Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 14:01

General

  • Target

    chrrmesetup.msi

  • Size

    27.8MB

  • MD5

    60b6321a22e3cfcecc3c1c68295cc868

  • SHA1

    808a316ee3b0f4fc7bce63358ff4f744e628465b

  • SHA256

    df41ebd057040524d137711938752fef32872f8a3ed2f4ee10e6b7c05d7f4410

  • SHA512

    b4047e9ef64bf63933143d289ce88b11107d552d37ef2905c3139e414bc8a61f86f49b548ee2e8978d0d02f5acfdc407640def7d05a9bcaffacfcebd5d872b91

  • SSDEEP

    786432:NURQ1YYLOtsId3pQof4c0RtYhGYrCw45alNJFOF:N2U9XeI8bwal8

Malware Config

Signatures

  • Detect PurpleFox Rootkit 3 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 11 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 40 IoCs
  • Loads dropped DLL 41 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\chrrmesetup.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1592
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2932
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 188AEA0DC59D50A01BEA2AEF245DD859 E Global\MSI0000
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Program Files\DeployEngineerCalm\RVMrLdYYerZH.exe
        "C:\Program Files\DeployEngineerCalm\RVMrLdYYerZH.exe" x "C:\Program Files\DeployEngineerCalm\MSjpGFGbYdhVKRljAaZT" -o"C:\Program Files\DeployEngineerCalm\" -pCVtfwrfwUvBoTLjcdFbD -y
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3980
      • C:\Program Files\DeployEngineerCalm\gafcETxyYz4.exe
        "C:\Program Files\DeployEngineerCalm\gafcETxyYz4.exe" -number 250 -file file3 -mode mode3 -flag flag3
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:876
      • C:\Program Files\DeployEngineerCalm\ChromeSetup.exe
        "C:\Program Files\DeployEngineerCalm\ChromeSetup.exe"
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3480
        • C:\Program Files (x86)\Google3480_931289740\bin\updater.exe
          "C:\Program Files (x86)\Google3480_931289740\bin\updater.exe" --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={FD39FE3E-F972-AC55-37EA-CE3FED473068}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-statsdef_1&installdataindex=empty --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=2
          4⤵
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4676
          • C:\Program Files (x86)\Google3480_931289740\bin\updater.exe
            "C:\Program Files (x86)\Google3480_931289740\bin\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x116c694,0x116c6a0,0x116c6ac
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2328
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
            5⤵
            • Checks system information in the registry
            • Drops file in Program Files directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3020
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=128.0.6613.138 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe68d16c28,0x7ffe68d16c34,0x7ffe68d16c40
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:112
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1984,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=1980 /prefetch:2
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:316
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1616,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=1996 /prefetch:3
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:3924
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2364,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:4928
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=3092 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:3392
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3068,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=3128 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2972
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4052,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:3508
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4624,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=4756 /prefetch:1
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1160
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5008,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5176
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4996,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=4916 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5396
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=4704,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=5100 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5456
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=3632,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=5380 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5596
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5116,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=5404 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5648
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5020,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:5908
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5656,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=5644 /prefetch:2
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5496
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=752,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=5788 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies data under HKEY_USERS
              PID:5368
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5484,i,13810087650687076256,668334183897403987,262144 --variations-seed-version --mojo-platform-channel-handle=5748 /prefetch:8
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:944
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4916
  • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.exe
    "C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.exe" install
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:3716
  • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
    "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update-internal
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x103c694,0x103c6a0,0x103c6ac
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1824
  • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
    "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x103c694,0x103c6a0,0x103c6ac
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4864
    • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\128.0.6613.138_chrome_installer.exe
      "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\128.0.6613.138_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\a12a3ea7-0cae-4fdf-ac80-7432fba66beb.tmp"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe
        "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe" --install-archive="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\a12a3ea7-0cae-4fdf-ac80-7432fba66beb.tmp"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Network Configuration Discovery: Internet Connection Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe
          "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=128.0.6613.138 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff641df46b8,0x7ff641df46c4,0x7ff641df46d0
          4⤵
          • Executes dropped EXE
          PID:5072
        • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe
          "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Drops file in System32 directory
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2400
          • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe
            "C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=128.0.6613.138 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff641df46b8,0x7ff641df46c4,0x7ff641df46d0
            5⤵
            • Executes dropped EXE
            PID:3668
  • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.exe
    "C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.exe" start
    1⤵
    • Executes dropped EXE
    PID:2144
  • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.exe
    "C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Program Files\DeployEngineerCalm\gafcETxyYz4.exe
      "C:\Program Files\DeployEngineerCalm\gafcETxyYz4.exe" -number 262 -file file3 -mode mode3 -flag flag3
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Program Files\DeployEngineerCalm\gafcETxyYz4.exe
        "C:\Program Files\DeployEngineerCalm\gafcETxyYz4.exe" -number 362 -file file3 -mode mode3 -flag flag3
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1556
  • C:\Program Files\Google\Chrome\Application\128.0.6613.138\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\128.0.6613.138\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:4336
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
    1⤵
      PID:5564
    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
      "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --system --windows-service --service=update
      1⤵
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5912
      • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe
        "C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=128.0.6597.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x103c694,0x103c6a0,0x103c6ac
        2⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57f6f4.rbs

      Filesize

      7KB

      MD5

      da0efb58973bb29d85619beb494a9d89

      SHA1

      722fce5693225cb83b5b32676679533587a52ed6

      SHA256

      7bd97a5d57bd97aa991403d8956e19f36a2f7efa4e9e70dd81d59af92567f526

      SHA512

      a263b7e0cdda6a802535fc78b5e277f7c0719cc75001650cc8d6cb1bdd75ddd1226e9db6153aafe3efdee57209908aefddf5fe5333eb4061d2f0e42a4c7bf35b

    • C:\Program Files (x86)\Google3480_931289740\bin\updater.exe

      Filesize

      4.7MB

      MD5

      823816b4a601c69c89435ee17ef7b9e0

      SHA1

      2fc4c446243be4a18a6a0d142a68d5da7d2a6954

      SHA256

      c2a7c0fa80f228c2ce599e4427280997ea9e1a3f85ed32e5d5e4219dfb05ddb2

      SHA512

      f3b38807ed1eb96c932e850b9b37551554408a628bedf12aa32bde08c442ff3663bf584335e7eab193ce2cf7552bce456737c96a2ba9faa953150e6304068fc6

    • C:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\Crashpad\settings.dat

      Filesize

      40B

      MD5

      6d204c330373fd5e5f1fa8781ed6a81e

      SHA1

      dc73fb22b24d308fc283d885358da51dec3d914e

      SHA256

      1fdb5740912a31422143e805aa332821877f7a99f2cbcf1dcc76e8ab0f19ed50

      SHA512

      9dd34b7a62b3148a03f5bc437ad21bac57baa05679a76fb0469e38b6eb9854d36e009f325254ddebe1da219574332b827cfda55e3c09a91abcf909a0b96feae0

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      500B

      MD5

      ceed909078ac6d44dc48d04296e7bf98

      SHA1

      2dbdf1be6a2047dab41cb829e14410c62289e52c

      SHA256

      b63ae1c574b3fdfda832bb602c14a10d7605ab817d21cf73499d084d54eb2344

      SHA512

      4b809f763df1e27784c9f0b5f5e835c5f8e1d7826c2c6ad8c23417ffda38e2cfb3e382ca52c90ad7a65b01b2e23afd75c3f9b98ae6fb94a190a189a2692a6c37

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      354B

      MD5

      d4927578fc92dc543365aa4e43b202ba

      SHA1

      5e1aeb950ac6ac3f071fa02f90a4fbc0c8e5304c

      SHA256

      4ac029c04a6e82f4c588237f57a798b4285c818bdbb4250c20f11a5b95d4ecd1

      SHA512

      4c6cbf4bfb4279edc6d6bd816ca4d1d4dbc8b7f06d875493ffeea3a8782568f49911db28aae743a41962bbe4fe34afc531e119be58888a2acf0623e99df38e95

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      600B

      MD5

      3d9a136a81fc963b29deb25a7cba6662

      SHA1

      23840dc9cdaf3c87dd36fe26565522882054118c

      SHA256

      61defd25b4b7975c302678189d77c212d18fc657ca9287b121a1d3515012d3d0

      SHA512

      613a5041df51c8efd367fc6aa649c4521e7613b3f45657337dd8dc9b0ddf7f79ddc3d2b1b8a288db35e11d8ff25ceb64abb348b48ec5fd13e46a5e1bf6eadbd5

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      600B

      MD5

      0c04dde4db568efdf301f7fc876ec3bc

      SHA1

      e8f38848d07329df5c0803b04c560360baf5a398

      SHA256

      2df29349559c37adacd013760756c286f49a801c02671a1a895d8efb9756b32f

      SHA512

      3fa68485ebfb826c9e334966bc96293af65923c3861eb057b3d3417d3db3d92676e6752856e1f50ff581eb9d147f0a27f8aad6d0a4cab2dd357268ff8e1b3d97

    • C:\Program Files (x86)\Google\GoogleUpdater\prefs.json

      Filesize

      49B

      MD5

      7b693a82168c33ec9e8cf276859ddf7f

      SHA1

      d396dbbe299fe7754a6244d01e97cc4edd0693eb

      SHA256

      84a9a7f43db56cd6e9a408f88244e8ba5efbe48a5b5168d321f112b8c8fd8e3f

      SHA512

      4064c158d753d19a72e1be1c8bd5fe7f22e2032d67d1dd7ea1d85ce652d63c69b85a4292c4403b0f7729b05607f3d1ccfaf4d27d04ad09ffcec70082450320ab

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      1KB

      MD5

      5b7001383901b964df765c7b9ef330ee

      SHA1

      3fa21b00c8dd90ca1350d9830938613a0d0cccf9

      SHA256

      3592d509766b2b2eca5d58474d039a832b426ccfbcc74c57e1019c58d327bb1d

      SHA512

      2bd108388f3e9a4e1ad93892d199bcb2be5723493e068c595072517554ab1081d7e55c75305adef85f6e3495c72f5beec6354f5bcffb3234f9f4f86c7a794f7c

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      1KB

      MD5

      4193f36e924881ae243ab3faf01f4a38

      SHA1

      0fd00cc8a916440bdc29aadf45e3606bf6b84aba

      SHA256

      b9908f4bb588fd1d32c74201a52ae71fc931e5468b7a8f695592d0323914b16c

      SHA512

      8196fa0e174ff5441fea8cc9408ce41223497f8d1fa9913b81d940874f5e04c03137b8b7c55a49187733e2dc9f147b9157a70dda1420a4480b448c4d1f867d76

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      4KB

      MD5

      56ca4f5245acba3e122eb46a60b5929b

      SHA1

      57cec8fc8e3d9abac47bdc393859c63a09501df1

      SHA256

      c82c021d4a7e66f1eb05daa40007ee23babf6dff1c4528f1ded4ba6cd4272d5a

      SHA512

      c5f2e0e0be159cb2815a229a37e57ff103acfd863b669c57f44d3eda0422013e99f4b4da658c8f5fd500e65c0f1558d49ea86336ad9dc6047138d9178191293b

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      5KB

      MD5

      44d0e4900b9f994f22752281a6256334

      SHA1

      4f2b0877cf20949be5e87857d94754d73a2133f3

      SHA256

      e43bf27f872a4ed3bd4792b10e6aef91de08a08a1516b6df30b23c26d6af18b4

      SHA512

      263cd8aab14d12a01ad1942228282fe5f69f690ecbac843f29188ebe372c1b1d37d778baf21e3b1d666b5f25bb83a642ac631332b16231def87504ee5de9593f

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      9KB

      MD5

      2bf8d2723ec0a2a34632d8ba23e2182b

      SHA1

      270e8105ff34bd707ed8ad5f23cd542bd1f20e79

      SHA256

      9079b8773f4bdbb81b6d2bb146662a97fc1a59135e2850d597f47a9664e262d5

      SHA512

      a48f08f563430606f2589c718dca52bcd8d1f67cd05b8170fe4838a5d768f819337436a2c157c1a4bb307dc17d918e9eb14580710fade91711e72cf434dffbb6

    • C:\Program Files (x86)\Google\GoogleUpdater\updater.log

      Filesize

      10KB

      MD5

      4e16d187bd76c48a7d31b590f3a44ca5

      SHA1

      533bf197b41b85200ceea12821bcdda62751ad57

      SHA256

      411120507580c9a0dcee19157e9016279ae0f8a89ad615adea976f61ba88b181

      SHA512

      95b5964ac039b48979da253526494c4630d9a60f657a87ffc4cf61f453387d8c6f283ae21c96184c14db5f40d46e8f980d9559490a998eb47d69ea916db6dd2d

    • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\CR_4E376.tmp\setup.exe

      Filesize

      4.1MB

      MD5

      f6a169eb6b8b2e18f7615e71451c8d1b

      SHA1

      574de22fbe45c4906b1090a0dee80dacf90324cd

      SHA256

      a71658b5a01ee0580da332b4695dea1602e71ea7ce2e43b35cd27be0e5730515

      SHA512

      a859bc4342737ae04f31212cae02ac32d18b969f9797e267e060b88feb0dfaa9ec422a9960019ed81de42d610b22ba01f03118693f59fce684d3e7f9402b96cd

    • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping2916_1112431241\a12a3ea7-0cae-4fdf-ac80-7432fba66beb.tmp

      Filesize

      680KB

      MD5

      812d91a558285499df51f3a4e24c2ca2

      SHA1

      9331f773a25ecec1b3c2876f3d4b5ecd228fb899

      SHA256

      cc2d9a74e4733effb40f8a65caf2f796219bcc0faaa36a4b579356d6c983bf1d

      SHA512

      1a4adbb7a40af6f558270fff2fb5a1bd9ab239bf945507a53307d523af56fe01795ebe04cab3fa599aa2cca3fc74c90a512584946ef60a895e60eed1fc05c0fd

    • C:\Program Files\Crashpad\settings.dat

      Filesize

      40B

      MD5

      8fdba02dee6bc2f0582aae48013c3868

      SHA1

      2b563f9c1583c529a88f486e02a5fcf86fe149ca

      SHA256

      8219145a2984575fa6086d99e956a6b12817cb1dec5cf8607740330103c88d1a

      SHA512

      8b2b41512897ae9a36625987403d05007b07133fe2012703b812b0573c8d7419f9968b40e3f712437621fd60481216345589d93095c1b61ff5ae07439209622e

    • C:\Program Files\DeployEngineerCalm\ChromeSetup.exe

      Filesize

      8.5MB

      MD5

      5adff4313fbd074df44b4eb5b7893c5e

      SHA1

      d27388ef6cf34d40e0e7666f6381fcc5bbafa0f7

      SHA256

      d0c7a4390bdd6b442b96fc76f8a38f7b756ba2c16752ea259844420161865cae

      SHA512

      f5d639922b91878cf83d97563288a3aa4cba94db3ad5e8ac11d24ef7c44b019383a4414aeba6171b4c7bfa83ea1eafc1231cc9233e3b82b5ca7dc0b3ffacbf60

    • C:\Program Files\DeployEngineerCalm\MSjpGFGbYdhVKRljAaZT

      Filesize

      1.9MB

      MD5

      af02d33c55b6178318bf59b6f26b3b5d

      SHA1

      80d56ade2e9f52347d5aa7be46bcf970a93cd689

      SHA256

      c135cb4f3c7b7f480499187109dde41281a1e8f29259fae95893ee53d744f1da

      SHA512

      8d86f7de37c3e22dd5223cf3bd6140f58ff57019ad1560c43ffaff17a83ee181b64fbe210b77ed6548e0125c412bb2a9912f5aa04344e01d53454fd5bfcd6d6a

    • C:\Program Files\DeployEngineerCalm\RVMrLdYYerZH.exe

      Filesize

      574KB

      MD5

      42badc1d2f03a8b1e4875740d3d49336

      SHA1

      cee178da1fb05f99af7a3547093122893bd1eb46

      SHA256

      c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

      SHA512

      6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

    • C:\Program Files\DeployEngineerCalm\gafcETxyYz4.exe

      Filesize

      3.2MB

      MD5

      61c267c568496d0621a0107c0fecb047

      SHA1

      d1d02d62bfcb4ea245fd54eb1507150d2d344284

      SHA256

      f7db71cf62374b28b0b635a1fbedb5524d84773ff14ea9a579f0d45ca945a059

      SHA512

      5e6cd5c304c5e7effd58c4eb08a4b71236d0697b6cf6e4b82c5ab980daeb3b9e7691915d7b086dd4f9dbefe49a45c3036a9f91f520be516e4872d4bd8cfe3983

    • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.exe

      Filesize

      832KB

      MD5

      d305d506c0095df8af223ac7d91ca327

      SHA1

      679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

      SHA256

      923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

      SHA512

      94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

    • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.wrapper.log

      Filesize

      774B

      MD5

      bc4893eaf0491fe1df37550e6515ba56

      SHA1

      f911f208518e43000b2f8c6835d6d927540cdbf3

      SHA256

      a2d0747c94b1e83070068343250f055a29c03c8e52df5869151d4f3a9307b211

      SHA512

      d392e363f4b04c26c6b9c750c3ac558f556be43334f59a03255d106a1a9b02f7b1d8f554ff9fcb59af76f5a8b3b3a0f7594e1d6b205583a10f7eafd4ff4b1c65

    • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.wrapper.log

      Filesize

      266B

      MD5

      bb74c2b36159e5726612a7e32da4cf16

      SHA1

      59a87ae1bef99519031637e8257ded3808cdd273

      SHA256

      9353a70db91a1f953a7d3fb50d39c9345a91b8049c03e8f4784ed84aba3f4c7b

      SHA512

      bc9409de3a2bb8585e2ef059a8e7d24fcafe049020e5034da6873f13be099fe0af2da8fb3faa95cd1614fa1a314752faa5c1e040b33a45b7c86f240dd446a0bd

    • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.wrapper.log

      Filesize

      422B

      MD5

      d8d3a5aebd471b58f9c664a35ba79be8

      SHA1

      b972d75bfa2777373deafcb19204a016ce23750b

      SHA256

      d1cb22c3250aa430ee3a05c9c848e2ab7c8f642e2a6527847c80ee210a66c64d

      SHA512

      006fb38843a4a42ff4a06ecba338ff8d9b1d61544d6aab20b0e3762f88bdd9e70e9fc57a0fd0f2759ce487199129e1a84988639f545b7a4f1c826cf219e32a70

    • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.wrapper.log

      Filesize

      486B

      MD5

      85840154f7f9bd61d6545fce46bc5824

      SHA1

      0e32864c03842e217c36e0c5732f6ca85273b5f2

      SHA256

      dbd2e09202a51e97ca9af03bb48932344822e1dc1209e784cd30de0336745712

      SHA512

      700a222d696bb226ec356c0c9cfed0662e80bca678ffb76bb231cdb4b51bc5fc8c4767dac633d9ff3c2bcbe20b8a2bae1ae6491547e4c2e714d95dabcc1d107a

    • C:\Program Files\DeployEngineerCalm\xFVbVZKWVCwS.xml

      Filesize

      435B

      MD5

      7034999fa66d69bf7436e28abbee7449

      SHA1

      507b6b981d54ebb4c7bdb11b048aa902cd10aff5

      SHA256

      f1b3f90f0527270c65710bb56f9ced773ce23feeee9f4551a1bf72fd297ab3ee

      SHA512

      616a70bd97b745d84e9d65dfcf9268282c74c1ac55691a81bb312ec689b15181914909ac2e83c51bcc6ceec0c9fe94bab3ddfc54de5fc16bec6cff9ab9473a4f

    • C:\Program Files\Google\Chrome\Application\128.0.6613.138\chrome_elf.dll

      Filesize

      1.2MB

      MD5

      bb7d6e99cc8298b544b75af2bb46873c

      SHA1

      3b9d3f6e0e392e89b3cba820c4c6271dbd09e2d9

      SHA256

      959dc64d6759f48b72580a0fa51a1006f3bacdf679574882f946aa6b80cef25e

      SHA512

      7964dce8d57995594b0adb112f2b305c9246154faf7ff137f49747a70c9317769841e7d405c2cc7626b971f51e1f59ec2dc0ade678914369c4420ae731b896be

    • C:\Program Files\Google\Chrome\Application\chrome.exe

      Filesize

      2.6MB

      MD5

      db46628ea19f23def3d3639e33431ad6

      SHA1

      29b97b1a7c807d8af01ec4d1177a005c38057a73

      SHA256

      ecfe5833564738f2434c6b826cd32888cbee451c84ef68537d3e86ad6bbcc0cf

      SHA512

      28ffd3cc91c66d549e3887e855521ac0c207e0a6dcd4d047e94ea9bc4a7e18634a8dbcaa94977e32aeb1387a497027baacd358cb84c9cb6c79bfa67e3a9afb60

    • C:\Program Files\chrome_Unpacker_BeginUnzipping3020_465396644\manifest.json

      Filesize

      114B

      MD5

      3448d97da638c7ef0fbca9b6949ffc8f

      SHA1

      36d8434f26f0316fab4627f7856fca7291fe8adf

      SHA256

      1700a11fd1e58367b450a41b2ae5fd26ecb5cdb459869c796c7dde18f1d30f73

      SHA512

      9bf9055b2ef82bd1d2a1e94009fed2d3481fe2dc336d306fa0db786658efa5b72c9a9a214a829b9fcc4222476051871ff012009c64f09b9109072abdf3def8cc

    • C:\Program Files\chrome_installer.log

      Filesize

      21KB

      MD5

      63dffb96a000345cbb15a78f29cd9a87

      SHA1

      304bfad4241937443d369d339179b10f85cb0a62

      SHA256

      49f17165bc7fdedd38297fe32ae56aa300913e651e85755565237da73ad59a98

      SHA512

      40dffff0fcc2b8ec60d590b5b273ecf0a687d6802dede5e4587eb9bb1bcee302f7d399f520856c187863b05e4915de5034b1f3791e1f70ddc3c890a77c04b315

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

      Filesize

      649B

      MD5

      ff3f015b7d788f8d9a5afc8d2435ce1d

      SHA1

      3f190b3a0c1c5944bedbd248bfafad23a5a878c7

      SHA256

      9473b2d524ad3995154817e22247311dbf42ce60833af433c0206efabcbed7d3

      SHA512

      032e3e7a1d045d91c967cf9f81135e3d5894a3cfc1dd0c8544d647e79d7ae2d492402dfb86a2c6a5afb2b7dabf534392edf5819a89ed75ea2b7a0c05efb22cc3

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en\messages.json

      Filesize

      593B

      MD5

      91f5bc87fd478a007ec68c4e8adf11ac

      SHA1

      d07dd49e4ef3b36dad7d038b7e999ae850c5bef6

      SHA256

      92f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9

      SHA512

      fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico

      Filesize

      192KB

      MD5

      505a174e740b3c0e7065c45a78b5cf42

      SHA1

      38911944f14a8b5717245c8e6bd1d48e58c7df12

      SHA256

      024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d

      SHA512

      7891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

      Filesize

      1KB

      MD5

      f838ee634fcf15a5be7fa92f4aa62de2

      SHA1

      3e0118d2173772e2a734478d8e262dbeeb8c12c4

      SHA256

      901771741f7fcee8b21712f4538c8865964b5ff502531fee15c19c88bdf0c551

      SHA512

      621b1293d87eec50c54f8d3a212430d2f7c41a8d0cd8bad4d3e3d306e5f20723b7c23f08548bb219827ddb0eb4f35c8031e97b96428c9212fffe5f8ff2d9a688

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

      Filesize

      2B

      MD5

      d751713988987e9331980363e24189ce

      SHA1

      97d170e1550eee4afc0af065b78cda302a97674c

      SHA256

      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

      SHA512

      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

      Filesize

      356B

      MD5

      ee7fff663f2300b322609e2270294ac9

      SHA1

      50b1288f400338a599f765e8d4049897756eb73a

      SHA256

      f0ae7ab85681077c838648c131e179d3be44267cb9e8f03b1932e85827620614

      SHA512

      f68c45f55848293b1b62ccff363b2648ea3edc06a0d0c182bff17023bd15da2f8ddd8fec6fd8631ade03acc2008fc8bb30cdd7cf10f2095f021ebad88ae5aa88

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

      Filesize

      10KB

      MD5

      973d9f363e660c8083e92181b4341ab3

      SHA1

      b5c28751781269edd496e2fff3fe5db0c122a3cf

      SHA256

      0a4901b50f4f5ed7bfec389650085bf69d9e071a37ed850471a4656d4b431785

      SHA512

      972f6d5ad60b24e8042dbbf7dc8dd6ad5d59d2935e2cc79c6996b341c4ac512d5f020a3bd190451f0ed9e9f97fff4d7f5cd8ea4344b7b406385d265574c43ab2

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

      Filesize

      15KB

      MD5

      a4ddb75de42ea9906db73943bafd8bf4

      SHA1

      89b6f229ec08d7daf07332f06b1b4b2be8222c86

      SHA256

      17686787ceb1b86884a81d5e55987de17a5f7a858826d8773f85368d654d8b11

      SHA512

      761fc9f53ca243ddd056194069947e1822bbdee876534d5224e9123c28f199efe7494c044f58cca3d6efc825d2863a28724cfc2c9e2147f03d603c077d34292b

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index

      Filesize

      72B

      MD5

      965ebda77d615f3f3cc25496d8642c22

      SHA1

      20ee48fb1b3f4958a5a3201a201440ee58d5400c

      SHA256

      d08003833f36febc7bd325859553725862fd2a70af7ba6c82c1be3f96d7ac0b4

      SHA512

      ef0bd2d998a364a2eba6692406b6f5df46e6842f7a27eb7e45a008c5ead33f9e02ae956e54c41964b7cfefa5faa643d70b9c53ad3aacffd50b9c1dedb6a7ee7c

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index

      Filesize

      48B

      MD5

      8e01fa06d8a04139417bcd5c081659da

      SHA1

      90dc4876f797b01a965837f204d2f3c2e8c96f7d

      SHA256

      9f314f22e1fa9244ebec4dfbc193dfcebbcd91e159a4811792f5ef1b07a541f3

      SHA512

      b18dfccf2a7d0f82956f28d769b1dd4ac65f824b69e6820d2c036b29290592e2bb59987d3868c5ff3707d238fe8c7607879d8152b72de523b573e7fce594c275

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_0

      Filesize

      8KB

      MD5

      cf89d16bb9107c631daabf0c0ee58efb

      SHA1

      3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

      SHA256

      d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

      SHA512

      8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_1

      Filesize

      264KB

      MD5

      d0d388f3865d0523e451d6ba0be34cc4

      SHA1

      8571c6a52aacc2747c048e3419e5657b74612995

      SHA256

      902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

      SHA512

      376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_2

      Filesize

      8KB

      MD5

      0962291d6d367570bee5454721c17e11

      SHA1

      59d10a893ef321a706a9255176761366115bedcb

      SHA256

      ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

      SHA512

      f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_3

      Filesize

      8KB

      MD5

      41876349cb12d6db992f1309f22df3f0

      SHA1

      5cf26b3420fc0302cd0a71e8d029739b8765be27

      SHA256

      e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

      SHA512

      e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\index

      Filesize

      256KB

      MD5

      af25c67c354a2313fa494aa6d37e2612

      SHA1

      d205f4e42607e52a5f79e284572eb1d6b5318669

      SHA256

      2163cbc3dc47a10b0da214dd8ded9b7b153ea61504c2fd5a5a38a9ba4306cee5

      SHA512

      623c7deb60021c656bb6e78b86acb7771f51313f02ceb9bf054d3e487936bf568f90c482e6a290fa7996350e23061b7f5a57bd53e325979328736357e8d0bc88

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\CURRENT

      Filesize

      16B

      MD5

      46295cac801e5d4857d09837238a6394

      SHA1

      44e0fa1b517dbf802b18faf0785eeea6ac51594b

      SHA256

      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

      SHA512

      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\MANIFEST-000001

      Filesize

      41B

      MD5

      5af87dfd673ba2115e2fcf5cfdb727ab

      SHA1

      d5b5bbf396dc291274584ef71f444f420b6056f1

      SHA256

      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

      SHA512

      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\trusted_vault.pb

      Filesize

      38B

      MD5

      3433ccf3e03fc35b634cd0627833b0ad

      SHA1

      789a43382e88905d6eb739ada3a8ba8c479ede02

      SHA256

      f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d

      SHA512

      21a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      99KB

      MD5

      abd1575fd90b5ac7f6fef5c9e330789c

      SHA1

      90b2c360322d494c9e4817a563a87a6d6c4d013a

      SHA256

      186e0fca0c789e6640bf810bf820439fbc1b76dd6683f76e8fd23a7b7971a4d3

      SHA512

      56328d688b0228de24c7bd558003d911b0926ac13f010192cacbe04e5d509023282e1ab422b833e830bcc6a5a910812cc2ca363c11ee88b8b9b3d523526d1c22

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      192KB

      MD5

      ee5f32543564ab465e053e59fc1e44c4

      SHA1

      9bd5f5795f6895f235dcdde9dc13ddc3bb0a0601

      SHA256

      b5e5ef456320e4063867b7cb894048a827506fbe97166bcbc4e04b1e0b710d32

      SHA512

      6cace2420ba268e4cc4d91192daee891829f805e0df501d0b95fe1c85410ae84097d1ba39473e53e9023930b924e0339a937640678ee5df62f07c769a286ed23

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      99KB

      MD5

      4fcad17201f784d7afc32d1f53d2bdad

      SHA1

      69efa77cbd1bbb4ca4b5195203629437ed5f82df

      SHA256

      feeff5891977628949f9b27795f955f5a50d0abf35e65c5d91d9306eea2c3bf9

      SHA512

      d1319a72a290ec4c3bb1aa92578b3b6ffe6a4cbf78d407fe87e92fa16219c240626a5ff439279b94b59cfef9a0aa4ec428661a463762a46387753a32a18188f8

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      192KB

      MD5

      aabc84a61540f1767bfad15d3ccc7eee

      SHA1

      5910a491fd749c6ca781de42adf11b80328ed634

      SHA256

      148f38bf53ade6adb5a265b8ab109db87a5c87b199cc686d54611c9cbaee390c

      SHA512

      32169ff64e7a4d27881f417a078f735ddb4437df3fe3d61d8a227e420b64afe527d8b1580ad63e6d41441fd4faf6d3217a8e46217ff102679fd00d855a531784

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

      Filesize

      196KB

      MD5

      083939bc71debcc1a0875c1698955541

      SHA1

      374d3839b05c64964e7d1e7285281f29a842f717

      SHA256

      7458d85e900edc69b4dbbe7d01b63ae15a74d990ffd9d0c907745e76d7804d65

      SHA512

      856d0ccced723d1ad7c58ae7b9b3c8852eb45174c3d17e59347714f366cb94a69cb7aac0c526eb1852b1cf0b500c3c913f0ad5d859f10b3dfdbd47192255ce8b

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Subresource Filter\Unindexed Rules\9.51.0\Filtering Rules

      Filesize

      72KB

      MD5

      b23dd5b6eccb460003ea37ba0f5e3730

      SHA1

      fd444553cb7699f84ce7e5664232771673dcf67d

      SHA256

      7f7f432c27d97dee184dcd3ea20f731674c008be849c0136f9c5358e359f3ea9

      SHA512

      7e47bd172c4bd4c65f063a8fa3fb33ed47f29156eb20e42d4e8ea73c6f02526a30ffe907be5b7c1406d4eaa71fbec7c0d557c376dccd0a1a961e2f61b3431181

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xFVbVZKWVCwS.exe.log

      Filesize

      1KB

      MD5

      122cf3c4f3452a55a92edee78316e071

      SHA1

      f2caa36d483076c92d17224cf92e260516b3cbbf

      SHA256

      42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

      SHA512

      c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

    • C:\Users\Admin\AppData\Local\Temp\scoped_dir3020_2103504414\1235dd0c-3a8d-4763-b7c7-7c14dfe7846e.tmp

      Filesize

      242KB

      MD5

      541f52e24fe1ef9f8e12377a6ccae0c0

      SHA1

      189898bb2dcae7d5a6057bc2d98b8b450afaebb6

      SHA256

      81e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82

      SHA512

      d779d78a15c5efca51ebd6b96a7ccb6d718741bdf7d9a37f53b2eb4b98aa1a78bc4cfa57d6e763aab97276c8f9088940ac0476690d4d46023ff4bf52f3326c88

    • C:\Users\Admin\AppData\Local\Temp\scoped_dir3020_2103504414\CRX_INSTALL\_locales\en\messages.json

      Filesize

      450B

      MD5

      dbedf86fa9afb3a23dbb126674f166d2

      SHA1

      5628affbcf6f897b9d7fd9c17deb9aa75036f1cc

      SHA256

      c0945dd5fdecab40c45361bec068d1996e6ae01196dce524266d740808f753fe

      SHA512

      931d7ba6da84d4bb073815540f35126f2f035a71bfe460f3ccaed25ad7c1b1792ab36cd7207b99fddf5eaf8872250b54a8958cf5827608f0640e8aafe11e0071

    • C:\Windows\Installer\e57f6f3.msi

      Filesize

      27.8MB

      MD5

      60b6321a22e3cfcecc3c1c68295cc868

      SHA1

      808a316ee3b0f4fc7bce63358ff4f744e628465b

      SHA256

      df41ebd057040524d137711938752fef32872f8a3ed2f4ee10e6b7c05d7f4410

      SHA512

      b4047e9ef64bf63933143d289ce88b11107d552d37ef2905c3139e414bc8a61f86f49b548ee2e8978d0d02f5acfdc407640def7d05a9bcaffacfcebd5d872b91

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      a2e7f244f7fdb9c916fec1c1ee7daf05

      SHA1

      e735d416b49795bba4486568bfb714642dc3aaf4

      SHA256

      407884da73fed309756e495421d4fe5efbc7c7cbaeab34809a1dc2d00eea3579

      SHA512

      a153d675736e3900c630f81283a7c0446590e31ca0e5ca2a502dc7ddcce3d0063e6b9d5ba4b66ec59231703333827cfb5c7a9ae4d85bbc0abb8ac2b45c7a68db

    • \??\Volume{851c08bf-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{30a22f00-73af-4a57-a6b3-71829b116b79}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      7795acb5257c594fd25df3934b20b6dd

      SHA1

      ca0f1b820aeee8d20416d1df5ccf1aee487082af

      SHA256

      dc0fec509ca5fe4a7151b2639b30827cad5ca8611932cea393a1ce2a48f95845

      SHA512

      5c388dff861d9f2415699c97ac6d1cd0b912350a8282ef25afb3da46de0d1228084f66af791388758b05d338289eb421a5dcd321f3a4c7f820e5bb60551916f3

    • memory/876-29-0x000000002A460000-0x000000002A48A000-memory.dmp

      Filesize

      168KB

    • memory/1556-121-0x000000002A380000-0x000000002A3C3000-memory.dmp

      Filesize

      268KB

    • memory/1556-122-0x000000002BFB0000-0x000000002C16B000-memory.dmp

      Filesize

      1.7MB

    • memory/1556-124-0x000000002BFB0000-0x000000002C16B000-memory.dmp

      Filesize

      1.7MB

    • memory/1556-125-0x000000002BFB0000-0x000000002C16B000-memory.dmp

      Filesize

      1.7MB

    • memory/3716-61-0x0000000000150000-0x0000000000226000-memory.dmp

      Filesize

      856KB