ccae0c0

      SHA1

      189898bb2dcae7d5a6057bc2d98b8b450afaebb6

      SHA256

      81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82

      SHA512

      d779d78a15c5efca51ebd6b96a7ccb6d718741bdf7d9a37f53b2eb4b98aa1a78bc4cfa57d6e763aab97276c8f9088940ac0476690d4d46023ff4bf52f3326c88

    • C:\Users\Admin\AppData\Local\Temp\scoped_dir1512_742710631\CRX_INSTALL\_locales\en\messages.json

      Filesize

      450B

      MD5

      dbedf86fa9afb3a23dbb126674f166d2

      SHA1

      5628affbcf6f897b9d7fd9c17deb9aa75036f1cc

      SHA256

      c0945dd5fdecab40c45361bec068d1996e6ae01196dce524266d740808f753fe

      SHA512

      931d7ba6da84d4bb073815540f35126f2f035a71bfe460f3ccaed25ad7c1b1792ab36cd7207b99fddf5eaf8872250b54a8958cf5827608f0640e8aafe11e0071

    • C:\Windows\Installer\e5795d7.msi

      Filesize

      27.6MB

      MD5

      1360b4beaf800c3ca4be311301cb2cb7

      SHA1

      f4d0724cf3df9d78779a5002c0414b1fcd76cbf8

      SHA256

      60ccad58b390a02fdf64477e6cbfd545c43788c7abaeb1fbe4d26099e178fe4a

      SHA512

      7e66cae3bbc27d7e55871e7ed06ded74b5aa222d4e21a0ed37b55b0c00fdcbd3817abc5ad303bc561ac54bb0bfa2a0cfe441226638f364ea7163977856046ab7

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      1484dc14623b395badcc9d48d52c0afd

      SHA1

      ca2ad6acbb3e533870afe383d85a8461164a42c1

      SHA256

      3bf92c9b5a8b19ce4b9d11fdd5ad40171827a7837caf1c77e0d4017cb6d6d4f3

      SHA512

      0490528e6b9039a3b4d02f66d9fe5317e88fdf9ea6be487823536c4a39ea0860f97f6f8b8ee54e81ddbcc678485503ed61b93505d2c6a5e157101b723aeba686

    • \??\Volume{851c08bf-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{0138ff69-796b-433e-b41b-3b2ab8227a83}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      fd5030d49bfb088dd55aa12fe91718cf

      SHA1

      85e6f21754bb02e1dfe549d1d216d9506ea76ffd

      SHA256

      042803500859fe286cc16d49d1cff988b669f3aef1ce66a4302c85f62defafa0

      SHA512

      439dd510cc5a0434f0743a3074dd72eb45b858c2b235ecc1f583a7b970dc1e09d4d574734052e12a97eeb6d61cbaae973093d579cad134fd2c5b89e322c0b034

    • memory/1500-82-0x0000000000B20000-0x0000000000BF6000-memory.dmp

      Filesize

      856KB

    • memory/4124-50-0x00000000299E0000-0x0000000029A0A000-memory.dmp

      Filesize

      168KB

    • memory/4892-158-0x000000002B760000-0x000000002B91B000-memory.dmp

      Filesize

      1.7MB

    • memory/4892-160-0x000000002B760000-0x000000002B91B000-memory.dmp

      Filesize

      1.7MB

    • memory/4892-139-0x000000002B760000-0x000000002B91B000-memory.dmp

      Filesize

      1.7MB

    • memory/4892-143-0x000000002B760000-0x000000002B91B000-memory.dmp

      Filesize

      1.7MB