Analysis

  • max time kernel
    162s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 18:55

Errors

Reason
Machine shutdown

General

  • Target

    AsyncClient.exe

  • Size

    52KB

  • MD5

    422b49a2404d8e67c9cd57d46acc97d0

  • SHA1

    89ca4038856c67d12d31750a799aa88b08acfb82

  • SHA256

    b7a9152f897cb11101d370f3b1ef30d411d4e4116a57ef31d340a58952cf4c1c

  • SHA512

    2d9a65aacce93def1829971071b3c02c64555c0e30deca5ff8b12d04202e4b0a5e85cce8c7e61dfad1d966fe027086e7d18e1bf1c23dbe9695f2a8e082fdc77c

  • SSDEEP

    1536:Ou4X9Tswb2vOnZH4fAzb03lKuIvLZQ7dqx:Ou4tTswb2vOnZH4fAb038L+7wx

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

x5sql-62870.portmap.host:62870

Mutex

c2VJpocLoXmn

Attributes
  • delay

    3

  • install

    true

  • install_file

    Defender.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe
    "C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"' & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"'
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3208
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA1FD.tmp.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3900
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:1416
      • C:\Users\Admin\AppData\Roaming\Defender.exe
        "C:\Users\Admin\AppData\Roaming\Defender.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3664
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc4e47cc40,0x7ffc4e47cc4c,0x7ffc4e47cc58
      2⤵
        PID:3052
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1768 /prefetch:2
        2⤵
          PID:2468
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2188,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2260 /prefetch:3
          2⤵
            PID:2036
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:8
            2⤵
              PID:2816
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:1
              2⤵
                PID:4508
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                2⤵
                  PID:3132
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3732,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3708 /prefetch:1
                  2⤵
                    PID:4348
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:8
                    2⤵
                      PID:4860
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4964,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4976 /prefetch:8
                      2⤵
                        PID:864
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4872,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:8
                        2⤵
                          PID:2528
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5376,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:8
                          2⤵
                            PID:2012
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5264,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5124 /prefetch:8
                            2⤵
                              PID:2260
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5396,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5260 /prefetch:8
                              2⤵
                                PID:3564
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4716,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5784 /prefetch:2
                                2⤵
                                  PID:2768
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5556,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5704 /prefetch:1
                                  2⤵
                                    PID:1340
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4732,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5576 /prefetch:1
                                    2⤵
                                      PID:2568
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4712,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3320 /prefetch:1
                                      2⤵
                                        PID:2736
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6044,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6048 /prefetch:8
                                        2⤵
                                          PID:3332
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5516,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3496 /prefetch:8
                                          2⤵
                                            PID:4476
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5352,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5268 /prefetch:8
                                            2⤵
                                              PID:2952
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4976,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5384 /prefetch:8
                                              2⤵
                                                PID:4828
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4636,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:8
                                                2⤵
                                                  PID:3176
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5572,i,8526306484691959151,242365392303095635,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3372 /prefetch:8
                                                  2⤵
                                                    PID:2116
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:1928
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                    1⤵
                                                      PID:5012
                                                    • C:\Windows\System32\rundll32.exe
                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                      1⤵
                                                        PID:720
                                                      • C:\Users\Admin\Downloads\AsyncClient.exe
                                                        "C:\Users\Admin\Downloads\AsyncClient.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3392
                                                      • C:\Windows\system32\taskmgr.exe
                                                        "C:\Windows\system32\taskmgr.exe" /4
                                                        1⤵
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:3024
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                        • Modifies registry class
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:468

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                        Filesize

                                                        64KB

                                                        MD5

                                                        d2fb266b97caff2086bf0fa74eddb6b2

                                                        SHA1

                                                        2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

                                                        SHA256

                                                        b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

                                                        SHA512

                                                        c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

                                                      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                        Filesize

                                                        4B

                                                        MD5

                                                        f49655f856acb8884cc0ace29216f511

                                                        SHA1

                                                        cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                        SHA256

                                                        7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                        SHA512

                                                        599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                        Filesize

                                                        944B

                                                        MD5

                                                        6bd369f7c74a28194c991ed1404da30f

                                                        SHA1

                                                        0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

                                                        SHA256

                                                        878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

                                                        SHA512

                                                        8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                        Filesize

                                                        649B

                                                        MD5

                                                        ef4e3f44f3948bc7104d23880f1bb8aa

                                                        SHA1

                                                        285bb8adedacf5ea44eda22b790977f7c815c0c4

                                                        SHA256

                                                        24134f090386efd432bbd6623eafbf92b285f8a21afb34acb2457fded0d8a765

                                                        SHA512

                                                        8bd1242883865c9681c2e0e07a27de52f7592149da8d735374b5f5c91fa4530586b9b0d2a73b6fe5e0f5bd64ed99a6b8c54956c9f9abdbd648e4fbd9cfc66b8d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        192B

                                                        MD5

                                                        8e8ecca03fa4ca4b06e34f494aa52d5d

                                                        SHA1

                                                        f0d8fb57e7250621627a01e90c64efcbd150729c

                                                        SHA256

                                                        38149ff7e68df65d69ba3b3e90cb1378c566961c258910b4c0e9ba56e0dddb58

                                                        SHA512

                                                        f7367d1bb38b53897725c4d116b9a6b0951e76895aa7c8cc40da0c61d190b83114e16d23ad2179900668c18e41605e972258cb765f2dabc88e8d3b2211c4c9ba

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                                        Filesize

                                                        851B

                                                        MD5

                                                        07ffbe5f24ca348723ff8c6c488abfb8

                                                        SHA1

                                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                        SHA256

                                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                        SHA512

                                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                                        Filesize

                                                        854B

                                                        MD5

                                                        4ec1df2da46182103d2ffc3b92d20ca5

                                                        SHA1

                                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                        SHA256

                                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                        SHA512

                                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        4d8d123bd81a67cc7e87495c4f098fee

                                                        SHA1

                                                        3a09bb9aae85fc1187f7f69c3b12ed1d06552af2

                                                        SHA256

                                                        5b6f57e1e0ca2075512cb9f17bd2ec26f7f3d69e81977f1ec0c66a207321da84

                                                        SHA512

                                                        d0242cfcbbd9e657da598cab6d6f279673717bf7840c7cd7c633e1f51288a569ee8da227257164a45921860b9d142766d540fdad38e3544749e0e31ae003fe4c

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                        Filesize

                                                        690B

                                                        MD5

                                                        eba66f2f158b73de5e0578b99a98d7a4

                                                        SHA1

                                                        f7e7f3f79ce7180c56b5db445f12a967fad8226f

                                                        SHA256

                                                        525c2d735e38f2f123301e39fcce1de3eb092a6156379c50304639aeaefa352f

                                                        SHA512

                                                        9015c00836367e4fe963e7de5d9532c64e02fb276455afff00cb5bd3b2a537bf70c4849f5ed32cce3f69c505c7e4c7d77bf393b20dbaf02240ef08010d163517

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                        Filesize

                                                        356B

                                                        MD5

                                                        2bac70c9c0ecee4a413678de66d5cd0e

                                                        SHA1

                                                        281bab99c718e3f8d38fe412b6b59b907b34abac

                                                        SHA256

                                                        3ce4c6c85c147a2215863f395f6f79c69f3a8793338f82b888109670c2074e40

                                                        SHA512

                                                        48dffb2eddc4886353e63ee3c2b13fbf99a1bc9881cd003f9eb8aec811b9d6fa196e7c91d25c8f8db4abbf1679e5fae013391ee804e592747cb9742592952bad

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        bf11c457afa2fa027731be91319af80b

                                                        SHA1

                                                        a0a3a767caf8a0be9905b6b793edd36f6f985454

                                                        SHA256

                                                        1857e507d7a058366ee18e8773d487756f17c4d40cacd082e3a3e666b9d28809

                                                        SHA512

                                                        617d1f37206af80f3085a0fd9a64048b1aea9c24003faf41894c2602793c180c851882a0585c8e62766ce8dce6d0f2d713646d07e9c90c7c257c9a59b334fca8

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        a71f0872c58dc9a51e1d9a3394f75325

                                                        SHA1

                                                        2f53e70396a410ff27989c1830995e28c3c90c3a

                                                        SHA256

                                                        6b29510e7e7d40097fcb60602b0a068ee448e3916e21712fcedd57d42a0e6326

                                                        SHA512

                                                        89c68729165cf6c7a849df4f1433074e2f640503e8260d82d24a01337b4d834905ec6881d22e9d1c6111b396489814c0c31f28bc6171a8a7a841f3dd41891f3b

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        0481e2568e53cbfef38616aa97f02abb

                                                        SHA1

                                                        1bfa3fe9ad367bc91f79849e14b3c07d32a2a57a

                                                        SHA256

                                                        399fd13ef3e34bf03208574f16350d29fda998c7548b011b7e054bd9435f0d64

                                                        SHA512

                                                        b800e7becbfa00df9d7bfe02aca3c8352c09f0111d2e5cdade2e00d350d53a06a065c8ed5790068aecbc6411285e348fe471159c6a0b09ce435c1b924347a6b9

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        b38303747962e2b3454e69bd3bbe73dd

                                                        SHA1

                                                        d25420effb715e3832dad5036e8f138eb94fa3b9

                                                        SHA256

                                                        dbeea6408626d26d7063facd022cc5f2c923a9355bd734bf59484507a11bebba

                                                        SHA512

                                                        6c6d3a6e99275477f7eabe4bd8d3660dbf114fb4896bb6707ec5a8633fa47ca34ae01f1135f0816f64357199a5edddc7f37e587ba3f393d12d3a39c29c714a6d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        7e0ac7dfeb5e5c4b2810f81c650854be

                                                        SHA1

                                                        5ca048ed96c6e2f54331dd63b446cce43cd1b9d3

                                                        SHA256

                                                        41b78750e25f3bc1683415b724abe22920acc26ca7ce4928367d953023267db0

                                                        SHA512

                                                        c95f8e59b5f0915b33f557ca56f03afaf0f52613fc58b37b9d56a9f2d1980e15534cd3aff305a21e53c5eba328c6fc1c0c7e583379b25e05de740c7b41a8f7db

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        1b29f4cf96b786e83ec8ddb410866de3

                                                        SHA1

                                                        b8f41af4a6018dcc7e5716ec3d1b39995fd2d94a

                                                        SHA256

                                                        60ae2b869bc2026a6e3993e6eac3b6bea9330cdf4092abc2dd68d7323f4413db

                                                        SHA512

                                                        647527e68f49d839e513fcc3b70b3b5e9d34a6534c1442e0d410ac91654fa9bdedb9b13d9e32e19c68a8e43eae7c4fcf64054c84179ce9ba572a61b0a330ebf0

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        fd86abd3495c70bf0b0f888e7eb427d5

                                                        SHA1

                                                        8025b613ca3dd13d42f378896930af8fdd21e7dd

                                                        SHA256

                                                        01e344d573b93c28e91025a5ffddf11abb30e0ff0528a3030b6e00a653ef02c5

                                                        SHA512

                                                        921e33ff4119c58c27361a91a1a308baba6066d9472a58d6a09da6f92098b524893b5fc05bf43fd25c5d680faace3ae70f089cc2f6aaff193e5bdc9c2fc06ad2

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index

                                                        Filesize

                                                        72B

                                                        MD5

                                                        ba094b77da5e3a0b9823ce63ea392a22

                                                        SHA1

                                                        0da290b933d4b027338535f5cf33a4b4be861b2e

                                                        SHA256

                                                        c6621a6b661011061e1af77f8577fe790571c3cc3e9ed01ae9400164749c47a8

                                                        SHA512

                                                        0f6d174e287f01ed57034aa6bc6b10021458d7a2c1557ead7cf95efc757fa5374de0aeaae7328f994658a06d1882ebf848157911d973a1818e6dc3f3d6302fea

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        231KB

                                                        MD5

                                                        238f8433860e02820edb1c47f939e8f4

                                                        SHA1

                                                        d4435fb298f3dba237ba18a2b57e728d80174818

                                                        SHA256

                                                        8bea46e2af827054167c20afdfc51886901b25d49318b0cf41d9c174d21f39a9

                                                        SHA512

                                                        369c6aa1b6dcf867d2c9dd517419e4718e7d02f17b56e20ffc685487f26ffabd5d9588ed6d1b0cbfd20c235694a254df770086ed0f0e9dcbcfa3d60d350a4289

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        231KB

                                                        MD5

                                                        c4c430935828f52c7e9116cd960e2c9d

                                                        SHA1

                                                        e8a8f9a6d6a2e5c0d2e772dce3337a313dce108f

                                                        SHA256

                                                        3f32410c0473beaaa0e1b34aa6b891b8eadf167a6ff669705af9a875484994fe

                                                        SHA512

                                                        7bb3831c50b87093398b91f0b85bcc3c9219e782c579e853fd5a33bda06ed7e2bf421682c32b0594bb18ff55671c788413d5f4805a098cf49f531560bd794c71

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AsyncClient.exe.log

                                                        Filesize

                                                        614B

                                                        MD5

                                                        54920f388010333559bdff225040761d

                                                        SHA1

                                                        040972bf1fc83014f10c45832322c094f883ce30

                                                        SHA256

                                                        9ed5449a36700939987209c7a2974b9cc669b8b22c7c4e7936f35dda0a4dc359

                                                        SHA512

                                                        e17aa5d1328b3bfd3754d15b3c2eded98653d90c7b326f941522e0b3bd6f557880246a6bc69047facb42eb97d2e0ed6c46148dfe95a98669fc4e1d07c21a285c

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir3836_164253639\CRX_INSTALL\_locales\en\messages.json

                                                        Filesize

                                                        711B

                                                        MD5

                                                        558659936250e03cc14b60ebf648aa09

                                                        SHA1

                                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                        SHA256

                                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                        SHA512

                                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir3836_164253639\d268df6a-0c1a-4dbc-9285-a2fa8542c08d.tmp

                                                        Filesize

                                                        150KB

                                                        MD5

                                                        14937b985303ecce4196154a24fc369a

                                                        SHA1

                                                        ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                                        SHA256

                                                        71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                                        SHA512

                                                        1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpA1FD.tmp.bat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        e9f6308ce224a0a2421bdb9b609d1a1a

                                                        SHA1

                                                        67f3e741d7aca837ad22bf6bed25bcd92587b5e9

                                                        SHA256

                                                        9943fc2288de7acc25dc28cde659bc97611aacc7de69cae08a0a835d84dd91a4

                                                        SHA512

                                                        bc347995c8823b7b378550968eff0e9366acbad1f64c6e70c911bf01732e3b181931a839f7cd77e517bcfa15bb52d2de068f4784141c161bdd9eac8840d79015

                                                      • C:\Users\Admin\AppData\Roaming\Defender.exe

                                                        Filesize

                                                        52KB

                                                        MD5

                                                        422b49a2404d8e67c9cd57d46acc97d0

                                                        SHA1

                                                        89ca4038856c67d12d31750a799aa88b08acfb82

                                                        SHA256

                                                        b7a9152f897cb11101d370f3b1ef30d411d4e4116a57ef31d340a58952cf4c1c

                                                        SHA512

                                                        2d9a65aacce93def1829971071b3c02c64555c0e30deca5ff8b12d04202e4b0a5e85cce8c7e61dfad1d966fe027086e7d18e1bf1c23dbe9695f2a8e082fdc77c

                                                      • memory/1324-0-0x00000000749AE000-0x00000000749AF000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1324-9-0x00000000749A0000-0x0000000075150000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/1324-4-0x0000000005730000-0x00000000057CC000-memory.dmp

                                                        Filesize

                                                        624KB

                                                      • memory/1324-3-0x00000000052B0000-0x0000000005316000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/1324-2-0x00000000749A0000-0x0000000075150000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/1324-1-0x0000000000900000-0x0000000000912000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/2968-15-0x00000000748F0000-0x00000000750A0000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/2968-14-0x00000000748F0000-0x00000000750A0000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/3024-567-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-575-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-573-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-574-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-565-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-576-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-577-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-572-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3024-566-0x000001B968000000-0x000001B968001000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-25-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-26-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-27-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-28-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-16-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-18-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-17-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-22-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-23-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3664-24-0x000001ED3BC10000-0x000001ED3BC11000-memory.dmp

                                                        Filesize

                                                        4KB