Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 22:00

General

  • Target

    descarga

  • Size

    5B

  • MD5

    4842e206e4cfff2954901467ad54169e

  • SHA1

    80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

  • SHA256

    2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

  • SHA512

    ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\descarga
    1⤵
      PID:2768
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fff28b7cc40,0x7fff28b7cc4c,0x7fff28b7cc58
        2⤵
          PID:1720
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:2
          2⤵
            PID:2132
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:3
            2⤵
              PID:964
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2576 /prefetch:8
              2⤵
                PID:4224
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                2⤵
                  PID:1392
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3320,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3444 /prefetch:1
                  2⤵
                    PID:3032
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3752,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3732 /prefetch:1
                    2⤵
                      PID:2636
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:8
                      2⤵
                        PID:4328
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:8
                        2⤵
                          PID:4368
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4584,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4992 /prefetch:1
                          2⤵
                            PID:4600
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4664,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:1
                            2⤵
                              PID:2344
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4056,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5380 /prefetch:1
                              2⤵
                                PID:1860
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4472,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5024 /prefetch:1
                                2⤵
                                  PID:4900
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5380,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5284 /prefetch:8
                                  2⤵
                                    PID:1848
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3584,i,14652890861661710505,9216340588069134483,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1188 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3428
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:1904
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:3908
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:3260
                                      • C:\Windows\system32\OpenWith.exe
                                        C:\Windows\system32\OpenWith.exe -Embedding
                                        1⤵
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3840
                                        • C:\Windows\system32\NOTEPAD.EXE
                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\download
                                          2⤵
                                            PID:2016
                                        • C:\Windows\system32\OpenWith.exe
                                          C:\Windows\system32\OpenWith.exe -Embedding
                                          1⤵
                                          • Modifies registry class
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3092
                                          • C:\Windows\system32\NOTEPAD.EXE
                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\download
                                            2⤵
                                              PID:4240
                                          • C:\Windows\system32\OpenWith.exe
                                            C:\Windows\system32\OpenWith.exe -Embedding
                                            1⤵
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4284
                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\download"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              • Checks processor information in registry
                                              • Modifies Internet Explorer settings
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3688
                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4812
                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D44737D34D4AC8192A97AB8BDF0DC438 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4692
                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6459E7825A18761D5BCA71073ACA2FA7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6459E7825A18761D5BCA71073ACA2FA7 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:1
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2552
                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E2FE4224E74875965F5A72DFCB7BF841 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1592
                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=044587F06DD47F0B6A21F6740812E3C6 --mojo-platform-channel-handle=1872 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1520
                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E38B72365FEE0C161C70AEBCC4CF49A9 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3760
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:3672
                                            • C:\Windows\system32\OpenWith.exe
                                              C:\Windows\system32\OpenWith.exe -Embedding
                                              1⤵
                                              • Modifies registry class
                                              • Suspicious use of SetWindowsHookEx
                                              PID:680
                                              • C:\Windows\system32\NOTEPAD.EXE
                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\download
                                                2⤵
                                                  PID:2900

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                Filesize

                                                36KB

                                                MD5

                                                b30d3becc8731792523d599d949e63f5

                                                SHA1

                                                19350257e42d7aee17fb3bf139a9d3adb330fad4

                                                SHA256

                                                b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                                                SHA512

                                                523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                Filesize

                                                56KB

                                                MD5

                                                752a1f26b18748311b691c7d8fc20633

                                                SHA1

                                                c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                                                SHA256

                                                111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                                                SHA512

                                                a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                Filesize

                                                64KB

                                                MD5

                                                b7075114a61a9a23d68567969af11e98

                                                SHA1

                                                b552aad9f7df66aeaddaf325c256b7366a232b3a

                                                SHA256

                                                5feec3085720c53a5a8c0101acac2be1d3bc955f26d96613f3dbf13aff6782b9

                                                SHA512

                                                101c5a94dabaf0113b2b5f4568f8f692607458fc1eb5e6f3dc98b5310c61f787edaca3c476f0841a4d2b72c2de4f5e29cc627848a0e9fbe2a5bcaa3f88171b8d

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                Filesize

                                                649B

                                                MD5

                                                279f5a35487b8d6de4dd971d56fb8cb5

                                                SHA1

                                                3d3000e3c6ba5f342bc02436c7381be4a6e208b7

                                                SHA256

                                                e452f85dca83b89c083aec4e30b184827f065a683d117b6e166a04def9867935

                                                SHA512

                                                bf1fadb11a16988885496a287eeaa91f7dd4fa68aeba9d21f5401917afb8c4494af90fe3e6ad5f15e689e6bd1c3bea3b7ae15c12549b96a2b9b1d0f3f3ab2b36

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                1KB

                                                MD5

                                                c0c1a943bb0df9a39c37058f03e9fa2d

                                                SHA1

                                                693c8bc7a53e6f161945490eca78d7cf91644efd

                                                SHA256

                                                e565dce9a91f564fb62a25cb6a0d68ab10804dcd4d0d635546a9fac27260b105

                                                SHA512

                                                3c6f3f8ba2b813d2901022962d738cb63c80f15f3dbe831587f6cc13616559ac11c13e10ffc7ed3d26eb22b6f7b792d8bb4c75db742bb12a447cffe460c2e2b5

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                356B

                                                MD5

                                                9ae362e50fd86c4d3143dc13e367a3ce

                                                SHA1

                                                684d6627e0f5971340825c2f8e356d3ae23cc033

                                                SHA256

                                                309bab25ab6a997a2353662cb35c40e0887b1d39bbacda3dca0d61bc00534275

                                                SHA512

                                                23fb81670e16f380059c29b47a07243a2430513701d9ff3f18ee3d2c199858cc5e96d9987adbbd77230697e175065cfb41fc35fec74ca0a122505e06683333d9

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                ac85bbb61206a796a672d77f19d40a4f

                                                SHA1

                                                d4b3a115147cb323439de21fd40350c6dff37ab8

                                                SHA256

                                                9ec54119f6275a738a03110ec1b16c312783babbd21e74774321bf7b12d26d0e

                                                SHA512

                                                0121242d3f4b3b09717432303fb759ca4cdf18810c09e1e4078343f6207e961de322a40d74d378b670d5b7b7dfec389f5f002f27a07d405caea9084a1bf70a13

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                a0ee16ff2d95de2f85ffbb8c8cc0e709

                                                SHA1

                                                6ce5474a87d2192e0191bbf86305b063f590cafa

                                                SHA256

                                                f5f8701c3ae09a67e163a65ac5e48bd40120128dd5b4dd2ba1e93ced2e1b431f

                                                SHA512

                                                d29b9fc4009de21b873e3864798e31c41dcba9ca7d6817d18d906dcf91fd0d5803062d46e30028f6e65450154e919591a1cc1729c6c8c0afa7c9a1840084528a

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                4f180242c00e18813d2ebba86c562943

                                                SHA1

                                                8acba0ed5cb55114a4324491c773ea3ce8406dcb

                                                SHA256

                                                e325aef9160f1877a8c3c35cefbb1da8ed49ae08cb6800be9894e9e7b6aa5d72

                                                SHA512

                                                ebb19e672361cc835ba2af6b022bf33da670e736a51f7a9acf9297f7249eb4c37e7979142f225f0e26dffbfec793c6175edcccc5b13a584f4aa582f4f62a2b65

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                495d6271b010e09854e90ca670fc501a

                                                SHA1

                                                4bc900ec0ac5a682d69b2aec7e2ea007d4009403

                                                SHA256

                                                b30ab5bc6ce6268c6fcea0d511a460fc6b042887176a684541f911ae196bc734

                                                SHA512

                                                9ef1179d0a991648710be28a8056d20acd49396fa6356b9abfe47e658059bbb51d973fd5f1e844f7d2417d1b872cea632089115c8028aecee2f5a4fb6892bcd2

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                c5b5287be1d100457ef84643f95983e4

                                                SHA1

                                                0a31744d0df67c829b9790748b00a085ab775eba

                                                SHA256

                                                c0fbe510466d1a1ad26b26a31afbc9f0bc36e3084d23e14d738f3530a291f99c

                                                SHA512

                                                8f3ae4cebd2380901b37c0daafc343f2f0d8ba4aef272f7afa571792fa3e093b55f4cd78c17cbf27cadce9188c1df2828413fcfeaab071732266af213ef33899

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                5b849c22574a1abaf096cf02e13582ff

                                                SHA1

                                                31c26617d9b6fbe3d14ddddaef807a058d373fb9

                                                SHA256

                                                99aa9c8b8b5d234586f00af41da204385b45ca67bb85c298994e7479262c5b5b

                                                SHA512

                                                596ad899c280eb11f4e48fb3507f68f213740d5c5fb5f3744e6a64f97d20fa7034644e65282c340cbfc803329b6e09e74940d7643ede13ae7600ef716a2961d4

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                2bb6f07f662d1726a11b8d6507d9520a

                                                SHA1

                                                62ca47d51a4d97189ca5e133b080f4189f283cb7

                                                SHA256

                                                fa24ee41e155ca4de4f1df8329efc84e9a5cede0302d65e700dafd3cd94b0440

                                                SHA512

                                                ed3dfed6f6f270f14db0e750a5fad1a924ca99dcc73ef7c3cbc2df1022d134398ded165f15e4f5bb42ec69bedd6a515b8b45d1387bc1894edf257830fc452e8f

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                Filesize

                                                15KB

                                                MD5

                                                3aeb9f4bf4bdfb89035146d23d71f128

                                                SHA1

                                                d8a8f60d8f73f6f717d04cedeed448753f45f156

                                                SHA256

                                                2dbf565a0537cf0b39454f931db9f53ed3e31239f14dcd89bb5f1dbaa1e51f48

                                                SHA512

                                                c3953644b4b39c837811015d4a1ab1458a1a7c0ca97ddcf06e70909b31e466661f2e436ea4b23ecfd1415c8362d155a473e3d2915d573a8819d785faa5c34e3d

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\eb9caa56-8caf-42bc-a535-443db13a5a82.tmp

                                                Filesize

                                                9KB

                                                MD5

                                                fe8743b07ee9b7f92c4fdde102bfca79

                                                SHA1

                                                09430834fa05e966ddb919da520d2df29108a595

                                                SHA256

                                                9f7e520c06c2aa3673c166b47008ebd92c708e8e028ccf5c23d29236ba3be1a0

                                                SHA512

                                                0a7272486dd1bc8a21d6c5b4d210119bc10880bac68d439dd866baa91173289c7bea015a05fece5198d8e84799388b3c7bb2f23c4cf031e8173148b96ad16140

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                234KB

                                                MD5

                                                e1679d4e030de11639106f198cd0b2a1

                                                SHA1

                                                341539de965da97faf232a1d079e007e22cfac31

                                                SHA256

                                                28fdf6bf5113963b868ebf7350334608509b604d0a2bfa2e05001542ef0274d5

                                                SHA512

                                                45f207227019bdfcf3aa92019ccb0e142e2e2c7b9d199f8642c50b1ea1c987b68fb738f79930c6600b66318e45672d38f01698a0582f2fdfb7975769b7186e62

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                234KB

                                                MD5

                                                621221716fb0d4b8ba802d5bc0b5d632

                                                SHA1

                                                7a3dd6bef182d3d781a54911661785d472beb4cc

                                                SHA256

                                                3dd14a2574e8d58649fa10517a324ff183c1be05a8af852147f055b9e3c18456

                                                SHA512

                                                8b529da18222ef0ff059145261f0e6d58484b5709049c91c5edce4192c5b05de005cd5ae3722ebe6d9a19caabe75a81d0048f1f3c2736041a3604ab257f6ca37

                                              • C:\Users\Admin\Downloads\download

                                                Filesize

                                                5B

                                                MD5

                                                4842e206e4cfff2954901467ad54169e

                                                SHA1

                                                80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

                                                SHA256

                                                2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

                                                SHA512

                                                ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba