Malware Analysis Report

2024-10-23 19:27

Sample ID 240629-yqerpsyapp
Target neggreee.exe
SHA256 277f1d93ff225ff51113ff57aa19f3f0dc40eeff1079e3547bec232e8292d236
Tags
rat default asyncrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

277f1d93ff225ff51113ff57aa19f3f0dc40eeff1079e3547bec232e8292d236

Threat Level: Known bad

The file neggreee.exe was found to be: Known bad.

Malicious Activity Summary

rat default asyncrat

Async RAT payload

AsyncRat

Asyncrat family

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates system info in registry

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-29 19:59

Signatures

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Asyncrat family

asyncrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-29 19:59

Reported

2024-06-29 20:01

Platform

win11-20240508-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\neggreee.exe"

Signatures

AsyncRat

rat asyncrat

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A 2.tcp.ngrok.io N/A N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133641648664244086" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3433428765-2473475212-4279855560-1000\{DBB9761B-9AF1-470B-8A50-54FD7329C64D} C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\neggreee.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2608 wrote to memory of 4716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 4716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 904 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 4788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 4788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2608 wrote to memory of 628 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\neggreee.exe

"C:\Users\Admin\AppData\Local\Temp\neggreee.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff982d2ab58,0x7ff982d2ab68,0x7ff982d2ab78

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3148 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3788 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4360 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4384 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4512 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3308 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3292 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3272 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4996 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x0000000000000448 0x00000000000004DC

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4832 --field-trial-handle=1808,i,2410685603140075862,10572809592755497662,131072 /prefetch:8

Network

Country Destination Domain Proto
N/A 127.0.0.1:4782 tcp
N/A 127.0.0.1:4782 tcp
N/A 127.0.0.1:4782 tcp
US 8.8.8.8:53 2.tcp.ngrok.io udp
US 3.128.107.74:16751 2.tcp.ngrok.io tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 3.128.107.74:16751 2.tcp.ngrok.io tcp
GB 184.28.176.26:443 tcp
GB 51.132.193.104:443 browser.pipe.aria.microsoft.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
NL 23.62.61.97:443 r.bing.com tcp
NL 23.62.61.97:443 r.bing.com tcp
NL 23.62.61.97:443 r.bing.com tcp
NL 23.62.61.97:443 r.bing.com tcp
NL 23.62.61.97:443 r.bing.com tcp
NL 23.62.61.97:443 r.bing.com tcp
US 3.128.107.74:16751 2.tcp.ngrok.io tcp
US 3.128.107.74:16751 2.tcp.ngrok.io tcp
GB 142.250.187.196:443 www.google.com tcp
GB 142.250.187.196:443 www.google.com udp
US 8.8.8.8:53 195.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
GB 142.250.200.14:443 apis.google.com tcp
GB 172.217.169.46:443 www.youtube.com tcp
GB 172.217.169.46:443 www.youtube.com udp
GB 142.250.187.238:443 clients2.google.com tcp
GB 172.217.169.74:443 content-autofill.googleapis.com tcp
GB 142.250.200.22:443 i.ytimg.com tcp
IE 209.85.203.84:443 accounts.google.com tcp
IE 209.85.203.84:443 accounts.google.com udp
N/A 224.0.0.251:5353 udp
GB 172.217.169.74:443 content-autofill.googleapis.com udp
GB 172.217.169.46:443 www.youtube.com udp
GB 142.250.200.46:443 youtube.com tcp
US 3.128.107.74:16751 2.tcp.ngrok.io tcp
GB 172.217.169.46:443 www.youtube.com udp

Files

memory/3544-0-0x000000007470E000-0x000000007470F000-memory.dmp

memory/3544-1-0x00000000005C0000-0x00000000005D2000-memory.dmp

memory/3544-2-0x0000000074700000-0x0000000074EB1000-memory.dmp

memory/3544-5-0x0000000005670000-0x000000000570C000-memory.dmp

memory/3544-6-0x0000000006030000-0x00000000065D6000-memory.dmp

memory/3544-7-0x0000000005AF0000-0x0000000005B56000-memory.dmp

memory/3544-8-0x0000000074700000-0x0000000074EB1000-memory.dmp

memory/3544-9-0x00000000069E0000-0x0000000006A56000-memory.dmp

memory/3544-10-0x0000000006960000-0x00000000069C8000-memory.dmp

memory/3544-11-0x0000000006AC0000-0x0000000006ADE000-memory.dmp

memory/3544-12-0x0000000006DF0000-0x0000000006E82000-memory.dmp

memory/3544-13-0x0000000001040000-0x00000000010B8000-memory.dmp

memory/3544-14-0x0000000005CF0000-0x0000000005D54000-memory.dmp

memory/3544-15-0x0000000074700000-0x0000000074EB1000-memory.dmp

memory/3544-16-0x0000000074700000-0x0000000074EB1000-memory.dmp

memory/3544-17-0x0000000074700000-0x0000000074EB1000-memory.dmp

memory/3544-18-0x0000000074700000-0x0000000074EB1000-memory.dmp

\??\pipe\crashpad_2608_CMGVVZQWICEFAKUQ

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

memory/3544-110-0x0000000074700000-0x0000000074EB1000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5911e8.TMP

MD5 683cba2ade2118e081c43b1aa01ce57d
SHA1 1967ea2f45db733f8523fb29d7af13bc1a4aa0ba
SHA256 9a39bcbe2907280b85548f3ece6c8a648b7d9313426f2dd30d018733fb833148
SHA512 dd1e94d679b19cd114151762af322b312278ebf9331e76c32e0d4dcced79125f2395f5ca853f866134d2759339a0e888f288a4c0ab018a83d90235c08a8c3f0b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 24752d458baa5a38850e28a34a79afdb
SHA1 1235c61249ab6d03492e0626fd806027a57dc6f1
SHA256 d425719705cad23a5dc6775e8450d31b92d1d0fa79a0defd7b14ffb8865c6671
SHA512 2cabb298f7f0134fa9a1300ee8d852ca6490a86a24ae81cd620acd39b7f7b3e3f8e3ca6b6828870b4574e62e8ef8d25a0d83e1424abb7aac2b662e409c908eba

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 6eb7f51111c6f85d8c49b775f1c8cc92
SHA1 dfd63872ca21ab9ef4e10c111ab7b52c0c020241
SHA256 c59a957914f6cb1297cf20912f72cea527d7bd64045cbe9928124045796de089
SHA512 716639c9a030f9db037072ec376ca681bb7874cb5b91a7b7ed52486c34adfaca167eb101336e36c4b51464fe4d8628ef0eefe3db775193abeb19caa941760d03

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 475b0ce042623da7c7101245de7871d8
SHA1 1924a898f3e5bf25686bcdab28d15ce7a896e438
SHA256 6d194f5779ad0e651cb24f833ec7d90d80fb4ca4dfb86862091c215b31e1d046
SHA512 30de4b1ab1410cbcd6f4e6b9737286ca8592f7932086502cca7eb07d2a95bf0fe0a0eca1a318beae18dc50f871826eef229b612f66437634cdd38dd0be83d82f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 ac84a3a3d0863e2b864adb7da7d3c2d5
SHA1 b4fb2f6749fdb8953c2aa314d7230a2cc1618778
SHA256 3dd960c746d3bd1fd83bef3d1a7ad3e2748310589c2fa07ffc22b81de7f743ef
SHA512 baa90f3b1e8e14a4f904b22ed44d48e8748473204bf44c5b6dbce027bd02cf38ec56d25a9181e14624e89cef534aaa1fab32b0a31c1b56c8607f95673d1bee13

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 48f718da3c2415a8cc83debdd3049daa
SHA1 21558100549d1a65ad7d9d42ef37ef6ff8e30805
SHA256 d7a1db0fd8fa71a3ebe45e8206dfd4ce438f2427979facd0088fcadc90bfa018
SHA512 617733b815d1f8d384fbb2f894ae244809ed9d9e2dabdd307da46f4d7cfe3dbe625a504b0e9d8690d857f1185e5415a6a3358ffbfbef609c76e1d0395dee0689

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir2608_1543368499\Shortcuts Menu Icons\Monochrome\0\512.png

MD5 12a429f9782bcff446dc1089b68d44ee
SHA1 e41e5a1a4f2950a7f2da8be77ca26a66da7093b9
SHA256 e1d7407b07c40b5436d78db1077a16fbf75d49e32f3cbd01187b5eaaa10f1e37
SHA512 1da99c5278a589972a1d711d694890f4fd4ec4e56f83781ab9dee91ba99530a7f90d969588fa24dce24b094a28bdecbea80328cee862031a8b289f3e4f38ce7a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Shortcuts Menu Icons\Monochrome\1\512.png

MD5 7f57c509f12aaae2c269646db7fde6e8
SHA1 969d8c0e3d9140f843f36ccf2974b112ad7afc07
SHA256 1d5c9f67fe93f9fcc1a1b61ebc35bda8f98f1261e5005ae37af71f42aab1d90f
SHA512 3503a0f4939bed9e1fd5e086b17d6de1063220dffdab2d2373aa9582a2454a9d8f18c1be74442f4e597bdba796d2d69220bd9e6be632a15367225b804187ea18

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 e9adb3bd7f7fb988983c027e5f5c1cab
SHA1 5e80569ffef8b9ae98835145e71a07ace4f3db53
SHA256 adb0f5033b75d730c51f00fbf47c545741ef768a3f23d633ba8d2f2757af3979
SHA512 9aa7268fd1d43473d52eafeb8806d1ed9790c684363fe0190ac89e8884576f0c76518c778ad2cbc4edea6d2365d72a3b1db785bf2f877299c68dbb20416e5ce9

memory/3544-346-0x0000000074700000-0x0000000074EB1000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 21bb4437abdf367a3b18d9238f4fe89b
SHA1 eb0c9c07f00cc82b74acbf5969009c7eec4021ec
SHA256 e9a996ce8038289de3595bc0ec088e64f9aeacd033539460ed784d8250dab6af
SHA512 e57805d15049407090012483f3c252f7d4a07a24125b8fb3b98aa7e80da5168cf9636f9d17112a8d1473e11d9c559fd4b25cf104574f0871f50bf8daf3afc09a

memory/3544-365-0x00000000072B0000-0x0000000007312000-memory.dmp

memory/3544-366-0x0000000000F40000-0x0000000000F4A000-memory.dmp

memory/3544-367-0x0000000074700000-0x0000000074EB1000-memory.dmp

memory/3544-370-0x0000000074700000-0x0000000074EB1000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 2b0db5526796877d35c5e7b9d45a725b
SHA1 3fd1733d98ff24e97cac5733056acca3c99b7938
SHA256 d23c3e13cdc390aa59df1478782822cc7eccaba5150f8eae11b4af5a8f1143be
SHA512 253409677b586f82aa1f949acaf7a1d909cb094d02fc738c7fb6877ec0c43f3ef1bfb939c1500c8b6f43757ed8f0838f240fc8da111aa0da046b8ca3404f16e2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5960f2.TMP

MD5 5dd5dea6be0ee2eb8c166b5d61b6261f
SHA1 9fdf5de8a822f527ff9182f0af1d49c89ec2221f
SHA256 ac471f0abec9b03332cde30f3c999251b6a0a383bda381ed82cdb17b58981113
SHA512 fcc5740cbe47344fdcdde94b24a4fc84b6584d61cf7f0a4f76ded58f43be32bbe57ba6f7bb5889551fb796370c07542f91486442038efde6107a3d61ae396af8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d2ea1753-c359-42e7-b87b-aa957e5e8b3c\index-dir\the-real-index

MD5 9352470f4eade220e28c9b181f35de27
SHA1 fec4e74803a2c8e64c5c9bcc59920402f5e634b0
SHA256 ef08c73f4b79c9d9f2dd7b34b894a14f5c7d5ef725f914af7f6db32ca06a7a94
SHA512 bbc8982d05c8ceec4f62345c95cfbbb25d694ec8511206ddf346cc2f3a2743601fb2753cd0026c2d7b5da7ce60e39f741108a5bef9eae478f736c83f5d26f831

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d2ea1753-c359-42e7-b87b-aa957e5e8b3c\index-dir\the-real-index~RFe596894.TMP

MD5 938a734e963ab0c223187072128c6d63
SHA1 07c6e7aed5a41dd07b6b428eaa7c8a46a3354ff1
SHA256 0596617e005753c6e8c163475610cd5281c8add3315f1fa3e797bcc1b0c704cb
SHA512 e67219638e08bb0a1311bd6adf5630d37d3b887a530cdd6c1da34a61d460f018bca5b9ffe4003288130aa92f3a23c8690959125e981e620cca879c264904b329

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 654531976e4c090b41424c4312f8d6e5
SHA1 2c47d5443be4aa1376e3ed9c679e5c4d667d5261
SHA256 c94bc9a38e976b994e4748c5479502e0d409116a41413e8f8701861e2d2e463e
SHA512 c40bd723508d4cb984773a1d7c443d7a00cbbcb39f38604b544a86c91f3f91ca0410228f5abda081148bbbe6b70085e7bf885c0c7fcdb2bb01b583b51f012efc

memory/3544-398-0x0000000074700000-0x0000000074EB1000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 35a45c0c23b96e82df55377797332b34
SHA1 5dcaf0e59b414092c9e54767259d2ed896ab443f
SHA256 2c7922a42fab8931ae90048ddd6bb3e57d00558e06873d3351917d3bd992f6be
SHA512 46a407f23683f5275e2fff5e13fe12cce473883bc142bf976b29626d2b6c2f7de8a4bba29091544b72328d1589af46361744cc507385bf1c3110802d08d5a3da

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 90c8a1a16322fdec16978388f2f9cc6d
SHA1 41f203d4eed054871c07078d3dffd12ffd739997
SHA256 fd582238e3cd6a3d2f31df0bcab9bafd211f7f35d38a41bd275f764653ca5ff9
SHA512 86023388c3535a8fe97ac9edebd6e9429a28901db5ce7b15d8b526e909b9f4a55b18f5d8457141b2ddcc79d687f4b4e71fef8d4af3a88482e816255a27f66eb7

memory/3544-413-0x0000000074700000-0x0000000074EB1000-memory.dmp