Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 18:49
Behavioral task
behavioral1
Sample
Lime-MultiTool-main/src/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Lime-MultiTool-main/src/utils/__pycache__/cpython-311.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Lime-MultiTool-main/start.bat
Resource
win10v2004-20241007-en
General
-
Target
Lime-MultiTool-main/src/main.py
-
Size
10KB
-
MD5
20bf3cb36efe0d6892662a45305c513b
-
SHA1
5b07501a82e6fbdbc267f75ad86f5ad9de6b77ab
-
SHA256
4290ec5465d14f98801de3400e0cb078586b6e27bc4bf6c7a1f87de036e8a6c9
-
SHA512
d3d719cb129ff20a1a70bc072e30a2fa18f9813631983d3e08882c88859588e13d631ebf22d0e471de3142ac292b7efabc085310d8eecbaa99b8be1245cad83c
-
SSDEEP
192:MTqreYeTbvBTHF1Z0SQuHaNOVV583zcapKENphISRfm2fT2yUAtCrBC1b8bd4CyD:MToeTbvBTlXCa7bujRs8pWS+QinACIBP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exeRdrCEF.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
AcroRd32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133759974916956727" chrome.exe -
Modifies registry class 11 IoCs
Processes:
OpenWith.execmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\.py OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\py_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\.py\ = "py_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\襧鰹㜀谀N OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\襧鰹㜀谀N\ = "py_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\py_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\py_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\py_auto_file\shell\Read\command OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
chrome.exechrome.exepid Process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 5628 chrome.exe 5628 chrome.exe 5628 chrome.exe 5628 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid Process 4768 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid Process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid Process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
Processes:
OpenWith.exeAcroRd32.exepid Process 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 4768 OpenWith.exe 1108 AcroRd32.exe 1108 AcroRd32.exe 1108 AcroRd32.exe 1108 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
OpenWith.exeAcroRd32.exeRdrCEF.exedescription pid Process procid_target PID 4768 wrote to memory of 1108 4768 OpenWith.exe 97 PID 4768 wrote to memory of 1108 4768 OpenWith.exe 97 PID 4768 wrote to memory of 1108 4768 OpenWith.exe 97 PID 1108 wrote to memory of 3092 1108 AcroRd32.exe 100 PID 1108 wrote to memory of 3092 1108 AcroRd32.exe 100 PID 1108 wrote to memory of 3092 1108 AcroRd32.exe 100 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 748 3092 RdrCEF.exe 101 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102 PID 3092 wrote to memory of 2268 3092 RdrCEF.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\main.py1⤵
- Modifies registry class
PID:3568
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lime-MultiTool-main\src\main.py"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ACFE23D4587DFA89633CEE8D05F438A0 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=860E07A20CBE09BB4D80396499B78377 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=860E07A20CBE09BB4D80396499B78377 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6A772A10609E7B27D8FCC4F7E09FB0D1 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5461644270418C43AA30B7A232ACE2CE --mojo-platform-channel-handle=1868 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AC586F3482F3F7EACF12B6C288331B38 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffeea64cc40,0x7ffeea64cc4c,0x7ffeea64cc582⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2036,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1760 /prefetch:32⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2500 /prefetch:82⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3712,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4956,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3244,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3156 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4424,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3444 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4964,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3284,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5176,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:22⤵PID:5416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4452,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4824,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:5464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4892,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4584,i,4747748743405964119,6349541732100920833,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:5644
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5dcf489d57cedbead2eb70e07c06cf106
SHA106d63e81e2e3c63cb23cd8e18fdbb4d93c469483
SHA256a7ded35b2683948080ded6c92ce9786493bf363a448e6c6e965dc7ab64b7780c
SHA512f004912d797a5a889948c3e1efd9bbe10f188f7f782234220d66d235cf63d5783d8d883601c421f7afbdb7083a3451a1f668846372027c6a660f616882fd3a95
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
41KB
MD5503766d5e5838b4fcadf8c3f72e43605
SHA16c8b2fa17150d77929b7dc183d8363f12ff81f59
SHA256c53b8a39416067f4d70c21be02ca9c84724b1c525d34e7910482b64d8e301cf9
SHA5125ead599ae1410a5c0e09ee73d0fdf8e8a75864ab6ce12f0777b2938fd54df62993767249f5121af97aa629d8f7c5eae182214b6f67117476e1e2b9a72f34e0b4
-
Filesize
280B
MD59f8cc1b73cb970e3c14604d7da8b466a
SHA1fd3651fae514f95a9352ff91c7b3586e8fa9cf31
SHA256d2f5d03c42b41a5a1c89a3ca8ea98af54d1e67a9f96f57cb0913fb39a294a39a
SHA512a93293c08565aa6d321299b75af1c0ef55bf49340c2b3d370313b1ff7b93e3dbb2a3e906aa53bb438aada2d700705e9bd7ccbf0ed165f7008b6350bba0177b6f
-
Filesize
19KB
MD5774b7ad0aa86db8ac2ff513cf24beefe
SHA1e16375d365e66e66410467d11971e2ce39d07ef7
SHA256d19c8e71555d109de547a8e8bc2d02733d4a3214d00244260bf91c931af93c46
SHA51290b758e2ba45b02a88f302c2b3efa94f672df16392ff75153a87d6f11a15a5dbec5fb062affa42c4f9dc0871c89674c5b8097c772066b747e2402e9f6fa63605
-
Filesize
216B
MD5477b128a930f5ec33b1d34974981fb37
SHA1b06064e3f51095084bfad97fb9f3430f439f3014
SHA256ddee4a13c5948866e62441602dc0a014518bddc19e009df7c4199c43b1b7d858
SHA5128e4d8e0e8cca7ddd255603897b8d185432a18b6cf92bb9d149bc34fead3386de074c1734f05574ba3605203122eea7156e9e74cfafd5504d95625c0dd96008f4
-
Filesize
216B
MD5bf6ba6eca3276cf30ca6e277de6826c7
SHA1ebacf0ea7434b25e434212e4249d4fd0076b3b8b
SHA256bc0aa24a9343f20fec111029cdb09bd1cba9e1c7915a997f0993aec42a3cf3f6
SHA51259e5ad6da13273ab2fe5e8f35d13a18c3ef06ac46a0f645026478a8f9ffbc709869c1e00cda871f5ec3772ec32e00e519a3525255ad4067213f344b889d19d7a
-
Filesize
216B
MD559da76997eaf570b74688f17b8737092
SHA18efb3a490bee4cb32809b0b5d669a5a734ad8642
SHA256bb7c9b4c521de704b4cc6f44437797321b3bd7f6f19f138bf700455f2abe717f
SHA5120b2e838eb4551eb3d64802ab9c98dd84e6ce6a9cade5416c8f7344266284c4f99507d08fdff65a9af64a809a6cea0545935ee187064cba8837d08a1647473d68
-
Filesize
216B
MD518c1d43c39620f18a0b78e17471b6f91
SHA141d17c9b0a5bc1736b65046253ed5563b76a08b4
SHA2560f00334fbcbad6d7d47681661984ef6100df0750022497f465a851790c57087b
SHA512107ca996a6a4ef9bbf91900fbdcf5233dc8a5b9fe53f1bd4cef50c05a53b6fa5c9bdf5fd392f83ab09b8612a002a7ae5edc33760737450e925fa864a101f2085
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD54600cd2308a07f549a9be5a1574be092
SHA142191e2471cabb93c6184b00809a9207f73e473c
SHA2562c731bba28653492511f5b340e6378178a2c75ae33fbb83748e23b9440a5e196
SHA5129efe74ce05b20a2ae1ddac0984c7ebee2e126bdd2e08a7a31ff836a9d040956b14f23058e3ce7c55b24df266eec2733e849ac1a8576c1394da5aba2c26c87f3d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD515db6ed14c81e0c9a1ae6ccaf9f88c1b
SHA19378b82a60fed41bd0e04578299fa120dee16813
SHA2564e10dfbdd58d6b9f1d0056d514720eb051f6b9b9652a50362629d68abdd4db15
SHA5125d868029e401479b082a77d6a018df2e795786ed3c1773af0489e8f3eca4b385a016688c3cffd504cc157fca4b12847a2ebaafc48894708e4520e8aadb3db0d6
-
Filesize
9KB
MD595d54cae3abe208ef6d73a7b8bd9102c
SHA1f31a2a1158cc4f912bbccbee15ed433908507f92
SHA256e4a9c03edeb1e08f35f7d57abd66cf778a6d3ba46ecdb0f83c6d1b3a39852af6
SHA512f3f8dfa13c2a4044dac1ac3d153913b5113ed8a65c059f36e1faf6dd66f0581c7007d49d9baf94d53196eaa3351b24e8a96a078606ef95b31ad63d3ffa72577a
-
Filesize
9KB
MD592b338ee5ef28c3736f2336c7140372f
SHA12607ed488c7c70df69e25cbf11716ab229da4ba9
SHA2560fe24e27d2eb3c6c9aed2f062d8bd96a368030d6346dec68ef92d34052983eb1
SHA512db70d9c0a34e5716e7ae3b682ce4a191380bbb0dfcbb3f1a115e6d7426dc1657e16fc82cf5d74f606344489622b5a996cf87811dd43967d56908886be0ee820b
-
Filesize
9KB
MD5a32b0d8fb3bbccf4694f6d5d2d3ca0b6
SHA10fe7ce67ccaf36de17b25adbf05e8b1ef3ecacd8
SHA2564f1f01bc147a3987de4c1c0df7ed360f206a09af1cfaef1fc5df0fdbac9f8988
SHA5129a77aebe5f2fcd5abda8bee3e0f5525e6decf796e9296c2ab09879b8d858574199ed6c2948ea143766f295eba0a779bf67d792d5485fa5dd255418ee7e097052
-
Filesize
9KB
MD5ff4f0606eea34179ff7fb4c20c6ea26c
SHA13e72d94748dfaf23ed2897c5394214ab162d3ea3
SHA2566808f3b06d0932b7bed39d043845b756869eb335c6d42aff3b48fef9e8812899
SHA5128f5ddaedd9ae8fd6d6c1b808d9e0cadd60f16d857ef1944316297ab59c73975393b330b9976ea89b9c0344655da930a2e74b2fdc3437f2e1d887f4de29241de5
-
Filesize
9KB
MD5ecffd88b098941c4e6be0d4bd2921cf7
SHA1c62f47f5223de59353aae7df9f72ab3355a46eee
SHA256ebd2fe2e9992cf5e2c9a346e6bec00736ef5124a4b6ac1f34547a217bebb25c9
SHA51269eb5b439292634ca53b9e7a03c46c6d5edd394d3df3a10676660e5122d5763f7279a875a5187c3b67fa7df7e7572a1b6406820cf1661f00c3e1dfdaf6822c4d
-
Filesize
9KB
MD5090055143c2476c77b26a9bba9e53d1e
SHA11badee648d5482c44a7b107017c8b3b9cf7b7984
SHA25631e9e98e729b1e5caf641ca7ad4e4e78836973de0def0815fb6b9cd030178109
SHA512adef466b59daaf1b24e99618d09290958d25951b15ddfe58208d86443d8de411daf7f0fcb7fef104436a161da39262c3de2e6e80dbe0801a01d1f2675252c82d
-
Filesize
9KB
MD55a26dd9c8f65d29d58503db605ad5ba7
SHA186d550314c70ef703dca70cbb56f1e0a9e8568ab
SHA2563ced958ba39f6c41ad5a7104ad35f52175243c6f6162ba78f8a58777f21f4863
SHA512c9c0695e18088946fafa868b815cff441541c8e5a5e1ef13c764ea09c9b3644d0c853a5331ae69f50e1702e2ded95a14f81bceefa52ecb0bdc74a234813c106a
-
Filesize
9KB
MD5b6ba2ade9147326dceef7939b87ae7bc
SHA19faec45f7cb865918e3b476380d1d3fb09e3ea19
SHA2560a0df5aca67b179d082917172f0f48c0ed54be25a09e507808745b6dbaf8da72
SHA512c6ec41e52e6f9d94afde06d76fc485c2b2f259dca6109a6698c21e79d97d4c1212dc499486c5c1b54a65a91c694ecac1faea381e937f29471a72ac4833052e9d
-
Filesize
15KB
MD5c4081089bb2a7cdb57ccf5c522f67191
SHA19e3fc67267afe612a722cbc27b236e6edd0d365c
SHA256dffe5535e0125c4504e67055321902ebae49cc57a735785aabe3bad7835c607c
SHA512842bbad0285ec2f9e0a0c39a10e2761dcfdd50fa3edbac457a087b6a162c0cee0b53cee47c42dd9876e78a86daae5fe8716d7bd3d03a9c6c24e6e030ab53cc28
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d835cb47d42f1fe99b7f482c07726c2a
SHA12b971c97825575609d74a0f6a1894a31d59a810d
SHA25609fc08d84b0bfbbf415071dc97d34843439696e9ab2d5513fbf3948181c82b5c
SHA5124bc44de3d61621311745808c472836f958ae1c05c5f1c3f891b89b3e1b8558a160de4ff647aaa9aba1e248618d47996df0da67acdec4b446a68e5b243559a596
-
Filesize
231KB
MD582eb92f9d44dc7ff31aa0075e4e92dd9
SHA191615ff882e289d83bcab55119b0ee3795809812
SHA25628ee7bea10a256624182895c9da0ef259ee3cb1b866aea6ac5495c46a58205e4
SHA51292b278fb9606994890cb6192903f5ca51ab32563b9a6004dc7326dc54fc64ee21448765334d19e0d3cc4fc989a3a39005c287e3f78dac788d51f5213124916ab
-
Filesize
231KB
MD526bd2d08685ee2806618692a3c36bdbe
SHA1908863a9a1eab9b28f9a0cef5490bb9c664e6914
SHA256e21ea41399713738f994ff40b32d652df330a73563fe1731e36f6eb3f33001ef
SHA5127ca7d15c8fb0fe4fd487cb147fe15cbcd61f373456c5221368ab0063ae004dbdfbdda56b1a70b93d5d2e34c694d3325c3263f7749a685a52208ef7d7c1a632db
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4960_2111118847\403895d0-b7b3-410c-bf95-2438e38424ac.tmp
Filesize132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4960_2111118847\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e