Resubmissions
07-02-2023 08:52
230207-ksqebsdg7t 1024-05-2022 05:22
220524-f2lehsfeg4 1002-05-2022 08:03
220502-jxq1zseee4 10Analysis
-
max time kernel
827s -
max time network
829s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-es -
resource tags
arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
07-02-2023 08:52
Static task
static1
General
-
Target
Setup.exe
-
Size
310KB
-
MD5
019ac2c608d79f6fe1f20ad235b1cad8
-
SHA1
637ddc1db076c63e94af222b331fa236008f6e5d
-
SHA256
de3e916b84e5baab191cb54d4e9d810e513939736d5e1b7b43ce54bba7cde10c
-
SHA512
05404fd9dcb938477f90efa5a8f9e08dda8403041a4bc68babfc11b16ca5c601baccbbedbcedd8ec6cee53b99a12acf9773b1d7f877307060172391999c077f4
-
SSDEEP
3072:4S5Y4khLVNXrE/hUg/gX4/yhGhfsdXNvyb5qdBtQ3+C8uFtyRv4bO0gp+:jm4kpVhrEZULdhGhOZyb5qRQ3+CVw4W
Malware Config
Extracted
privateloader
http://212.193.30.45/proxies.txt
http://45.144.225.57/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
2.56.59.42
Extracted
vidar
2.3
889
https://t.me/mantarlars
https://steamcommunity.com/profiles/76561199474840123
-
profile_id
889
Signatures
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Creates new service(s) 1 TTPs
-
Sets file execution options in registry 2 TTPs 11 IoCs
Processes:
KMSELDI.exeAutoPico.exeKMSELDI.exeAutoPico.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" KMSELDI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe AutoPico.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" AutoPico.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe AutoPico.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" AutoPico.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" KMSELDI.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe AutoPico.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.execmd.exeKMSPico_Setup.exeservices.exesystem32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation KMSPico_Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation services.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation system32.exe -
Executes dropped EXE 18 IoCs
Processes:
ChromeRecovery.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exeKMSPico_Setup.exekms driver.exekmspico_setup.exeservices.exekmspico_setup.tmpsvchost32.exesystem32.exeUninsHs.exeKMSELDI.exeAutoPico.exeSECOH-QAD.exeKMSELDI.exeAutoPico.exepid process 5652 ChromeRecovery.exe 2636 software_reporter_tool.exe 752 software_reporter_tool.exe 3236 software_reporter_tool.exe 1312 software_reporter_tool.exe 2484 KMSPico_Setup.exe 5868 kms driver.exe 5684 kmspico_setup.exe 3092 services.exe 904 kmspico_setup.tmp 2148 svchost32.exe 6128 system32.exe 3644 UninsHs.exe 5452 KMSELDI.exe 5260 AutoPico.exe 2456 SECOH-QAD.exe 116 KMSELDI.exe 2036 AutoPico.exe -
Loads dropped DLL 10 IoCs
Processes:
software_reporter_tool.exesystem32.exeSppExtComObj.exepid process 3236 software_reporter_tool.exe 3236 software_reporter_tool.exe 3236 software_reporter_tool.exe 3236 software_reporter_tool.exe 3236 software_reporter_tool.exe 3236 software_reporter_tool.exe 3236 software_reporter_tool.exe 6128 system32.exe 6128 system32.exe 1300 SppExtComObj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/3092-198-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/3644-262-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce svchost32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\svchost32.exe = "C:\\Users\\Admin\\svchost32.exe" svchost32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 3 IoCs
Processes:
kmspico_setup.tmpdescription ioc process File opened for modification C:\Windows\system32\Vestris.ResourceLib.dll kmspico_setup.tmp File created C:\Windows\system32\is-G389Q.tmp kmspico_setup.tmp File created C:\Windows\system32\is-848R6.tmp kmspico_setup.tmp -
Drops file in Program Files directory 64 IoCs
Processes:
kmspico_setup.tmpKMSELDI.exeelevation_service.exedescription ioc process File created C:\Program Files\KMSpico\cert\kmscertW8\ProfessionalWMC\is-OKTJJ.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW81\ServerStandard\is-G1VEG.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Excel\is-BMO10.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\is-0BP8S.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Publisher\is-UHLQF.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Publisher\is-RHE21.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\is-K8RDE.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\is-3QLG7.tmp kmspico_setup.tmp File opened for modification C:\Program Files\KMSpico\logs\KMSELDI.log KMSELDI.exe File created C:\Program Files\KMSpico\is-690GI.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\is-NI53N.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\is-CAFM3.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro\is-B6OEA.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Standard\is-EQLOJ.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\is-K3KLM.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\scripts\is-P6IR4.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\scripts\is-4FV18.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Visio\is-CT1V3.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\is-2RK6I.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\is-4T9PN.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\is-BNN1K.tmp kmspico_setup.tmp File opened for modification C:\Program Files\KMSpico\TokensBackup\Keys.txt KMSELDI.exe File created C:\Program Files\KMSpico\cert\kmscert2013\Publisher\is-S2E4L.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Outlook\is-UEME1.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Word\is-0K1E6.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Word\is-HRBM4.tmp kmspico_setup.tmp File opened for modification C:\Program Files\KMSpico\Service_KMS.exe kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\is-CFUGA.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Standard\is-F6J6B.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\is-9RVEH.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\Business\is-LUI9T.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\TokensBackup\Windows\data.dat KMSELDI.exe File created C:\Program Files\KMSpico\cert\kmscert2013\OneNote\is-HQ0F5.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Outlook\is-NP1QU.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\ProPlus\is-NFPJS.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\Business\is-MGPPK.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\is-JHG9G.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Visio\is-L65EJ.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Access\is-9FCVL.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\is-HV7P1.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-HS6NV.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW81\ProfessionalWMC\is-KMM50.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\icons\is-VS158.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\logs\is-30P60.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW10\Professional\is-ILA1F.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\BusinessN\is-RCVPK.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW81\ServerStandard\is-GD50A.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\is-NLA2F.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\is-A50A2.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Word\is-VEE8V.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro\is-KV2TU.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-CLJAT.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW8\CoreN\is-7TD31.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW81\CoreConnectedSingleLanguage\is-JNBQ2.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\sounds\is-TJ6NF.tmp kmspico_setup.tmp File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4308_1329370629\_metadata\verified_contents.json elevation_service.exe File created C:\Program Files\KMSpico\cert\kmscert2010\Excel\is-DS427.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\is-UDH79.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\is-76PBL.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\sounds\is-DJKAH.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-B49LE.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscertW8\Core\is-1HQST.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Publisher\is-VT5BB.tmp kmspico_setup.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Visio\is-V1GMJ.tmp kmspico_setup.tmp -
Drops file in Windows directory 2 IoCs
Processes:
KMSELDI.exedescription ioc process File created C:\Windows\SECOH-QAD.dll KMSELDI.exe File created C:\Windows\SECOH-QAD.exe KMSELDI.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 536 3444 WerFault.exe Setup.exe 4696 6128 WerFault.exe system32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
system32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString system32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4892 timeout.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
chrome.exechrome.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies Control Panel 3 IoCs
Processes:
KMSELDI.exeAutoPico.exeKMSELDI.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\PaintDesktopVersion = "0" KMSELDI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\PaintDesktopVersion = "0" AutoPico.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\PaintDesktopVersion = "0" KMSELDI.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
kmspico_setup.tmpdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter kmspico_setup.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" kmspico_setup.tmp -
Modifies data under HKEY_USERS 7 IoCs
Processes:
SppExtComObj.exeAutoPico.exeKMSELDI.exeKMSELDI.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64 SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64\DiscoveredKeyManagementServiceIpAddress = "10.165.99.14" SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64\DiscoveredKeyManagementServiceIpAddress AutoPico.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588\DiscoveredKeyManagementServiceIpAddress KMSELDI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64\DiscoveredKeyManagementServiceIpAddress KMSELDI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588\DiscoveredKeyManagementServiceIpAddress KMSELDI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588\DiscoveredKeyManagementServiceIpAddress AutoPico.exe -
Modifies registry class 3 IoCs
Processes:
cmd.execmd.exeKMSPico_Setup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ KMSPico_Setup.exe -
Opens file in notepad (likely ransom note) 3 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXENOTEPAD.EXEpid process 2276 NOTEPAD.EXE 2476 NOTEPAD.EXE 716 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
svchost32.exepid process 2148 svchost32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
taskmgr.exeKMSELDI.exepid process 32 taskmgr.exe 116 KMSELDI.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 59 IoCs
Processes:
chrome.exechrome.exechrome.exepid process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
taskmgr.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exe7zG.exe7zG.exe7zG.exetaskmgr.exekms driver.exeKMSELDI.exeAutoPico.exeAUDIODG.EXEKMSELDI.exedescription pid process Token: SeDebugPrivilege 2992 taskmgr.exe Token: SeSystemProfilePrivilege 2992 taskmgr.exe Token: SeCreateGlobalPrivilege 2992 taskmgr.exe Token: 33 2992 taskmgr.exe Token: SeIncBasePriorityPrivilege 2992 taskmgr.exe Token: 33 752 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 752 software_reporter_tool.exe Token: 33 2636 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2636 software_reporter_tool.exe Token: 33 3236 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3236 software_reporter_tool.exe Token: 33 1312 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1312 software_reporter_tool.exe Token: SeRestorePrivilege 5316 7zG.exe Token: 35 5316 7zG.exe Token: SeSecurityPrivilege 5316 7zG.exe Token: SeSecurityPrivilege 5316 7zG.exe Token: SeRestorePrivilege 4948 7zG.exe Token: 35 4948 7zG.exe Token: SeSecurityPrivilege 4948 7zG.exe Token: SeRestorePrivilege 1884 7zG.exe Token: 35 1884 7zG.exe Token: SeSecurityPrivilege 1884 7zG.exe Token: SeSecurityPrivilege 1884 7zG.exe Token: SeDebugPrivilege 32 taskmgr.exe Token: SeSystemProfilePrivilege 32 taskmgr.exe Token: SeCreateGlobalPrivilege 32 taskmgr.exe Token: SeDebugPrivilege 5868 kms driver.exe Token: SeSystemtimePrivilege 5452 KMSELDI.exe Token: SeDebugPrivilege 5452 KMSELDI.exe Token: SeSystemtimePrivilege 5260 AutoPico.exe Token: SeDebugPrivilege 5260 AutoPico.exe Token: 33 2164 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2164 AUDIODG.EXE Token: SeSystemtimePrivilege 116 KMSELDI.exe Token: SeDebugPrivilege 116 KMSELDI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe 2992 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3948 wrote to memory of 4472 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4472 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 4440 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 736 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 736 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe PID 3948 wrote to memory of 1832 3948 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 9682⤵
- Program crash
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3444 -ip 34441⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffdd4ec4f50,0x7ffdd4ec4f60,0x7ffdd4ec4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2012 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2304 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4516 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4632 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4788 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5216 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5460 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5236 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5200 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3224 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3792 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2712 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4020 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4860 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5608 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5760 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1424 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1496 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1592,6814944803632263898,604274447879214938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=884 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ipk2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ipk W269N-WFGWX-YVC9B-4J6C9-T83GX2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /skms kms.xspace.in2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ato2⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ipk W269N-WFGWX-YVC9B-4J6C9-T83GX2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /skms kms8.msguides.com2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ato2⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4308_1329370629\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4308_1329370629\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={0ad5c29a-4b43-4ebd-b260-df6eac5bb7d0} --system2⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd4ec4f50,0x7ffdd4ec4f60,0x7ffdd4ec4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1616 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2856 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2040 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4572 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4808 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4664 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,10804307783304692724,11665452552762543276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd4ec4f50,0x7ffdd4ec4f60,0x7ffdd4ec4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1752 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2396 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2580 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2588 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4516 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4896 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5032 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3328 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3152 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5508 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3576 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2584 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5464 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3164 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6096 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4356 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5236 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\107.294.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=jrSUwkc+7HF0Z7POAHiq9nzZngi9aMpcjoE3CL5+ --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=Off2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=107.294.200 --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x7ff742745960,0x7ff742745970,0x7ff7427459803⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2636_TMFAHKIVFCSIZQSK" --sandboxed-process-id=2 --init-done-notifier=764 --sandbox-mojo-pipe-token=10792194111250585629 --mojo-platform-channel-handle=740 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\107.294.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2636_TMFAHKIVFCSIZQSK" --sandboxed-process-id=3 --init-done-notifier=984 --sandbox-mojo-pipe-token=541397359273310799 --mojo-platform-channel-handle=9803⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3128 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3132 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4408 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4180 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1788 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5440 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2440 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2868 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3112 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5456 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2952 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,12053593741760566316,2298867074826256705,131072 --disable-databases --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\" -ad -an -ai#7zMap32209:102:7zEvent98191⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\password.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\KMSpico\" -ad -an -ai#7zMap31239:118:7zEvent21071⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\" -an -ai#7zMap4685:118:7zEvent191151⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\Instruction_SEPTEMBER_2022.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\ReadMe KMSpico Install.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\KMSPico_Setup.exe"C:\Users\Admin\Desktop\KMSpico_Install_v.11.2\KMSPico_Setup.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Admin\kms driver.exe"C:\Users\Admin\kms driver.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\kmspico_setup.exe"C:\Users\Admin\kmspico_setup.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-7CQ5T.tmp\kmspico_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-7CQ5T.tmp\kmspico_setup.tmp" /SL5="$50380,2952592,69120,C:\Users\Admin\kmspico_setup.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer Phishing Filter
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Service.cmd""4⤵
-
C:\Windows\system32\sc.exesc create "Service KMSELDI" binPath= "C:\Program Files\KMSpico\Service_KMS.exe" type= own error= normal start= auto DisplayName= "Service KMSELDI"5⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Task.cmd""4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /TN "AutoPico Daily Restart" /TR "'C:\Program Files\KMSpico\AutoPico.exe' /silent" /SC DAILY /ST 23:59:59 /RU "NT AUTHORITY\SYSTEM" /RL Highest /F5⤵
- Creates scheduled task(s)
-
C:\Program Files\KMSpico\UninsHs.exe"C:\Program Files\KMSpico\UninsHs.exe" /r0=KMSpico,default,C:\Users\Admin\kmspico_setup.exe4⤵
- Executes dropped EXE
-
C:\Program Files\KMSpico\KMSELDI.exe"C:\Program Files\KMSpico\KMSELDI.exe" /silent /backup4⤵
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\KMSpico\AutoPico.exe"C:\Program Files\KMSpico\AutoPico.exe" /silent4⤵
- Sets file execution options in registry
- Executes dropped EXE
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\services.exe"C:\Users\Admin\services.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BF58.tmp\BF59.tmp\BF5A.bat C:\Users\Admin\services.exe"3⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f4⤵
- Modifies security service
-
C:\Users\Admin\svchost32.exe"C:\Users\Admin\svchost32.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\system32.exe"C:\Users\Admin\system32.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\system32.exe" & exit3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6128 -s 16003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 6128 -ip 61281⤵
-
C:\Windows\SECOH-QAD.exeC:\Windows\SECOH-QAD.exe C:\Windows\system32\SppExtComObj.exe -Embedding1⤵
- Executes dropped EXE
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
-
C:\Program Files\KMSpico\KMSELDI.exe"C:\Program Files\KMSpico\KMSELDI.exe"1⤵
- Sets file execution options in registry
- Executes dropped EXE
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x4b01⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\KMSpico\AutoPico.exe"C:\Program Files\KMSpico\AutoPico.exe"1⤵
- Sets file execution options in registry
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4308_1329370629\ChromeRecovery.exeFilesize
253KB
MD549ac3c96d270702a27b4895e4ce1f42a
SHA155b90405f1e1b72143c64113e8bc65608dd3fd76
SHA25682aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f
SHA512b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5f9117eef265e523cfb5089ab5388e102
SHA113da751278466c6af5b00499ddc8f4cc129a6056
SHA25697625a9a59a2481937e156777eb38537f212ad290e3c9d974f5c558ddd490268
SHA51214fb42f95120fefe78ad63945521cbef00ddbeec7619b08855b580eef59769d051ccdd05a7409347bdbb0c85c1f934f4dc91928f9122ad12bd66dbb97934f6fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\HistoryFilesize
116KB
MD5d1337ffe3b2dc5e6041469d92a07f7f4
SHA10fc3bd52ebaff3cf1e703d9133c9797e95335d25
SHA2563a189aca426786d500853ecbe519a572003b8797620772c1b9d0a600bef00658
SHA5127184c94c6c40b040ad9b335a22e20c0523a8732fb7d26e13a0b7876bda68e4b798e31ce98e2e53ee47ba453876625d7f659cd81fd5403febaed71fcd467817f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5645ee74005712356d82d22712dabdbf5
SHA1318ad622082e6b18ef791c3436d33286701c6a8b
SHA2569bfb842d3ab88e57a9d3070d4fce6e6e379346c3925bcfc910b51fbc9c4e22b6
SHA512c2e4e7007ab63a2179f8bdb02a711a955669e2a14ac0c6b5069c811d3dd72df554e1f29c59c33e54ad77775bbe5ab5c4dd1ffef110653244828911296abccdb6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5e2322e35429ff84ca09c7987027fcf32
SHA1fe2a68048d64b11ddf7eafa5d9439b24f7e9459b
SHA256278bc4e63df224cd588b8faeeba665c4ca82fbd3e32da9546c3be3168eea9170
SHA512e9c6009bd22dff97cf054c7b48294c4be1ceb481c4587ae6e798bc98284465401d1fc57a1756e03bcd641a1f88b1d34102f088ee052f8b5276f64a8da5c15b53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOGFilesize
345B
MD5d0c79bde06bdf4248492a608e527552b
SHA1da0e6a67553526687d09893347a5f94d8964d91b
SHA256cfd7ed151357014fc7aacf58cff7c669448fca113c3342fa0ba58550f1025a2c
SHA51204e22c72851432ab633ff5607063a8915dfce1182735cfcb150863e431bba607bca06f0855230022cfe8357f2234cf45695d8ac114bdc1728b048aad3aa57ccc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000003.logFilesize
160B
MD5de92ad90be6d3364745b2f73f4c3cf73
SHA19158681463bd30e5af4dda4baac81f93cedbda77
SHA2560025a3e0d3b834401b3b5f820e1991ef7e810d9a4b8b6b579e6301c94e7031a0
SHA5129e81cefc195439439f4b23ee7696309d7bc3c08e5b444d2abde26d2f12b2d3bcfd124fb9a2d40c6389e9f787741676fad366a2e9982674e7b931028c014d8a79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOGFilesize
324B
MD5a9b9b6c5b60299c744b6c981a3fb35a7
SHA1486863ca6149baed8c4f125264d88e5ebcafcfb3
SHA256d598e1f8ed7942bbed7b0be1562318a4bfd5c4cd7bcf9dab13edc2cb90e973d7
SHA5120b77d605e385fcd2b8b2cfde6ab3c02b81af1c949453851a53f085abce13de9d5b42812985f1fa6383f3b64bc879461030feaa208e976bbb50c88f2fc49b8c84
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last VersionFilesize
13B
MD5b63048c4e7e52c52053d25da30d9c5ab
SHA1679a44d402f5ec24605719e06459f5a707989187
SHA256389caa40ea458e84bc624a9af1e0dec60fa652b2db2b81c09b1dfe22822cc3d1
SHA512e86c58c5a25e24f21ad79ed526a90c120a09c115f4820663bd2ebbc59e7bb1c4c418267eb77645522aa20b2c1b53fba8e31690db7bae9b21e4eff3db06316359
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
116KB
MD5dd1827d612964db5831fb64ea3484b3a
SHA12f5e11fb5657b4c889879083f5a5e6cf1dde1f4f
SHA2569f96bd56da92757957673707628b2935ea7501fe6d00af26ea59f175efa530e9
SHA51213f2dbbffdfe5f402f96135a7485adac122eaf6dda05af16cbb05b26d4acf1be4649f7049623dcb67b6c8198a8a73a0355600824ccf97df5971068ca6986339c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141\Recovery.crx3Filesize
141KB
MD5ea1c1ffd3ea54d1fb117bfdbb3569c60
SHA110958b0f690ae8f5240e1528b1ccffff28a33272
SHA2567c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d
SHA5126c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Safe Browsing\IpMalware.storeFilesize
106B
MD574231856dcac47c1dea4d32a383b6def
SHA1fcce47ded44945dbc8b17c3c45bcd0c5a80c8ba3
SHA256e0376702c52c68ab7f8d5e555dcb4e09ed6d9f342f65a7bc5614a49afdb2b80d
SHA512932ccbd4eb2e5ffa6ab11b9a4fbdd4be8fe6825a9318c40841a9b00003fba781f496c4a90259c4fe185cc4bb8fd3e9efa4e127e256c81e950671666e0ca8e609
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Safe Browsing\UrlSoceng.storeFilesize
26.3MB
MD5edff4f5503435bddca466020f29c27ca
SHA1a8a6b5a486579652914a657d198cd1ef710a251a
SHA25638158ba348d489b62cb8b4ee519fbd0df9ffed78efe12cde0bad3a96d9f80c9a
SHA5120b3d3df6d501591f178453e62a88b4b486964a7e0deb659ac38ac36144e88110965dde514cab0ce8de693c882092fe54d04f30aed728a41b3f8e4ccd36049235
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1Filesize
264KB
MD59643eca08ba96d73e494449f6d55fb67
SHA1635eca8015442a0faed6c1edac5bb01f5c426f01
SHA256eefd4d1062c034c63d22e037ba1b6c94ad8f10ecfd5784049c742d74b292259e
SHA512a1e51d056bcb614d5aee9147183cd5d40e10cdd2e5ae76eacd36221162f160624389eb02af24d4e7b2d6a6ebd77ab48e05780fecfe9bb3507019721f50dae6d4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\CachesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_2740_ZSJITVJQTIZJXWOWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_3948_EHHBBQBUWKTYOUVOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/116-293-0x000000001DC50000-0x000000001DC60000-memory.dmpFilesize
64KB
-
memory/116-291-0x000000001E5B0000-0x000000001E5C0000-memory.dmpFilesize
64KB
-
memory/116-290-0x000000001C240000-0x000000001C250000-memory.dmpFilesize
64KB
-
memory/116-292-0x000000001DC70000-0x000000001DC80000-memory.dmpFilesize
64KB
-
memory/116-288-0x000000001C240000-0x000000001C250000-memory.dmpFilesize
64KB
-
memory/116-289-0x000000001C250000-0x000000001C260000-memory.dmpFilesize
64KB
-
memory/116-287-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/396-215-0x0000000000000000-mapping.dmp
-
memory/404-264-0x0000000000000000-mapping.dmp
-
memory/620-234-0x0000000000000000-mapping.dmp
-
memory/752-163-0x0000000000000000-mapping.dmp
-
memory/752-221-0x0000000000000000-mapping.dmp
-
memory/904-192-0x0000000000000000-mapping.dmp
-
memory/1000-237-0x0000000000000000-mapping.dmp
-
memory/1108-236-0x0000000000000000-mapping.dmp
-
memory/1180-208-0x0000000000000000-mapping.dmp
-
memory/1236-143-0x0000000000000000-mapping.dmp
-
memory/1300-284-0x0000000000000000-mapping.dmp
-
memory/1304-196-0x0000000000000000-mapping.dmp
-
memory/1312-167-0x0000000000000000-mapping.dmp
-
memory/1428-140-0x0000000000000000-mapping.dmp
-
memory/1568-223-0x0000000000000000-mapping.dmp
-
memory/2036-329-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-341-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-337-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-342-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-343-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-336-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-338-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-328-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-330-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-331-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-332-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-335-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-339-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-344-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2036-340-0x00000000013F0000-0x0000000001400000-memory.dmpFilesize
64KB
-
memory/2148-224-0x000000000061D000-0x0000000000683000-memory.dmpFilesize
408KB
-
memory/2148-226-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/2148-225-0x0000000002120000-0x0000000002190000-memory.dmpFilesize
448KB
-
memory/2148-193-0x0000000000000000-mapping.dmp
-
memory/2356-222-0x0000000000000000-mapping.dmp
-
memory/2500-209-0x0000000000000000-mapping.dmp
-
memory/2508-211-0x0000000000000000-mapping.dmp
-
memory/2524-141-0x0000000000000000-mapping.dmp
-
memory/2636-162-0x0000000000000000-mapping.dmp
-
memory/2772-266-0x0000000000000000-mapping.dmp
-
memory/3092-191-0x0000000000000000-mapping.dmp
-
memory/3092-198-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/3128-207-0x0000000000000000-mapping.dmp
-
memory/3228-138-0x0000000000000000-mapping.dmp
-
memory/3228-217-0x0000000000000000-mapping.dmp
-
memory/3236-178-0x0000023A00550000-0x0000023A00590000-memory.dmpFilesize
256KB
-
memory/3236-169-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-177-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-180-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-176-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-175-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-174-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-179-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-172-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-185-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-184-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-173-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-171-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-181-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-170-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-183-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-168-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3236-165-0x0000000000000000-mapping.dmp
-
memory/3236-182-0x0000023A00510000-0x0000023A00550000-memory.dmpFilesize
256KB
-
memory/3380-270-0x0000000000000000-mapping.dmp
-
memory/3444-135-0x0000000000400000-0x000000000049D000-memory.dmpFilesize
628KB
-
memory/3444-136-0x0000000000400000-0x000000000049D000-memory.dmpFilesize
628KB
-
memory/3444-132-0x0000000000529000-0x0000000000545000-memory.dmpFilesize
112KB
-
memory/3444-134-0x0000000000400000-0x000000000049D000-memory.dmpFilesize
628KB
-
memory/3444-133-0x00000000006D0000-0x0000000000703000-memory.dmpFilesize
204KB
-
memory/3564-204-0x0000000000000000-mapping.dmp
-
memory/3644-262-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3644-261-0x0000000000000000-mapping.dmp
-
memory/3704-235-0x0000000000000000-mapping.dmp
-
memory/3816-230-0x0000000000000000-mapping.dmp
-
memory/3832-214-0x0000000000000000-mapping.dmp
-
memory/4076-145-0x0000000000000000-mapping.dmp
-
memory/4080-213-0x0000000000000000-mapping.dmp
-
memory/4568-259-0x0000000000000000-mapping.dmp
-
memory/4740-232-0x0000000000000000-mapping.dmp
-
memory/4892-271-0x0000000000000000-mapping.dmp
-
memory/4904-233-0x0000000000000000-mapping.dmp
-
memory/4968-220-0x0000000000000000-mapping.dmp
-
memory/4984-260-0x0000000000000000-mapping.dmp
-
memory/5000-212-0x0000000000000000-mapping.dmp
-
memory/5092-210-0x0000000000000000-mapping.dmp
-
memory/5260-285-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/5260-283-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/5260-282-0x00000000006A0000-0x000000000075A000-memory.dmpFilesize
744KB
-
memory/5260-281-0x0000000000000000-mapping.dmp
-
memory/5296-218-0x0000000000000000-mapping.dmp
-
memory/5364-239-0x0000000000000000-mapping.dmp
-
memory/5452-268-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/5452-267-0x000000001C780000-0x000000001CCC0000-memory.dmpFilesize
5.2MB
-
memory/5452-269-0x000000001E350000-0x000000001E4DA000-memory.dmpFilesize
1.5MB
-
memory/5452-263-0x0000000000000000-mapping.dmp
-
memory/5452-265-0x0000000000960000-0x0000000000A4A000-memory.dmpFilesize
936KB
-
memory/5452-274-0x0000000001199000-0x000000000119F000-memory.dmpFilesize
24KB
-
memory/5452-275-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/5452-276-0x000000001E6E0000-0x000000001E6E4000-memory.dmpFilesize
16KB
-
memory/5452-277-0x0000000001199000-0x000000000119F000-memory.dmpFilesize
24KB
-
memory/5452-278-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/5452-279-0x0000000001199000-0x000000000119F000-memory.dmpFilesize
24KB
-
memory/5452-280-0x000000001E6E0000-0x000000001E6E4000-memory.dmpFilesize
16KB
-
memory/5524-231-0x0000000000000000-mapping.dmp
-
memory/5612-216-0x0000000000000000-mapping.dmp
-
memory/5632-206-0x0000000000000000-mapping.dmp
-
memory/5652-147-0x0000000000000000-mapping.dmp
-
memory/5684-187-0x0000000000000000-mapping.dmp
-
memory/5684-286-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/5684-188-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/5684-197-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/5768-238-0x0000000000000000-mapping.dmp
-
memory/5784-142-0x0000000000000000-mapping.dmp
-
memory/5868-195-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/5868-190-0x0000000000B40000-0x0000000000B4E000-memory.dmpFilesize
56KB
-
memory/5868-205-0x00007FFDD3220000-0x00007FFDD3CE1000-memory.dmpFilesize
10.8MB
-
memory/5868-203-0x0000000002B80000-0x0000000002B8A000-memory.dmpFilesize
40KB
-
memory/5868-202-0x0000000002B70000-0x0000000002B7A000-memory.dmpFilesize
40KB
-
memory/5868-201-0x0000000002BA0000-0x0000000002BC2000-memory.dmpFilesize
136KB
-
memory/5868-200-0x000000001BFE0000-0x000000001C0E2000-memory.dmpFilesize
1.0MB
-
memory/5868-186-0x0000000000000000-mapping.dmp
-
memory/5868-194-0x000000001B740000-0x000000001B7C2000-memory.dmpFilesize
520KB
-
memory/5936-219-0x0000000000000000-mapping.dmp
-
memory/6072-144-0x0000000000000000-mapping.dmp
-
memory/6128-229-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/6128-240-0x0000000050B30000-0x0000000050BC2000-memory.dmpFilesize
584KB
-
memory/6128-272-0x00000000005FD000-0x0000000000631000-memory.dmpFilesize
208KB
-
memory/6128-227-0x00000000005FD000-0x0000000000631000-memory.dmpFilesize
208KB
-
memory/6128-228-0x0000000000540000-0x000000000059D000-memory.dmpFilesize
372KB
-
memory/6128-199-0x0000000000000000-mapping.dmp
-
memory/6128-273-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB