Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/12/2022, 10:44
221210-mta25sab8x 1009/12/2022, 20:12
221209-yza5waha7v 1004/12/2022, 13:12
221204-qfsa2sbh74 1001/12/2022, 14:04
221201-rda5esef46 1030/11/2022, 14:19
221130-rms2lagf28 1029/11/2022, 15:31
221129-syd79afa3z 1029/11/2022, 09:15
221129-k73m7shf6s 1029/11/2022, 09:08
221129-k31caahc7x 10Analysis
-
max time kernel
2701s -
max time network
2700s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe
Resource
win10v2004-20220901-en
General
-
Target
ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe
-
Size
146KB
-
MD5
2c6e6e290972fcd5e556efccfd51f174
-
SHA1
ec3de0785e4ccd0282e92e35c915ddb72832fd83
-
SHA256
ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e
-
SHA512
a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f
-
SSDEEP
1536:KQsw8LQ+Z9DjjSD60zzeE2G95Vz6B6yRTj9AU44YxSs2gdIuV8Vm3PkO0v0RDQBK:KjiSd/LHG9516B6cv44WdX80/VDmGp
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-lj5qINGbTc
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Extracted
djvu
http://fresherlights.com/lancer/get.php
-
extension
.kcbu
-
offline_id
hlqzhQ6w5SquNDF4Ul2XBDJQkSIKbAT6rmRBTit1
-
payload_url
http://uaery.top/dl/build2.exe
http://fresherlights.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-lj5qINGbTc Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0608Jhyjd
Extracted
vidar
55.9
517
https://t.me/headshotsonly
https://steamcommunity.com/profiles/76561199436777531
-
profile_id
517
Signatures
-
DcRat 5 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\fa96cd4c-0338-45c0-b0c0-e4237608920c\\2AE8.exe\" --AutoStart" 2AE8.exe 1476 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe 2372 schtasks.exe 4352 schtasks.exe -
Detected Djvu ransomware 18 IoCs
resource yara_rule behavioral1/memory/4264-203-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4264-211-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4828-209-0x00000000021D0000-0x00000000022EB000-memory.dmp family_djvu behavioral1/memory/4264-206-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4264-213-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4264-245-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5668-303-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5668-301-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5668-304-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5668-309-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3620-414-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/3620-415-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2848-460-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2848-461-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4764-476-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4764-477-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1272-495-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1272-496-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 3 IoCs
resource yara_rule behavioral1/memory/2012-133-0x00000000005F0000-0x00000000005F9000-memory.dmp family_smokeloader behavioral1/memory/3068-210-0x0000000000490000-0x0000000000499000-memory.dmp family_smokeloader behavioral1/memory/1940-197-0x0000000000560000-0x0000000000569000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 203 5584 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 31 IoCs
description ioc Process File created C:\Windows\System32\drivers\NGCx64\1614050.027\ccSetx64.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\SymELAM64.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\SymELAM.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\symnets.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\system32\Drivers\SYMEVENT64x86.INF Sevntx64.exe File created C:\Windows\system32\Drivers\SYMEVENT64x86.CAT Sevntx64.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\SymVTcer.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\wpCtrlDrv.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\IRONx64.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\wpCtrlDrv.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\isolate.ini NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\symELAM.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\wpCtrlDrv.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\symefasi64.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\etc\hosts 5B47.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\SymNet64.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\srtsp64.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\srtsp64.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\srtspx64.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\srtspx64.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\SymEFASI64.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\ccSetx64.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\iron.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\iron.inf NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\SymEFASI64.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\ccSetx64.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\srtsp64.sys NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\system32\Drivers\SYMEVENT64x86.SYS Sevntx64.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 5B47.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\symnet64.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Windows\System32\drivers\NGCx64\1614050.027\srtspx64.cat NAV-ESD-22.20.5.39-EN.exe -
Executes dropped EXE 64 IoCs
pid Process 4828 2AE8.exe 4896 2C7F.exe 2412 2F11.exe 1940 34FD.exe 3200 477D.exe 3068 4DD7.exe 3172 522D.exe 228 5B47.exe 4100 rovwer.exe 4264 2AE8.exe 4756 5B47.exe 4456 2AE8.exe 4828 rovwer.exe 5668 2AE8.exe 2188 rovwer.exe 5496 rovwer.exe 4720 build2.exe 4880 build3.exe 4732 build2.exe 2024 rovwer.exe 4212 mstsca.exe 1156 rovwer.exe 4676 rovwer.exe 3016 rovwer.exe 3440 ChromeRecovery.exe 4152 rovwer.exe 2176 wtgbrtj 2364 cigbrtj 5076 rovwer.exe 3712 rovwer.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4816 rovwer.exe 1740 coInst.exe 2256 SRTSP_CA.exe 1668 EFAInst64.exe 4300 SymVTCatalogDB.exe 5588 ELAMInst.exe 960 Sevntx64.exe 3188 RuleUp.exe 2280 symerr.exe 660 tuIH.exe 5056 InstCA.exe 5952 rovwer.exe 5364 rovwer.exe 4444 2AE8.exe 3620 2AE8.exe 5144 coInst.exe 3064 SRTSP_CA.exe 2008 EFAInst64.exe 1784 SymVTCatalogDB.exe 4536 ELAMInst.exe 5696 Sevntx64.exe 4048 RuleUp.exe 1732 symerr.exe 1684 tuIH.exe 5508 InstCA.exe 5188 software_reporter_tool.exe 4644 software_reporter_tool.exe 4300 software_reporter_tool.exe 5928 software_reporter_tool.exe 1388 InstStub.exe 924 uiStub.exe 4680 NortonSecurity.exe 5288 SymErr.exe -
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\OptimizeInvoke.tiff 2AE8.exe File renamed C:\Users\Admin\Pictures\OptimizeInvoke.tiff => C:\Users\Admin\Pictures\OptimizeInvoke.tiff.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\ProtectExport.raw => C:\Users\Admin\Pictures\ProtectExport.raw.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\RepairReceive.tiff => C:\Users\Admin\Pictures\RepairReceive.tiff.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\ResolveStop.raw => C:\Users\Admin\Pictures\ResolveStop.raw.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\UpdateUnblock.raw => C:\Users\Admin\Pictures\UpdateUnblock.raw.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\FormatPing.png => C:\Users\Admin\Pictures\FormatPing.png.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\NewEnter.png => C:\Users\Admin\Pictures\NewEnter.png.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\RevokeRedo.tif => C:\Users\Admin\Pictures\RevokeRedo.tif.kcbu 2AE8.exe File renamed C:\Users\Admin\Pictures\ConvertFromSuspend.raw => C:\Users\Admin\Pictures\ConvertFromSuspend.raw.kcbu 2AE8.exe File opened for modification C:\Users\Admin\Pictures\RepairReceive.tiff 2AE8.exe -
Registers COM server for autorun 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0579E89F-E364-4a3d-A9CB-90262B2B7E1C}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4433A54A-1AC8-432F-90FC-85F045CF383C}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B59987EA-25FE-44B4-8802-E4DE67073D8C}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{96237786-C89D-4504-837A-A3BA2C29524D}\InProcServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09D32393-10DA-4eca-91AA-AD11C69DB966}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2272AE7A-0C30-48E1-91DF-F9E666276C0C}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2272AE7A-0C30-48E1-91DF-F9E666276C0C}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\MsouPlug.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{96237786-C89D-4504-837A-A3BA2C29524D}\InProcServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\symamsi.dll" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F13C7C55-93E5-48ca-A5E5-E6564089CAB0}\LocalServer32 NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09D32393-10DA-4eca-91AA-AD11C69DB966}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}\InprocServer32\ = "\"C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\NavShExt.dll\"" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F13C7C55-93E5-48ca-A5E5-E6564089CAB0}\LocalServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\SymDgnHc.exe" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{12C26F0C-01D9-4EE7-B7C1-24753904B09E}\LocalServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12C26F0C-01D9-4EE7-B7C1-24753904B09E}\LocalServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\uiWNSNotificationApp.exe" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4433A54A-1AC8-432F-90FC-85F045CF383C}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4433A54A-1AC8-432F-90FC-85F045CF383C}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\coIEPlg.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F13C7C55-93E5-48ca-A5E5-E6564089CAB0}\LocalServer32\ThreadingModel = "Free" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0579E89F-E364-4a3d-A9CB-90262B2B7E1C}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B59987EA-25FE-44B4-8802-E4DE67073D8C}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2272AE7A-0C30-48E1-91DF-F9E666276C0C}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09D32393-10DA-4eca-91AA-AD11C69DB966}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\McStatus.dll" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12C26F0C-01D9-4EE7-B7C1-24753904B09E}\LocalServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0579E89F-E364-4a3d-A9CB-90262B2B7E1C}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\coIEPlg.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{96237786-C89D-4504-837A-A3BA2C29524D}\InProcServer32\ThreadingModel = "Both" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B59987EA-25FE-44B4-8802-E4DE67073D8C}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 5B47.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 2AE8.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation NAV-ESD-22.20.5.39-EN.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 2C7F.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation rovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 2AE8.exe -
Loads dropped DLL 64 IoCs
pid Process 2672 regsvr32.exe 2672 regsvr32.exe 5584 rundll32.exe 4732 build2.exe 4732 build2.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 1740 coInst.exe 1740 coInst.exe 1740 coInst.exe 1668 EFAInst64.exe 1668 EFAInst64.exe 1668 EFAInst64.exe 5588 ELAMInst.exe 5588 ELAMInst.exe 5588 ELAMInst.exe 3188 RuleUp.exe 3188 RuleUp.exe 3188 RuleUp.exe 3188 RuleUp.exe 3188 RuleUp.exe 3188 RuleUp.exe 2280 symerr.exe 2280 symerr.exe 2280 symerr.exe 2280 symerr.exe 2280 symerr.exe 2280 symerr.exe 2280 symerr.exe 660 tuIH.exe 660 tuIH.exe 660 tuIH.exe 660 tuIH.exe 660 tuIH.exe 660 tuIH.exe 5056 InstCA.exe 5056 InstCA.exe 5056 InstCA.exe 5056 InstCA.exe 5056 InstCA.exe 5056 InstCA.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe 4500 NAV-ESD-22.20.5.39-EN.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4732 icacls.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NGC = "\"C:\\PROGRA~2\\NORTON~1\\{0C55C~1\\NGC\\562C4DD5\\22205~1.39\\InstStub.exe\" /RELAUNCH /RUNONCE /PRODID NGC" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NGC NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NGC\MEDIA = "C:\\Users\\Admin\\Downloads\\NAV-ESD-22.20.5.39-EN.exe" NAV-ESD-22.20.5.39-EN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NGC NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\NGC = "\"C:\\PROGRA~2\\NORTON~1\\{0C55C~1\\NGC\\562C4DD5\\22205~1.39\\InstStub.exe\" /RELAUNCH /RUNONCE /NOPROMPT /PRODID NGC" NAV-ESD-22.20.5.39-EN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE\NGC NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\fa96cd4c-0338-45c0-b0c0-e4237608920c\\2AE8.exe\" --AutoStart" 2AE8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json 5B47.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Norton Security\desktop.ini NAV-ESD-22.20.5.39-EN.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\ = "Norton Password Manager" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\NoExplorer = "1" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\ = "Norton Password Manager" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\ = "Norton Password Manager" NortonSecurity.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\NoExplorer = "1" NortonSecurity.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\NoExplorer = "1" NAV-ESD-22.20.5.39-EN.exe -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1068 api.2ip.ua 1151 api.2ip.ua 1165 api.2ip.ua 987 api.2ip.ua 1097 api.2ip.ua 1134 api.2ip.ua 1175 api.2ip.ua 1096 api.2ip.ua 31 api.2ip.ua 988 api.2ip.ua 1152 api.2ip.ua 1166 api.2ip.ua 1176 api.2ip.ua 27 api.2ip.ua -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_E1EDEF0C21AE75D448F7327475DF4C9E NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_E1EDEF0C21AE75D448F7327475DF4C9E NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3781B4A3713292956206932165FA4132_DFD3E0F75C6A3CFC3271FE2C5C19E838 NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EE44ECA143B76F2B9F2A5AA75B5D1EC6_5BFB72FAE1BB9D1928D1C5C92F52E8EA NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EE44ECA143B76F2B9F2A5AA75B5D1EC6_5BFB72FAE1BB9D1928D1C5C92F52E8EA NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F234AF16A662E2448E049CAD14C6D675 NortonSecurity.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt NortonSecurity.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt Sevntx64.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt Sevntx64.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3781B4A3713292956206932165FA4132_DFD3E0F75C6A3CFC3271FE2C5C19E838 NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0F7788E201A03EF5036E7C8BF55432CB_BDA62707BA70CB0111D9E81215C5BF30 NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0F7788E201A03EF5036E7C8BF55432CB_BDA62707BA70CB0111D9E81215C5BF30 NortonSecurity.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F234AF16A662E2448E049CAD14C6D675 NortonSecurity.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 4828 set thread context of 4264 4828 2AE8.exe 96 PID 228 set thread context of 4756 228 5B47.exe 108 PID 4456 set thread context of 5668 4456 2AE8.exe 142 PID 4720 set thread context of 4732 4720 build2.exe 174 PID 4444 set thread context of 3620 4444 2AE8.exe 407 PID 4996 set thread context of 2848 4996 2AE8.exe 469 PID 1816 set thread context of 4764 1816 2AE8.exe 496 PID 6028 set thread context of 1272 6028 2AE8.exe 530 PID 5428 set thread context of 5156 5428 2AE8.exe 549 PID 5172 set thread context of 5248 5172 2AE8.exe 570 PID 5084 set thread context of 660 5084 2AE8.exe 587 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{591D2F72-BEEF-4E6D-AEE1-2C53200DE57E}.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\sw.pak.info NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\MSVCP140.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine\22.20.5.39\SPManifests\SymEFA.grd NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\19\01 NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\am.pak.info NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\cctFW.dll NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\coFeatSv.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\en-GB.pak.info NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\tr.pak NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4104_553626233\ChromeRecoveryCRX.crx elevation_service.exe File created C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\04\01\InsBrand.loc NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\13\01\hlinks NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\MUI\22.20.5.39\IMAGES\icon_metrotoaster_image_risk.png NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\IPSDefs\20200717.500\v.grd NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\Iron.dll NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\coIDSafe.dll NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Branding\22.20.5.39\15\01\muis.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\04\02 NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\FFPrefs.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\SymPlatformDefs\20200721.050\virscan1.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\ccGLog.dll NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\QStartUI.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\BASHDefs\20200717.004\bhspauth.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\uiMetroN.dll NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\MClnTask.dll NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\SDKCmn.dll NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\SDKCmn.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\STICDefs\20190827.078\hlinks NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\11\01\hlinks NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\ms.pak.info NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{D418C996-433A-42df-8D3C-E1A24C0AD3C0}.dat.bak NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\coNatHst.exe NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\srtspx64.cat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\07\01\InsBrand.loc NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\pl.pak.info NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\SymPlatformDefs\20200721.050\catalog.dat NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\SymPlatformDefs\20200721.050\disseq.dat NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\IPSDefs\definfo.dat NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\06\01\InsMUI.loc NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine\22.20.5.39\SPManifests\SEF.grd NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\14\01\InsMUI.loc NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{64A1EE4A-948D-4bd0-A3E6-9D6BF96DF72A}.dat.bak NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\WebProtectionDefs\20100430.009\virscan1.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\SPManifests\NAVPatch.sig NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\msvcp140.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\Definitions\SDSDefs\20221128.016\virscan9.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{65190544-26C3-43a4-A78A-694964901607}.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{A6AC491F-0711-4D5A-8612-F085B49B1AE1}.dat.bak NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{591D2F72-6BF6-4E6D-AEE1-2C53200DE57E}.dat NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{D49714FD-DF22-4124-9FC2-D059ACABE7E1}.dat.bak NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\vccorlib140.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\nl.pak.info NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\sl.pak NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine32\22.20.5.39\locales\ta.pak NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\Definitions\SDSDefs\20221128.016\hp_1.idx NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\Engine\22.20.5.39\concrt140.dll NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\WebProtectionDefs\definfo.dat NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\Definitions\SDSDefs\20221128.016\virscan5.dat NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\Engine\22.20.5.39\itbLUReg\{591D2F72-6BF6-4E6D-AEE1-2C53200DE57E}.dat.bak NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\MUI\22.20.5.39\09\01\ncwRes.loc NAV-ESD-22.20.5.39-EN.exe File opened for modification C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\SymPlatformDefs\20200721.050\disconf.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\BASHDefs\20200717.004\bhscda.dat NAV-ESD-22.20.5.39-EN.exe File created C:\Program Files\Norton Security\NortonData\22.20.5.39\Definitions\BASHDefs\20200717.004\bhsprule.dat NAV-ESD-22.20.5.39-EN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 53 IoCs
pid pid_target Process procid_target 984 3068 WerFault.exe 88 3616 4896 WerFault.exe 82 2800 2412 WerFault.exe 83 3668 3172 WerFault.exe 87 5052 4828 WerFault.exe 123 5976 2188 WerFault.exe 157 5096 5496 WerFault.exe 164 5664 2024 WerFault.exe 182 2012 1156 WerFault.exe 191 2312 4676 WerFault.exe 199 2804 3016 WerFault.exe 232 6024 4152 WerFault.exe 258 5404 2364 WerFault.exe 260 4004 5076 WerFault.exe 331 220 3712 WerFault.exe 364 2672 4816 WerFault.exe 374 4164 5952 WerFault.exe 394 1112 5364 WerFault.exe 400 5264 1704 WerFault.exe 435 1008 1156 WerFault.exe 447 3260 1316 WerFault.exe 451 5752 4592 WerFault.exe 458 2372 224 WerFault.exe 463 5436 1272 WerFault.exe 462 3488 508 WerFault.exe 471 4252 3056 WerFault.exe 475 3560 812 WerFault.exe 478 4536 1992 WerFault.exe 482 1160 5048 WerFault.exe 487 4768 1572 WerFault.exe 498 4768 4976 WerFault.exe 510 5604 5176 WerFault.exe 515 1948 5992 WerFault.exe 519 1120 3296 WerFault.exe 523 3916 3580 WerFault.exe 524 1892 5960 WerFault.exe 531 3844 3968 WerFault.exe 534 3472 812 WerFault.exe 539 396 3964 WerFault.exe 542 1064 2828 WerFault.exe 545 1652 5548 WerFault.exe 550 5764 2592 WerFault.exe 553 5136 5356 WerFault.exe 556 4428 2764 WerFault.exe 559 4468 5368 WerFault.exe 563 1448 5244 WerFault.exe 564 2264 5516 WerFault.exe 571 5096 1428 WerFault.exe 574 5700 3104 WerFault.exe 577 3532 3316 WerFault.exe 580 3716 5636 WerFault.exe 583 3652 4788 WerFault.exe 588 1060 4508 WerFault.exe 591 -
Checks SCSI registry key(s) 3 TTPs 27 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 34FD.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 34FD.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 34FD.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 477D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 477D.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 477D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtgbrtj -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4352 schtasks.exe 1476 schtasks.exe 2372 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4688 timeout.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2272AE7A-0C30-48E1-91DF-F9E666276C0C}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{4433A54A-1AC8-432F-90FC-85F045CF383C} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\AppPath = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{0579E89F-E364-4a3d-A9CB-90262B2B7E1C}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" NortonSecurity.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} = "Norton Toolbar" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{0579E89F-E364-4a3d-A9CB-90262B2B7E1C} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{4433A54A-1AC8-432F-90FC-85F045CF383C} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{2272AE7A-0C30-48E1-91DF-F9E666276C0C} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} = "Norton Toolbar" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{FAD61B3D-699D-49B2-BE16-7F82CB4C59CA} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{4433A54A-1AC8-432F-90FC-85F045CF383C}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{476D0EA3-80F9-48B5-B70B-05E677C9C148} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{476D0EA3-80F9-48B5-B70B-05E677C9C148} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{2272AE7A-0C30-48E1-91DF-F9E666276C0C} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} = "Norton Toolbar" NortonSecurity.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{4433A54A-1AC8-432F-90FC-85F045CF383C}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{B59987EA-25FE-44B4-8802-E4DE67073D8C} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{B59987EA-25FE-44B4-8802-E4DE67073D8C}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Policy = "3" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\AppName = "symerr.exe" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C55C096-0F1D-4F28-AAA2-85EF591126E7} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB} NAV-ESD-22.20.5.39-EN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{2272AE7A-0C30-48E1-91DF-F9E666276C0C}\Compatibility Flags = "1024" NAV-ESD-22.20.5.39-EN.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople NortonSecurity.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople SymErr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs SymErr.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BackupShell.BuPropertySheet\CLSID NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BackupShell.OverlayPending NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{43DCE0DD-22BA-4CE1-A467-94CDD1FBE80C}\ProxyStubClsid32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9CC9305-0A30-4015-92A0-0711EE24E720}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\Programmable NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7102C629-439D-4CE9-A2FA-911713E8E8C2}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEE5EE11-10B4-4531-B306-1C3546BD5F42}\ProxyStubClsid32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2EF276A-4D20-44E9-B9D2-29F129EB826B}\1.0\0\win64\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\ = "BUContextMenu Class" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine32\\22.20.5.39\\buShell.dll" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{43DCE0DD-22BA-4CE1-A467-94CDD1FBE80C}\TypeLib NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C884BB9C-39DE-43A1-8480-B7E2FC5C77C6}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8933BDBF-DADC-44c3-BA6D-F944EBF16362} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BackupShell.OverlayExcluded\CurVer\ = "BackupShell.OverlayExcluded.1" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BackupShell.OverlayProtected NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E224C5C-DFDC-4906-9041-AE43C6405AA1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7102C629-439D-4CE9-A2FA-911713E8E8C2}\ = "IOverlayPending" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E224C5C-DFDC-4906-9041-AE43C6405AA1}\ = "ICatalogSetFolderEnumIDListImpl" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6A750A-637E-43FE-8E8C-CD8CC52AFCF0} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9CC9305-0A30-4015-92A0-0711EE24E720}\ = "IOutlookPlug" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{96237786-C89D-4504-837A-A3BA2C29524D}\InProcServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B59987EA-25FE-44B4-8802-E4DE67073D8C}\ProgID\ = "BackupShell.BuPropertySheet" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{43DCE0DD-22BA-4CE1-A467-94CDD1FBE80C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F0E3A5D7-80C7-4228-90FE-61DF01C417A5} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2EF276A-4D20-44E9-B9D2-29F129EB826B} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BackupShell.OverlayExcluded.1 NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BackupShell.OverlayPending\CLSID NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4433A54A-1AC8-432F-90FC-85F045CF383C} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7102C629-439D-4CE9-A2FA-911713E8E8C2}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C884BB9C-39DE-43A1-8480-B7E2FC5C77C6}\TypeLib\ = "{C2EF276A-4D20-44E9-B9D2-29F129EB826B}" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2272AE7A-0C30-48E1-91DF-F9E666276C0C}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\SymDgnHc.exe NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NortonLifeLock.Norton.Antivirus.IEContextMenu NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2272AE7A-0C30-48E1-91DF-F9E666276C0C} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\NortonSecurity.exe NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\Programmable NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A5C2370-FF1E-4C2B-9796-E2FA2FF1D605}\TypeLib NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6A750A-637E-43FE-8E8C-CD8CC52AFCF0}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9CC9305-0A30-4015-92A0-0711EE24E720} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F13C7C55-93E5-48ca-A5E5-E6564089CAB0}\VersionIndependentProgID\ = "SymDgnHC.SymDiagHelper" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MsouPlug.OutlookPlug.1 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96237786-C89D-4504-837A-A3BA2C29524D}\ = "SymAmsiProvider" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A5C2370-FF1E-4C2B-9796-E2FA2FF1D605}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AA091DCE-F3CA-4ECC-A18D-B1F1871A4690}\ProxyStubClsid32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0579E89F-E364-4a3d-A9CB-90262B2B7E1C}\InfoTip = "@C:\\Program Files\\Norton Security\\Branding\\muis.dll,-116" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\VersionIndependentProgID NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\TypeLib NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A5C2370-FF1E-4C2B-9796-E2FA2FF1D605}\TypeLib NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B69B6ACA-155C-41D0-BC90-4857239731A4}\ = "INortonDriveContextMenuImpl" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408}\ = "Norton Password Manager" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09D32393-10DA-4eca-91AA-AD11C69DB966}\InprocServer32\ = "C:\\Program Files\\Norton Security\\Engine\\22.20.5.39\\McStatus.dll" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD5F89EE-9C85-4D42-B366-919387500641}\1.0\0\win32 NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A5C2370-FF1E-4C2B-9796-E2FA2FF1D605} NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\PropertySheetHandlers\BuPropertySheet NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{476D0EA3-80F9-48B5-B70B-05E677C9C148}\VersionIndependentProgID\ = "BackupShell.OverlayProtected" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F17C0B1E-EF8E-4AD4-8E1B-7D7E8CB23225}\InprocServer32 NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F7CAA2A1-67A2-44BB-B20F-202FD8EB1DAB}\TypeLib\ = "{C2EF276A-4D20-44E9-B9D2-29F129EB826B}" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MsouPlug.OutlookPlug\CurVer\ = "MsouPlug.OutlookPlug.1" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{09D32393-10DA-4eca-91AA-AD11C69DB966}\InprocServer32\ThreadingModel = "Apartment" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DEE5EE11-10B4-4531-B306-1C3546BD5F42} NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F13C7C55-93E5-48ca-A5E5-E6564089CAB0}\LocalServer32\ThreadingModel = "Free" NAV-ESD-22.20.5.39-EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BackupShell.BuPropertySheet\ = "BuPropertySheet Class" NAV-ESD-22.20.5.39-EN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E224C5C-DFDC-4906-9041-AE43C6405AA1} NAV-ESD-22.20.5.39-EN.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 NAV-ESD-22.20.5.39-EN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 NAV-ESD-22.20.5.39-EN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 NAV-ESD-22.20.5.39-EN.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 NAV-ESD-22.20.5.39-EN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe 2012 ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 980 Process not Found 5292 taskmgr.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 644 Process not Found 644 Process not Found 644 Process not Found -
Suspicious behavior: MapViewOfSection 11 IoCs
pid Process 2012 ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 1940 34FD.exe 3200 477D.exe 2176 wtgbrtj 2764 wtgbrtj 5040 wtgbrtj 1752 wtgbrtj -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 2408 chrome.exe 2408 chrome.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 2408 chrome.exe 4304 msedge.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found Token: SeShutdownPrivilege 980 Process not Found Token: SeCreatePagefilePrivilege 980 Process not Found -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 4304 msedge.exe 2408 chrome.exe 980 Process not Found 980 Process not Found 4304 msedge.exe 980 Process not Found 4304 msedge.exe 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 2408 chrome.exe 4304 msedge.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 980 Process not Found 980 Process not Found 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe 1752 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found 980 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 980 Process not Found 4500 NAV-ESD-22.20.5.39-EN.exe 4020 NortonSecurity.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 980 wrote to memory of 4828 980 Process not Found 81 PID 980 wrote to memory of 4828 980 Process not Found 81 PID 980 wrote to memory of 4828 980 Process not Found 81 PID 980 wrote to memory of 4896 980 Process not Found 82 PID 980 wrote to memory of 4896 980 Process not Found 82 PID 980 wrote to memory of 4896 980 Process not Found 82 PID 980 wrote to memory of 2412 980 Process not Found 83 PID 980 wrote to memory of 2412 980 Process not Found 83 PID 980 wrote to memory of 2412 980 Process not Found 83 PID 980 wrote to memory of 1940 980 Process not Found 84 PID 980 wrote to memory of 1940 980 Process not Found 84 PID 980 wrote to memory of 1940 980 Process not Found 84 PID 980 wrote to memory of 3200 980 Process not Found 85 PID 980 wrote to memory of 3200 980 Process not Found 85 PID 980 wrote to memory of 3200 980 Process not Found 85 PID 980 wrote to memory of 3068 980 Process not Found 88 PID 980 wrote to memory of 3068 980 Process not Found 88 PID 980 wrote to memory of 3068 980 Process not Found 88 PID 980 wrote to memory of 3172 980 Process not Found 87 PID 980 wrote to memory of 3172 980 Process not Found 87 PID 980 wrote to memory of 3172 980 Process not Found 87 PID 980 wrote to memory of 4104 980 Process not Found 89 PID 980 wrote to memory of 4104 980 Process not Found 89 PID 4104 wrote to memory of 2672 4104 regsvr32.exe 90 PID 4104 wrote to memory of 2672 4104 regsvr32.exe 90 PID 4104 wrote to memory of 2672 4104 regsvr32.exe 90 PID 980 wrote to memory of 228 980 Process not Found 98 PID 980 wrote to memory of 228 980 Process not Found 98 PID 980 wrote to memory of 228 980 Process not Found 98 PID 980 wrote to memory of 3996 980 Process not Found 91 PID 980 wrote to memory of 3996 980 Process not Found 91 PID 980 wrote to memory of 3996 980 Process not Found 91 PID 980 wrote to memory of 3996 980 Process not Found 91 PID 4896 wrote to memory of 4100 4896 2C7F.exe 92 PID 4896 wrote to memory of 4100 4896 2C7F.exe 92 PID 4896 wrote to memory of 4100 4896 2C7F.exe 92 PID 980 wrote to memory of 380 980 Process not Found 97 PID 980 wrote to memory of 380 980 Process not Found 97 PID 980 wrote to memory of 380 980 Process not Found 97 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4828 wrote to memory of 4264 4828 2AE8.exe 96 PID 4100 wrote to memory of 1476 4100 rovwer.exe 104 PID 4100 wrote to memory of 1476 4100 rovwer.exe 104 PID 4100 wrote to memory of 1476 4100 rovwer.exe 104 PID 4264 wrote to memory of 4732 4264 2AE8.exe 107 PID 4264 wrote to memory of 4732 4264 2AE8.exe 107 PID 4264 wrote to memory of 4732 4264 2AE8.exe 107 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 PID 228 wrote to memory of 4756 228 5B47.exe 108 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe"C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2AE8.exeC:\Users\Admin\AppData\Local\Temp\2AE8.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\2AE8.exeC:\Users\Admin\AppData\Local\Temp\2AE8.exe2⤵
- DcRat
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\2AE8.exe"C:\Users\Admin\AppData\Local\Temp\2AE8.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\2AE8.exe"C:\Users\Admin\AppData\Local\Temp\2AE8.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
PID:5668 -
C:\Users\Admin\AppData\Local\6fba7451-a95d-43a8-9c28-96aa56ae201c\build2.exe"C:\Users\Admin\AppData\Local\6fba7451-a95d-43a8-9c28-96aa56ae201c\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4720 -
C:\Users\Admin\AppData\Local\6fba7451-a95d-43a8-9c28-96aa56ae201c\build2.exe"C:\Users\Admin\AppData\Local\6fba7451-a95d-43a8-9c28-96aa56ae201c\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
PID:4732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\6fba7451-a95d-43a8-9c28-96aa56ae201c\build2.exe" & exit7⤵PID:4808
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:4688
-
-
-
-
-
C:\Users\Admin\AppData\Local\6fba7451-a95d-43a8-9c28-96aa56ae201c\build3.exe"C:\Users\Admin\AppData\Local\6fba7451-a95d-43a8-9c28-96aa56ae201c\build3.exe"5⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- DcRat
- Creates scheduled task(s)
PID:2372
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2C7F.exeC:\Users\Admin\AppData\Local\Temp\2C7F.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:1476
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_win_path
PID:5584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 11402⤵
- Program crash
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\2F11.exeC:\Users\Admin\AppData\Local\Temp\2F11.exe1⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 4442⤵
- Program crash
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\34FD.exeC:\Users\Admin\AppData\Local\Temp\34FD.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1940
-
C:\Users\Admin\AppData\Local\Temp\477D.exeC:\Users\Admin\AppData\Local\Temp\477D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3200
-
C:\Users\Admin\AppData\Local\Temp\522D.exeC:\Users\Admin\AppData\Local\Temp\522D.exe1⤵
- Executes dropped EXE
PID:3172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 3402⤵
- Program crash
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\4DD7.exeC:\Users\Admin\AppData\Local\Temp\4DD7.exe1⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 3442⤵
- Program crash
PID:984
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\56F1.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\56F1.dll2⤵
- Loads dropped DLL
PID:2672
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3068 -ip 30681⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4896 -ip 48961⤵PID:4440
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\5B47.exeC:\Users\Admin\AppData\Local\Temp\5B47.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\5B47.exeC:\Users\Admin\AppData\Local\Temp\5B47.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
PID:4756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://search-hoj.com/reginst/prg/3a483db7/102/0/"3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffa064846f8,0x7ffa06484708,0x7ffa064847184⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:24⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:34⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:84⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:14⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:14⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4756 /prefetch:84⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5248 /prefetch:84⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:14⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:14⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:14⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:84⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵PID:3472
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7a8b25460,0x7ff7a8b25470,0x7ff7a8b254805⤵PID:5884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:84⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6288 /prefetch:84⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:24⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3180 /prefetch:84⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4960 /prefetch:84⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5364 /prefetch:84⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:84⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1328 /prefetch:84⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2128,1778785697361946362,16620734516500389394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5076 /prefetch:84⤵PID:1280
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://search-hoj.com/reginst/prg/3a483db7/102/0/"3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa065a4f50,0x7ffa065a4f60,0x7ffa065a4f704⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1644 /prefetch:24⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1968 /prefetch:84⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2396 /prefetch:84⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3024 /prefetch:14⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3016 /prefetch:14⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:14⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 /prefetch:84⤵PID:5704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 /prefetch:84⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:84⤵PID:728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3660 /prefetch:84⤵PID:5724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 /prefetch:84⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3664 /prefetch:84⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3388 /prefetch:24⤵PID:5676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3432 /prefetch:84⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2372 /prefetch:84⤵PID:5344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3008 /prefetch:84⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1604,6516894817733926297,5549545372535340659,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4476 /prefetch:84⤵PID:1180
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2412 -ip 24121⤵PID:732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3172 -ip 31721⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 4202⤵
- Program crash
PID:5052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4828 -ip 48281⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 4202⤵
- Program crash
PID:5976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2188 -ip 21881⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:5496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5496 -s 4162⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5496 -ip 54961⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 4282⤵
- Program crash
PID:5664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2024 -ip 20241⤵PID:4624
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:4212 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- DcRat
- Creates scheduled task(s)
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 4202⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1156 -ip 11561⤵PID:5884
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:1752
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 4202⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4676 -ip 46761⤵PID:4764
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa065a4f50,0x7ffa065a4f60,0x7ffa065a4f702⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1668 /prefetch:22⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2712 /prefetch:12⤵PID:5400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1936 /prefetch:82⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2720 /prefetch:12⤵PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2212 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=916 /prefetch:12⤵PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1600 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1492 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2216 /prefetch:12⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:5492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:5820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3180 /prefetch:82⤵PID:5372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3524 /prefetch:82⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:5412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5184 /prefetch:22⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2916 /prefetch:12⤵PID:608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:5560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:5872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:5940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3048 /prefetch:82⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2328 /prefetch:12⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=76 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:5892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6812 /prefetch:12⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=82 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:12⤵PID:5768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=81 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:5776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7312 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=85 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7540 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=84 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7248 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=86 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7848 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7776 /prefetch:12⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8144 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8376 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8532 /prefetch:12⤵PID:6032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=89 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8276 /prefetch:12⤵PID:6044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=93 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8684 /prefetch:12⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=94 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8768 /prefetch:12⤵PID:6016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=92 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8660 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=95 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9176 /prefetch:12⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9328 /prefetch:12⤵PID:5292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=99 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9680 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=98 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9556 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=97 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9136 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=100 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7324 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=101 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=102 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:12⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=103 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=104 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7300 /prefetch:12⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=106 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=105 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7516 /prefetch:12⤵PID:5872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=107 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9988 /prefetch:12⤵PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=108 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=109 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10448 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=110 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6816 /prefetch:12⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=111 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=112 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1620 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=113 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8328 /prefetch:12⤵PID:5228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=119 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7588 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=120 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7576 /prefetch:12⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=118 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7664 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=117 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7720 /prefetch:12⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=116 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8056 /prefetch:12⤵PID:6004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=115 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8076 /prefetch:12⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=114 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8148 /prefetch:12⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=121 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:12⤵PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=122 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=123 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9084 /prefetch:12⤵PID:5908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=124 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8172 /prefetch:12⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=125 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=126 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=127 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10204 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=128 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=129 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9808 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=130 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9972 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3864 /prefetch:82⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9452 /prefetch:82⤵PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=133 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=134 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=136 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7740 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=135 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=137 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6596 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=138 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=139 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7356 /prefetch:12⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6616 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8824 /prefetch:82⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6448 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6560 /prefetch:82⤵PID:5788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6632 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 /prefetch:82⤵PID:6104
-
-
C:\Users\Admin\Downloads\NAV-ESD-22.20.5.39-EN.exe"C:\Users\Admin\Downloads\NAV-ESD-22.20.5.39-EN.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Program Files\Norton Security\Engine\22.20.5.39\coInst.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\coInst.exe" /install3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SRTSP_CA.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SRTSP_CA.exe" /install3⤵
- Executes dropped EXE
PID:2256
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\EFAInst64.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\EFAInst64.exe" /legacydelsysvolinfo3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymVTCatalogDB.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymVTCatalogDB.exe" /d3⤵
- Executes dropped EXE
PID:4300
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\ELAMInst.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\ELAMInst.exe" "C:\Windows\System32\drivers\NGCx64\1614050.027" /install /installcertinfo3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5588
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\Sevntx64.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\Sevntx64.exe" /Q /HRESULT /CheckForOlderVersion /log IS3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
PID:960
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\RuleUp.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\RuleUp.exe" /install3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3188
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\symerr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\symerr.exe" /uninstalltasksandlegacy3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280
-
-
C:\Program Files\Norton Security\Engine32\22.20.5.39\tuIH.exe"C:\Program Files\Norton Security\Engine32\22.20.5.39\tuIH.exe" /install3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:660
-
-
C:\Program Files\Norton Security\Engine32\22.20.5.39\InstCA.exe"C:\Program Files\Norton Security\Engine32\22.20.5.39\InstCA.exe" /install3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5056
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\coInst.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\coInst.exe" /install3⤵
- Executes dropped EXE
PID:5144
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SRTSP_CA.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SRTSP_CA.exe" /install3⤵
- Executes dropped EXE
PID:3064
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\EFAInst64.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\EFAInst64.exe" /legacydelsysvolinfo3⤵
- Executes dropped EXE
PID:2008
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymVTCatalogDB.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymVTCatalogDB.exe" /d3⤵
- Executes dropped EXE
PID:1784
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\ELAMInst.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\ELAMInst.exe" "C:\Windows\System32\drivers\NGCx64\1614050.027" /install /installcertinfo3⤵
- Executes dropped EXE
PID:4536
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\Sevntx64.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\Sevntx64.exe" /Q /HRESULT /CheckForOlderVersion /log IS3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5696
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\RuleUp.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\RuleUp.exe" /install3⤵
- Executes dropped EXE
PID:4048
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\symerr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\symerr.exe" /uninstalltasksandlegacy3⤵
- Executes dropped EXE
PID:1732
-
-
C:\Program Files\Norton Security\Engine32\22.20.5.39\tuIH.exe"C:\Program Files\Norton Security\Engine32\22.20.5.39\tuIH.exe" /install3⤵
- Executes dropped EXE
PID:1684
-
-
C:\Program Files\Norton Security\Engine32\22.20.5.39\InstCA.exe"C:\Program Files\Norton Security\Engine32\22.20.5.39\InstCA.exe" /install3⤵
- Executes dropped EXE
PID:5508
-
-
C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\InstStub.exe"C:\Program Files (x86)\NortonInstaller\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC\562C4DD5\22.20.5.39\InstStub.exe" /TRAYONLY3⤵
- Executes dropped EXE
PID:1388
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1720 /prefetch:82⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4716 /prefetch:82⤵PID:5596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1708 /prefetch:82⤵PID:6120
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=lOLFXvEmZv5Y6bV7bPMuWFKTNu7RFNIYJHZNaJFX --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=Off2⤵
- Executes dropped EXE
PID:5188 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=107.294.200 --initial-client-data=0x294,0x298,0x29c,0x268,0x2a0,0x7ff771445960,0x7ff771445970,0x7ff7714459803⤵
- Executes dropped EXE
PID:4644
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5188_ZKHYKLOATJNLAMUI" --sandboxed-process-id=2 --init-done-notifier=784 --sandbox-mojo-pipe-token=257946272168227906 --mojo-platform-channel-handle=760 --engine=23⤵
- Executes dropped EXE
PID:4300
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5188_ZKHYKLOATJNLAMUI" --sandboxed-process-id=3 --init-done-notifier=1016 --sandbox-mojo-pipe-token=17487811587754019994 --mojo-platform-channel-handle=10123⤵
- Executes dropped EXE
PID:5928
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1888 /prefetch:82⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=10212 /prefetch:82⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1420 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1420 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=157 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=158 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10000 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=159 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10440 /prefetch:12⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=160 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1656,17743526748248276555,3805670542023917204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=161 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8824 /prefetch:12⤵PID:3944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 4282⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3016 -ip 30161⤵PID:5964
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
PID:4104 -
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4104_553626233\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4104_553626233\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={8d5674ab-3bf3-4ab7-87ca-4c2a2c412b01} --system2⤵
- Executes dropped EXE
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 4202⤵
- Program crash
PID:6024
-
-
C:\Users\Admin\AppData\Roaming\wtgbrtjC:\Users\Admin\AppData\Roaming\wtgbrtj1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2176
-
C:\Users\Admin\AppData\Roaming\cigbrtjC:\Users\Admin\AppData\Roaming\cigbrtj1⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 3442⤵
- Program crash
PID:5404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4152 -ip 41521⤵PID:6044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2364 -ip 23641⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 4322⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5076 -ip 50761⤵PID:2164
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c 0x32c1⤵PID:5240
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 4202⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3712 -ip 37121⤵PID:5068
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:5292
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 4202⤵
- Program crash
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4816 -ip 48161⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:5952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5952 -s 4202⤵
- Program crash
PID:4164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5952 -ip 59521⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:5364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5364 -s 4282⤵
- Program crash
PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5364 -ip 53641⤵PID:2276
-
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4444 -
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task2⤵
- Executes dropped EXE
PID:3620
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\uiStub.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\uiStub.exe" /win81⤵
- Executes dropped EXE
PID:924 -
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\13347E23\B772681D-E1E5-41A5-9DC9-E81057BEF4B5.dat"2⤵PID:2164
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\NortonSecurity.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\NortonSecurity.exe" /s "NortonSecurity" /m "C:\Program Files\Norton Security\Engine\22.20.5.39\diMaster.dll" /prefetch:11⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
PID:4680 -
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\33230791\BB2429F8-83FA-4445-9CF5-6B5A3E69102A.dat"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5288
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\NortonSecurity.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\NortonSecurity.exe" /c /a /s UserSession22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4020 -
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\B8D6822C\CC32DFB2-AD7C-4FD0-AF95-F9C72FA3BF72.dat"3⤵PID:4816
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\993DA71E\B67D158E-4E9A-4621-B8B0-4E8391BE310F.dat"3⤵PID:960
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\718D2846\C5AFC715-B26D-4653-A2E1-E2EEE36979AF.dat"3⤵PID:2276
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\E589B070\76372009-1017-4195-8785-EA9A9B7EE3EF.dat"3⤵PID:3080
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\24E6AB0D\11392714-117C-4116-AEF8-B4C163A95D0C.dat"3⤵PID:984
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\C395E710\6B012B29-D3EA-479D-8F3D-87A5E8219461.dat"3⤵PID:5692
-
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\A213B7A2\34FB5872-2F04-472D-9AAB-57A250F0630A.dat"2⤵
- Modifies data under HKEY_USERS
PID:4924
-
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\552D93DD\53FE1FD1-1178-415F-AB78-D75EFBC240EE.dat"2⤵
- Modifies data under HKEY_USERS
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 4202⤵
- Program crash
PID:5264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 1704 -ip 17041⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 4202⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1156 -ip 11561⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 4242⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1316 -ip 13161⤵PID:2872
-
C:\Program Files\Norton Security\Engine\22.20.5.39\uiStub.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\uiStub.exe" /win81⤵PID:2868
-
C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe"C:\Program Files\Norton Security\Engine\22.20.5.39\SymErr.exe" /file "C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NGC_22.20.5.39\CmnClnt\ErrorInstances\13347E23\16E74271-B830-476D-AD5B-321ADA18D791.dat"2⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 3082⤵
- Program crash
PID:5752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4592 -ip 45921⤵PID:3936
-
C:\Users\Admin\AppData\Roaming\wtgbrtjC:\Users\Admin\AppData\Roaming\wtgbrtj1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2764
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 4202⤵
- Program crash
PID:5436
-
-
C:\Users\Admin\AppData\Roaming\cigbrtjC:\Users\Admin\AppData\Roaming\cigbrtj1⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 3082⤵
- Program crash
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 224 -ip 2241⤵PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1272 -ip 12721⤵PID:2204
-
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:4996 -
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task2⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 4202⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 508 -ip 5081⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 4282⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3056 -ip 30561⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 4202⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 812 -ip 8121⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 4362⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1992 -ip 19921⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 4202⤵
- Program crash
PID:1160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5048 -ip 50481⤵PID:5860
-
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:1816 -
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task2⤵PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 4202⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1572 -ip 15721⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 4202⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 4976 -ip 49761⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5176 -s 4282⤵
- Program crash
PID:5604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5176 -ip 51761⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 4162⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 5992 -ip 59921⤵PID:5212
-
C:\Users\Admin\AppData\Roaming\wtgbrtjC:\Users\Admin\AppData\Roaming\wtgbrtj1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5040
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 4202⤵
- Program crash
PID:1120
-
-
C:\Users\Admin\AppData\Roaming\cigbrtjC:\Users\Admin\AppData\Roaming\cigbrtj1⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 3082⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 3296 -ip 32961⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3580 -ip 35801⤵PID:5356
-
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:6028 -
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task2⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5960 -s 4202⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5960 -ip 59601⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 4282⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3968 -ip 39681⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 4202⤵
- Program crash
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 812 -ip 8121⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 4202⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3964 -ip 39641⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 4202⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 2828 -ip 28281⤵PID:2352
-
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:5428 -
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task2⤵PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5548 -s 4202⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5548 -ip 55481⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 4282⤵
- Program crash
PID:5764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2592 -ip 25921⤵PID:5884
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 4242⤵
- Program crash
PID:5136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 5356 -ip 53561⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:2764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 4202⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2764 -ip 27641⤵PID:684
-
C:\Users\Admin\AppData\Roaming\wtgbrtjC:\Users\Admin\AppData\Roaming\wtgbrtj1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1752
-
C:\Users\Admin\AppData\Roaming\cigbrtjC:\Users\Admin\AppData\Roaming\cigbrtj1⤵PID:5368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5368 -s 3162⤵
- Program crash
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5244 -s 4282⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 5368 -ip 53681⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 5244 -ip 52441⤵PID:5296
-
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:5172 -
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task2⤵PID:5248
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5516 -s 4202⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5516 -ip 55161⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 4202⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1428 -ip 14281⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 4282⤵
- Program crash
PID:5700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3104 -ip 31041⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 4202⤵
- Program crash
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 3316 -ip 33161⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:5636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5636 -s 4202⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5636 -ip 56361⤵PID:5348
-
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:5084 -
C:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exeC:\Users\Admin\AppData\Local\fa96cd4c-0338-45c0-b0c0-e4237608920c\2AE8.exe --Task2⤵PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 4202⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4788 -ip 47881⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 4202⤵
- Program crash
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4508 -ip 45081⤵PID:948
Network
MITRE ATT&CK Enterprise v6
Persistence
Browser Extensions
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD52cd5657a1cfb86af007a58bcd99d5d01
SHA1bfb94c15ba860e8f416bff681ce2905b7eba1928
SHA25616a711f021c02fd543d01b8a6dfc2e8154dcfe7f21f11b21fe0bd2f353efd80b
SHA51210ebad85bc74fd56bbe00db0c27a5a58d2a15d2db2c9a15ecfcfd82daf86c1a7b8ce2f39de6e1b7cf2d87dd430e0b7e21a35f0698c983f02ea70b2fab82492d1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\128.png
Filesize8KB
MD51f2092ca6379fb8aaf583d4bc260955e
SHA11f5c95c87fc0e794fffa81f9db5e6663eefa2cd1
SHA256bf8b8d46317c1fda356507735093f90dff5a578f564ed482b1166088ffcb8015
SHA5125ee4e914801fd60a3f3840cb7836f4773c6a49cfc878b431a60d0eb7e7dc391d1efdb079fab134ed08148a94e83d1eeb483a698f6cb8d3136dadd645058b9cd7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\16.png
Filesize843B
MD5c2e121bfc2b42d77c4632f0e43968ac2
SHA10f1d5bc95df1b6b333055871f25172ee66ceb21d
SHA2567d0d655cccfc117307faf463404da2931c2f5deae5ce80e638e042beccfa7b1e
SHA512baa00af5fe6de9a3de61f85f4e27dec9c5c9a12052fb1d110f2dc5c1a4e39d275547a6d0368a93f6c0c88945dca3777b550408942f7c498ba556170b1e7a243c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\24.png
Filesize1KB
MD552b03cd5ab1715c9478925d24e470989
SHA1675804f5552867b9015b6cdb2328a88b3596a00c
SHA256afb7462a5952697a10eda8f653fb57287def531ba851678323dfa838a0291ccb
SHA51200dc3c4ae1939f16e506bf414d369c755e5043edbaf9181e9c05f48d1cc55c5f05f67c9cab2ab82a2845fdeba977d47c263bdd23762ba3cfcea43d8bb1b3fdd3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\32.png
Filesize1KB
MD5a11da999ffc6d60d18430e21be60a921
SHA1f98adfc8f6c526f2d3d9bd7b8726a7ea851ec1e5
SHA2561e8162fa7f3109b450c66d3c7a4a8ba205f1516d23a5b610ab396ec0931b6dc6
SHA5128aa2078ff8e68edd30ba46a4cae1a87df2a92e9623c848f0bcd816791f6243faa98164ec849c544130f22b8cb1fa1bd9e5bece8367fde1fd22fe8b1da09ce401
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\36.png
Filesize2KB
MD54e93455eb724d13f8cddbe4c5fd236c3
SHA13e8c930686c4024e0a3e6cd813d709ce67a7208d
SHA256a3e4f86e7e85040a8e234652d834c089bdb2849937194b612ca1963c81fcc69f
SHA51278a3c51f4db8aa273f6d0363c93c0b88d401752b18007b1a09303236b1d91e9758d8ea32a88b8ce76c6e820fe0ebca5ae1fc28c86dc98479f1ff8200c2dfeb83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\48.png
Filesize3KB
MD5059ee71acc8439f352e350aecd374ab9
SHA1d5143bf7aad6847d46f0230f0edf6393db4c9a8c
SHA2560047690e602eb4a017c27402ad27cfe3b2e897b6e7b298e4f022e69fa2024b50
SHA51291928af347a547678d15b95836b7daeb6b2fbbd4855f067be9f6b8feadafff7803aa31159c8a1bf8f7cb95733bde883315a189dae54d898d517f521ea37d5ded
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\64.png
Filesize4KB
MD5d93ff667b54492bba9b9490cf588bf49
SHA19a9f6fc23ecbaacebbc3260c76bb57bab5949a63
SHA25655a82197ac30ec87ecbaa140ed6f007c4d4a379834370a518b77971e0107c9a0
SHA512923051a25d4c4567cee0af02feb4cf02bdecca3c6f344bc48994941632637c0ec47303734f5e3dc76160b2c9f2f4eae704ac48e2806ac998a4dc8707c7db59b6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\js\ads.js
Filesize5KB
MD58a6ae25fdab0c267e050cee7172290c6
SHA169e3f9e40e36ef9705626990aecc00e578a26501
SHA256d41e04886f3dc8379a35a788b85060dba2e23303787f4ad44d0a07964ad034a5
SHA51245a426e26055ca457536965e8098c84d134aa533ce2fd8712a7e7549fb78394e74c866f507c78eccf81eb3e993fedbc483d8e62fafe8b35bdb3a22c983a331b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json
Filesize1KB
MD523bb601e1a3c4a5a19830739f33b6f7b
SHA13558f1194cf2562f66245d7d5f562e7331da8afd
SHA25604bbd2c615f81fd4f57663259f6373224033b23c623bc1265afcd8ceb548f1bb
SHA51271cb66058b9cd2feb98b01d78554422fbbad148fc2e9450a6fcdf25af6a8bed4a3c0d71df6293e1da22af4f24e31bc95fa1f54836e2f7798c56bd03d144b1dba
-
Filesize
6KB
MD5c89fcf11ce0449d6ba15e44eecdf2032
SHA19273e58b022e1bb51b5b458bfd8c402e1e14e84b
SHA256df1daa2d176731398ef6cb81e017906869e2da6c2d93da1f77a085c13eac9943
SHA51220497577a5145aace37478510b767d7ad97a333dd403273c668eda401581c57667ae2f6c4ce61d507d914ca5f8b9427f675e3bf97131b4ece2b20573a9a17f2a
-
Filesize
17KB
MD5a98ff5837ee4c4fec4903e1978667385
SHA19d257507532007745d74085dc92fdd6f240af825
SHA2563838b483f6e909691c57f811198ffc6ee44a099fc302967677bc49afb0e41d4f
SHA5129c65d022783a4c7144f575c967b77082c04cf3111da40e1c8a2e6e9e8d3f202ddca324beacf4e8c81fbfad8aa578e454e7a2b9de10419134c11136797eaa9efd
-
Filesize
88KB
MD5b9c332ec7fcc5e7296f8888ce963b307
SHA1c534bf360a431beb86c236612943f4588559af57
SHA2560ea8b98e11c25cc8b65f4fa618dbc24ba04354e76d3dd550ef3eb76c07bc45cc
SHA51249ee6ff545478ef65277767a275bbc81a68a662152e1ef697584171fcbad99e9285d6c7ad1d8fe027321340aa29ef5c1da4f85d8bce45d7526cfb1831351bc68
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\128.png
Filesize8KB
MD51f2092ca6379fb8aaf583d4bc260955e
SHA11f5c95c87fc0e794fffa81f9db5e6663eefa2cd1
SHA256bf8b8d46317c1fda356507735093f90dff5a578f564ed482b1166088ffcb8015
SHA5125ee4e914801fd60a3f3840cb7836f4773c6a49cfc878b431a60d0eb7e7dc391d1efdb079fab134ed08148a94e83d1eeb483a698f6cb8d3136dadd645058b9cd7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\16.png
Filesize843B
MD5c2e121bfc2b42d77c4632f0e43968ac2
SHA10f1d5bc95df1b6b333055871f25172ee66ceb21d
SHA2567d0d655cccfc117307faf463404da2931c2f5deae5ce80e638e042beccfa7b1e
SHA512baa00af5fe6de9a3de61f85f4e27dec9c5c9a12052fb1d110f2dc5c1a4e39d275547a6d0368a93f6c0c88945dca3777b550408942f7c498ba556170b1e7a243c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\24.png
Filesize1KB
MD552b03cd5ab1715c9478925d24e470989
SHA1675804f5552867b9015b6cdb2328a88b3596a00c
SHA256afb7462a5952697a10eda8f653fb57287def531ba851678323dfa838a0291ccb
SHA51200dc3c4ae1939f16e506bf414d369c755e5043edbaf9181e9c05f48d1cc55c5f05f67c9cab2ab82a2845fdeba977d47c263bdd23762ba3cfcea43d8bb1b3fdd3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\32.png
Filesize1KB
MD5a11da999ffc6d60d18430e21be60a921
SHA1f98adfc8f6c526f2d3d9bd7b8726a7ea851ec1e5
SHA2561e8162fa7f3109b450c66d3c7a4a8ba205f1516d23a5b610ab396ec0931b6dc6
SHA5128aa2078ff8e68edd30ba46a4cae1a87df2a92e9623c848f0bcd816791f6243faa98164ec849c544130f22b8cb1fa1bd9e5bece8367fde1fd22fe8b1da09ce401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\36.png
Filesize2KB
MD54e93455eb724d13f8cddbe4c5fd236c3
SHA13e8c930686c4024e0a3e6cd813d709ce67a7208d
SHA256a3e4f86e7e85040a8e234652d834c089bdb2849937194b612ca1963c81fcc69f
SHA51278a3c51f4db8aa273f6d0363c93c0b88d401752b18007b1a09303236b1d91e9758d8ea32a88b8ce76c6e820fe0ebca5ae1fc28c86dc98479f1ff8200c2dfeb83
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\48.png
Filesize3KB
MD5059ee71acc8439f352e350aecd374ab9
SHA1d5143bf7aad6847d46f0230f0edf6393db4c9a8c
SHA2560047690e602eb4a017c27402ad27cfe3b2e897b6e7b298e4f022e69fa2024b50
SHA51291928af347a547678d15b95836b7daeb6b2fbbd4855f067be9f6b8feadafff7803aa31159c8a1bf8f7cb95733bde883315a189dae54d898d517f521ea37d5ded
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\ico\64.png
Filesize4KB
MD5d93ff667b54492bba9b9490cf588bf49
SHA19a9f6fc23ecbaacebbc3260c76bb57bab5949a63
SHA25655a82197ac30ec87ecbaa140ed6f007c4d4a379834370a518b77971e0107c9a0
SHA512923051a25d4c4567cee0af02feb4cf02bdecca3c6f344bc48994941632637c0ec47303734f5e3dc76160b2c9f2f4eae704ac48e2806ac998a4dc8707c7db59b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\js\ads.js
Filesize5KB
MD58a6ae25fdab0c267e050cee7172290c6
SHA169e3f9e40e36ef9705626990aecc00e578a26501
SHA256d41e04886f3dc8379a35a788b85060dba2e23303787f4ad44d0a07964ad034a5
SHA51245a426e26055ca457536965e8098c84d134aa533ce2fd8712a7e7549fb78394e74c866f507c78eccf81eb3e993fedbc483d8e62fafe8b35bdb3a22c983a331b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\cdklkehakandkgnhnjnbpnnngiohpchj\0.0.0_0\manifest.json
Filesize1KB
MD523bb601e1a3c4a5a19830739f33b6f7b
SHA13558f1194cf2562f66245d7d5f562e7331da8afd
SHA25604bbd2c615f81fd4f57663259f6373224033b23c623bc1265afcd8ceb548f1bb
SHA51271cb66058b9cd2feb98b01d78554422fbbad148fc2e9450a6fcdf25af6a8bed4a3c0d71df6293e1da22af4f24e31bc95fa1f54836e2f7798c56bd03d144b1dba
-
Filesize
3KB
MD5917cf3bd19d3e976d28b07741002d824
SHA1de63528c365706a7a19817c7d8b67865c06ce82a
SHA256c41b8f1f3d0eef113b7df26de10a733e056283c98bb58f435f96665ce72139d4
SHA512f97faf06ed5db1c6f6b29a382e41bfd80230428b1363a18fe8bc1f95acdb63f8d0e35d6da4be1be65c45f07a31ea0d375438ab0e0d40426ffe499a6c7b4992e0
-
Filesize
26KB
MD53ad04b1312af5af997119c85db8e2bbf
SHA106a63548e3bcb92e40f51c5f0dd815414f1ba336
SHA25603e8ca0fb068b108b3626b0ca87526482bacc4fbf59b25eabbd98f1e2b6333f7
SHA512cc942183b99b8a97cbd191865992d4d4eda09ccb74b8fc91e773b66613ae9f68d242210d27457ea65c5884d033c04c3f1bde4fc07a8e97946b11984e47a0f44f
-
Filesize
112KB
MD5184b44f0c181703a19b2488ca962b320
SHA1ff14c17be8ea309c4825d978c9a3311b8c7e8e97
SHA256217fc4f44d769b5a2c2986f7decd1ee0dae87137091dd3133da9f39cdd33eea0
SHA512c19368b3431fa19847ade6589a8969a14c056ff646b5a7988db67502c138af7d68aa68b06ce1b71581c715fa35b84206d6cab5132a258fcbbb732bb1275abf61
-
Filesize
2KB
MD50acd7f001254a6aa62b27f95a16b033d
SHA1a10e75763e3eb9bee35b7ae9c101d7eddcca2716
SHA256f9682dbb97dd9c9d73e9d23ceab06ba73b974c9f19bdb419fc3d3aeb8b9215ae
SHA512d8216eadcbe70b1e9945b0fa3e140d3ee8767e3b2899d6bfbe25e742a3e4517fa04d45118131f292769ffa021f0d8d064b51ff3ee94ccd00dd00aa0e50c297e9
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
Filesize
204KB
MD57a08dddaf46824ff249224fd48591b18
SHA186a4b189594ab64831622ac1e78718dfba40cda8
SHA2566d9852dec66703e9518cbafddff0e640f4b776bbf8a0cc3201eba942a7a7a3aa
SHA5123680c88d3f3d41fcea155eec6a4c1d4e07ad055a8d84f678ee9c8895831256295ede48bb76a5857fc07590dece0965a2610710ed4869a083cbd4cea8ed70cd46
-
Filesize
204KB
MD57a08dddaf46824ff249224fd48591b18
SHA186a4b189594ab64831622ac1e78718dfba40cda8
SHA2566d9852dec66703e9518cbafddff0e640f4b776bbf8a0cc3201eba942a7a7a3aa
SHA5123680c88d3f3d41fcea155eec6a4c1d4e07ad055a8d84f678ee9c8895831256295ede48bb76a5857fc07590dece0965a2610710ed4869a083cbd4cea8ed70cd46
-
Filesize
313KB
MD5c42d13fbc2efd907113054c91ff86130
SHA16dc92133c1410be4d4911b7ae934e8c4a6d050af
SHA25676153e0e8d619392a7b5dd5334cd7900e2fcfac29e23d64489d167321ff9eee0
SHA5126a5e8c3437638423a7ff354970ea93fd840c1c840843f0c7168ef517e53d63d9712f1972ece0a9c3d0abca7c1e6d2cbbe72fcfaf4296cee9a9b6a83eaeb7a552
-
Filesize
313KB
MD5c42d13fbc2efd907113054c91ff86130
SHA16dc92133c1410be4d4911b7ae934e8c4a6d050af
SHA25676153e0e8d619392a7b5dd5334cd7900e2fcfac29e23d64489d167321ff9eee0
SHA5126a5e8c3437638423a7ff354970ea93fd840c1c840843f0c7168ef517e53d63d9712f1972ece0a9c3d0abca7c1e6d2cbbe72fcfaf4296cee9a9b6a83eaeb7a552
-
Filesize
145KB
MD5074ba3457745515c7d081e6b14dfe5da
SHA146d85073d72767779945c960fb140aeafd355732
SHA2562215fbfce2b9d29e5cf5da500b6e3e9a8b073c70165d3e21f6339133653aae87
SHA512c8565734e610c0be32cf57fb89ce6217e7031b0601163959896cadec2933a3ad671a0a6418134896d11314f22ed283bdf7ecaeefc336a3479a6d97ffc8b83c29
-
Filesize
145KB
MD5074ba3457745515c7d081e6b14dfe5da
SHA146d85073d72767779945c960fb140aeafd355732
SHA2562215fbfce2b9d29e5cf5da500b6e3e9a8b073c70165d3e21f6339133653aae87
SHA512c8565734e610c0be32cf57fb89ce6217e7031b0601163959896cadec2933a3ad671a0a6418134896d11314f22ed283bdf7ecaeefc336a3479a6d97ffc8b83c29
-
Filesize
274KB
MD526ab12af334137fedf1961a421294abc
SHA1f96fa14d035e6408d47093a85be5f6224ee250ed
SHA256dc0c9b8a82e97a0275bae25dff21b46f3e8521a235cf7fea929fe3d2d4609e67
SHA512c92afc703a810ed694f5d53c2f23225fc90698387ee9ab8d007bd27240a3c694b42517015b331f487c041dff4bd52684bc16f1bbdfe3a7ac5851a7627529ef25
-
Filesize
274KB
MD526ab12af334137fedf1961a421294abc
SHA1f96fa14d035e6408d47093a85be5f6224ee250ed
SHA256dc0c9b8a82e97a0275bae25dff21b46f3e8521a235cf7fea929fe3d2d4609e67
SHA512c92afc703a810ed694f5d53c2f23225fc90698387ee9ab8d007bd27240a3c694b42517015b331f487c041dff4bd52684bc16f1bbdfe3a7ac5851a7627529ef25
-
Filesize
146KB
MD55d49eb050d5ab9f146dc66b58c8ce505
SHA1e85332934c0407dd2384a1e6e11805b91016e4d5
SHA256995968777fcc92c1dd0bccc63d17c47353fbb32c68a2af90b3b60744a596dc9a
SHA51270479acc19f922ee49ef9037cd07f23dd4af854b7db3acab51824f0f518420ef041201147a32bcad58e8966de246b82c1161f326e753074d16cbbf098b9a3d7f
-
Filesize
146KB
MD55d49eb050d5ab9f146dc66b58c8ce505
SHA1e85332934c0407dd2384a1e6e11805b91016e4d5
SHA256995968777fcc92c1dd0bccc63d17c47353fbb32c68a2af90b3b60744a596dc9a
SHA51270479acc19f922ee49ef9037cd07f23dd4af854b7db3acab51824f0f518420ef041201147a32bcad58e8966de246b82c1161f326e753074d16cbbf098b9a3d7f
-
Filesize
204KB
MD57a08dddaf46824ff249224fd48591b18
SHA186a4b189594ab64831622ac1e78718dfba40cda8
SHA2566d9852dec66703e9518cbafddff0e640f4b776bbf8a0cc3201eba942a7a7a3aa
SHA5123680c88d3f3d41fcea155eec6a4c1d4e07ad055a8d84f678ee9c8895831256295ede48bb76a5857fc07590dece0965a2610710ed4869a083cbd4cea8ed70cd46
-
Filesize
204KB
MD57a08dddaf46824ff249224fd48591b18
SHA186a4b189594ab64831622ac1e78718dfba40cda8
SHA2566d9852dec66703e9518cbafddff0e640f4b776bbf8a0cc3201eba942a7a7a3aa
SHA5123680c88d3f3d41fcea155eec6a4c1d4e07ad055a8d84f678ee9c8895831256295ede48bb76a5857fc07590dece0965a2610710ed4869a083cbd4cea8ed70cd46
-
Filesize
204KB
MD57a08dddaf46824ff249224fd48591b18
SHA186a4b189594ab64831622ac1e78718dfba40cda8
SHA2566d9852dec66703e9518cbafddff0e640f4b776bbf8a0cc3201eba942a7a7a3aa
SHA5123680c88d3f3d41fcea155eec6a4c1d4e07ad055a8d84f678ee9c8895831256295ede48bb76a5857fc07590dece0965a2610710ed4869a083cbd4cea8ed70cd46
-
Filesize
274KB
MD529a373c2434df5c3203864edadf0142e
SHA106eeaf59c220156007f491e6d5c158ef8cbe39da
SHA256278234b6fac8082ce18f4898067337c0933d8b604a90694c8d30e7d7eab23d48
SHA5122580ecc59623888e9de48a2a3dda5ab6d89d3f8e4f9ba6e0a6e1f8fe6bc9d9bccb2d4f7f6278f362e8bc5993135ed19dad99231f854971cb2a9d5163d7a5cd03
-
Filesize
274KB
MD529a373c2434df5c3203864edadf0142e
SHA106eeaf59c220156007f491e6d5c158ef8cbe39da
SHA256278234b6fac8082ce18f4898067337c0933d8b604a90694c8d30e7d7eab23d48
SHA5122580ecc59623888e9de48a2a3dda5ab6d89d3f8e4f9ba6e0a6e1f8fe6bc9d9bccb2d4f7f6278f362e8bc5993135ed19dad99231f854971cb2a9d5163d7a5cd03
-
Filesize
2.2MB
MD5c5b915ef4725ee4ad0229e053dad05d4
SHA1032fb4cef8ee63d527e98dadf4cdf94c707e1005
SHA2567a1505d85c64361dfded962e654d6293bf610cd18a3c2683f2ea24bcf99d61db
SHA512763abbadec6389c9421730f21217b18fc3136147885c91f04ea236bbe346e250e87589599499c339d502e71d69c85612b0469d00a198eac41dad50f9c33d8603
-
Filesize
2.2MB
MD5c5b915ef4725ee4ad0229e053dad05d4
SHA1032fb4cef8ee63d527e98dadf4cdf94c707e1005
SHA2567a1505d85c64361dfded962e654d6293bf610cd18a3c2683f2ea24bcf99d61db
SHA512763abbadec6389c9421730f21217b18fc3136147885c91f04ea236bbe346e250e87589599499c339d502e71d69c85612b0469d00a198eac41dad50f9c33d8603
-
Filesize
2.2MB
MD5c5b915ef4725ee4ad0229e053dad05d4
SHA1032fb4cef8ee63d527e98dadf4cdf94c707e1005
SHA2567a1505d85c64361dfded962e654d6293bf610cd18a3c2683f2ea24bcf99d61db
SHA512763abbadec6389c9421730f21217b18fc3136147885c91f04ea236bbe346e250e87589599499c339d502e71d69c85612b0469d00a198eac41dad50f9c33d8603
-
Filesize
2.0MB
MD547ad5d71dcd38f85253d882d93c04906
SHA1941ef208fb34ff9a3b25f7a325fcd0a44eacaaaf
SHA2566ba14148ff3ce0ee93f4d2641677ac454aa0187821cba41c8eb03212a8c04fe2
SHA51275291bdf369e90b76d7c15a45c3532f751e82a7acde205af1c019775e1138833cea32652fe940cc98e3a491f2c3677c45d58933c7e2ea55f089e99f2133dd0d0
-
Filesize
2.0MB
MD547ad5d71dcd38f85253d882d93c04906
SHA1941ef208fb34ff9a3b25f7a325fcd0a44eacaaaf
SHA2566ba14148ff3ce0ee93f4d2641677ac454aa0187821cba41c8eb03212a8c04fe2
SHA51275291bdf369e90b76d7c15a45c3532f751e82a7acde205af1c019775e1138833cea32652fe940cc98e3a491f2c3677c45d58933c7e2ea55f089e99f2133dd0d0
-
Filesize
666KB
MD548d297bfd2e885dc24ecb4905db4482a
SHA1208f24f50ae748a002a5497f88abecf0e9f1dc3e
SHA256e237ff774cc5374a2ca6d281835cc7dcedcc3f9edbe60f9a0cab7432a8349af2
SHA512e1cc0850bb18cc1bd6116c0472a24b54d694319930cbe0468ee2face51f3890077aa32807d4c33d5efec94fd2b1b1eee3dc0193efb64762587354e047d84fe42
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
Filesize2KB
MD5f0ef1be5b8741330184b5d4e597aae38
SHA1d03c0f827ac746c9cb55767b272c77af963f3360
SHA25652484a3a38aef8dfe2eb03fa1e02126addc31ffb73e1d9e089aeb7ea7965a354
SHA5125f9b04c50edc5d3436dc44b6b097187d4ee62438c19d74c7d208451172e7eb8daa662a5a40a7cb480feff9db25e96fc92cfccbe563a02ca9b8da516e4eff3f70
-
Filesize
1KB
MD56b800a7ce8e526d4ef554af1d3c5df84
SHA1a55b3ee214f87bd52fa8bbd9366c4b5b9f25b11f
SHA256d3834400ae484a92575e325d9e64802d07a0f2a28ff76fb1aef48dbce32b931f
SHA512cce2d77ad7e26b9b2fae11761d8d7836b160db176777f2904471f4f73e5e39036979ba9ff66aea6fd21338a3bba4a6b0ad63f025870d55e1486bb569d813d49a