Analysis
-
max time kernel
58s -
max time network
64s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-01-2025 20:43
Static task
static1
General
-
Target
50$ Gift - [steamcommunity.comgiftr.txt
-
Size
245B
-
MD5
09137aceb525ce1904f4f9acebb05974
-
SHA1
8bc63781f827387e6317b39140671a52d0afd174
-
SHA256
08ff9fab62e25b30257e76f7b03de5e3bbfd9fa1b55ff9ec17b5ac156d38468a
-
SHA512
a63aa0555b6194d1a0a5c30783f02d202dd7c9373aee045501d098b246d27c25a108d04284de933493c1d714d3aaff1d04677f091f3880a70d44d4f41ce0c0e6
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133816202701932280" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe Token: SeShutdownPrivilege 1772 chrome.exe Token: SeCreatePagefilePrivilege 1772 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe 1772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 572 wrote to memory of 872 572 cmd.exe 78 PID 572 wrote to memory of 872 572 cmd.exe 78 PID 1772 wrote to memory of 4464 1772 chrome.exe 82 PID 1772 wrote to memory of 4464 1772 chrome.exe 82 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 1640 1772 chrome.exe 83 PID 1772 wrote to memory of 3516 1772 chrome.exe 84 PID 1772 wrote to memory of 3516 1772 chrome.exe 84 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85 PID 1772 wrote to memory of 4652 1772 chrome.exe 85
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\50$ Gift - [steamcommunity.comgiftr.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\50$ Gift - [steamcommunity.comgiftr.txt2⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9ddfcc40,0x7ffa9ddfcc4c,0x7ffa9ddfcc582⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:32⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3084,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4744,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3352,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5052,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:82⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3348,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3472 /prefetch:82⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3392 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3208,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3232,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3556 /prefetch:22⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4560,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4480,i,17380346253306045049,12434995882978931315,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f3dcbb0a4e55b96abff1adae7c3c7c9b
SHA17419ce0944bc95c008ba67fd0049cc5d95193b19
SHA256a58f27d6610f1ae82705e2ce13d6f15963740f515a5eb0f1baf8ce0a68d45bd4
SHA5126d1d8705a8edb3459249920063816492d31f640c32d819a83ae795a24c17f6471a542e24319b31e80e3f4f3db51b3c448b51901c6142b23494e8c5fece4bc05a
-
Filesize
720B
MD5075e2a7841ada51cf334c300abd62644
SHA1db9ad110c502c314e6e8d01daad2d19d3922d08f
SHA25628ecb1a3fe6e0aef73d070f725738043d195b069ef4f44c39dff1135d160ca3d
SHA51273384b766b94be275dbcfcf8e55d45765014c3326430ddbeb321b9b1b649ee7a0dd70f3453ac82a39ed9c5ca02ed08eaf99e3ea7bf37d25be4d09f6f5c5f4646
-
Filesize
1KB
MD5060dba3629c7ce619e6aa353b8e6596d
SHA1c878252076ef4ce72413cd19f8d62ecddb8b48da
SHA256630c72718c9ad1c01fa69c2a8477af414e3800c0735088787c0eaf6869299389
SHA512f9265dd4f3efdc961e4442e2cb3de35e767e1c40e1dba49bad7c00442486d8e8716152f3c81312f3a64d31370e715d21cfe19f8b835711b9bddfb29031682b8c
-
Filesize
264KB
MD566190d757084c88b68330c807f65f767
SHA15168c0cbd651b54232bb75276a2708777e556f8c
SHA2567837b00d72cb5db2a340954712bf582dc87fb207a62bfbcd2e164415e250a981
SHA5127e9849b436f4c06ecd2b7465e0bcf40b9d0bd0e02d4d3bfb1cd564b0baed32f03eebaabd50b46f96b640731e8d900bc1b10c7928b41bda774d61eb37dfe40d45
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
4KB
MD56ed18e06da7d5b1103521ad398ddb4f2
SHA1d8e80b37b3af094b79ff301e426dc7028ecc45af
SHA2569ee1bdaafdbd7c717ffff9855d9bca97b4dd4e4d37b6d599fccc090e5d488949
SHA512f97da39111466e64b53cddb215db046dd7e629f84ed920fb61ce7cb4f4631f75e26ca9285d4cfea6b00d436f9b7e6f9ffcba84b81490d1d99c91b81a2e2d7007
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD507a6cf951fd8b10a9080bcfa0cd3c813
SHA1e138e3dfb69f0144447cd6d58218fc157de39a08
SHA2565d8333b2d232dffd6a85543b7f2d28f3b20cda8b66c70feea08136e3836ca421
SHA51208d988109a2f63dd69ccb56eede93aec336d3b086ce654b2083ef54f12f4d7414f06d71c70b01109134b7a4e59221ebb66693a28e0bbb12cabf59f5afbf94107
-
Filesize
356B
MD54d8c65128f4ee722faeba2468f8f517e
SHA18826f5c3b6040e27f90f0b400a160e0ae6e343cb
SHA2563e7edd4ee0140c78ccdbedc075e1e470f02cbed636d1a836c82ab3eb8bbb90e3
SHA5124d3a992a7060fe7e36cbe062b2e6824d965c467bc0c69426da668c9a9fe9bfb405b21b7aea02c241a43ebe21b4b0012158a91d7f72dc81bc9434f71d830de19f
-
Filesize
1KB
MD593c50ddb9c19860dbba7f7c29b0e5f3f
SHA18cfdff436438bfe32e27409c2945f20742079664
SHA2561d15dec1313ea55ed369a2074976025e9a55e50875d701fbcf966569d8a11307
SHA51229e2261c1cc98f9b712941c3b741f495123a4064d1aae11a54995c6b033749d9732ff959c28d6fbbf4ebae5a4d67641b8433bd4aa3d214ba42291b83cb3cf640
-
Filesize
9KB
MD535a9000ce126baf200e6c30a6b6f1105
SHA1b5bc5653234d4eb1f047beaca294688172a47dc6
SHA256f3757310bfa5d1024a80f426ca33d046432faa505e2fb7098f670a9de79e58ea
SHA512d38787daf814dc8344394818e7cbc9fc97c532a45f34c22d8bff6e5ab0fa4fc691ef2f536a015877350ca280a860b95b0a8418f998bc679a15b4ac9d30154277
-
Filesize
9KB
MD5d240ebdd32654d614e172410f9b5b0fd
SHA18145afa0360d6b51136e98c84ab408228f9f77b3
SHA25613a19fd1b1e2ec6eafa659afa128fd2601930e4515d70de5527ba7ab63eb9d15
SHA512eda0358af365629da62a3ce0bd5fd97c981538e88a19d7177bb9f0d7ae8ed748703f6c4c152fd3c029986be5d13c8425ef7b0f50c4602440dcb880c1b647f04a
-
Filesize
9KB
MD5e1d462e609d468b4ef9281cedca510ed
SHA1d105e3d6e42b2823bc06b4b219cbc587adf98534
SHA256cf70bf8fb35694bb499723b57d6e3f4c2e4d126d6dcb15ca77d785e5076af7f2
SHA51281e661f28d6d55b38f9d3aaee7d553d8eaab1fb379a0e46b37f198ea0c268b99d44bbc96420efe18ee3e7d0e5423a508762b32e02fcf10ffe6125b64d4526d73
-
Filesize
15KB
MD5cb82050ee312f88e4464d13b300a349d
SHA129ec07bb2c728a52c5a346a369d5bacd79769e15
SHA256be6348856994df187dcd97b062eb08edb7d690cb4be31023933161fcc7dab9df
SHA512331c189d7274115fd7ed382878ee83a4359fa3cdfe4a2286402c6a9f4daba5f47af769bc5d1df4021b8b497faf855476daf275333d4cf7eee07d581c19761d4f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5521dd88fb21346bc32845459dddea477
SHA1891e55a09794dc3316b7eb2da6aad7aa5c7277cd
SHA25644dbe3bb2e866e8b4c510550d563bb14dbf86fa03aa030129dd9241924dd436a
SHA512941e6fcb38f73962a6c6c4ad0f794a1517099b64ae260c753e7ba0f7d7b2919fb659425c155726cafd2df74e2155d1ae5ac41164d97551e84f06b7beeccf3e51
-
Filesize
230KB
MD57fee814012208f76fff8dd7136352775
SHA1eba9a582f4798e27073ce9c98fc4f24d8bb4775c
SHA256cfd93600c4453da915fbf27ab09c55ac313b7fd8f1838c0c3d110d396433403c
SHA512ddcd6d85288011e65cd70fd1036ac45658c07afcc0da7cf79cbe6d794452cc3261d2f41a343f1c377a3bcb07e6f8148051e39eb99c8a92b541b531faa49a3081
-
Filesize
230KB
MD5e74201f251dfa7b203101c23171de70a
SHA18bd334a0d828558255a6dd423aeb0247072c016d
SHA2565bc9d383c8518926738cfed7ea2d2a88a9bc34a1c76359b7ed3d6555ecb959d4
SHA512bf31f8511367749d1347871e8f6e2005cf309a04418cb8c12b842acb489709aa3570b2078b104e5dbf3ebe052861f33f7351ba64990a0a12629f0e4bc7cf516a
-
Filesize
230KB
MD5789d11d475dc442c321c37a3064502d8
SHA1280f15c1306a664d933bfffa64ad18bbe53dec44
SHA25687890b3146e03e1367669c9f4b20f78385771a90b8405663f7363ff3c9076119
SHA5128876452e75aa08de5eb061f059cefe181ab74073eb56e9987a8ee6aeb6e5012c8b87c11cb8643adf0b059ab584374c9f71fa3586adcb1cdea769f9b718626618
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727