Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 19:47

General

  • Target

    9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580eN.exe

  • Size

    2.0MB

  • MD5

    6f39f4a65437c51cd0ab542f98660140

  • SHA1

    5128323c948fa582f805b6f1e58d6f4f1c88fecc

  • SHA256

    9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580e

  • SHA512

    82ff746659b445f99c6263ce4b081d5466df140e3358a88b92f8d85d9d1b366943f263828e1532cabb9330bc8bc290f8918464b9e5d4e2fe25a589c970f8f870

  • SSDEEP

    49152:ensHyjtk2MYC5GDDKzcCyEq9DRho/ctH01Ws74rA4RUBDHgE3dqFWVCnz:ensmtk2aeKB5qFb0I+0PqkWEz

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 40 IoCs
  • Loads dropped DLL 55 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580eN.exe
    "C:\Users\Admin\AppData\Local\Temp\9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580eN.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\._cache_9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580eN.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580eN.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Temp\GUMD310.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={BEFBB8A4-A3DD-BC34-A18F-733C0820F3B5}&lang=zh-CN&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHZN&installdataindex=empty"
        3⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4508
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3432
          • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:2396
          • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:3644
          • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:1744
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PC9hcHA-PC9yZXF1ZXN0Pg
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:2412
        • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={BEFBB8A4-A3DD-BC34-A18F-733C0820F3B5}&lang=zh-CN&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHZN&installdataindex=empty" /installsource taggedmi /sessionid "{0C46C317-BFA9-44DC-AA33-6E9E8334BE1E}"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2628
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Program Files (x86)\Google\Temp\GUMD89E.tmp\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Temp\GUMD89E.tmp\GoogleUpdate.exe" InjUpdate "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={BEFBB8A4-A3DD-BC34-A18F-733C0820F3B5}&lang=zh-CN&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHZN&installdataindex=empty"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3136
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3116
  • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
    "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\130.0.6723.117_chrome_installer.exe
      "C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\130.0.6723.117_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\gui311F.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe
        "C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\gui311F.tmp"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3140
        • C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=130.0.6723.117 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff61cf1ec28,0x7ff61cf1ec34,0x7ff61cf1ec40
          4⤵
          • Executes dropped EXE
          PID:1128
        • C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4228
          • C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe
            "C:\Program Files (x86)\Google\Update\Install\{34EBF9EB-1702-415A-A220-B156C7AA3C85}\CR_11F8F.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=130.0.6723.117 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff61cf1ec28,0x7ff61cf1ec34,0x7ff61cf1ec40
            5⤵
            • Executes dropped EXE
            PID:1680
    • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler.exe
      "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1800
    • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler64.exe
      "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleCrashHandler64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3864
    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9lZGdlZGwubWUuZ3Z0MS5jb20vZWRnZWRsL3JlbGVhc2UyL2Nocm9tZS9hY2xzNmh0NnhreHltZTdrbXlwZzJ4MnFhMjVhXzEzMC4wLjY3MjMuMTE3LzEzMC4wLjY3MjMuMTE3X2Nocm9tZV9pbnN0YWxsZXIuZXhlIiBkb3dubG9hZGVkPSIxMTUzNTcwNDAiIHRvdGFsPSIxMTUzNTcwNDAiIGRvd25sb2FkX3RpbWVfbXM9IjE0MTQxIi8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjYiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIxOTY3MDciIHNvdXJjZV91cmxfaW5kZXg9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI3MzUiIGRvd25sb2FkX3RpbWVfbXM9IjE1MjUwIiBkb3dubG9hZGVkPSIxMTUzNTcwNDAiIHRvdGFsPSIxMTUzNTcwNDAiIGluc3RhbGxfdGltZV9tcz0iMjk2NDAiLz48L2FwcD48L3JlcXVlc3Q-
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2200
  • C:\Windows\System32\Conhost.exe
    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    1⤵
      PID:2396
    • C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateOnDemand.exe
      "C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateOnDemand.exe" -Embedding
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3136
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks system information in the registry
          • Drops file in Program Files directory
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1520
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=130.0.6723.117 --initial-client-data=0xfc,0x100,0x104,0xf8,0x40,0x7ffd0c617c38,0x7ffd0c617c44,0x7ffd0c617c50
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:5040
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1940,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=1936 /prefetch:2
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4916
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1840,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=1984 /prefetch:3
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3640
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --field-trial-handle=2344,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=2520 /prefetch:8
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3520
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=3212 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4780
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=3236 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4268
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4408,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:2
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1808
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4660,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=4672 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3696
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4892,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=4668 /prefetch:1
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2592
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5056,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:8
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3676
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5136,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=5304 /prefetch:8
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1672
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4580,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=5132 /prefetch:8
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4060
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5408,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:8
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:5176
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5720,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:8
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:5580
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=6028,i,269148342326591430,11431391012011154702,262144 --variations-seed-version --mojo-platform-channel-handle=5856 /prefetch:2
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:5348
    • C:\Program Files\Google\Chrome\Application\130.0.6723.117\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\130.0.6723.117\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:2684
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
      1⤵
        PID:3452

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\GoogleCrashHandler.exe

        Filesize

        294KB

        MD5

        4c3832fbe84b8ce63d8e3ab7d76f9983

        SHA1

        eea2d91b7d7d2cdf79bb9f354af7a33d6014f544

        SHA256

        8fe2226e8bec5a45d4b819359192ab92446b54859bf8877573ab7a3c8b4ada76

        SHA512

        e6e316bf3414ffb2674bf240760b2617ced755b8a34ad4b3213bcca6ea9a0aa3c2e094319d709a958f603b72197bfa34b100dbe87b618e17601b2e0dac749f84

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\GoogleCrashHandler64.exe

        Filesize

        392KB

        MD5

        dae993327723122c9288504a62e9f082

        SHA1

        153427b6b0a5628360472f9ab0855a8a93855f57

        SHA256

        38903dec79d41abda6fb7750b48a31ffca418b3eab19395a0a5d75d8a9204ee7

        SHA512

        517fc9eaf5bf193e984eee4b739b62df280d39cd7b6749bec61d85087cc36bb942b1ebaed73e4a4a6e9fa3c85a162f7214d41ea25b862a4cf853e1129c10293d

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\GoogleUpdate.exe

        Filesize

        158KB

        MD5

        baf0b64af9fceab44942506f3af21c87

        SHA1

        e78fb7c2db9c1b1f9949f4fcd4b23596c1372e05

        SHA256

        581edeca339bb8c5ebc1d0193ad77f5cafa329c5a9adf8f5299b1afabed6623b

        SHA512

        ee590e4d5ccdd1ab6131e19806ffd0c12731dd12cf7bfb562dd8f5896d84a88eb7901c6196c85a0b7d60aee28f8cfbba62f8438d501eabd1bb01ec0b4f8d8004

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\GoogleUpdateComRegisterShell64.exe

        Filesize

        181KB

        MD5

        0fe3644c905d5547b3a855b2dc3db469

        SHA1

        80b38b7860a341f049f03bd5a61782ff7468eac7

        SHA256

        7d5c0ed6617dbc1b78d2994a6e5bbda474b5f4814d4a34d41f844ce9a3a4eb66

        SHA512

        e2cf9e61c290599f8f92214fae67cce23206a907c0ab27a25be5d70f05d610a326395900b8ed8ed54f9ecbddfd1b890f10280d00dbcdad72e0272d23f0db1e53

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\GoogleUpdateCore.exe

        Filesize

        217KB

        MD5

        021c57c74de40f7c3b4fcf58a54d3649

        SHA1

        ef363ab45b6fe3dd5b768655adc4188aadf6b6fd

        SHA256

        04adf40ba58d0ab892091c188822191f2597bc47dab8b92423e8fc546dc437ef

        SHA512

        77e3bbb08c661285a49a66e8090a54f535727731c44b7253ea09ffe9548bae9d120ef38a67dfa8a5d8da170dde3e9c1928b96c64dfc07b7f67f93b478937c018

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdate.dll

        Filesize

        1.9MB

        MD5

        dce0fd2b11b3e4c79a8f276a1633e9ae

        SHA1

        568021b117ace23458f1a86cd195d68de7164fa9

        SHA256

        c917ad2bf8c286ae0b4d3e9203ab3da641af4c8d332e507319ee4df914d6219c

        SHA512

        ba89867fd2bea6166b6e27c2a03a9a4759aee1affe75d592f381d9cb42facba1af1535f009a26f2613338b50de13b6576ab23c4e24d90827739f1678923ff771

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_am.dll

        Filesize

        42KB

        MD5

        46f8834dd275c0c165d4e57e0f074310

        SHA1

        7acbfb7e88e9e29e2dc45083f94a95a409f03109

        SHA256

        91ac6c9686d339baa0056b1260f4fd1394ce965b1957aa485e83ae73492f46b5

        SHA512

        b615fe41b226273693da423969a834b72c5148f5438e7a782d39191ad3013e2abfa10d651fa2ded878abb118e31831dc7dec51729b3235cebb2b5d7f3ba2ade1

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ar.dll

        Filesize

        41KB

        MD5

        d1c81b89825de4391f3039d8f9305097

        SHA1

        ecfcf4b50dfbb460e1d107f9d21dd60030bf18c3

        SHA256

        597fe53d87f8aa43b7e2deb4a729fc77131e4a2b79dc2686e8b86cc96989428e

        SHA512

        a2be34c226c0a596efa78240984147196a4de8c93187af5835f0cec90ed89e7dffd7030cd27e7a1f1bd7f26d99322e785e195f5d41bf22e00c4af08270699642

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_bg.dll

        Filesize

        44KB

        MD5

        0d7125b1bda74781d8f1536e43eb0940

        SHA1

        39818cacce52ff2edfb2a065beb376d43fdb0a93

        SHA256

        00dfe30f3e747b5788f7ae89b390e63760561a411b7e39257376cd13700a1e0b

        SHA512

        c34d7405acceb7186cf63e75083981b9230d2755e207fdfd1dbce7d59a96f30ec04c28c12dbe0ed96fb595c63dec8819c08d406840787d9b9797568fbf50dec2

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_bn.dll

        Filesize

        44KB

        MD5

        64ed14e0070b720fcefe89e2ab323604

        SHA1

        495c858c55151e2400a1a72023aa62216033f928

        SHA256

        635f3a7fd3c1f62eb91117189ac84e1a1e5c3a8e104863d125c16e8be570e3d1

        SHA512

        4fab73de11e595c7e4edd9a66137f8e7b0b13db1799dbe4c10dd766783079d38d560c6cc1bf9af4bc1abd71f1706643bd9a31c0f58e55df3d0dd7d739e1480b7

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ca.dll

        Filesize

        44KB

        MD5

        ba783ac59839551280618c83c760d583

        SHA1

        53d1d10955e322a6135b047eecd88a4815f9b6da

        SHA256

        c2d15f8da32907d8cea1aaa0d51f16bc692a74141fdace43a84c78647433a086

        SHA512

        a635d52c20164a02dc3fc4ddb961bf36177014e0cb27e50588013a0e9f3787194de3c9da160672b62b25eb94ddcea366bcaa44b6bfa593da77c97aba48f8a50b

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_cs.dll

        Filesize

        43KB

        MD5

        8041b1db1f5a00dc1a617f02d9cd9744

        SHA1

        963bb4e81134089d12b26ad1631bb0825e9b8fa3

        SHA256

        c823d54a7777e3cb0ff2bbec829833f0ad5bfbe58290af02e0f85a877db50fb7

        SHA512

        bfa81a184e2985e2755c941137562c40ad4903a9b883f84471ff10636c363be909db0044bb4320c1fb615303ee375d64675a894abe08414ff1c0a5da0e22d450

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_da.dll

        Filesize

        43KB

        MD5

        13bb66cf80aea019219f9181496b5b74

        SHA1

        8bbd83fff1bcdc01e93ed263b8564519a7c6fe7c

        SHA256

        c9e878e8c3a2ebe17df25c3406a0c449d93e56620e3006e83ce777952f47a488

        SHA512

        e7c84e8c600767cb4df43b9ed1c5220becde79c32f832158bd78368ec9b04422f272715bbca5a261da967fcb019dbf01d154467c77d2775e46e19ab3f6d64f9c

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_de.dll

        Filesize

        45KB

        MD5

        c1dd450c8f536604579902fb23013233

        SHA1

        ae60094a4a1a2a33624a65b0ce3132a77de6c6e6

        SHA256

        a8422f753e831ea71c41867cfdc767fcbc05874fc039a0101bd05c571f8d822b

        SHA512

        35ab265a6363856e40156185bffb93d6481ea321f63a033160847cb88cc0764a18f14f9a72265e2f1f9caeff4702efdd147a46b23614fce090e08b78cd3ebc4f

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_el.dll

        Filesize

        44KB

        MD5

        59ba1742a224cb96c89ca335ff208409

        SHA1

        2b595feed6efe926cc87c16534c3b8bafc511cdb

        SHA256

        2836ec2d0830b66f281d65cb24f9ea2311e6464f13d4d0e41547be5ce994582e

        SHA512

        a4e7bd47af97387ef0828daa4d1b6f820faef02c28e77dda0da08e0a4766f2beac42d4ac5dfec82e7c3fd1a39e9d6a1359d45750ebce4c0e6722567b1df6e919

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_en-GB.dll

        Filesize

        42KB

        MD5

        68420a06ad032bd6a79b2472c3350476

        SHA1

        4e301f757c209dc928ab05370a51abca66bd38d8

        SHA256

        bbd19a75809f516726289377f97d67ae5f9122fdad0ad9f34974cbbbc91b9968

        SHA512

        9829cb34552d85b99441273174e801f401b1d7df3c7140e8bbdb74b77008e3e258bbafab2afb3f01f7909198c1376a3ae9360c941c7df60ad49309fb916b5f8f

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_en.dll

        Filesize

        42KB

        MD5

        0d30a76bbcbc637382fad5a927297a2f

        SHA1

        39dbd1bcb5372e06aa4ffa3a6fe0010bf8652517

        SHA256

        dc22cbd055cfae79301c7906ca1e2a1e926aaf943fb11d8060b91202bd5759aa

        SHA512

        1d73f9a223ff1d292a4886c1377a2dca0459b6f757f814d73e66746f25b4e97fbaf90188d96cc1829bc9a288b5a118ff472fabb1c401994b1524d70e92953f8d

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_es-419.dll

        Filesize

        43KB

        MD5

        4a28036303c7f36827a757d0950669b1

        SHA1

        af5fa8d2dbbd8f8bdac508f187731cf33ff8b960

        SHA256

        0047475c9353a570604d437d8985cebc7230b26f010ef30f4176f93f0c2361b4

        SHA512

        b5eaf77b729142abc233974c3900c39cd75fd2252e8ed49059bfe607d2b1c74b28f347b86793aa8e5a12c87701bfce8e9c87d34e262df7be559ecbd0f56e9c0f

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_es.dll

        Filesize

        45KB

        MD5

        f49411f7f8feb475ee096db6a5938290

        SHA1

        6926ddaf08b3f701fb357f032e76bb33e63f50f0

        SHA256

        e7a76d367bffea50a8f0b2f8daee91b3e5250431127a9dfdaa25980c39b22573

        SHA512

        0f95d6cf92882a30dedf4b51bda94cff87da327843569aa4f3c763fa2c658378795adaedbc3d93958128376e51d2d0792958def24a2e19c57d6717153d3512ff

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_et.dll

        Filesize

        42KB

        MD5

        6d9e77d00e750d6c56784bd03dfe7137

        SHA1

        e0c8e15adfb6b3efdc2eb1f7f3fbf5301d185ee6

        SHA256

        feececd2144da0f8d7006695f2e915fef34b1cf1c00c867e2a08cf8d9e5b5bc5

        SHA512

        8082e6bbf590212cdfd5b844557b66702e60220cd02d5850fb821a4a6527d4d5e82f1fa7595fab01f76090e8992ebab92de614205db4413ffb6bc48c9c10f185

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_fa.dll

        Filesize

        42KB

        MD5

        66e75aac042e5776513c1a20f360df78

        SHA1

        2916825a831048eae55402371591221be27eba3b

        SHA256

        2528329f2177422671714b67c9d292e681791c26e6fca8d3e99d92434f23d686

        SHA512

        6985d5004b6e919b7977c608be044004d2c1aafe1f855dd4b47dedb2f3a22cb04608df2c6079480b7cb3d08f8605c8aad1b3279c78482afd44280db143508839

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_fi.dll

        Filesize

        43KB

        MD5

        0ff6b7be8cceae26bd9ade3914b987c3

        SHA1

        6bb771e7c844ca501cbd1a05c0c19bb2078a784b

        SHA256

        52e75123d0c6ca6904a613aebef15dc9e662a7296089923ea690b4e627e5cbe9

        SHA512

        98e13a07d13691eb113ae63eff36c7c9041582ddfffb26f3918c0e87f484315930a0e924868c83dab46349bc09dddcb5bf0ae7a01155d9b1e2d90aba5ac4834b

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_fil.dll

        Filesize

        44KB

        MD5

        b039877936c8bc88efd93656e8e2fc3a

        SHA1

        b27e928267e2b7085e45cf6f450ba8bcc0af66e2

        SHA256

        7ffa28c0273c63aad16d3ac3419144f5bb8ce3484be73c45130927aa3ada6e43

        SHA512

        26992d60966d56b64b0ca2047f9149bbac8e6522d14ac2a9b2a4e57d5991f26a050e02fcb475243f0787221fc2307d5523f2c33b6abc3f6c7aa5daa1938f67f3

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_fr.dll

        Filesize

        44KB

        MD5

        048033bd00459d6a545744ba1d46ab45

        SHA1

        1f9cb02b84da6b603b8be9a717f4ae3f32cb3f4a

        SHA256

        52099330cdfdb45b04db7bc0b2003762906afdca4ce16e7a33f0b4f7aebefe7b

        SHA512

        66a676c37e03dd326777534aba889410a6ecf43e17a5f5736415a5be179d4f8aefd626a1f28b4869d3dd17a296b04eaa88d20c90796f9a9cfc3899007a08748c

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_gu.dll

        Filesize

        44KB

        MD5

        9acb142c6097bef9a56847eaff078a5c

        SHA1

        d69d206d06dcf09b46b0e8bb47c177cb2a5bd8e6

        SHA256

        125b6ee3b4fee064eabc9baf671a366e4e88f68c97e582972cf741d914284628

        SHA512

        49f06023c4c70b75aabb81b586114704bc905480f4c0978e8d4315c232ea0b5d7d9545b7d02a9b24b71f72b066e926839908e2ace1ccf245716e6ef2fcf1193c

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_hi.dll

        Filesize

        43KB

        MD5

        8d62d3b71591fcb40f59b6d0f651614d

        SHA1

        2c7b1831cead9e2acb85cebaf1c2c53784476f38

        SHA256

        ad368ca65db3e0a9417634d6bd2ac81c38858f875c1cdc6d641c2389b99d5a59

        SHA512

        9ad0a199148eb21927c1ee3976fde7be2968063955b1a5526fe18b62bc12c3b4d6e2d7dad7b5b1e8f76937733ae4a38289a32bcebfe60ab50f0f80648ce80711

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_hr.dll

        Filesize

        43KB

        MD5

        b9114cc4de1128c5156e3afc7f8123f0

        SHA1

        ff0fe96553ade4200d68305dd2e694dc91a2995d

        SHA256

        2846c112a3f0a3c6b050fbac7ea96dd3733f117068a5cccc8b6cf16ede9d4c47

        SHA512

        3bb6519556cef59d91ad92e11987ae6a36c9436cee5fe79b2a08b24fbbc04207c1114d466c0dc05f63221b368cd13b818b0c87188feb2511716a2ad75675a478

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_hu.dll

        Filesize

        43KB

        MD5

        5601a611f2801a57025ac0f6725ce7e3

        SHA1

        bd2f8d12a70b19546adfd22fe6a590a4274d2669

        SHA256

        bd765a07250856c9ecb5a8319f04b9bdf4d2251827324ab5066b3d731b18ac18

        SHA512

        41ea26924ebf780e5d91ff8e5383d31b04076197b43ba964860556484b845e0590bf4cd805876cafb7cfb3082002cb35454bfc34c55e17113d9778a73182bc38

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_id.dll

        Filesize

        42KB

        MD5

        e8706af39491f7a579a4a03d7e97ee86

        SHA1

        2f0cb0de6a34f368803003bc33f260137741d525

        SHA256

        15dbad35e7fa0dcf3ac2f08adbfb56981e3365f91d801c71f913fc0ab7c4cb52

        SHA512

        b3544f99cbfd0dec7bd2b9169364cb2daac8aa388f24f27862de71e4bcf40a24ae42900510aad30cdcfddd0594b62083ce67c9b573c8fe3a3055873ffab7297a

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_is.dll

        Filesize

        42KB

        MD5

        d9bd75ad7a3a353cee9c40044ce5b794

        SHA1

        5cfae92b010c7f15c0de3faa2d556501077eba6c

        SHA256

        569ae0a08a78a956848b5a468247a02a0a0917657de3dfd17ebd67cfc929f38d

        SHA512

        256c11f9c5adc1efb11a3eb0807226afe72bdf02e6657104001b11c12961accd2e9ce4b7c6f8ec8dc577f8b25d6049f18f143786f2b9b5b2b9b6f14bb480b7ee

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_it.dll

        Filesize

        44KB

        MD5

        49a37b39ed5f6fc7f8ed271afb7b4b00

        SHA1

        e688384442cf0c87d95afe2dd4ac9219e2ac6862

        SHA256

        d6a2194ed9fc11cf4ee229d6282225e732594c345b3a948d78e1e25287e2bb92

        SHA512

        d75608306a0b44a1a6c8264804fc77dda034a83a2e1198a982a388b99e595687aa2b1c34d49f4ebc92b05f4932319eb0f66caa5d749e1a8f0b33b51a379367aa

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_iw.dll

        Filesize

        40KB

        MD5

        7c89d57d66e73d8f09ebafa1733e61c2

        SHA1

        d2cdf93717da261437a841dc7bea321dda20736a

        SHA256

        936ca4058d17ceff0ad72ffd721ec87e76a7df8066fb10110a8ae7bf311d5c27

        SHA512

        205eae74837c601e459ba5d7a994f3ba76b279ca67ffc8d694d9b75baf72bedaf72f18443417010c19fd3c97560aa7c1284b319a738afea5a2402d7763fb1674

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ja.dll

        Filesize

        39KB

        MD5

        56c037987597e28377c43df3fd64a2a0

        SHA1

        1e769ef90a0c8c5bf3c4a6d4e4ff5897a4e1ab84

        SHA256

        d158b0a602fafda9a117ad6065ecab3f02159ec1055adbac8979b311db83e1c7

        SHA512

        b2982807011cc473842aa89aa425fcc504d91072e384246122ebdc33b56ecafe16b746cf5206d2686412f90ee663b1545565cc050dda600295aa8bb4fa0f6828

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_kn.dll

        Filesize

        44KB

        MD5

        78ba7d33500cfa4639519609f7cedec8

        SHA1

        9b0d9c945917d61f8a0caf2c3e11d0cb2c7e6c7f

        SHA256

        6c8c7692fcce08684ead91e0a68c09121e46e45c1aa5d30aa9342d9ff099a3e8

        SHA512

        f3e7acbaaee401a2a3b0a68db88fbf6fb620940cfe2891d822f38ef18ee5739d0ce66d5f440eb8ccc1d336ac5a406bb668ca20eba9fb494c0adff3bde8c73d96

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ko.dll

        Filesize

        38KB

        MD5

        5c8d844a20331d1753b38babc1ec567e

        SHA1

        ebf130fb8c1550d329aa2eb008780c2a8a69dc06

        SHA256

        2da70429e0e6b931da700861a2c0b416d9420c3973531edef460079fd2d95c8d

        SHA512

        0a27588c7f5791940ac4d8946533a1572d70f8c4fbdf0ce35a3c15a3ae56d77d2094b2b2c1ed4090bfad4ce11488d616d5bedfe6dc62ba32ab33714abce8ec65

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_lt.dll

        Filesize

        42KB

        MD5

        979ddd15d4625f2d9442308ac23b093e

        SHA1

        41bdaf8e7930a788e72b2e8d812d3ad8cc9614d9

        SHA256

        546ec90e214472e91048428924aea9853eb1a0baea8fca9af87f5b4640440078

        SHA512

        148e0c38279d1ae560713fa4c0f2bf1c0245b6971d71d7b4a2cf44c4d512ad1fc8a9cb33ce7554f4a4855cc0ef319c6e72784cb2c4b87b324990ba945c31ef9f

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_lv.dll

        Filesize

        43KB

        MD5

        dd5164441187cd34cf6b4571ad06b02f

        SHA1

        12acf5a1184c074ef04b52f2e855866b815fe61f

        SHA256

        df49a28d88b5a20f2bd26fe17fd049a04baa5c27c0c9d96203335c4ee52d4413

        SHA512

        c1bb517c682f211f6894c06810bf13079dabbc1912d8f6932746c0dc774b1ad836c21cb2e7f19f7575eb4ba989644f7806f13fca2653dab7b44960a567788a57

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ml.dll

        Filesize

        46KB

        MD5

        1a68c9a98363c381f08922f560250758

        SHA1

        5c8fab19a6fce550c541ddae84c1ed1eeb1d9a8f

        SHA256

        2a308897298977866c0199c137f679773ed63ed703b1286d07cf0e1de45225f1

        SHA512

        c22490c4660ba897c34eaf2f1681b9ef713bb8da72969db4a462ec8f639eef1a3403a7cbafe8f86906d69a4c716e8d638caf89aa9911996d1d1600b0659bce07

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_mr.dll

        Filesize

        44KB

        MD5

        b7479d97664ff3f68883a4665ad46f03

        SHA1

        fed7419a8408adecd531d6f7e1a24bfbbb97a25b

        SHA256

        d8b54b04a01467927702a439f875de02577721da3d6b393fc9b6d5f81f0e363b

        SHA512

        3885c46f4763961ac41ecf4e33ef67f560b14672087894bc0d72b6fdf1e73feecc5a4990f0df52759032085ae4b9cf918355010954166614b18e3cfed2e82645

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ms.dll

        Filesize

        42KB

        MD5

        7f3113def8e50c086bbe84273477bad4

        SHA1

        f29165a7988ed9b46fa162b02cbc58e3baf9dc8d

        SHA256

        60821a3672d3170f4d2e230e4c72aa3fef58cdeea16d0af22b5c2077bd76750a

        SHA512

        3fb6f5ea722e81ccfbaf01110fa341f8299a81b71ae072f52d11e2c8b3bcf202175f9c8e176c289aeac9d405d9919e406ae75929a942b52f49cc52a0858611dd

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_nl.dll

        Filesize

        44KB

        MD5

        092df8fbd33220a72d1a81745cd61722

        SHA1

        16ee50224dc792a144dd8445c1b1017f0b22d252

        SHA256

        001666ead47d5efa71ccfa9818269e137f0c4ad90f32d758a9e6d9bc4560bb9d

        SHA512

        d2da63cfb76879745de3d2b537673f584bd2f28fca9582a8476f78b69ae0caa156085b61c33f03737748b942a1196ec0f1a4628766ad85ad6de60c6d68cb5ea2

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_no.dll

        Filesize

        43KB

        MD5

        9efb18e27e49361b5ca0fe4eebb286b2

        SHA1

        7e522beabde6ad87aec419f4c26395c64d8382a8

        SHA256

        3c066ff77d407ad1547372027f0c569ff65b06f1a5e34ed578ab9e6b87ce4876

        SHA512

        5c034c37801cea6fa3219d24f81b62bd416e4ce2e9102285be34ade76d80ed0229d7951c8b4626e2aa602991a8ba5424c2409a50f9dc8909d335a84d6bccc52b

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_pl.dll

        Filesize

        43KB

        MD5

        355fe9ce9db81686db356a30c17212a4

        SHA1

        6eb7892a5ab482f9f2e4c91dc12700e1e0eeffac

        SHA256

        5a6d70da9a5ebae1d28d8fa97ec40e40b271d5386648a5d00e28d49fd41a2bb0

        SHA512

        b76653623bbef763639ab79f75173811962727b677bfd359952224d61a4537f8ec8067ce9281145f1500d68b4133792c1a03beae9708067d3a57bf2138e63d9b

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_pt-BR.dll

        Filesize

        43KB

        MD5

        9dd85190c1ca43e4ea964f6695f34865

        SHA1

        f0c597a48312d55a6b820eeea05747b99d815a96

        SHA256

        ee5403a3ea60d3308d4999e6092aa4ad80fec2a90a701e7ede44f29298c48737

        SHA512

        3ba6b4143dfd3be9f9f5cf4d80e54f99bc68976f7bb662f97bccc80bc1789494a35fa958921589d65131d5cb1784fd09c48f7bbe940ced165ef4b0dc9afb998b

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_pt-PT.dll

        Filesize

        43KB

        MD5

        82ef6ec70333a490acfa9e46680a5d50

        SHA1

        7dee942e0af205b0d5e65a237fcb571602080d61

        SHA256

        21193d4beead2b2d43ad2417219018803103b5e0db94273005c0f480c3ef5d73

        SHA512

        c819ba1f42fbf11e446dcd2e4a51e9f2d607a941d0380768747286d0f8dcc7872fd76669f411a4a61e9e0417aae4e2d6085611abae62777feac6e9a4e1cd6061

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ro.dll

        Filesize

        43KB

        MD5

        dd97a63df7ddfc0ed38f09dcfb8f31f8

        SHA1

        ed049d9162f9216ee6b440ede178af8ae489501c

        SHA256

        69333435afbc6821a0f40497466f98fa8e20a10ee928b2a85ec711ac77d7442c

        SHA512

        f2b99a9fde86c21bf99423d1686a0d9a7d4a064ae9b648346db65ec071e86e6070b0bd72d24a2806a316108ed7cb9b1bdfe8713e1c8f661bd66ef5f540e1207c

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ru.dll

        Filesize

        42KB

        MD5

        6534fdfc9541218c0cc45450ff5cf322

        SHA1

        e34f0094597907895db8e5460a2177231c4e3c82

        SHA256

        08fb286a2823fef7a25b8359beef81f6f1ba65de7a9e76ca598612a981e3bc8e

        SHA512

        4c86efbab153ef7fd06f5283737f1859cf6f10dc3f64d36684ab0cd81d3eb5b2a7ac2fbe6c1ef2f21c3eceb67694560894e162e57dfa1e177a64d67cd8537e52

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_sk.dll

        Filesize

        43KB

        MD5

        59e7c6d09737f36d43dc66cf6550109b

        SHA1

        4bdc91ba8fc182ed213345e49b2806918cc03712

        SHA256

        99c406740386846de02fd0b8af6d63b1b6de586f0d3125846b904c8b2f35ffef

        SHA512

        bbac8e066927efb40545e2d474dad921dca646407e2bb2360f6f7802e0cbfb71c4b60ae8eca6c13b49cbe469141a301194cc43cb12464e1e826c56ba0a04e4cd

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_sl.dll

        Filesize

        43KB

        MD5

        10c0234687254950bb93f7c379c1da49

        SHA1

        45b21d2531ca4f8ed67767c3e813b3a5f51845d3

        SHA256

        0eaf7f8721f2b51d10ff36c1ef0bc7cd958b351a81a720e0b8908f93048fb88d

        SHA512

        1a6ea2cdc3b55618f8145ba957089f01c613e407797256fa540a7ac9723a216419463a07a0a99fdc62d827dccc5f6290f84e79b21e810ded9f990331e422d70d

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_sr.dll

        Filesize

        43KB

        MD5

        66813fb0d3a66fc673133c288aa21f29

        SHA1

        c934f77f2b4e8f8be1d9a63497a7549e5f9e4a7b

        SHA256

        6a5459c40d0e8f8d7dcb3aa457d70bf3655f8b9f52121ab16adfebe56a8aaf73

        SHA512

        ee7f26f6734f8743aafd7a41b647dd92330618f9014e88bdcb8fb3e1b90f7b6d6a3cf4df22171d7add5df0af8196e8ad68c85bcb71a4d75f1e31061a52055fea

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_sv.dll

        Filesize

        43KB

        MD5

        54c3bd48650dda24560a3f567929a876

        SHA1

        53c6a27155ee329774d97b533210211a9946d607

        SHA256

        ab5cb8da8269308eaf2a2c0cabacfd02f21787c08ac99c5380bd74a6307ce6a7

        SHA512

        009a1397bb13b0b4a2c540eef4927c80754ad27a88e54a998732604a902c97594fac3e46303224b90f5329168d3aa468610be46b64f25833fa5e68a60f2baa7a

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_sw.dll

        Filesize

        44KB

        MD5

        e17047f1905dd4a7c54f6b7391a3a2b5

        SHA1

        460e93c96b4605ea4ebb8cc3b5c98880b238b38e

        SHA256

        21d08e9fbc8d311096e48d0121b6e139308f008e588e9fbb2c044ad54d0c6fe3

        SHA512

        3a060c089a5a200ec38a275f44ecb02c56764efa0860e4f2ce4362820265c9ef2a8e5b5fd94aad6ce7e9fb619cc4afd1bb477fbfb3eacfd5dc961d0a38fc552f

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_ta.dll

        Filesize

        45KB

        MD5

        2c0f7d4ee79fae77026d5733989b43c7

        SHA1

        fe9395690cd573794d40f04e16b828138baff120

        SHA256

        b61196b93e653dc3b6ab3cfb367218081a88a2dc21f678deb79ad47dcaa2d573

        SHA512

        32dfcbaa68f8cd387dd7a05d056368382911d7ec80b22475d182912cd27ff3888a0865916b9d76d76777a24f16facf54ee342d1a7f4ab3b87624dda1e72a367a

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_te.dll

        Filesize

        44KB

        MD5

        456e12d968e0e77270173ef937915c3c

        SHA1

        0daf03d2c505467fdec7b5bdfbe3699554892164

        SHA256

        c5c9ac04b400b67c6cfdf2ee9c21901df239a00cabd402e59af0a00d4efb0173

        SHA512

        aa3a63145ee88d266e8b57202d01e934aa79b14c6cff6dc1381b1c526a3f890ef6ea2917da7af1acdd04785341b025fea3709e636c9d36745e644cc2abf5a1e7

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_th.dll

        Filesize

        42KB

        MD5

        21e645b6564a4bff088abcdb94f7b4ba

        SHA1

        db9966ea497a9c5532172f8cb70d037fe2daa13c

        SHA256

        08e643f88d1df3f681824923eea75f7dddee55d6ab62dceb5a812c05ce8c753d

        SHA512

        81d7b60b211230c9af1cf4b016e80092e3e765cb40e775992c850495ce8e4f9886f190a507650f26f092a468533fec03b01ac3837d94282e75380602b9db5e78

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_tr.dll

        Filesize

        43KB

        MD5

        e05348222ebc21d3d1b4aed180a62566

        SHA1

        851394ae7d9c9fb85979b7d0f660a415004def0a

        SHA256

        531415cbe8c0753227934e926446872416e1593bd653826aa29bea9e6f5ac668

        SHA512

        055a1ae42f5cd9229884efbea235085326b1b8904c4c28c5096430bc528a19ac29d450740a76d5c2bfd69d67a7e78958343fbaab575b80ac495b3e373ef26502

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_uk.dll

        Filesize

        43KB

        MD5

        af3f42cbb576430ddd211c4a1fa1d5a9

        SHA1

        69149b4a0ee61c2250bd1a758fa7aa7c281a6178

        SHA256

        4d72aad9545ab5eb6a89e3690675abf9007caa376d9da6b0c8cb5c704ba9407d

        SHA512

        903007ff6e99201d38cf4b9ecc54df9f1de67dc58cbcc6277cede1be2fe8ebb508d6a37dd4fd98d64e9a2616625544ae1302daf335c2454c4a56c7cb4d18dd1a

      • C:\Program Files (x86)\Google\Temp\GUMD310.tmp\goopdateres_zh-CN.dll

        Filesize

        37KB

        MD5

        3238536195c72141bf60ee15ce6413dd

        SHA1

        5d89916a8f72b9836e3e2e1eb93077b515a231e9

        SHA256

        5c0e33d4cbda0d878a48c51a7286e6ce3884ef0aa06ce4fc306b888d3e8f07f4

        SHA512

        78fcc97db95b720e1ce7fa24ec9820d784a8013f791837629021176f8ae416775ed8a25b3afbce33fc18b29de5375f3ea2818a5a345ba0ad87bc71dfb72cbe0c

      • C:\Program Files\Google\Chrome\Application\130.0.6723.117\Installer\setup.exe

        Filesize

        5.7MB

        MD5

        975f2eaa38bb31796f08bdf7ada59b5d

        SHA1

        3d8bbb8cc560a5be2d73d394caf19a914140432d

        SHA256

        fdd374c979fdd584e6361d41a238c81436018d96d9f5be0cc1e05e7f997c1873

        SHA512

        a110ddf5b7df6d871c0bfe0f1821df8e127e3e5e6d1c6955f844cce4725afa06ca258c34b9488681588da0fe0594660f080525a101a2f05ef6b5c63811332051

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        2.0MB

        MD5

        6f39f4a65437c51cd0ab542f98660140

        SHA1

        5128323c948fa582f805b6f1e58d6f4f1c88fecc

        SHA256

        9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580e

        SHA512

        82ff746659b445f99c6263ce4b081d5466df140e3358a88b92f8d85d9d1b366943f263828e1532cabb9330bc8bc290f8918464b9e5d4e2fe25a589c970f8f870

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

        Filesize

        414B

        MD5

        53529668f3e95536c6d2b8f8e6848f68

        SHA1

        12a097c06dd125cc72afc92d9597368dfda715a9

        SHA256

        fedcd9265f2e8ccbd2aa98ea7df36ebe1a16eef408725692f2e5a00176499bdc

        SHA512

        b836167c8f80f0ad5cffd5c5f7a3a50ffa32bb441b65986d86de95525fb822bfd23432101c34cd8297d6f87ce89883efe6d8c60979221b5e1fe7652593615582

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

        Filesize

        120B

        MD5

        7361f476d84ea8fad8520bcb28489a88

        SHA1

        432120801227c915a8c95b340454764d71bc8147

        SHA256

        ca4fc4361f6f735b64484fc4bd8c8755fb882658226ae9100eb3f36426c1257f

        SHA512

        f79cd5464a2ac1551fb2d62820770cab80d47135fa02c12f934db7439be0542ac2af0b0d52bdd0dc15fb58857e5d7f51faaa4c8dfe22d5a58524c1fd2710eb3e

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

        Filesize

        851B

        MD5

        07ffbe5f24ca348723ff8c6c488abfb8

        SHA1

        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

        SHA256

        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

        SHA512

        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

        Filesize

        854B

        MD5

        4ec1df2da46182103d2ffc3b92d20ca5

        SHA1

        fb9d1ba3710cf31a87165317c6edc110e98994ce

        SHA256

        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

        SHA512

        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico

        Filesize

        192KB

        MD5

        505a174e740b3c0e7065c45a78b5cf42

        SHA1

        38911944f14a8b5717245c8e6bd1d48e58c7df12

        SHA256

        024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d

        SHA512

        7891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

        Filesize

        2B

        MD5

        d751713988987e9331980363e24189ce

        SHA1

        97d170e1550eee4afc0af065b78cda302a97674c

        SHA256

        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

        SHA512

        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

        Filesize

        356B

        MD5

        e16386049572b536c5df5d3e5a60ee13

        SHA1

        b6bb53d8073ec9978d01bdd4f4c006cb20f42aa2

        SHA256

        266f0809469f1b0a1a37fa7ba8d3f33601c66248b5db5210db273443deac277a

        SHA512

        657de68f02b9e975bc3f729125a4672db1e31176874d6c826e8cc2d6249a71aa7ebdc381679577c631a962cb7b65e77d6b37ff35eec7d9fc2e528c674714b1ed

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

        Filesize

        11KB

        MD5

        0c8e624d3a0446709e1d12717c6a721c

        SHA1

        025485530818fb571181df402ac1344211830f6f

        SHA256

        f4c11c092d2b948fab948674436b9b98b452f48ed0570b9118b0c2af1dc531bc

        SHA512

        7af21da819b3717b95b7def4ba02c773cc97aa884b44b03996f45a77d8b8da761f51cd27c29da19853382e618fedbc47b6ae647451b5add9bf605d2a1aba9ad6

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

        Filesize

        16KB

        MD5

        a18188f8ac5a4b903cde9490aa71d11a

        SHA1

        5192b16c9f3572586431f1583ca50563b96312e7

        SHA256

        9501a23f323eba0bc73c7597f3c8382c418ad1fa0073c76e858dbf461b8bee1b

        SHA512

        c31192655f88aed35947eb40bc9e3be71a77793c9a46a1d1833fbb6fa0b589ba1abbb5f82dfac21d2ef355fc3c6c03dc52454800009e6219b1afd624b6c3b165

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

        Filesize

        120B

        MD5

        bda76e468898820ea4309f5169e41097

        SHA1

        f7fa25d812b1af626af56c66a8a53043c4ccfd19

        SHA256

        9607e90a41d2d238eb436052dafe4643a8c38692cfb5c7c38988567cb73a0859

        SHA512

        888d7ddfe1a6ff8fdb355129b65720b1b89fdbf71ffe8c798bbd5751afa99c4e8f6cbb1e328aaaf7bb9a14cb5b2195ea87f59d536ac1877e3f55745d35ab2b9b

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\trusted_vault.pb

        Filesize

        38B

        MD5

        3433ccf3e03fc35b634cd0627833b0ad

        SHA1

        789a43382e88905d6eb739ada3a8ba8c479ede02

        SHA256

        f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d

        SHA512

        21a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        116KB

        MD5

        399295e7cac5040860836d52913f733b

        SHA1

        149d1d4250c334fc6e60419b3fc7b871746c0c68

        SHA256

        0cbdc12777cd4373ecb448f9746d7d3ea2ed262f12051c9866ef1d006e7ba470

        SHA512

        1f010bb9ec7901ccc6b889ca968f502872296500a30bd92ca3880f4c722f1f8059dc3eb14679ed2bfa2db9a14cd473bce28ae9e1c90004d8ab76c1ffab4467a7

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        200KB

        MD5

        7591f31fa95523b7b2257ef96ea0910c

        SHA1

        e38083fc96bed1baaf710e0de7f86a354f006df0

        SHA256

        2ecc611a28865833f4f4903077f95d56d60fe6159999f58178a8171598091de9

        SHA512

        134ec60eaade8620938ab34c5bb0b9c784aa333957d2b5344dfe574787ccb123f123f6a679944e517573374769262637128d7a80480c183f5e1b9da0d171450f

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        200KB

        MD5

        ecc5f5033374dcc27039692b9285258b

        SHA1

        db8661c6cc0a009d5b5c047b31d8b0bccdd965de

        SHA256

        ac7794e97af71c87a733cd78c6accff2aeb662ab4ff26e4d8738eb1806c76210

        SHA512

        a240a60db593189fd558795dad60d29fb799d85f2085420cf0de192431c15489e60293ccce2b2e3b6a7f6c0867e32e78df976192ea2e2fb16e0cdfe82b46864b

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

        Filesize

        115KB

        MD5

        cb0c3a3a5caaaf9f3e2053772ee67da7

        SHA1

        478f3d69d5af55e465454b9813d21ba71f3d132e

        SHA256

        f3c3b7528b8f37f86178f28d2a51f2b04d6e8a989831a120afe2eeab9838e0ca

        SHA512

        d6434d19dea5fcec9ab6aad832ff58a123b0e63cfbce0e82cd3a288547ef2dfdea1bf20c7375c3944220fbc7b37cb54d96ffe6a3ac5704f44bdda3faec05f3d9

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

        Filesize

        132KB

        MD5

        da75bb05d10acc967eecaac040d3d733

        SHA1

        95c08e067df713af8992db113f7e9aec84f17181

        SHA256

        33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

        SHA512

        56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

      • C:\Users\Admin\AppData\Local\Temp\._cache_9d24a5a3487655f1e44380fd2a28d75846e2fcae8fc3465a29b6332e9b7e580eN.exe

        Filesize

        1.3MB

        MD5

        4ee72b6e16baab717f9a7ec37dce041a

        SHA1

        3043d33c8b5df3f9783f1fae0b2c5311518f9d99

        SHA256

        df826c2f55a8876e84f1c6d9791fb8a127572811f190e74a596ac58d4d626216

        SHA512

        a0a415bcc1f2c08f993f8c5dcce31b70c59bebe74e70f8284430de6ebf44ec33fddbb863297f391eaade99246c925bb757ed1ecaf8f98c100319c0479800ab85

      • C:\Users\Admin\AppData\Local\Temp\scoped_dir1520_1442839980\CRX_INSTALL\_locales\en_CA\messages.json

        Filesize

        711B

        MD5

        558659936250e03cc14b60ebf648aa09

        SHA1

        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

        SHA256

        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

        SHA512

        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

      • memory/3116-512-0x00007FFCE8110000-0x00007FFCE8120000-memory.dmp

        Filesize

        64KB

      • memory/3116-438-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

        Filesize

        64KB

      • memory/3116-442-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

        Filesize

        64KB

      • memory/3116-441-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

        Filesize

        64KB

      • memory/3116-440-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

        Filesize

        64KB

      • memory/3116-439-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

        Filesize

        64KB

      • memory/3116-513-0x00007FFCE8110000-0x00007FFCE8120000-memory.dmp

        Filesize

        64KB

      • memory/4104-615-0x0000000000400000-0x0000000000610000-memory.dmp

        Filesize

        2.1MB

      • memory/4104-1169-0x0000000000400000-0x0000000000610000-memory.dmp

        Filesize

        2.1MB

      • memory/4104-543-0x0000000000400000-0x0000000000610000-memory.dmp

        Filesize

        2.1MB

      • memory/4452-0-0x0000000000800000-0x0000000000801000-memory.dmp

        Filesize

        4KB

      • memory/4452-173-0x0000000000400000-0x0000000000610000-memory.dmp

        Filesize

        2.1MB