Resubmissions
13-06-2024 22:17
240613-17q76sseje 113-06-2024 22:14
240613-15yt8swdnr 113-06-2024 13:43
240613-q1mw3a1elb 3Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
wope.js
Resource
win10v2004-20240611-en
General
-
Target
wope.js
-
Size
50KB
-
MD5
60b57c920f143c45518160f24b1ca469
-
SHA1
c02784401d4e947461706a781ff031234d1dc9e3
-
SHA256
26c2d7995785b3b22b7bce6586016a990fa5e0b9bcc2f2eb7106515f15a1fc39
-
SHA512
9cfd3cc3c8c612172e5ea0381613d5844b6d46453947c67e93dd5d037f4222452698b15047c6b5a7ae349ef52d31766a171b93308638f74978cf69c91ea0098f
-
SSDEEP
1536:10UxT3dWkdcea+mmY3lwia+3fVVw6dS4Xg911:mUxTkXWiB3fVVwn4Xg911
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627598736164132" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3304 chrome.exe 3304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid process 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe Token: SeShutdownPrivilege 3304 chrome.exe Token: SeCreatePagefilePrivilege 3304 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe 3304 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3304 wrote to memory of 2500 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 2500 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 3632 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 1472 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 1472 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe PID 3304 wrote to memory of 396 3304 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\wope.js1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6fadab58,0x7fff6fadab68,0x7fff6fadab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2064 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3576 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4304 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4608 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4812 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4804 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3256 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3088 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4448 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2428 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4432 --field-trial-handle=1892,i,9565880274968519239,16928918235226956059,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000024Filesize
64KB
MD592356d0513ca1b8d064a32ed5c03f331
SHA19d115a0eef9a38663c9df6c8f3fae605edb37114
SHA2560033a94154e5b25943ce930a90d066f29c49e174e1feaf241d56c1be3514514a
SHA512631d8da4b0df3143a2910ea82355718fb8c926600b3bdabaf19953f5209ec26df7710bb5cb64d420a40a635f93fdc90ae7c9e8b00f80bbeae4eaa9a620526013
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
72B
MD5366d18b3e7981004cee4560806048f7d
SHA1c11864f30483614671d1045ced4e0b645f804fbf
SHA2565c5c73c1c98c965dd99fa511db88260288469bde1c78deadaf0a2e54aba973ac
SHA512e1cce945d749e276e2e62ceae2645a640de17f73a90cf58d54bf9f90733f69eb12750b6a7d0472248b97144cd30a6a56fcde098e530da0c805789a80ec2469ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD56e16d1c45c0512e9bd46050d93783b07
SHA195158cdd684a97bbc577ed1ea3b2e975ccc2dc34
SHA256c74de2fb0f7143dafa9b02a9adf8884385dc04b754046f0f2b7b98ea193b6c6a
SHA5120fb5e3a1b7f81ede4caa398326076a7f69bc025faa7f7e2d9dd24db260852625580fdaf7268d0f21894231673d5a5358c9c2f68762f642358c907da3fd1b68f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD59ab1cb0285f59ffb5f5441049d40fd06
SHA1e48ae85224a1f9271f26e016b254037c12f5beb2
SHA2560eae7ef6946f1949464679664f3d36ef0992c29e93ec92f32999c72e84fd5bcf
SHA51298d583d83a48c4c3df093f4440b88463f012777fed017c318489a1a54db66b04f17646131581b1c2dd8f2615dbaa68d55b7388a5fa262e99481405edffc651c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD5b6ed53755d033ec17aadd851f4ff00fd
SHA1ada680aadd94db0c6ea126c5200c30bdf91fdc6f
SHA256a40fe0e9b5f142ad2bb2dfb828941a13ecf140fac5e49ed285d4dcd87d1e6935
SHA512aad93d8d795a539ce874e0f1b341ccf5cae851bd40b34c5f2ca3d3724783d931d3ba25d062a2391832513b5fbb9f737626f77b694ee8fc209e8140b6ba8634a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD509c6da9d51b0bfdd48d692bd60797947
SHA13f5efd0f1ca0e59092c2536e06c309df65f7fadd
SHA256784c95db36dc766aa15f154c85d7449c4cb57a08176756769e7c352ba9b5610a
SHA51241c1bde004946fbf8ad1efa148e19ea7656c949873d0589eb22ee9e750d33db11d8cea087a34c943542df3fb002511bad2109962e5c3ecf27bd102c1785493b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD550bae1d300c6e914940d78f8151d994d
SHA186679f48deee50987c024d51479c63f28181c96d
SHA2568ac90dd53e1a6980ed57b53934adf0fd30d3da3e7783d6c5c1268d63298bbca4
SHA512833b4d8de03f76fde9166e4b0ff50d9f4b75a4e0574ec4a87281317b535e917e3a9c608402734e4559e2d7a3df05a7ee5b143e2ebe75fb40b2b0ff152b8d62ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5384bbdc74da8aefe149886f06c68985d
SHA1ae4f6a483fe9ac95875dbce65d7951cc73cff34e
SHA2565ecbfb25caf327cbbb20eb6c6b128c6b6060edc5bf92ddf8b312afbf7edb03d8
SHA51230fe2415c9aa11ed610efcba2b76e1b9ecc706bb4952c7c3a7f605c7554752545762ffb6936a61d7531ccbdca8b6221b17899e41592ffc757e2e1e1b8a484731
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5440dd50d2e8a38b737bd129473b94200
SHA11738e83d84e205306496c8fd4ab0a3ec0f68a0d7
SHA25605a4cdde10da21c91a4ae05d2376a2016f79a9c68bc293bbd038524a27101d99
SHA512f53f5f222704f220b109931f2cb3d70c71b1e205d4d753131feb493f1df8940930c35eb7199e8ea3319141cb11b243126162a818ced5428c87bddec1435e449a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD54c413f9c76ec6f3d9f1ac07ac5166976
SHA120f814370d5635729de37a35075f35edbab184cc
SHA2562fd4f1de423317b264d998b12eb5f73e0bde136ad3871cdce15fa6d05e10d8a2
SHA51233a5c3a3979744c9130f6f32278bca3d842e56a387cbb422c3ebc4824d6bb72d82b8775279c92026d22bc529f78ce26a654bb21380451f12a00b87da7cd51675
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD53b7b2c83de7c0646996e42b32b84b65c
SHA18f1fbfcbe89a3490b39091fbf76e484cbe8d466a
SHA256ee8ef9b1665ae8e96b3241d48692a4da2128647861a48a01b731f77223d716f8
SHA512161ac633437e536830889c0c7011715f29c63fa8e5cff037de4e0a02957476f70ed682e000c467a882ea3a32482ffb98ab4ddab6e2eba8115c9a30e2497304f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD567166191e02c5d916aa0af0ed3192419
SHA1847cd843bc646fc9ac2fdf0fe1d359fb3b1c1662
SHA2565443f6595e343784bad26eea204ae9feebec64e59083904f5515903d9acf8845
SHA51212b4eec55834e6ef5b756f5e6225b2ff2befcc76944a588e30c397edff21ab84f58d3e746e7ddc23eb8e89409c852157282dc61bf895e077515a9671c6908f66
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5b44691f047be4295dfb1d2cc3294201d
SHA1749893002814f3b4b579d39086d8bdb1208f2d45
SHA256a3232e86baf01dde97f0175fbb1b487740d0617a7cd601efba4414c5ab5e0442
SHA51282aaf63f0fe63ebfc165ec23d8a1e646d496721375edba6c2b72e91ac239fd7d6dbbf48e306156f562eb1a92b517278aff5fdc57c6b545d6a7cee2626c341bec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
274KB
MD5f11b8bb04f7fba5b16ade01e859cfe94
SHA1b888bf5eecca5c8d999b6ecbd9e8ccec36ffcb6e
SHA2560ae54e8921d60112558394cfa0a9bbd901be13d1c9e5907064c08fff0f63d8da
SHA5128482a01bcf7b76a5123e97df51a6328e5e6c7cbaa53f2160364e5509d84d088f625ae74c6d20b712e8e59cabeb7d0f240dbb8a6ade3ed4abe9b179924a4943f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
91KB
MD52e53b7a1031167ac7c02385aacf2adec
SHA1968c286cec2063f831f24b74590617e9c44f21c3
SHA256a00b582be463f986fee1794a543c65dad52175058973f413c703eb8fdee29979
SHA51256e3c710f8a4fdf12bea50337de6ddb29d6d4d885579d9917be700478c9dbc96e6d164578d0905af82d9cac7cf290ea6f37a7b8eb68d8a9545d8352a07d2fd75
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe586e45.TMPFilesize
88KB
MD58945145b1df6c97973bd2fa9efeb1d4f
SHA1cc1f88dde38b704577ac15adcccc9d4997710a9d
SHA2560422bf638f206fe4e2a4f58f1d3fabe760764876221f25fe50c3e64cccb7c418
SHA5128f4eb5e475bf7261d098a2c925ede7470c7d78998d85c826c39a02dae60b29160db49468d814a8104b3ac14d67417bedb8bfb70ee7cd3e36a2bae83f5043f88d
-
\??\pipe\crashpad_3304_LMXRYBDEIYQOKSXBMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e