Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 17:32

General

  • Target

    ts.js

  • Size

    4KB

  • MD5

    ed3b56e4275b4a0ed7b7b0b7bd7461c6

  • SHA1

    404efc9a3c6be253546f9ad0cc6b61df5efbf091

  • SHA256

    848296488fd185d3621c274420d9e59b974734234ec4e420bc11820f26c732a6

  • SHA512

    7bc3684177b1ec80b3e7895522f29996a706a3215314307726c9ecaab65b5525936725bf41d876fdd575e9dd583d6cc1e02ca9fed2988418d4cf33fb8d3f208a

  • SSDEEP

    96:dCkwnKuF0idLODzNXkv6YxiMjip1PDpmMjDqVoV7bKD8Ngr:fwndTdCDz1SLxixp1PPjD9btNgr

Malware Config

Extracted

Family

vidar

C2

https://t.me/fun88rockskek

https://t.me/asg7rd

https://steamcommunity.com/profiles/76561199794498376

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Extracted

Family

vidar

Version

8

Signatures

  • Detect Vidar Stealer 20 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\ts.js
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\tp3host.exe
      "C:\Users\Admin\AppData\Local\Temp\tp3host.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Users\Admin\AppData\Local\Temp\tp3host.exe
        "C:\Users\Admin\AppData\Local\Temp\tp3host.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3696
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3724
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb699bcc40,0x7ffb699bcc4c,0x7ffb699bcc58
            5⤵
              PID:2180
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:2
              5⤵
                PID:5056
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:3
                5⤵
                  PID:448
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2324 /prefetch:8
                  5⤵
                    PID:4612
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4460
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4848
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3636,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1940
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4724 /prefetch:8
                    5⤵
                      PID:4964
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:8
                      5⤵
                        PID:4236
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:8
                        5⤵
                          PID:2696
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:8
                          5⤵
                            PID:3028
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                          4⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:4024
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb699c46f8,0x7ffb699c4708,0x7ffb699c4718
                            5⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3640
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
                            5⤵
                              PID:1184
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:3
                              5⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2876
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
                              5⤵
                                PID:3456
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:1228
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:2672
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:980
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:2256
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                5⤵
                                  PID:2756
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
                                  5⤵
                                    PID:3444
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2604 /prefetch:2
                                    5⤵
                                      PID:4832
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3828 /prefetch:2
                                      5⤵
                                        PID:1012
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AECAECFCAAEB" & exit
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2180
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout /t 10
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        • Delays execution with timeout.exe
                                        PID:4624
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                1⤵
                                  PID:1380
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:2020

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\chrome.dll

                                    Filesize

                                    676KB

                                    MD5

                                    eda18948a989176f4eebb175ce806255

                                    SHA1

                                    ff22a3d5f5fb705137f233c36622c79eab995897

                                    SHA256

                                    81a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4

                                    SHA512

                                    160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85

                                  • C:\ProgramData\mozglue.dll

                                    Filesize

                                    593KB

                                    MD5

                                    c8fd9be83bc728cc04beffafc2907fe9

                                    SHA1

                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                    SHA256

                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                    SHA512

                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                  • C:\ProgramData\nss3.dll

                                    Filesize

                                    2.0MB

                                    MD5

                                    1cc453cdf74f31e4d913ff9c10acdde2

                                    SHA1

                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                    SHA256

                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                    SHA512

                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                    Filesize

                                    649B

                                    MD5

                                    4725d653ff10e4286f00c5732d740693

                                    SHA1

                                    171782797eb562016d96c4850bd5fdd626d7223e

                                    SHA256

                                    9b949466716140ffe69b1bec40f1ffebad2ceffff756e29807488d706e274a61

                                    SHA512

                                    1b8f342494afedaab66a43eb67698b526770b4e66d944ecb17a9fc6239c1cd63a983e71486f8d1da7dab05a8fef33a544780a80616603dcf9ac4bb88e1399527

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                    Filesize

                                    552B

                                    MD5

                                    7d08f14817a4c763cfb9f09208008568

                                    SHA1

                                    bfafb731de634ae5b791a2472c503b3f018ef67e

                                    SHA256

                                    947c90931eacf8d6967102e10bb56b4809493163301cea54eded3b22996586de

                                    SHA512

                                    7174b34940fa4a22b4115b447ec936d020308ce45edd06cd5711e4ba135af8d606801d3a8ce24aac837a6ee978640815f2f2fec7e55522e37f093b7136d1029b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\05df1010-5069-475a-9b55-f342b08a8a6f.dmp

                                    Filesize

                                    823KB

                                    MD5

                                    7ff4a640b5be4f9033731e3ea11f2f67

                                    SHA1

                                    6ec21ab87f81fe5f5f50f5e9d7422c2644ef7efc

                                    SHA256

                                    2787e10418d1e003654d4fe7d369c17c53b537146320ec48b7105f8c598f6b6c

                                    SHA512

                                    606ae28327ada5893514851580d68dc2a4681f28e9ad51736b37f08fd52b06ff27f5417b317306f3cebe49bb96e12e26bb111608f0d1046d09ff599e3a5862b2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2a7cc06c-9697-4905-ae10-67c7d2f9a02d.dmp

                                    Filesize

                                    838KB

                                    MD5

                                    79da06f8af3de51570481d2d99ceb04e

                                    SHA1

                                    ce0c177e8d129e1dda0615ba92034e602a31f78f

                                    SHA256

                                    4e922d0e401b9398c40e558cbb433c4ca68b90792bf88413725e952cf9927780

                                    SHA512

                                    219efbd43e175b2f48a89aa4d128db31189b7cd9046d8d4d0096f455a36ee3dcf50e55bdeaf38ae1e63b4e9a7ba2d83a338581eafaff71c05ffad8420744b273

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\62cad879-177e-443d-8b52-0a0edfbf01c0.dmp

                                    Filesize

                                    826KB

                                    MD5

                                    af73fe73c78e111288f9570be2dd236e

                                    SHA1

                                    5d3e5b7f45a9906dc3a9b496509f99c066630fef

                                    SHA256

                                    590cc87fde882ab2a481c1f55776bd65318ce0993590a42e54dbf36834bba3d0

                                    SHA512

                                    bd97c91b98cfa8ec54c47acb80ba108f95b9af15c4c0d73a91c1ac86ed4429982487badd2152c889f456e1eaa400d9980e5dbb368bf5acc58d2e8feaefe153d6

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\7f603834-cf1d-44f7-8920-fd82b7b14a5e.dmp

                                    Filesize

                                    823KB

                                    MD5

                                    9a6ff8b07839ddb2e06e0288addcca08

                                    SHA1

                                    563185d65e508117de6c9ee069f4a5f2cdf3e85f

                                    SHA256

                                    8a5664144f4b69eb93e30d2c68bc087ed7864cec27ba0d9fc8acd8dafba5cb80

                                    SHA512

                                    ade5053e4b5121a6f80763f5fd8affd39c7eb6ea346dfb5452720bc7864e2b555ffd3bcc5c703e03653301abbb971cdd495f69e538bd99d99bb86f4a716a16ea

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    a0486d6f8406d852dd805b66ff467692

                                    SHA1

                                    77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                    SHA256

                                    c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                    SHA512

                                    065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    dc058ebc0f8181946a312f0be99ed79c

                                    SHA1

                                    0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                    SHA256

                                    378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                    SHA512

                                    36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    bfb0b51a020df1927743c01149621f55

                                    SHA1

                                    ae4c06896a5f920c43db8e4e1661ea1f83ec4dcf

                                    SHA256

                                    6081bd059452804fd9458217d75d1a4d88cbf30560b3c21dfae4a64248133db8

                                    SHA512

                                    89809e38cac082bb2a521a28d8d1d5dc1cc22cf2d6ee5bbe53d6d8f14bc0677cbdf8e084e3418e58cfab057bf00ebb019c3f32d94cf3673fcb84e91b21d1e6d8

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    25400746ac39342693709711f6760821

                                    SHA1

                                    59260c541f574fdf29c0b9fb52d178661611a921

                                    SHA256

                                    a5d7c4b12083c265dd281303f1dde2334536ffbfcdba40d3552efd4a3fcdedcb

                                    SHA512

                                    4172484f5099b4616b0033370f9b96dd2ee9a3a213ed9b4bc2f623cd6aa44cb572eaef95473bf68a8e52aaebe0f1362b6539b4670658fd9039d0fff30fb5b049

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    8653116538c873f805b42a435f8bc760

                                    SHA1

                                    fc37df34f1f3246afa6378ddbdbb7e0b16d7288c

                                    SHA256

                                    913754a0a1c971baa8b9f2cc4ef19be7f6aeaa35fb8de90bf428b8d95692f885

                                    SHA512

                                    86b011b90eab8060a7342f3d5e12c679e3947f63f0178b83c0639fda4677f356282fc1a9530be8f7ee1595fb1e7ce41b72aba8332b0fa63212926f539a350abc

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Temp\tp3host.exe

                                    Filesize

                                    5.0MB

                                    MD5

                                    fb08f2cb20523c34a7c01e2f565774a1

                                    SHA1

                                    212f6bb39ab33ea61abaf69e35da3449db39d1d8

                                    SHA256

                                    9a42637e8c5229a0b84c28892e030c5b9d07cd32ccb5bdc0cc6f0633113c8fe2

                                    SHA512

                                    c7e650e8b7d4f1ece36f1dd1427ee200ed824a032ea6b3452a5f3f68edca4605f5f94c5ee2730dcc9016c8d8fea355fddf2d47aecdf23e574cd431307d0d143d

                                  • memory/436-27-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/436-38-0x00000000008D4000-0x0000000000901000-memory.dmp

                                    Filesize

                                    180KB

                                  • memory/436-18-0x0000000000516000-0x000000000052E000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/436-21-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/436-23-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/436-24-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/436-17-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/436-20-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/436-37-0x00000000008CA000-0x0000000000901000-memory.dmp

                                    Filesize

                                    220KB

                                  • memory/436-36-0x00000000008C6000-0x00000000008CB000-memory.dmp

                                    Filesize

                                    20KB

                                  • memory/436-35-0x0000000000900000-0x000000000091E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/436-26-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/436-31-0x0000000000516000-0x000000000052E000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/436-34-0x00000000008B5000-0x00000000008C0000-memory.dmp

                                    Filesize

                                    44KB

                                  • memory/3696-110-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-303-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-30-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-39-0x0000000000400000-0x000000000091F000-memory.dmp

                                    Filesize

                                    5.1MB

                                  • memory/3696-25-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-52-0x0000000019AA0000-0x0000000019CFF000-memory.dmp

                                    Filesize

                                    2.4MB

                                  • memory/3696-109-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-108-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-297-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-178-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-304-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-313-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-102-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-49-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-333-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-334-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-341-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-342-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB

                                  • memory/3696-343-0x0000000000920000-0x0000000000C20000-memory.dmp

                                    Filesize

                                    3.0MB