Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
ass.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ass.vbs
Resource
win10v2004-20240412-en
General
-
Target
ass.vbs
-
Size
1KB
-
MD5
07edb399c2dc4dfb266a482cc04ab171
-
SHA1
fcafc22aab69c7e8ecccaf8a3f9c3afbe7e0166a
-
SHA256
97f4edf1775eed410448a7a45b79e0f191b7609bfedb3979c0005e1ada87a96d
-
SHA512
349b8c24f0ef75c8a74286c5d77a75b3e8eb5d6a2a25160d5ad547a2c3a5878e29ea0d4c8d17ca8157bd812d088989dea323cb305e8a1ed6b6bb48c3ae53d0a0
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133585208615043771" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2177723727-746291240-1644359950-1000\{D3A98552-817B-4F28-B7FA-C56604AF5B13} chrome.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4864 chrome.exe 4864 chrome.exe 2816 chrome.exe 2816 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: 33 3212 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3212 AUDIODG.EXE Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe Token: SeShutdownPrivilege 4864 chrome.exe Token: SeCreatePagefilePrivilege 4864 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe 4864 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WScript.exechrome.exedescription pid process target process PID 532 wrote to memory of 2620 532 WScript.exe reg.exe PID 532 wrote to memory of 2620 532 WScript.exe reg.exe PID 532 wrote to memory of 3800 532 WScript.exe reg.exe PID 532 wrote to memory of 3800 532 WScript.exe reg.exe PID 532 wrote to memory of 4864 532 WScript.exe chrome.exe PID 532 wrote to memory of 4864 532 WScript.exe chrome.exe PID 4864 wrote to memory of 4912 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 4912 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 5116 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 2776 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 2776 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe PID 4864 wrote to memory of 1232 4864 chrome.exe chrome.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ass.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:2620 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f2⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:3800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/watch?v=BbeeuzU5Qc8&ab_channel=MetroGirlzStation2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bfd6ab58,0x7ff9bfd6ab68,0x7ff9bfd6ab783⤵PID:4912
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:23⤵PID:5116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:83⤵PID:2776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:83⤵PID:1232
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:13⤵PID:2536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:13⤵PID:4940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4316 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:13⤵PID:2384
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3344 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:13⤵PID:1896
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4640 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:83⤵PID:2420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:83⤵
- Modifies registry class
PID:3112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:83⤵PID:5180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:83⤵PID:5192
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:83⤵PID:5288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1780,i,17709789758111791304,7743050796015237693,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4408
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007Filesize
46KB
MD5fc61620b49e35cb359b1f0cf208f6a87
SHA154d6ad78961f356ae02cf52144e2baed96f97485
SHA25665cf192b867dddedcb10ee782d29d0989c00395fc6ff6a0923e23756ab8e0eba
SHA51217ae00dcb2a9293e33007c623ebb462ba4961e345255733b03b1dcd4bbecf34db280e77b57813e5b5c42467ec0a7c7af1b40fb038650fe526be380f4624dea17
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
504B
MD5f3d1609442623e8093f0327507ef24d7
SHA1804fba41c9d98507cdcb22e9be12e3c215051881
SHA256fc740d56fcb62a2ac0112c0a247f8c05507108c8d57bf695465a48df03280a64
SHA512d96dc27e7abba49b3f85cf0050c363b4dc1049e1248ff40f28d7b27f4c2c06be431ce04cac7e76281f09e3f7d3197c92688e0b0002cc777fbd0b652d0bf5e035
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD52a52bc42eb808cda91b0ac8a0fc1f519
SHA1154680d6f6b2a1b92806ecdbb0f0619ea8e45ba6
SHA2561d27e0a1b6a6e1f5be09fb6f26c62023c03f9a105e78661dd46ae027df474877
SHA512604bb2b98c51e8546501d6b02784cf3e4725b1014d794048b8f69ab32ad454627bbc145fdb294e929a639f3e0b35cf29cc3508cdd3ea023ba73418bcb860c9b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD504035e5e1c789a18647a7d9969d71209
SHA10fbe51a6341f1368a0678e39587518f5c4212204
SHA256a6490e20aa34b4e2ab8183c9d3bb78e07e1ec409cb2dfcef51a4ed0d37cd4634
SHA512171dc796fd74c4d6e4fa8b7ca5beb48f68d06da68568b9e35f96145ed4a9a5e9fd669be1f192f2e8751fc45b94df0d532ca2a2edd2d747dce613f493221e39be
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5259eb96348c3ae8e0009491bbef893cc
SHA16d24abfeb3cdc1586082feb8eb568038022b5f48
SHA25683aab301f2422b30e5be7fc91f282423b2c8d73534bdd93aa982ca82bb485dd8
SHA5129abfcd3d1b74d459b0fb504de068cd0c386d837fd13b1d0b3dc37248b4c50dae5e07d6dc0ea6f6903caf35a49a94d9f947c3a60f0885f390da250474cd97f751
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5ca6335c8bf12f791294fcd2f6dacb2bb
SHA100f078012e87a4df38106beb5cc34e39bc720088
SHA256253873f4580de5841c53b6428b0dbbe3465a72fe390a9d445bf88d1b0e2cbb07
SHA5126fb020c848a8210cfdb752f5866cb0ac6316a7eebaace0438990adee45da04d057013695fc405575ccd146cf7b3249ff7379635b85da83872d9219d763e6efd7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5cc1ab41696793b798b63e096be432366
SHA1cefa9d82310d53fe9c11138c96ef5b5b4f5f751a
SHA25633b684656327b35f99a0c959c40d365ee40d44bb5c07c33d627a270a0b597dcf
SHA51240ba68756b25bb656f8a8d8eabc6ea4d7b35028a4613d197001d74140a9555339c9a479bad9962cf781606c473440f3bf60e5a07fc0e266585f75928afff48f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5a82e1119523c04ecd6eff5f6e6a4c169
SHA175ef469784e7a05f54682b6915294883ae729036
SHA2568945ebc0374a1622c2c2cca00cd9011af06169850ad970979ab80dbbc9e0422b
SHA5126cf989c45025a6bf471187e71d3219b66fc030e4c0c6dfdf3e26ce25f675a899b222e2510c40a3b71e2a74271c76f45230aba0817ab4938d13dfa87ccabce706
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\68635f4f-f6f0-4727-896a-7fcf87a55242\index-dir\the-real-indexFilesize
624B
MD51410a302e98278600bd6afddf872e9ec
SHA127edd96b9fa1ad997e4abbc1083996056e8af836
SHA256da1db78da94cc3289088eb6b473cba878abcf7ff996a44ccd1b47ebed482ca2f
SHA512aebca8616aa4a5f511c8bc50597ec7cac084d3417af1e5778f2a13998aeae19d844cb107eff160ca066095053ca08706d7d178abfd2706557d6d1b126a412c66
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\68635f4f-f6f0-4727-896a-7fcf87a55242\index-dir\the-real-index~RFe57a086.TMPFilesize
48B
MD5fecac046be0fbd464cafac1c900e871e
SHA14a690dfef7b28635824f3e95bfcb7425db51867e
SHA25650f9d656c1915997a4140737ea5db311418665b66443d2ebe067f3b83c40a367
SHA512bff1af2e43ae8c9542e2e3257a15fea7439ac34afdcd940092d1c83ffa522205581f932f2dc46580cdeeec2f2aaf5b27ac6c39c9a655a20a09c2b6e457efad2a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\ae1ab2bd-b3da-4630-a935-623386515b3a\index-dir\the-real-indexFilesize
2KB
MD50e6e0c089f2c066c7e2eebd39a52f3f1
SHA1e307b77fbf869d12bde890e8792f11c8ae362bfd
SHA256f453ba21b7f6a5f93fc5659dca5d26cac9ec5f6cb440db9aa56d260c716718e8
SHA512bff6eac497196999e708fc9ef3ea0aa8a7f93eaa64e6aac9cbe1a732a00b4ddac79f9c99594bae8dc7c21d7d27fd86e3393f0887037de9ee6c7718c3d87d43bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\ae1ab2bd-b3da-4630-a935-623386515b3a\index-dir\the-real-index~RFe579dc6.TMPFilesize
48B
MD5dd975702e5ea4cf9882d9ac40c731c0c
SHA1c7b772c4ee3cdbac53de4936ef599ce1f29fffe0
SHA2566efa3df6813f6e1ee245a35b62a3aea973938e98b3a53bb0d05c404c835c5519
SHA51278071d946e74adf2a0fd9a47675c3b7b63fae87079fd4467c673d4907cb330e9cc287e5088a1dbfcc025d4750d32527eaa010a687ce0eafd719d2bceb8e490af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
176B
MD59e849873e6efbfb6b597b8e56d377cbb
SHA1af65824f2a717c61d6050a34d5db4c0563f7add9
SHA25665967864290fc31fb5e7da468a928abd3d851b998cb4d4d4d859bf0a0e78b743
SHA512a3d584abe086e5f5ac65b746a5373e26522b79cb798d07160cd0f875abab8a4984cc4ef7994f7c9ce4dc012e880b1dd172077fcbe1668eaffc11cf317116c051
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
112B
MD573979d5a28dd6ab8f1c51c5fc4869bce
SHA14bb8ac4cb22e1fe391c2937c1236c2a81bc9b18f
SHA2566746fca706d8719fb8247f863862f6dd719f08251828e593beacb4681b7b0ca6
SHA5120f632a45cea7387ff9563ee20f810b1cb6b3f10e316b92eb2408afa4eb36869e404e33245df80ec4a166a4b72eb4e6f6b2a9fee139aa709c9904fe4f02bd4adf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
185B
MD52b789056f9d574ff698525a73fbf8528
SHA16cee8b20293fbc54761a1a03dc52ead2fedf1738
SHA256ebb5806217ba334b0ca41d8220c8a258e7c71c9bdea3e3b5d8fa45f5ac0a1b8b
SHA5126ddaabd2f0544c5be6c6def27140a070a486bc29ff007dc85e506be3ea5e97e61322772761f2ba17b71b9283e92e2fa60525f7de01fa6c354efa8d35f3afa409
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
183B
MD55b08bc17039552388224f19d2c2d809f
SHA1528c9ba160d2ba33cc1d66bb9a5b26cac94eeff4
SHA256a85a27c58ed2d29c6d283a68592932c5ac2a6a509e5fce59a52b6c56cdc5385f
SHA51298772793ccb4d6d56f110a4060bda7dc6479fa37c1fa39437859353bfa564c4784e9430ac1cf19af23bd03556ee03ea96cc497431318317de9234a1643fafa1a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe573ff7.TMPFilesize
119B
MD5a98145ba28c42199c0c9c99def53ddd2
SHA15fbf2291582613975c93ca4e6dbb939640d76332
SHA256f00e4a62ed55514c3cd9ad08a95384ab422fcbb31ef08c5b9790b8846d3e09ca
SHA512f07efb23a132851b5716487dd2df1ee6959821b55a8de243ce3dc3e75a1f0871184ad14b9ffb7c2b1d2c5b74a0141de14b01c1586e34edea63abb539e5b33eda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
96B
MD548391302d51939f5bb8e945162ba2de8
SHA1eeab4edf1a61e70c02796aa8d401ea72a39b34a6
SHA2567e6d0d4ac3c94ac8b41684f610b21b707568421788cdb5061751bec7b964d106
SHA51267491614d249ca802c35e839fcf20bb74a67083934bcd49e27d1e3d245fac39ce2656e7310c231ceada0a6e8c2d1844340dc1c0e8412e377b48183c561dda336
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579431.TMPFilesize
48B
MD545505083da4d7c8e1cf1b9dd3b055f94
SHA1bcf17d9928917e7f30d725c153cffabe194c1586
SHA256cefb386cb9e448250eafd6d8532e89cf8bdf3de5a613d2b3dcd2fabd8140abaa
SHA5120e9a77672cca832fa0fb27789f393cd48b50d4a77c20d91734bfb5162a10f8db8937ce9629324964f9b1336bbc5a4c242619f8fd7a65b9045b6eca7b9708a3dd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\32.pngFilesize
673B
MD588dfa96f9642297ff88909ca4e0f7330
SHA1ed8655bf13e6cc49395da4c760168c4148454b7c
SHA2565e5eb084cf1a650b2e122f53d36f85b67ce6e39069e399a46a25dbd34f7be286
SHA512cc2deedfeacf9f26e48cbb26e222a219905888b95634c7d91d6393b84248305ce8940816bdb3bff0f5384b9dad90f4e3905b229e06ce4b1023a1439293b240dd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir4864_1249221806\Shortcuts Menu Icons\Monochrome\0\512.pngFilesize
2KB
MD512a429f9782bcff446dc1089b68d44ee
SHA1e41e5a1a4f2950a7f2da8be77ca26a66da7093b9
SHA256e1d7407b07c40b5436d78db1077a16fbf75d49e32f3cbd01187b5eaaa10f1e37
SHA5121da99c5278a589972a1d711d694890f4fd4ec4e56f83781ab9dee91ba99530a7f90d969588fa24dce24b094a28bdecbea80328cee862031a8b289f3e4f38ce7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir4864_1249221806\Shortcuts Menu Icons\Monochrome\1\512.pngFilesize
10KB
MD57f57c509f12aaae2c269646db7fde6e8
SHA1969d8c0e3d9140f843f36ccf2974b112ad7afc07
SHA2561d5c9f67fe93f9fcc1a1b61ebc35bda8f98f1261e5005ae37af71f42aab1d90f
SHA5123503a0f4939bed9e1fd5e086b17d6de1063220dffdab2d2373aa9582a2454a9d8f18c1be74442f4e597bdba796d2d69220bd9e6be632a15367225b804187ea18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir4864_2075722701\Icons Monochrome\16.pngFilesize
216B
MD5a4fd4f5953721f7f3a5b4bfd58922efe
SHA1f3abed41d764efbd26bacf84c42bd8098a14c5cb
SHA256c659d57841bb33d63f7b1334200548f207340d95e8e2ae25aac7a798a08071a3
SHA5127fcc1ca4d6d97335e76faa65b7cfb381fb722210041bdcd3b31b0f94e15dc226eec4639547af86ae71f311f52a956dc83294c2d23f345e63b5e45e25956b2691
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD5a1a2c78afc249e92e38e02ebbeb24c4d
SHA1e7bec9c0d16422e17afeb051d2bcf1d9c4a7b97a
SHA2563119ed0c57356b21c2a5c25393861cb514f780f1eec9e84541a6d290d9c04a6c
SHA51203c31160b6bc520be061b7e18dfde30fde7c54310d2216dbfd45acfa09212acb8c33c13bc06f712c342cbde9c01bf7e3b43f92a11b0dd98c85bd11d8fb1411f9
-
\??\pipe\crashpad_4864_SNKDHFCHBBYXVDZGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e