Malware Analysis Report

2025-01-18 00:54

Sample ID 240613-lqyhlaxdmn
Target 666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e
SHA256 666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e

Threat Level: Shows suspicious behavior

The file 666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e was found to be: Shows suspicious behavior.

Malicious Activity Summary


Checks computer location settings

AutoIT Executable

Unsigned PE

Enumerates physical storage devices

Modifies data under HKEY_USERS

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Modifies registry class

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 09:44

Signatures

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 09:44

Reported

2024-06-13 09:47

Platform

win11-20240611-en

Max time kernel

149s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe"

Signatures

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627455046890959" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1276817940-128734381-631578427-1000\{BC6CB926-0057-4E48-AC66-AD00D1E0FE20} C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4664 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4664 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3404 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3404 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3524 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 1468 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 1468 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1596 wrote to memory of 3108 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe

"C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff7180ab58,0x7fff7180ab68,0x7fff7180ab78

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3148 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4176 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3240 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3040 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3144 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4932 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1468 --field-trial-handle=1808,i,373609609388418978,14985971150168202155,131072 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.youtube.com udp
GB 172.217.169.46:443 play.google.com tcp
NL 142.250.27.84:443 accounts.google.com udp
US 8.8.8.8:53 42.169.217.172.in-addr.arpa udp
GB 216.58.201.106:443 content-autofill.googleapis.com tcp
GB 142.250.187.238:443 accounts.youtube.com tcp
GB 142.250.187.196:443 www.google.com udp
GB 142.250.187.196:443 www.google.com tcp
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 clients2.google.com udp
GB 142.250.187.206:443 clients2.google.com tcp
GB 172.217.169.46:443 play.google.com udp
GB 172.217.169.46:443 play.google.com tcp
GB 172.217.169.46:443 play.google.com udp
NL 142.250.27.84:443 accounts.google.com udp
NL 142.250.27.84:443 accounts.google.com udp
GB 172.217.169.67:443 beacons.gcp.gvt2.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
US 216.239.32.116:443 beacons4.gvt2.com tcp
US 216.239.32.116:443 beacons4.gvt2.com udp
GB 142.250.178.14:443 google.com tcp

Files

\??\pipe\crashpad_1596_RUXJZUWXAKRHXRRV

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 b899fb8b99f6241a5c13b89aed077d6d
SHA1 ebf92b36cd461eb1684d76be6927ab3899778c94
SHA256 6a33ebe3fef0e1dd0f607c8ef8047b2b0ba318d4cb5ddf51d7937ea39163deaf
SHA512 1ff5a5993de5fa674a1437b004eba92f35e58e65ca20acff3a08caa63dec665a14f7007bab4aa71daebc80db12b62e6c9c82b4a83d25a243fa5f4959b7897463

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 b88ba137c4d0028e1e4b5ce886940e3a
SHA1 2e9d917f5e2589e3756fb352b8d3fb714ccbace3
SHA256 0179bd47dd790c7d2be1bdca87e8ea7302c38f592331fd59f9787666b43a66c8
SHA512 e4ac6d6334c892be45bf805a42a0218fa73537550d50c410c49726ff81cb68b5e18d1ef3511f471fcee6141727dc5ae8845d8d97f632850ba10186ee700d3658

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 2a0acc6c75c592d79d73f91de81e46f9
SHA1 12ec3da986098e28d25d3c41daf1dba33648f2a1
SHA256 dc2c71f43a7c164e74cf3283e4680b8a24a53131f078834d4ffe947d3c30d16a
SHA512 c3eef9cf286fcd5983bd7f9f2e392fe9a53a637e4cef8eaa4886539015e6026f34c7b62132beb9c6849ad485b51d7ee339afc55f66dd080d0eca1767b1b7823c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 0c7addfbfc09282bc62eb7252a6262de
SHA1 08c6f7c39d62c4e6286c99aa6b7534de882c3f7c
SHA256 ab0ab4164dfa7892f013005b6f0d6feb02bb87a9c44325e682fb0af5c2d1c161
SHA512 194cb72cb91b376d6a16ff7f8887b8a950af1431dc58f3ee5216a98b85f0c31ed7abed27ba5488bc3b2a1ed688597feede6d31d60f98442765f4ca8846f639a0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 7ca90be75a8901177003efbae68a78dc
SHA1 f8df3b57a808c53cadfe8182c18f6ad1b0575b1f
SHA256 8f437f1ce7ec0111f2c22b25c2f12678c8bbf5b2f5ca341c2cd7c2b6f3ec2a5d
SHA512 37cfb8d5292fa3089f28b1339242d09bf7c529b1529e2c1b25a947e1378709b1da606f577329caf5caef464f1d3c01931b12b1cf55863cda8f9febbc7e820a4c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 4dc5bad72a14b9ea2116eb325aae773d
SHA1 6991898e0f3d06d428146d3e07319934685518e7
SHA256 66516a909ac0f10189a9e2093912c6e70cb173c3f654ed06e0f87097c2896deb
SHA512 13965eed165caab22426e7503c571e461706dcc94ce3d8bec13f472aa0fefa22a6ebb9fafe9128128bc10d50b669b5ceab34f153dabbd1226bad75a7e5b3c967

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 76a350b07abe0859ef6532e0a4a3aa19
SHA1 75392f61c4a51acca3c6f1f4d2aff6c0aa2dc7bd
SHA256 71cce9a004c7b1711a1c54bf9ada2d7744abdfcb615f9afd29fe6c84f438d024
SHA512 53cd5af26d21b01da79c242c562ec225f50e66b41ad67b486ebf077cbd505cdd59fd5f753cfd458732adeff821f20049860e27ce2362de99cdebfed17e3eb8f7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 1d02a32785a3da5e2ee881d45f18135b
SHA1 7e51c5ee8dcb7f2a9a433d8e450d9e0f205b39dc
SHA256 cd59a5a902b42c871c0ca0acd2196a332e8a57a709baf001f4214f72a4afe8b7
SHA512 ab2be69856bfb71a967761254c8e7832f7066969f32a957190b34f867a3802bf4b3fe2d8d209908fcc12cb4e0d6161ad46a3935ab15a1da64a0f36c318bdd63f

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 09:44

Reported

2024-06-13 09:47

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627455032783831" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4808 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4808 wrote to memory of 3784 N/A C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3632 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3632 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 2616 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3784 wrote to memory of 3888 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe

"C:\Users\Admin\AppData\Local\Temp\666e64990cd2492153ca1001f662c8f08bd947baa115c0c1af55dd2a6280409e.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe986aab58,0x7ffe986aab68,0x7ffe986aab78

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2296 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4452 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4540 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3152 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3368 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1848 --field-trial-handle=1952,i,6562537131554092397,12317956859145832177,131072 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 www.youtube.com udp
US 8.8.8.8:53 clients2.google.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 google.com udp
US 8.8.4.4:53 google.com udp
US 8.8.8.8:53 www.youtube.com udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 clients2.google.com udp
US 8.8.8.8:53 clients2.google.com udp
US 8.8.8.8:53 www.youtube.com udp
US 8.8.8.8:53 clients2.google.com udp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
US 8.8.8.8:53 www.youtube.com udp

Files

\??\pipe\crashpad_3784_XDNTBSNAEZJMEPFW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 819b524a82b4e56facba9a59ea92d721
SHA1 a46cf928ba8196598ddef29fd179247e1034759e
SHA256 49aa07c91d26dea5a62bc4e541e45158c0da5eb6dda5e701505ccb048b596af8
SHA512 42543b856e0674e00dd97a2aa53cbd573e30cb38f31848e4f669048a872aa8bc50f7d362e0d9e13cb4c8d46ae0ea5b7d68c6769800c47c8718364cf07031f451

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 e5b58743d35342df5dad0934a2dd5c53
SHA1 a7dd37bd9c82ac7a489751fad4797aba9ee766c6
SHA256 1cf58b8f55b149d3a7d95cc14438fb9ad36dc883a34d879a5fc34d1bfdc9c53c
SHA512 53f92a11836893b8b95a518bb3537bdccdc5e92362c1ab6152e180460bb5de6b4e3018f9ae6705c1a803a57ed2b92d863cb65f77a8a2838d4668a20f07f18f65

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 80f7ab37c2de54dedc2dd18ea6c5770e
SHA1 b7e54448ef544a24d7b6e8566d5d21099638148c
SHA256 8a3b277d28d72f0a9c34995391be323631b7dfe735b530ee5d142dcd28228144
SHA512 29b0eec5f491bf7f656d1a928b80577db4dceadc87690ae1ffe4ec8a48fe7802b6cd263f90a3b55a6b66b1c8dc777fa1f996c362d26079632cefdc1262566d30

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

MD5 fa27cc5554ddfb1a0a0646fed1afeab8
SHA1 2f55aecd29d6fec1529fde72d45bff7237ff8ca6
SHA256 580028c9769c6fed87776f2b40b2c3a41439e7cb8dd6e62a5fb3bd137ef45018
SHA512 6d2c7abc1ff78edfdc81c29e4e0bb3928521bb932fa6fc2e414e24d148ca588b927b834ab625adb6973e5a8daf84ac453c2c0198153e0d867cc1dbf08ff151c5

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57df92.TMP

MD5 ddf964261e47f1b6c9b168383f4dbb57
SHA1 e73d951539b6ad83ce23698e05c5230b8af93abe
SHA256 34e417b564f553344aa00f3b5219fe8b92004448cabcda61baa96f38ed86e1c8
SHA512 8c3a79852bde3968d5810e21c69e86d427bd819c4f014ccfc8e7288411bd7f5198c20e9c5ff2e3f3226bbf8e1a216339f8e6bf71c39a7280435e990b6dc98eed