Malware Analysis Report

2025-01-02 06:08

Sample ID 241123-r6y2ystjbk
Target 40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe
SHA256 40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076
Tags
socelars discovery spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076

Threat Level: Known bad

The file 40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe was found to be: Known bad.

Malicious Activity Summary

socelars discovery spyware stealer

Socelars payload

Socelars family

Socelars

Reads user/profile data of web browsers

Checks installed software on the system

Drops Chrome extension

Looks up geolocation information via web service

Legitimate hosting services abused for malware hosting/C2

Browser Information Discovery

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Modifies data under HKEY_USERS

Kills process with taskkill

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-23 14:48

Signatures

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-23 14:48

Reported

2024-11-23 14:51

Platform

win7-20240903-en

Max time kernel

117s

Max time network

117s

Command Line

"C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe"

Signatures

Socelars

stealer socelars

Socelars family

socelars

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe

"C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.200.3:80 c.pki.goog tcp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
NL 2.18.244.216:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
DE 104.107.161.181:80 www.microsoft.com tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-23 14:48

Reported

2024-11-23 14:51

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe"

Signatures

Socelars

stealer socelars

Socelars family

socelars

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133768469522228966" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4316 wrote to memory of 5052 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe C:\Windows\SysWOW64\cmd.exe
PID 4316 wrote to memory of 5052 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe C:\Windows\SysWOW64\cmd.exe
PID 4316 wrote to memory of 5052 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe C:\Windows\SysWOW64\cmd.exe
PID 5052 wrote to memory of 2108 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 5052 wrote to memory of 2108 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 5052 wrote to memory of 2108 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 4316 wrote to memory of 2232 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4316 wrote to memory of 2232 N/A C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2284 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2284 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 2356 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2232 wrote to memory of 1492 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe

"C:\Users\Admin\AppData\Local\Temp\40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc3ffcc40,0x7ffbc3ffcc4c,0x7ffbc3ffcc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1864 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3776,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3660 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4872,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4940,i,6517242827760911935,7839758563155263150,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4972 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.200.3:80 c.pki.goog tcp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 46.3.26.104.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 3.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
US 8.8.8.8:53 www.google.com udp
GB 172.217.16.228:443 www.google.com tcp
GB 172.217.16.228:443 www.google.com udp
US 8.8.8.8:53 150.16.251.13.in-addr.arpa udp
US 8.8.8.8:53 10.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 228.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 clients2.google.com udp
GB 142.250.178.14:443 clients2.google.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
GB 172.217.16.227:443 beacons.gcp.gvt2.com tcp
US 8.8.8.8:53 227.16.217.172.in-addr.arpa udp

Files

\??\pipe\crashpad_2232_VSUDECWYOSRNUPVK

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 cc3f3b565ec4cf8609c3041f021f1c6f
SHA1 bd6a8467dc4df8462b1239bdad645611730e270f
SHA256 e33a93fbf27c02e5b1957571851c3fa20597c088b6e1f7d7899585c8f9133513
SHA512 0e66cbb97b91e2f60aa4cc79f088f024273eac81e06b4ef058064c31cd8ff0557e32012513a74e056c9194fd662153c8297b9c93b74dc055ab796dc0121e5da5

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 0cdaed41da20b9e6871b72e7e6c3f691
SHA1 01f5472b84750b2e06536b084b68786dd0c44f24
SHA256 980c627261f695a75d130d115ca9e755e9b13161f4768eaaa568482359c05529
SHA512 791703eac31f944a621f07729b63eec2cf4f239aa690f04ef78ae44ce97d7ba17e257f41ee770fdc47b31b36a0e7eaed7c557dab3ded975e92e4b349c96e60dd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 4d25c890c74278bee96b9f2b60fcb678
SHA1 89213798e00e927ad08dffb77b39ba9414dcd0f6
SHA256 02be07e24100a25603503d48967b4b742b35d34a5f3b128ba540d9655fa9164c
SHA512 30bf0bcd7e4efa2aba759e14a6bcca60c51df14c23d8ad335a117d31114b1e4c0bbc5b3d2f1465674837838e5e8952187562ab31f2cb8369de5f649cf5844637

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 f06cf712c23a990af2e1049fe131334a
SHA1 55e04e7d56cda0f31a578fdbeaf4cf87da502bbf
SHA256 59304eef5ecb4d6038a90fc052106c7c7aba4a5b7674f527fff687d41469dee4
SHA512 cc621eee3dac8a660722342f732f60481b4138b89101eb1de715cddcdf92d890afc6591fe035e1bfa7619d43e827ce90e3ee10deb92c6e93f111cbdd6ef1ec3b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 21e4483ad4fecb2fd93f6e05e515cec7
SHA1 82077e44f4f55cd2d3c78f02ba24e1b99d3c7290
SHA256 3b779c25f2694acf8674e13697dbcb2b50b5a963ac32a55d18dcd007b85708a1
SHA512 cec135797c097780d1e4ff37480eb6cddf1a8aa398a0a65f5e24a4c23ab063caa7719628adb03352ea8d3740c82b1ecc47e782aecdbfbb5a09bc44d828af9dbd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 e72b8892f7c0e59101a677b9b3a1c448
SHA1 0f7ea174469835afc21e4ac16dc09a2855af025f
SHA256 328388ff1ed4128c10cca55ab59854d06ebc6d75ee2381ff7a1e30b500bdd42b
SHA512 75efda0b51c580056eb089fec75ca9d720b8bfc3bac3f93e94e995a17d29c6cbf67cffcb46e21774f51280554180b1e5eb5070a0eb4aafd093e0ae9d77b82273

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 622ac378550a947c3b2b2633d4d31a59
SHA1 a8b348217232867640e339539995f52139cf1b74
SHA256 640b3a94ab23b82e712989b5e54bfa82899287a2e2b0891456d534650a1d1b33
SHA512 5f580d8ce434fd84dc292a3eccf8f505629b5c485d8b2ddbfeeb5b4cda09e29b3f762c071282e419137bcfff54e068cdfcfe9a44411d87d78dec3a7fa3e6e619

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 3cdc59e1ea8ca4d2ef80b9f67db398ae
SHA1 0bbf9f215729bc80068495bdc06b0424fd5e2680
SHA256 216484fbd2200db7c3dd939365dd7f56121b7e25ae82f8bdd4b039244f60b69c
SHA512 e128155c2686f0d4f72ca9964b4d2addb5d92041fe1d7858c2ca69f4b1890755da1031d8901b554924d796ed7a44e1148f0d2ba52b63e075b5686b557479237c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 cc0f0d4047e5a46cd9fab69bc20328e2
SHA1 a136a38d572e96e8d672610807a7e097fce552e6
SHA256 2775eb2bc1fdab021f6c589433e5b881624366f7044ebc1c5874a2e366375180
SHA512 0c1dedcdd7edcc525ec15a7f51db821c4802b0cb6e14ee65de36f1ce5b64bddcdcc684819539879c26ba517d3415365af360fd937c72751cc1dd6f154555ce54

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 c55043031afc9048873aa264476ddbe5
SHA1 f37e99b8b2f8ae2712d214d15e44eecbddbbe959
SHA256 0d67e6c6552823cc92792ebe66b41dcbbb15eda417ead97bd9dbcaf34c0a9ebd
SHA512 068285258ab749049add8e41ea017c12d98940d18e8d310012a08957bf3d0f9e867b3f00467f69ebbb5c7c621df9be99b5d7be632ed055be62bf1b90bf8c2090

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 14c282ce054f104f3822b1d71f2aebda
SHA1 66639a3e1b5fe2688d14b66731810477f229173d
SHA256 b03e3f1b18cefa40d838e6311609d49708a30b5f9b7ac5c3df7a83b8bc344a5e
SHA512 e17f6bbdbe5ffbb5545f8c787d2569c913f441f22929f9660c24d74c40e41518c690f53f84715a1563b9434d0ec4286ccab08fb2f7337db84566b7991fc683b9

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 d54721a71c0eb137fe12ba6c637c77d1
SHA1 9565b9945ecb0b3c6c7f44a19c36a3c769e59fa5
SHA256 9055a27565421384e2bb2787e75802b82cd09158a418ccc1b04e5e4a40eed1ae
SHA512 34d2b67e4fe29ef9995f7679e875ffdf2fce0c7c7d0c3c330ad97c7d2fb69c9e3c9ecb74237fac561fd9521a984ca38c15615da44a54e807d129aceb94017810

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 47f6920da8bc710dd7b310a727f36c11
SHA1 fea8108482f248a2e84eb30bc60d51a13a0aae34
SHA256 b4484949fd355ba5de5b5c30074b95cb06fc6f39ede8a5600d3aeb096264300b
SHA512 01bfb4ef0e75cfa6c8227a0b1a3b02992e18504bf2821712bace7c5011423142e01994b725c20fafda595c9925d2b599028284f6694273af2001ec8d0ad30322