Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2024, 06:59
Behavioral task
behavioral1
Sample
source_prepared.pyc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
source_prepared.pyc
-
Size
172KB
-
MD5
e71af41e6590f3fbd27659b6353b6842
-
SHA1
d35b429dd110c77c9cf45427d04ecbef41b8c9a5
-
SHA256
8bf0290c7289b68b3a02a29d30d287c151e33025fcea96e531e4f0387b74305c
-
SHA512
7e59300ed2fe89c25c7dbebd0d0504bd9abee0a7ccf29dcdb3ab72ae2930a52529e6ada670229864394756ec0eae4ca8ef76f249a97b957f922f94fde34ff09f
-
SSDEEP
3072:nFfBHWC0aOO/2A1w17roxPZTerUScdQQV+yXIvdXzbxsTxw:nyC0aOO/2AiroSj8Sywse
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133784604125576668" chrome.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file\shell\open OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\.pyc\ = "pyc_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\.pyc OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\pyc_auto_file OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 212 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3624 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe 3624 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 212 3624 OpenWith.exe 97 PID 3624 wrote to memory of 212 3624 OpenWith.exe 97 PID 4520 wrote to memory of 2520 4520 chrome.exe 106 PID 4520 wrote to memory of 2520 4520 chrome.exe 106 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 4744 4520 chrome.exe 107 PID 4520 wrote to memory of 3312 4520 chrome.exe 108 PID 4520 wrote to memory of 3312 4520 chrome.exe 108 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109 PID 4520 wrote to memory of 4608 4520 chrome.exe 109
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc1⤵
- Modifies registry class
PID:4080
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xa4,0x124,0x7ffcc7c9cc40,0x7ffcc7c9cc4c,0x7ffcc7c9cc582⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3420,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4076,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4864,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5072,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4528,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5060,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:22⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5108,i,9139632459495577966,9837976242950840771,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57e270c3fbc5c99eccf289e4eb74eefcd
SHA1360333e12ca45a82a3ddb045f6e2082489bd654d
SHA2564751638dbd26da3f7ebc8b7e1c4e21c3c5649eacd85929bff3c68aec4eb4de21
SHA5123790bdcf613d4c1cfeade6b427179d73896f025846483a5f2e8c6b5555ee505cc4738c152e5a6f96aeaf040ceb21f59b685d2c463dbb352f42ffb97ec5988c97
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
216B
MD53057bc18e60bf7f70a0a1933ddc2d6b9
SHA1ebdf2af4dd3f14a24bb3a68bbd32bc8188d7019b
SHA256995b8eafe61774e63276ebf031bc4b9d8c003038f5eaf64371ecf053c0861d21
SHA5121f3ec3f40c5dc7dae047be86fa0c7a98a4a93f072cc1cd38628f9fed41cb1acc33e8bb42e0ad26bfb6de47a26320e705d659fe19cb05c57358b1abaf335e4d4f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD553ff3b21cfb50c2d2ae43b6281c66463
SHA1e16cff506b39d49fc98c25fc14e126d4e5905bfe
SHA25610ff8a076b1fc1a5cec81055fe3295692427c18f8af5ccd68f75256d4948b689
SHA5124a55d64776db43f98bce2dcd7886c83e69ab3ca8a56300ba78d82983bbfe3b6128a1afcb288937c3432d68a65f986c7373c4605f19403542a274ae2753b7ac2b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD59a613468d8775fc53e79c02b7217fd5d
SHA1b839032b5334659dc5a1f99c8a43f4764f904681
SHA256995513b316de23ada978f494b5e808efed3827a5ff83e4491bd2e30de3763669
SHA512f55c42f74fa1d15b70ec8edd42d13f128c16c46a10f4ffbaa9ca1b786845a74d2e911a689c8537e4326c946f893e5fd968539904ffdc79e288cabf8121e267e0
-
Filesize
9KB
MD5f009ed277258aa9a288a8e34df5d1c56
SHA19702192a86f1087437a216f475f19657a8732e52
SHA2568fc337ec5e63904dc3ddb5539556fcd6f56e557cea7a13695d1ccf42a5b06ae4
SHA512f73037c67427e3b240b766c70303d94842d5b2fedb1fd25b7dc0fe43ed916aa93684bdea9c834083eb1a053a48c7f75b741ed4fbd78f930023bb83b716adca32
-
Filesize
9KB
MD50c1714187d7bbfcdb5acc4e031173af7
SHA1da16d8bbe70a210673e7a387d5e950b18be54410
SHA256cd2f0e801c5e005cf2510ce0f560856101f15d833a1f51211dc566ad8febf425
SHA512eda0e430c859750edf9ecb4e8241c7a46fa0e6098d286ccb63633bb1c2f15bb4a93d798de6dcb73aa3457db20856b94c47ffaa9124ce6946564857315107285e
-
Filesize
15KB
MD515ec859f7308e864803ab79b0fe7f66d
SHA16461973b37d81f7befab4b2c46c262892626f1e2
SHA256d86b2371a339e88d0a6c56f4ddcb96df3c5d7fe36009fee0fb34c655f3c7c2ab
SHA51291b137cb21a6764e4d9d4097b476a2029f39c21d78342e54cb5e39dc5da1e4ba7accecbe5ed0bea26dc7cfb6d09e71a4f0b49eeaa5029d19a307215cbd35af70
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c414bfb26ecc2945a53036761a09be70
SHA1bb239d5ab777ad141ff2182ca8e01bda05e4c661
SHA256a208edae29ea1ed527a00f8ba91594c13c44cef7e3eee613ae216568156fb5cd
SHA512bc202e3abd839f85573434c122aa7b8949b84d5b62f505855cc4befbd055746f6d5140afde468dcfd62913924cf99dfba9e544ada7af7e7d3da023af81afecd9
-
Filesize
231KB
MD5d6a953ed467f0f2c326d41b7008f00d1
SHA1a485cef12d400d970f3de43b05f576d24de62579
SHA256ef4497a5a9dde1ff92c604eb3aebb1d21d7145add0231109fa2618cf6b86d289
SHA5120da687088c01645bb2d8c5c11a9e2f3574a9c9646556e0c33b0d9584e84e0ec02d666e33cbcaabcba7dc1c814bc9af1dbc314c7941e710a8e52a2c2852cfdc96
-
Filesize
231KB
MD586ac0f47054d909986d0332908bbef90
SHA17f4e174ceda20e6949c2c79155b5b13948e8d618
SHA256680652dcf5cc67c47d658fc8911ab9f179bfb93a275695e3031db1d2fe6d5d85
SHA51255845330f7b7f8c096f8d92727bfce358603145c702eca39a3aa39b90866364060fa24de6a6abe3a99eee35e154fe14a813f731c84af05fa9051ff6eba82d1d0
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4520_1082639997\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4520_1082639997\e492ec03-6894-4e9d-977b-91ad2a9a117c.tmp
Filesize135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4