Analysis
-
max time kernel
1795s -
max time network
1381s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
06-03-2023 00:46
Static task
static1
Behavioral task
behavioral1
Sample
desktop.ini
Resource
win10v2004-20230220-es
General
-
Target
desktop.ini
-
Size
282B
-
MD5
3a37312509712d4e12d27240137ff377
-
SHA1
30ced927e23b584725cf16351394175a6d2a9577
-
SHA256
b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3
-
SHA512
dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
Processes:
JavaSetup8u361.exeJavaSetup8u361.exeLZMA_EXELZMA_EXEJavaSetup8u361.exeJavaSetup8u361.exeJavaSetup8u361.exeJavaSetup8u361.exeLZMA_EXELZMA_EXEinstaller.exejavaw.exessvagent.exejavaws.exejp2launcher.exejavaws.exejp2launcher.exejavaw.exejavaw.exeSKlauncher 3.0.exeSKlauncher 3.0.exeSKlauncher 3.0.exeSKlauncher 3.0.exeSKlauncher 3.0.exeSKlauncher 3.0.exepid process 6104 JavaSetup8u361.exe 4240 JavaSetup8u361.exe 1488 LZMA_EXE 5952 LZMA_EXE 4668 JavaSetup8u361.exe 5868 JavaSetup8u361.exe 1168 JavaSetup8u361.exe 5884 JavaSetup8u361.exe 4860 LZMA_EXE 5652 LZMA_EXE 4456 installer.exe 2904 javaw.exe 4920 ssvagent.exe 4508 javaws.exe 1428 jp2launcher.exe 4364 javaws.exe 1900 jp2launcher.exe 3968 javaw.exe 2824 javaw.exe 5224 SKlauncher 3.0.exe 6040 SKlauncher 3.0.exe 2596 SKlauncher 3.0.exe 5796 SKlauncher 3.0.exe 4628 SKlauncher 3.0.exe 640 SKlauncher 3.0.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exejavaw.exeinstaller.exessvagent.exejp2launcher.exepid process 1340 MsiExec.exe 1340 MsiExec.exe 1340 MsiExec.exe 2904 javaw.exe 2904 javaw.exe 2904 javaw.exe 2904 javaw.exe 2904 javaw.exe 2904 javaw.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4456 installer.exe 4920 ssvagent.exe 4920 ssvagent.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 1428 jp2launcher.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
ssvagent.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0070-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0223-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0166-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0187-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0243-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0121-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0274-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0071-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0366-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0066-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0100-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0253-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0267-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0002-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0053-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0025-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0048-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0176-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0353-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0078-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0015-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0128-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0166-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0175-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0233-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0033-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0063-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0022-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0112-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0046-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0069-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0237-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0263-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0064-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0040-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0049-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0056-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0342-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0013-0001-0029-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0167-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0220-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0184-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0246-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0013-0001-0033-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0032-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0043-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0190-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0134-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0292-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0290-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0013-0001-0017-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0070-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0082-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0187-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0066-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0209-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0105-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0297-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0359-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0120-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0192-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0114-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0205-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
msiexec.exechrome.exeJavaSetup8u361.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SunJavaUpdateSched = "\"C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\jusched.exe\"" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run JavaSetup8u361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SunJavaUpdateSched = "C:\\Program Files (x86)\\Common Files\\Java\\Java Update\\jusched.exe" JavaSetup8u361.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
installer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\NoExplorer = "1" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}\NoExplorer = "1" installer.exe -
Drops file in System32 directory 3 IoCs
Processes:
installer.exedescription ioc process File created C:\Windows\SysWOW64\WindowsAccessBridge-32.dll installer.exe File opened for modification C:\Windows\SysWOW64\WindowsAccessBridge-32.dll installer.exe File created C:\Windows\SysWOW64\WindowsAccessBridge-64.dll installer.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-utility-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\security\blacklist msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\images\cursors\win32_CopyNoDrop32x32.gif msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\msvcp140_2.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\splash.gif msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\jvm.hprof.txt msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\legal\jdk\colorimaging.md msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\fonts\LucidaSansDemiBold.ttf msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\messages_zh_CN.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\j2pkcs11.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\security\cacerts msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-filesystem-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-convert-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\legal\javafx\mesa3d.md msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-core-synch-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\images\cursors\win32_CopyDrop32x32.gif msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-heap-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\fonts\LucidaBrightDemiBold.ttf msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\deploy.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-stdio-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\legal\jdk\libpng.md msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\calendars.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\kinit.exe msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\security\javaws.policy msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\security\java.security msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\README.txt msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-runtime-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\fonts\LucidaBrightRegular.ttf msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\ext\localedata.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\legal\jdk\jopt-simple.md msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-core-datetime-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\psfontj2d.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-core-util-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\jjs.exe msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\sunec.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\ext\cldrdata.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\rt.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\prism_sw.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\security\trusted.libraries msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-core-synch-l1-2-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\jfr\profile.jfc msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\w2k_lsa_auth.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\management.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-core-file-l1-2-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\javafx_iio.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\keytool.exe msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\sound.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\cmm\CIEXYZ.pf msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\legal\jdk\icu.md msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\legal\jdk\thaidict.md msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\java.exe msiexec.exe File created C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\jfr.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\decora_sse.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\i386\jvm.cfg msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\messages_es.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\jce.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\ffjcext.zip msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\messages_sv.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\dt_shmem.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\fxplugins.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\ext\dnsns.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\jsoundds.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\meta-index msiexec.exe -
Drops file in Windows directory 23 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\e5ac778.msi msiexec.exe File opened for modification C:\Windows\Installer\e5ac778.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7E11.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSICEDB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID13E.tmp msiexec.exe File created C:\Windows\Installer\e5ac77b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7223.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI77B3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI797A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7B8E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7C89.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICCA8.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSID546.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7570.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI78ED.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} msiexec.exe File created C:\Windows\Installer\e5ac784.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F32180361F0} msiexec.exe File created C:\Windows\Installer\e5ac781.msi msiexec.exe File opened for modification C:\Windows\Installer\e5ac781.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
msiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msiexec.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
installer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9167671E-7E42-49E1-97FC-4F4712EB4CEE}\AppName = "jp2launcher.exe" installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\Policy = "3" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppName = "javaws.exe" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppPath = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9167671E-7E42-49E1-97FC-4F4712EB4CEE} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}\AlternateCLSID = "{CAFEEFAC-DEC7-0000-0001-ABCDEFFEDCBA}" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\AppName = "ssvagent.exe" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\AppPath = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin" installer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\ACTIVEX COMPATIBILITY\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\Policy = "3" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA}\Compatibility Flags = "1024" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284} installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\Policy = "0" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9167671E-7E42-49E1-97FC-4F4712EB4CEE}\AppPath = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7}\AppName = "jp2launcher.exe" installer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9167671E-7E42-49E1-97FC-4F4712EB4CEE}\Policy = "3" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A}\AppPath = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin" installer.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
installer.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0047-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0014-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0192-ABCDEFFEDCBB}\InprocServer32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0074-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0312-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0194-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0208-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0286-ABCDEFFEDCBB} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0105-ABCDEFFEDCBA} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0161-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0015-0000-0053-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0096-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_96" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0205-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0292-ABCDEFFEDCBC}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0298-ABCDEFFEDCBA}\ = "Java Plug-in 1.8.0_298" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0014-ABCDEFFEDCBC}\ = "Java Plug-in 1.8.0_14" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0115-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0005-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0031-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0056-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0015-0000-0078-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0169-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0155-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0299-ABCDEFFEDCBB}\ = "Java Plug-in 1.7.0_299" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0263-ABCDEFFEDCBA}\InprocServer32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0315-ABCDEFFEDCBC} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0027-ABCDEFFEDCBB}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0015-0000-0071-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0079-ABCDEFFEDCBC}\InprocServer32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0127-ABCDEFFEDCBC}\InprocServer32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0082-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0010-ABCDEFFEDCBC}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0066-ABCDEFFEDCBB} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0024-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0162-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0076-ABCDEFFEDCBA}\ = "Java Plug-in 1.3.1_76" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0015-0000-0098-ABCDEFFEDCBA}\ = "Java Plug-in 1.5.0_98" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0173-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0318-ABCDEFFEDCBB}\InprocServer32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0191-ABCDEFFEDCBC} installer.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0092-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0039-ABCDEFFEDCBC}\ = "Java Plug-in 1.6.0_39" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0206-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0046-ABCDEFFEDCBB}\ = "Java Plug-in 1.8.0_46" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0267-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0355-ABCDEFFEDCBC}\InprocServer32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0021-ABCDEFFEDCBB} installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0046-ABCDEFFEDCBA}\InprocServer32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0105-ABCDEFFEDCBA}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0247-ABCDEFFEDCBA}\ = "Java Plug-in 1.7.0_247" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0280-ABCDEFFEDCBC}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0029-ABCDEFFEDCBB}\INPROCSERVER32 installer.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0241-ABCDEFFEDCBA}\INPROCSERVER32 installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0016-0000-0152-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0046-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_46" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0181-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0280-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0350-ABCDEFFEDCBB}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0218-ABCDEFFEDCBA}\ = "Java Plug-in 1.7.0_218" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0017-0000-0369-ABCDEFFEDCBB}\ = "Java Plug-in 1.7.0_369" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0018-0000-0232-ABCDEFFEDCBA}\ = "Java Plug-in 1.8.0_232" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0013-0001-0018-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\CLSID\{CAFEEFAC-0014-0002-0044-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe -
Modifies registry class 64 IoCs
Processes:
ssvagent.exeinstaller.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0017-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0013-0001-0057-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0059-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0171-ABCDEFFEDCBA}\ = "Java Plug-in 1.6.0_171" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0050-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_50" installer.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0192-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0038-ABCDEFFEDCBA}\ = "Java Plug-in 1.5.0_38" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0210-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0218-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0251-ABCDEFFEDCBC}\InprocServer32 installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0013-0001-0021-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0000-ABCDEFFEDCBA} ssvagent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0015-ABCDEFFEDCBA} installer.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0077-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBC}\InprocServer32 ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0097-ABCDEFFEDCBA}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0151-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0044-ABCDEFFEDCBA}\InprocServer32 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0058-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0060-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0184-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0157-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0062-ABCDEFFEDCBA} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0159-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0175-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0145-ABCDEFFEDCBB} ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0023-ABCDEFFEDCBB} ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0174-ABCDEFFEDCBC}\ = "Java Plug-in 1.8.0_174" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0321-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0144-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0002-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0070-ABCDEFFEDCBA}\ = "Java Plug-in 1.4.2_70" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0061-ABCDEFFEDCBC} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0071-ABCDEFFEDCBB}\ = "Java Plug-in 1.7.0_71" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0093-ABCDEFFEDCBC}\ = "Java Plug-in 1.7.0_93" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0291-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0103-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0260-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0123-ABCDEFFEDCBA}\InprocServer32 installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0144-ABCDEFFEDCBA}\ = "Java Plug-in 1.6.0_144" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0174-ABCDEFFEDCBB}\ = "Java Plug-in 1.6.0_174" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0059-ABCDEFFEDCBA}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0221-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0085-ABCDEFFEDCBA}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0096-ABCDEFFEDCBA}\ = "Java Plug-in 1.6.0_96" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0176-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0178-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" ssvagent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0013-0001-0027-ABCDEFFEDCBB}\InprocServer32 installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0073-ABCDEFFEDCBB}\InprocServer32\ThreadingModel = "Apartment" installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0067-ABCDEFFEDCBC} installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0294-ABCDEFFEDCBB} installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0230-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0111-ABCDEFFEDCBA} ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0008-ABCDEFFEDCBC} ssvagent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0016-0000-0132-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" ssvagent.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0153-ABCDEFFEDCBC} ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0015-0000-0045-ABCDEFFEDCBB}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0057-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0018-0000-0172-ABCDEFFEDCBB}\InprocServer32 ssvagent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0321-ABCDEFFEDCBA}\ = "Java Plug-in 1.7.0_321" installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CAFEEFAC-0017-0000-0359-ABCDEFFEDCBC}\InprocServer32\ = "C:\\Program Files (x86)\\Java\\jre1.8.0_361\\bin\\jp2iexp.dll" installer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\WOW6432Node\CLSID\{CAFEEFAC-0014-0002-0038-ABCDEFFEDCBB}\ = "Java Plug-in 1.4.2_38" ssvagent.exe -
Processes:
JavaSetup8u361.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 JavaSetup8u361.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 JavaSetup8u361.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 JavaSetup8u361.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 JavaSetup8u361.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 JavaSetup8u361.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2300 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
chrome.exechrome.exejavaws.exejp2launcher.exejavaws.exejp2launcher.exemsiexec.exepid process 1112 chrome.exe 1112 chrome.exe 6108 chrome.exe 6108 chrome.exe 4508 javaws.exe 4508 javaws.exe 1428 jp2launcher.exe 1428 jp2launcher.exe 4364 javaws.exe 4364 javaws.exe 1900 jp2launcher.exe 1900 jp2launcher.exe 3848 msiexec.exe 3848 msiexec.exe 3848 msiexec.exe 3848 msiexec.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 42 IoCs
Processes:
chrome.exepid process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe Token: SeShutdownPrivilege 1112 chrome.exe Token: SeCreatePagefilePrivilege 1112 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
chrome.exepid process 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe 1112 chrome.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
Processes:
JavaSetup8u361.exeJavaSetup8u361.exeLZMA_EXELZMA_EXEjp2launcher.exejp2launcher.exejavaw.exejavaw.exejavaw.exejavaw.exejavaw.exejavaw.exepid process 4240 JavaSetup8u361.exe 4240 JavaSetup8u361.exe 4240 JavaSetup8u361.exe 4240 JavaSetup8u361.exe 5884 JavaSetup8u361.exe 5884 JavaSetup8u361.exe 5884 JavaSetup8u361.exe 4860 LZMA_EXE 5652 LZMA_EXE 5884 JavaSetup8u361.exe 5884 JavaSetup8u361.exe 1428 jp2launcher.exe 1900 jp2launcher.exe 1656 javaw.exe 1656 javaw.exe 220 javaw.exe 220 javaw.exe 1772 javaw.exe 1772 javaw.exe 5540 javaw.exe 5540 javaw.exe 2440 javaw.exe 5472 javaw.exe 5472 javaw.exe 2440 javaw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1112 wrote to memory of 1304 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 1304 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 3520 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 1512 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 1512 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe PID 1112 wrote to memory of 4184 1112 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\desktop.ini1⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd24f99758,0x7ffd24f99768,0x7ffd24f997782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1364 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4512 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4556 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4520 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4756 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4736 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2820 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4532 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3204 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5724 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5344 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6068 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6112 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=6272 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=6036 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6192 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3436 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6760 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3392 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3376 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=856 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=4904 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=5288 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6216 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=6204 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=5608 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=3156 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=6692 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=5656 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=3344 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=40 --mojo-platform-channel-handle=4720 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=41 --mojo-platform-channel-handle=6176 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=43 --mojo-platform-channel-handle=6408 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=6760 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=45 --mojo-platform-channel-handle=6304 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=3280 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=48 --mojo-platform-channel-handle=3164 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=49 --mojo-platform-channel-handle=6120 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=50 --mojo-platform-channel-handle=6240 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=51 --mojo-platform-channel-handle=6396 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=53 --mojo-platform-channel-handle=5296 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5896 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6600 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1744 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5256 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=59 --mojo-platform-channel-handle=5292 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=60 --mojo-platform-channel-handle=3372 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=61 --mojo-platform-channel-handle=4736 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=62 --mojo-platform-channel-handle=5048 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=63 --mojo-platform-channel-handle=5396 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=64 --mojo-platform-channel-handle=3544 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=65 --mojo-platform-channel-handle=5508 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=66 --mojo-platform-channel-handle=5256 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1052 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5180 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4608 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5620 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1780,i,750751311990645641,4101075352758748963,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds240756468.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds240756468.tmp\JavaSetup8u361.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE"C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE" d "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\au.msi" "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\msi.tmp"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE"C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE" d "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\jre1.8.0_361.msi" "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\msi.tmp"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds240781593.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds240781593.tmp\JavaSetup8u361.exe"3⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9AA1872A7F296BC6EC92DC55ABA71EAE2⤵
- Loads dropped DLL
-
C:\Program Files (x86)\Java\jre1.8.0_361\installer.exe"C:\Program Files (x86)\Java\jre1.8.0_361\installer.exe" /s INSTALLDIR="C:\Program Files (x86)\Java\jre1.8.0_361\\" INSTALL_SILENT=1 REPAIRMODE=0 ProductCode={26A24AE4-039D-4CA4-87B4-2F32180361F0}2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaw.exe"C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaw.exe" -Xshare:dump -Djdk.disableLastUsageTracking3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\ssvagent.exe"C:\Program Files (x86)\Java\jre1.8.0_361\bin\ssvagent.exe" -doHKCUSSVSetup3⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaws.exe"C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaws.exe" -wait -fix -permissions -silent3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\jp2launcher.exe"C:\Program Files (x86)\Java\jre1.8.0_361\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files (x86)\Java\jre1.8.0_361" -vma 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 -ma LXdhaXQALWZpeAAtcGVybWlzc2lvbnMALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaws.exe"C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaws.exe" -wait -fix -shortcut -silent3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\jp2launcher.exe"C:\Program Files (x86)\Java\jre1.8.0_361\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files (x86)\Java\jre1.8.0_361" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DE5CAEC0D3736861C9EF1D0C9E354A55 E Global\MSI00002⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding CCED72D8CE8DFB327E7F24AE5678A15E2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 77FD5A3F60CA2B0337EE51EC910A1516 E Global\MSI00002⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8FE6E6D07894A93EA9B474E10FE7299D2⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2D8B21ACF496DEA8E067AABC01700928 E Global\MSI00002⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds240806765.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds240806765.tmp\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE"C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE" d "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\au.msi" "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\msi.tmp"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE"C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE" d "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\jre1.8.0_361.msi" "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\msi.tmp"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaw.exe-Djdk.disableLastUsageTracking -cp "C:\Program Files (x86)\Java\jre1.8.0_361\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserWebJavaStatus3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Java\jre1.8.0_361\bin\javaw.exe-Djdk.disableLastUsageTracking -cp "C:\Program Files (x86)\Java\jre1.8.0_361\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserPreviousDecisionsExist 303⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\SKlauncher 3.0.exe"C:\Users\Admin\Downloads\SKlauncher 3.0.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\Downloads\SKlauncher 3.0.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\SKlauncher 3.0.exe"C:\Users\Admin\Downloads\SKlauncher 3.0.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\Downloads\SKlauncher 3.0.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\SKlauncher 3.0.exe"C:\Users\Admin\Downloads\SKlauncher 3.0.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\Downloads\SKlauncher 3.0.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\SKlauncher 3.0.exe"C:\Users\Admin\Downloads\SKlauncher 3.0.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\Downloads\SKlauncher 3.0.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\SKlauncher 3.0.exe"C:\Users\Admin\Downloads\SKlauncher 3.0.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\Downloads\SKlauncher 3.0.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\SKlauncher 3.0.exe"C:\Users\Admin\Downloads\SKlauncher 3.0.exe"1⤵
- Executes dropped EXE
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\Downloads\SKlauncher 3.0.exe"2⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e5ac77a.rbsFilesize
710KB
MD5b876d8979f01b5c3a725c96214f791f7
SHA1fc59e16997648b81036f3de0c4e888e41615d141
SHA2567004bcde7ae2ed5cd2df8acd6bab59297b5ddcc8dd200a835537480bd385de35
SHA512d5c46983aa7ca4959be6e7def4b5229ae9227148ea847afab5db0d86a6e10e6c98ec02b68b9b43cf23dec7b2deecf233bef8dfcd0c3b81e901ebb04178f4a400
-
C:\Config.Msi\e5ac77d.rbsFilesize
7KB
MD58f63f275dc6fd96596d567f978edc2f2
SHA133ad4d7aaff9a62c476340ebe88d2522dfdc3a05
SHA25674798ce1941bb9cb0a139ede9292bfe12dd8c9e029be531d6c4ec47533b98af8
SHA5129c27caaa61d0af330065c5050cd7e4b1964bc66d6a055af51f07a5fe62c33316853bb72b7a9306227ed1750b31c1f167f83f8b3a2dd31b7f77f52364e6cb5c7e
-
C:\Config.Msi\e5ac783.rbsFilesize
8KB
MD5f9943402e3411d6386d38cf4f7e683dd
SHA1c7dbdc0b48cb7bafb568796940f3d5e4e81b487f
SHA256b60945e4df2a7bff2701be2845c7bfa171a6e33bd033b67f11671e28ad504ceb
SHA5128629db345f95ea349bc92a7f9c18c581bcf621e64213df4340589498037335e5be44d34fbfc150d73125ab8bbf074e43e903ef62ad5bc391d9b00214600b6af2
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\Reference Documentation.urlFilesize
197B
MD5faded0d5bdcbad42d8f4826cc3c620fd
SHA1c49c34f2d2160297b1c0c71c327180ed52ff673e
SHA256d869d1b0c391cd9ce8f0c633cb8e5731c5073c33f875b32a2a61006a3c1bb24a
SHA512bc60186037724353460a0f7af8b207ccabe64d80aaff796d9ee082c6cb6573ff214dedc22080fdf23664ce79f7604276e1bab746dcf2407a46e40ff38b7119cb
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Get Help.urlFilesize
188B
MD5684333e26e94b3db4d1971c01f83d030
SHA121d61ea4ab5954241d4fe0c3353f4673be3dfff7
SHA25689321d2dadfbb526104998111361d2207536b7967ea130775389b486cd9b6fce
SHA5120322d1b37a82b155ce9cf432254d47dde2dd74807f759e39c48b321bb68e73ba50dbe3dbef7b2280f5f6858b44a8d177de027b35ff59493e18cc97743b67765f
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Visit Java.com.urlFilesize
184B
MD5d5f6b5ef01ca2efb13aa9c459803f1ac
SHA1d19c236c2f6706ceb9e062a2b8a79cf6b4c77882
SHA256fdaa401ded2f4633adbec4a95e0eafe083abb5b7f44142c395194f48d461be9d
SHA512f4b115fb9f305df470c8ff01223f1e55b8d72d7f6a03243f8ff99fe4f8ad6426753765758257c71151957ba6800b02ad94f69d93b80449eda2149acef3d99f6d
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\Java3BillDevices.pngFilesize
11KB
MD5b3c9f084b052e95aa3014e492d16bfa6
SHA10e33962b2191e7b1a5d85102cdf3c74fcd1254e4
SHA256a68ddd67f6fcb0bbf1defa0778ee543e92c1074c442197ab623f733cc6285948
SHA51206f51ac2962a0ec5f05ad6c90a2ba85b851d1fa2f0c079dc264fe930316cead959f68f6e34ff591b131867b482c266ac42400b06385dae712637ff0a90f902d4
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\au.msiFilesize
843KB
MD5c95a831719a0a8659911c2d961a9e425
SHA184e5db605edecd9976f2a7d45b00c2c5deabe11d
SHA256bb5d1befb8970ee28066d13727056d54e0ee624564556757c26c75d6faafcc9d
SHA512073f2e9ce88f18ddf6d5e9d1d47a142b68a4935d73854580ca6d5b619473632965051e398bf5485ff0664d2caf2ed13d4260ab64428c7ea2cce78983feed3069
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\jre1.8.0_361.msiFilesize
52.6MB
MD51aa57a5a04ec43b25937efa2a3f0f0ad
SHA16121bef34c9c603e8b03140c05e0418096ac7bb6
SHA25666a697fe354addb90ae4e3c6b617f9ca0e5a65a439435f674e3f6d8c7db85b6b
SHA5121461ff7fc5d3a1e3fff20bd42324f0dc6f82bbdb9d35cc425535449a0f8e346599c4012802f0a801cce243eea4d878e6430a02db5b24fe6cc99b24cdad31c4e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD552957d4bf2f5b79a0cf7b42e9eb1a954
SHA1c6ca0bc3ebd37a4a7a99b3ec8b4cc29368c5fac5
SHA256373963e79b7dd7a50576b9bf92f1a5c356e30bad53e25c44d245dfcc2f869d6b
SHA51290f957c13fe611b314c501d6cff5fa6d747ce1bb67d32b73997292c6c846c516e509ca76351f827bfaefe80960d4ba8ee89ac7a2a9330f4741f6dce9b4170036
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000019Filesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001bFilesize
279KB
MD58cb26e0baeecb2b3e54e231d7db00c8c
SHA1a60b5a80a015737dd1d1e7d45805e39052b23c3e
SHA256ef0bcb1d41b8ad1adafa368ec93cfb284e2069f6895e58b64c13252a27f573f7
SHA512139cf818c7b013d20d3e946d227d74467d6a71826c51182719d3548b110dfae7ed2adf7040582467711714b874c1b4603e0c459688f660a20dec3d01ce293275
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001cFilesize
63KB
MD5de6db31ef91aa3105a77c4a889f8caa5
SHA14c2db88d9fb4b4b3d811a9522ddacd2ddedfdfeb
SHA256cdffd84781b4756783820919d61468afc8b56fc3617132d5781d97ebc486e6b2
SHA51236d079508d5b03df8f6c6d5aaa382b5270d77e01fe07a3a91957e2bf299966dc3fd1b937f8649a2eeac73413ffe5691775fb86abe6dff24f90d4b48465f9fa6d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001dFilesize
37KB
MD5d90cb261f4a509d886611473296e188e
SHA123551f9039c8b855b496f017c8f75b32f6e56671
SHA256ca6c7cdd1e68e9f251fbf58e0b0ad9e883b38979e264c3cf4125f603b21c8bb4
SHA5121cca6c9490c8f7adca7441ffea3e7445309d0c52fbaf7252e4c3c73525e00233a8173536c031747a55343bb86e96618d9c96afc6e4f8d25b0106729cca5c8031
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001fFilesize
67KB
MD5dcea241704da5f3a53ec8da406f38f75
SHA1811bbcc37ba27e1397b3ec62b7aeae30cdbeb8b2
SHA256707f3a32fbbd4e1ea7cea29173c6a3e539933633fcf484193e00aa9f6d285720
SHA5129210783c2c86c76547bb0e829aefebaccfd903b723f6e330dea4aa8047082f6704d3a517de76a3f0f44fe4561cb99685394980fd63f169a97c2fbec661c447e6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000022Filesize
185KB
MD5c66d0c865b062cedd5b31cc9d146fe1f
SHA174b5b565ce64e44c01da8d1d69b7657c6d4c1212
SHA256a10827747b025f2cb7f7442a1599ee7f5283f2a9f55e8c5dd20fd058165cc8b7
SHA512650dfd30779b990dbd65fdffebb0dd75b8c94a27d6adf3c303975f75e81a47470247248ee387ee9f108880150b4e9b3ac366135a4100230097975bbfdee395f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000024Filesize
327KB
MD5750921a2a5d908b5a8ac3b9ee7d226a7
SHA12ff731053ff9c73127b889aac84e5488ba8c8915
SHA25607640124af3ad59ea60a7c356a0bfe4955c3a4879d41d6d96920c63c98bb694c
SHA512390cd1f3db926906360df8319743fd5d442f1a6ec957660bc1dd4de8db61f09768af3f0c9c7ed17b96615ea358881a5a88a9b0f6c1eeb8cb86cb7c76d24dca2c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000025Filesize
61KB
MD5a5b087ad566d60959f31a0fe146204e3
SHA1105108412e2278849250a60c3cfcddce20cf86b1
SHA2564ef16036cac76984e899bcabded9d21d99aa7826943482c30ac01b07a96447fe
SHA51271cbbcd43355cc5f28949b0ceed03f8bc1902fdd6dc564fcfee0f9924cd165c6e33a034c1b4aaede84fbf11136ccf43cb6e0e2083e0bf861b56217d4c88036c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000026Filesize
51KB
MD5702bb8ef66b97d5200bc5d2a0db6e81a
SHA1673386d33815c104cc0f505a0569ae4a2bff13a1
SHA2561e69a3a6e39bb9db34b81e2ac1cdfd3164e48ab1124cf49964795c09be3e9735
SHA512c1c0048df3094c75a8d70a28c61b5e113e133c312e8c7ea5916bbb938fedc45b6c01f7cde221dc3c47c6b9d44d7fb67281bf7bf3dd18b845c7b8f818c2dbc85c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000027Filesize
108KB
MD598bcc8aee47d890c8944b3eeafb9860e
SHA19148ac9554bfdbf7bdbda9f57ce49e7ac153907b
SHA256313c01a547cbb0d545456651a9d4d598207ef1d09a700ff078245eabe8d3addc
SHA512ea7e4172df96f89408c922d2c69299f900f1c7eb15fe5c89d84f1a9c52c10f6e9c78782dfad0c4d25b8508d800ef3992f15fbf8fc49775aa61121b5d6def38f1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000028Filesize
607KB
MD5060eef8d5155498677392454fbfdc8e6
SHA13335a242443e02cf50eceabfbd7d6f0679bb867e
SHA25666bed6ef99d8ab46377a218e74f4c45bb3c7dbda3e8d2fcad3dc8826bfd6bef5
SHA5126d9cf52c6e248a3e78be95e704959b78a1cdddb93829d385c00382a83e0f6bd053c8e90f9f34d015e235aa86090a3fdd973b198145647825f45873f59e43fcb6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000029Filesize
35KB
MD52c00ee937ab07d009c968dd8a3749f54
SHA1a23e7315d74433f6bf60f09bc95f23eff46237fa
SHA25659023beaa76eaea4cd6da205fd9bc7f8e79f8238f2b570a0e8f83071f76bb9ac
SHA512604fef789121bd39894d40eef77ad5fa5dde0e18c2fc245db596e1917ec1232c490e9d54d7d327922ee45b15292516733e035e71c25941519d574a1ef8aa0513
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000047Filesize
49KB
MD58991c3ec80ec8fbc41382a55679e3911
SHA18cc8cee91d671038acd9e3ae611517d6801b0909
SHA256f55bacd4a20fef96f5c736a912d1947be85c268df18003395e511c1e860e8800
SHA5124968a21d8cb9821282d10ba2d19f549a07f996b9fa2cdbcc677ac9901627c71578b1fc65db3ca78e56a47da382e89e52ac16fee8437caa879ece2cfba48c5a6d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000048Filesize
29KB
MD50dd4d2874c37a232e8189a1e7c3704e8
SHA1358deee7e845c461c2774061ebdc56d3ab824c4a
SHA256860becd7930cc3a8db90a5b30af52d0456d5386cb7d01132ea7c8142c85b3354
SHA512baf6435eb1e5c749a06befb3456b85bfecb6507cb2769ff96c0f5395a85e880a76006ea426c9d7cb71a4695eb0af12edc96b20fb02f2b91af71a1adce7c1ed52
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000049Filesize
131KB
MD5afbdf4878c534ac0f013755a75b9776a
SHA1571e83ac1897d6b5765ec3b3f3178c97f55e8b82
SHA25622331abebaaf2805c445d8ba2861c74d30078257470dc2afb413dd8d2f9558d5
SHA51259dfa99c3c10a3c7bff10824878b1395b5b94d3d3c7667046bb4943ea3cb6061cc62507f963f68a36f662674be6e3fae05adef6ee692a5752ce0d71908861154
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00004aFilesize
102KB
MD5140024df3ec5b5f924a64cac58a74351
SHA13772631bfbcdd6f7dbfe6c171173d48a269de858
SHA256faae55d88c6981973b1561e275dabe1e074b2f3cc59a9ec6bd49458a13a391be
SHA512a0d7a28aa2de427f633b7e445b0d728605ce9553c4d81f6d3536ca84a6cc83b4be463af4be9ef58f31eb11701fe3b9a1b6276b56e89d4dcbbc7922c8425e65f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00004bFilesize
22KB
MD59004c13a0ab16120972d6aa8e557df37
SHA140139fe61786aeeb1b4dd1337af94b69c32627f3
SHA256a6757b470a38710fbfe08c70f37502eb708d202b293871385b94cd3dd45b7e32
SHA5127e393169f608dfeb35eece3a8a9feec25c3996c862282a2c66a9b1804d6bb0ce8ef13bec2b7357b094d3ca6c4933b328cded49947adbfd929ac04633a0f560cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00004cFilesize
244KB
MD54c8b3ef303d2dc2af261652e7524a5df
SHA195d639ec6dbe0d55176e5ac0e6725a7db2eda744
SHA256b77fc40105144967dd5eab6353d1e267d6adde572dba22bd79633efed608e26a
SHA512fda2302a500b71da3f75c57074d35b69c9b031e87aa96dd661a7fd70d04b15b68e30b27f2570d28640f88187c8a27042358a8a8239f668ab69bfd5a98d914432
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00004dFilesize
25KB
MD58da88e02511b2c5426b0a4f5950d401e
SHA1fed82bceece728ead76f94bcefbcb2aef60e880c
SHA2560a5842c3ea6dde516e278b493af3ce60ea430a9538712cd0071dd74caf246595
SHA5124117fe3c7961db48f1eeefb920fb449f0db7f2d510a043d01a29ce7882f2cc02e8ae60f93bfee38f631d373848e1c050f71ca391aee4fb6eba9bc5e1ca94af6f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00004eFilesize
70KB
MD58017ef4c214f3b64eaa33311491269a7
SHA17ca59c45e93731c7a4a33b6d2cbf7b4339d2831b
SHA25694f449d9ce38a3c77c573bcae5866361aa5ef7fa9c7fdd53d6ed398874165ec2
SHA5126e86f845e7f73b0c347ccc72f91d5c7147a8def6a0c732b69253b4671fc2314aef90ba5a44772d59f612e1f5afba8d42fc7e411804a2e12f63d405f3f6d88904
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000061Filesize
63KB
MD5be5a354369a5166848935ce3f51669db
SHA1fb2351d0ee433d13d46499840f04a08b16db5b6e
SHA25660e36710c811497be131a35eaaee90dc4f51739df3a86d5a198fcd12b9925f0d
SHA512d2d2dfe4fbfc12917602be89b1fd57ae1251e1aa2a03aff6cee61e33a509fd64cb12de1ffc528c8729697c558e8e94a1a3ef095749c9ef6ff8574d92d22304a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000062Filesize
72KB
MD5101dd8f23accb653a61b8899bf52abef
SHA1ee62af5ca4a7c781de5c1eed9cc3fb8835cd1510
SHA256427dd8c3d53e9fed594edf146a20903d813174c36c860011001a3f402ffb0720
SHA512796b603b56e26900322a871b2d130f501f96320f0297f57bc31ae954ddce5afb0fe5f098e42e4011bc7d05b84f4872e4f5fb5826c0f98cf8a881cac19ec2a38d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD5ea8d676ab0e42d187424204effcac8ac
SHA1b11a3d52b653db38957b976bc908b0db33810c59
SHA256d187b37c1b7785536071044f4d4e10151c1265f18e5e5b9baff4804926ec3b86
SHA51204138c8b96eacade5583f0f867a874d4c6a6de3c655587811c69f7f1b8630431aee6308d6408a5b50ff40cb20e0ba81c4fa2b31bfa170ed41540166df4e4c66a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD57432719efca96403ffc333fc180930a3
SHA140510e82c59b334f8f92668ec89b4642e0c5cdda
SHA256b994d84a1b179fe7898901216976dceccf144bbf93d1430b564b7ab6e99df4a6
SHA5121f9fbc20bc4e0e5db17080f5dd8502071d49831f88f9efcf595f2d540ba9c5c95be408831b2481b74e8b23e491d3a1002fc509d8f227d90f92a6cb3b9965e4fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1Filesize
264KB
MD5cefcdb6e3a1761926c0f51062d5350a2
SHA19158aa435f7f49e196df9cbf6582b598f06f428a
SHA2568fd3eae743847a5e54a5c7955406ec237c53db04389a54b2f20c92154dd02d41
SHA512f0a229951458abe0e2a0eb3bcda4d189008f85c7043221bd6f703cefe48f64c0513445db37a825b34d186a77b9ad5bfcb692da3881ea41a512e3c1d251696d05
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.oldFilesize
392B
MD572c40c329d6d98cba443c694b1ef96ca
SHA1b2dbddf2af3c18f68e31b4a4c249a3d68fce9978
SHA2567de94abb7cd948632b2215e977f19261e16f69de046b587c8acbb93f78e4bf37
SHA51206dcea9f0415f89f7eb0217121f36feefd20fccb74c24ebb86695fd5e0397518fbe4315a3a3f555eebc51b3e667cb0e247250f998ad21a37af8c3063e9fe4d4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.old~RFe5918ed.TMPFilesize
349B
MD5c0c6044925a1acd5c3a9aeafbea0fe90
SHA14a7deaf7b7534479011a8ac7c942c20a8cafdcac
SHA2560237ee0a2cd3bbdf8036fa782bc508369bf599638c50273550cb93bb7e5dab45
SHA512a5c957c80116f623b287b479ee52afbccc5b6bdf87dfe1658dbeae8d9296199de83df8f9043f70fff8c01a6cbe57307c8ca2891b27fddaf8dae096e4f30abebd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001Filesize
23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7d7c9b36-560c-4330-bdd2-c6c3c50aa01d.tmpFilesize
3KB
MD5c043433437ac9672dc561cf2fa9a642d
SHA1d28b0de4004815d26ac3507869dcba4cbf70c036
SHA2565216c1e92c052a9fc775f1cffbf12167581795eea97c54e8b54faac4a7d858d7
SHA512bdfe8bfa179665a60d891becb577b0627c8c03da3f4c0bff3246bf07cca9707cc1d2472d2389bce2adcc8397f952a133bf6df0b4a0c7c71eb43d26e91c013ca4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
7KB
MD56b748a3daae93d1c6a9a76629bff9b52
SHA1cb274fbc1c8e737f7d4d2ec2da6d51bf9bb93d9b
SHA2568db9451a3b62a7fabdc666dacecfb71d856473d0228e1af13c0e52adc65e9c4f
SHA512b688797e1be03047932941b31f3fe96c11b861a62a33fa27904e18df94fd8d5a68c737c57b388252d04f385228e01e1c5e3ecc96b2c1a3f73d44c8b3e96ac50a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
12KB
MD5db1e961890385d74c084b827ea4f78aa
SHA1166db7dac08ef698d5290e3771fdc015eef6683f
SHA256d72fb35314fa311fa9ed73389bfdfe854de41e21673ce5933067bfb2e1fee0a8
SHA5124a38a63cb9057c5e70ce843a9af396fae840bb5fac49f237928c4fb615c5015516a55ade9e8ae68ddd538b741dd7e5f98a7854d93a4bbf41300f40be5e080084
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
13KB
MD5dd398f41134b9e1b1ddc8955f045fb9d
SHA1aea1c8738afaac1de0cf18a0d120ebdc5fc0abd8
SHA2569f1f60d883ce00deb1817004a4337c8514723d3c86cce7a435c6444df0f478b5
SHA512ea390c8115a22250dea3c45dc1b4b3473bf5741c38942c60f7f7814366cd29cf74ffda23ffedbc28a3cc149753b4e2a7b0671090dd5df13d5478c93414353c98
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
14KB
MD5b2cc564fcec4d75e2a4249c36977cb1e
SHA1e47e77d8feacde0e5434fff8cf0ebecfecea8b57
SHA25686b5160ebf6a761c11c3010682908fce5fd595c38201f7c83b86106184da1bb8
SHA512d4427f385ff1f54aaf080282a770cd64fb8b13cb68c99e0a4a2a7e30779fc861b280be2fc11209d78716f0b5c1f1eb2b32befa3239752bc6a3465b634277fa86
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD5a952af43f46119e1f1a6c0b9f2ec500e
SHA1e7dde38bff68bfdeb5f04c82deb4d60b05f8b3c4
SHA2562ae406e257257f75852b0c3401b3a97ce7d9e8318a46f41c21e0c93310e39707
SHA512a032100b4fcc1503880c30af848b1bf613c62e9afa193b6a105510098c60b4e80867e3acf441e0243704af7298da21485c98e957ec7db8cb70e187280a90e78b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5533cf8b1f9e19412d0cb0bb98a9da722
SHA1321fcb3ec9b0a74963c85631ff7214e4e96d140b
SHA256d2a09e38ad81fcbd24c7ef05254e86a4ea5010aeb017e58cf0bac3a515556606
SHA512f7b5f92b885333318528a33a6d4bbc673bca705849afb64f7f1b0d4ce76957ad653bd5b2225ae00b15e076e04252f60ec464c69c703c3c014c1553bc1582cc9e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD558b840d544ae573214925c550663deac
SHA1d01a88242b9b1d5fab3fdeb2317b34cedd7dbe74
SHA256d04864339f51dcd3970c616fe4a8b038c3d8247237c8025afcce4b4638054caf
SHA512bacaf8e754d91f6eb91647c49d5bf5d59fc0e5a72bb37db7f27ec2d1ae6b99f7b9499b190539c1aaf3c3b24cd9049d71c5b63d654596f9845f6945037a9434f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5f7bc179e4ef951e530e1be1ecadcdeaa
SHA16f49bf3fd08ff86b46fe4357785e20c01def61a4
SHA256733ad4db9d883d5f36f48991906e93badecaa3ac71526b2f18d600d144b7174d
SHA5126326424df5f2674a8165022664615191047432dd5c1ca82762bd5a61134cfd5336086e0fb380fcbc2920052f2eefc5e69d591fd5fe70408af3dd69c7a27d53b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD51741fd9b3361b4c1007a42427af3488b
SHA1305e8bddc2b560ec5c813fe46d743046d4005afd
SHA2569cd3693358015a75ae38fe07d3e98bc602cec69048da2d6a389bf07801c883e8
SHA512cb946d125e8ab9db634e1535cefda816f76b5beaff49fb59ca4414ef3c6c5cc1297b75c1e7bc12049de0cf421834e9976f09e1bfe5d91690764fbe8ec6391643
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5ab06fdeaf11a08c6ffc69e89690d2676
SHA1d8fedb41e3fd1be0bfdf29aeea99cc479df0c7ac
SHA25662bc10db2061191ff90cc5c9cdd5910332c1935245fdadbed6ca7956d0c69f0e
SHA512d269b88622bb59788c7c62c001a363a438dd1b003cabbe6e8bbe7590e6489b86db4ee471e580c8eb2c9ad9dd79cfbc4b95eeecd5c271263ffe03705688186e17
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD578c537cd7800764d20661f4a992a067e
SHA12569bf1416e724530e2ec475ab17b8f7b89132da
SHA25672755b545f65e906bc5408ca4d717205e1fd739dbeb976f8834a784478b77b87
SHA512f41909d75a4cad3acaa491a64f95d5396052f1704c5aee15913d8f72b7a035ed8f2f02cca14c4f6b5838d6cf4ea6e9bcabbbaf4609bb9c1d81cdcd2fc239b8aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD587aa2921291ab7522ba488e66b1c4563
SHA1c501108a60e912dc6f988d79441d5425eaaf5e63
SHA256508217e30673537b59aae76709c0fcf06e9e1327dafe6f7067319ebec918b24e
SHA512868d44b850151ad53d90aec30c163c4a24721c38a807f955de8aa63feeea98dc68b08308b39e1332cc8e852a2b0306899e499a38090d7a8ae5aafa8babef7440
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5a214a27d4df2a98a6a91b2264f69862f
SHA18d7f49756090b6eef9b6a71ae4b89437a0069c88
SHA2569fad4c7de63fb26ad7b8bf03a821db6bb2acca91b7061376776018028d58b511
SHA51244bd6d67fcd96d8c1b6641a7def6e02864870d195efbdb99fbed4e519e4f47d2c40942ebaa9b18291ce1fc70d81b7a39980fce9dfc3f06558ca7f751d95a4481
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5d1ef1116394a832c1bf26b4d0817a143
SHA1ade4e87e45062e9c601fb89ae5bf805a62c88dd3
SHA256636d0b1ee2447e71ffcaec8d31ff09dbff44f4ca391bec44591ab33f39132318
SHA51267eb7d7126ee8508244b5309a5de6f02ca6ee15f534a2e9d587a0592a6f4c7df2a15a82750f86da26b84b089e28898265c445375a187aab172d7d50075b2448b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD59b6b52ba5db9700c68eef87c12fe568b
SHA1ff596f439124bdf77d9a623d84c17c8ce63a08d9
SHA2560a96131eecd1bd438ddee83c9092abe76c475ac0061ec02645b1592f7a5e5a73
SHA5121ce6e524286223416df0fb1881bd2cd8cdbdd5614e5e6d411c147a84310d12c23710504955ccae4ef871d33198faa93d9742d939a174db2af8a526b7230e64d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5c0eee0124b3a4768317f9dae9131304e
SHA14335710dfdff871f108d42731d0946d228b01b3e
SHA25692fd5bdf636bb6e9b95e407fc209531ef6634a9592153d81f0c944eded940cd4
SHA51213d31c29f15cf45d12469c8e0cc44b33df0e03e647796a7098370c67eb8ab9fe57fe5b902b671707110ee518513186035f88e9ab8adddf90d3ebf13beead89c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD52f385f532516e772b9eb0d4424099154
SHA10967933878d6bcbff12abda105d2a02ba7216227
SHA256e2f456688ebd494334982a4fc756193a56fdf9a8b9cc05a88558b54f7b0fdd53
SHA512ef2f20da9511c5f902b0dd0ac8a988cb5dbbaf2c27d1623013c1286ea790496f72b93f953034a688eaa77938b980aa583a2273058b1747817848393b4475c82e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5c39188d728f8fbaedeb2922a64be4263
SHA10ab55972625e25811dd7df63f829dde8d121da60
SHA2569a74442b41e397c7958b390f67acb059b899d40dd23b956b215ba2aa42904ecd
SHA512511f02d2584056e2c9b32b199b6b385be64167408ebf301bb3d8e2939c40c33ea2a47876c031f0607168cdd8a7685b7789efc1daabc98117921085285b5315f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5c4f930abb9e0677a36c883552f2c3e2b
SHA1e353ce7b7779aa7ec4c7e4b8a0a197f614a3f717
SHA2563a51225347b97b59b9d4a94be578e33c990d50261d65d0c43166981aabb0dc47
SHA5127be90db8a73a6d570313f36225725b7ca6c394f8d13de3923bf085ee1e9d600b50362e9bc856ec216a53c7c50de4b9ee142774c6def93b9d2899f5424b5365e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD543813d4092735f92a304eedd157084ac
SHA14753b2efec1c3b6aef9430bff0f36cfb6ac6bef5
SHA256fb44ec2399f8c17514d9c1c2cfa1e77e3965115f42d906bd9cc4ed95c6215e9c
SHA5121e27c4e79e02b08ba87dca658385c932922708d5f08ff487e77a40af54382b86ba966839040e40d7b4921710983c84bbd18ae4a4d602e142258ac6fa22c5c437
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5966f99b5af8f1f3d736537c9200dd30c
SHA1f04d9da1a3193ec2db778557f1cad703ebd38c45
SHA256575f92c37e3c99b8ba21d49db745459c674e5ba9eee1bc77d1edbcd2bcae4b80
SHA51222100873f42b462a8e298fbfd59c59147d5a6885e3ff8b815c71eb661602c0c0042e5244808031589e26cb56e53774a6ca2df12ec02fad70e999b94cdf677497
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5c5276f215f37f415b8a503f340e6d105
SHA1604331796b88203378eb6c27bd61d89148572bd4
SHA25609d26e28ae476c6c9a285b3670041c0f3ebe417f987f916ca18c27771b4b38e4
SHA51231ff232dda0b2209b88343ded1c0485392f8a0f232e844316e56986730ff674b5971c4baf54fe06db67b526239cd7a979e639cd775ba30e2ffaa06e97620b157
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5560faabf28257726576aab3445c428e1
SHA158d38871174a02bf4ecf9abea74a6dcf2ee397e4
SHA256a1f6e17c7341efd57fdc9f37a0602377be8983ea5db4a51233cc53e14f374590
SHA51213dc5e2c500d444b19ac65211cee703f6ba5888c65a0922ecf1f7c585c6e0c26ef5e3e2c597c494be82818bc29f0cfdb7471a0664982076d643202f17cfc1c70
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5ca36e81fc4040a9d48f03bd2b422203f
SHA13c15c89209ed4b76c511def1a1293093a1f29d62
SHA256c72bffe1e6e70b112547fcac29fcb2c6d151faadbf54f189809a85fefbc1c95e
SHA51235e603b11846983d9b358a9819ce530ae1db5532614d41270cc81a5551e98a36961fdb17f9aa7adf91985c07220b9ac4265f1234d818b96d2b9cd589d9cb8e60
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD54ab3afa2e3702956204d248b847601d3
SHA1e39c2eb5adedc01f8e7f8b2c9df6b19d006cba60
SHA256c4bd67588565d806b53ac6f7f2939b80876541d7b7959b5d670b7e4b8e99941b
SHA512bf2c4b30cb971754e97360180f1df29551b399bc91589a0f3547c5e5a0a1ebd7dc0592b2e4ab4b155bc5dc3181e89d3272372b87b84a25bf3a5e42aefa1683db
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD52c7f60e6e0b664d53ba372d0cbec44fb
SHA1cd23e31ca469d649a3d315e37339935b4a58dae7
SHA2562f66a34d768ad2a74798b602210dc286245ed37ba0b2b7d08ad785e56638f48a
SHA5129cfee0826710e56b350c0bc788cac78fa08ab7e4c7599c6162e217f8c235e8faa2a7e76f6b919f7a6e4def452abfe266406247f21b867a01ee1c2a8c51360592
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5f48f566d4951892f95163fa2f1d3ef4c
SHA12d48572720f2fc7db0854bc4c95955287ced826b
SHA2567e5805e0912784708ba9a3b4ffa300e10e2e62cb2040d2c2f224ae082ddac075
SHA5129c59efca9e14685fb794146d1c32d422451d08e89514c0705322f002a80a2e778c3ae104b580d9466af798cd6e43c2b7e20cbe6d435ce228e8af76516a941901
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD58078ceae56398b62b6b47358637b9f12
SHA10e3ff7c89c6c1c57a53f792b78f238472624b64b
SHA256771aa4f1e8cdedee596c1b517c84ed750587b7a0cd469107472768b58116ad16
SHA5124efc72ec1a42b2e2e96515183f24a4b912a3ed43b33f95d8e6cf325c70eb8e962fdbd2f0776ccf1aa8c95a87f78dfbe284eb434d7b2dd7598e764a55a94b9a71
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD5f49530a632e52b7ed6fb787747b6392b
SHA1aad7c880afab734dda43adc1f7cbfd0b1ad9c9bc
SHA2565973f3a16b607d9c0a11feeeef79259703389e4085087ea329c5e6cb3fa0e1c3
SHA5129f3c6bae32ba95c9118997d2b3e8c852acf6341215eba309f90f566e32091a198184b76da4f3b2f61f9976b324ef456cf7a9e488b333f0246f57067e585cf401
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD5c145ca7eb21af73174820dfca631b926
SHA1538f2990dbc16327006f33493885808386155fe3
SHA256d17f4ebfd865efddc6b01c26aa4737173c5c79cd740c2d38fd2fee1a98935d30
SHA512ef21aa7dd58d5d2c83a17f4c84b8d391c321ee08628c7422e9dd769dfd2164a6b4d364ba27cacc3e02c504a2bd656f097803e8a29afa24ee200e0d9a36642806
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe579ac9.TMPFilesize
120B
MD5086d47f2567473884fcef52fe5435d98
SHA1cb19f188ec4dbada0983edc81ed0250e62786655
SHA2567629c297f3088d217101a65486cb45ceb899d694b965240d55c02b87cd31f565
SHA51233e4590e0112ab30fd81698b83e9ff36d473ba228847037f79021c3da8f6194685ced34b3ee4909ca0d505eb1490b29d300f0536498bd8e53d0b9bc3d61eb2c5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
142KB
MD507a4469516c20a3941b806eeb58b6d3e
SHA127559979a25f7d472abe244c6f6a63a198c55d7b
SHA256bc2798fea889f46bb4da81da48efb890a6770ca91469975edc0f0d0a4323a202
SHA512b5aa15533fe149d198e3e6e9fc4a6cff66191a1f8ad2cf4b75dc44ddb5d9751b1f2c30a34ec6320360c98428076fdedcce17a0fc7f93cf87599aa730ad3c1dbf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
142KB
MD5f7f7ecbfb0c21280b04e0281845a57dd
SHA18c21300b4b7743d54eacabad0f78688d1e2b67bb
SHA25627b5c9b90763edb6af4939973a1a742fc6ba6dcb48a8f8f384871d400dd03f09
SHA5127443ef7cabbdb70cdc0e4265fa524e93ca1dbb289760fdbbdd773cca0df6b4218ac144dc6c432271d182a4c2839b8d83c8995d60a590ceaa80dd84ffa8c3a4a2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
142KB
MD5b91e10d1d7f3f302f4498196aa7f014a
SHA11df27409a67033701e8edd86f37d8717b7b1a508
SHA256dff7b21df337b24ab06ce268ea2f82509af3bd9a61c14477b89cbb7671002d2b
SHA51296e1b8d453c4fefcb8ef66120d24c808e6c0d40efe1d1f23be97dec21767bb00e27316918e008a93d31d7abd5926a8d346efbb9b28f74fccdb6d3f37e6baa158
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
142KB
MD542810b4e6ee18d21258220222c231309
SHA187ea2b328ccc44ea7f6e1fa99b663ff2e037b68a
SHA2560ec406fb65dbfd93c586186aab85d54be678d4dbd5e58552b638a94f311f38b0
SHA51271854dd63b5554f9dd7b911daf6774cf0009a219f30254eb9da31f554acd097680e444c6edf6cae762add03484f5a8699a19fbf34eabf34fa6b077e132cf290b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
142KB
MD59e1069c77afcd7abf74df9bd5a20a540
SHA1ed2e87e8280ff09ac7551e9023b1c594ccbd7d09
SHA2568a6eb42f01e66bc44c754a95e9a8c46f2900d7329ee115ee29947167c484af96
SHA512b73cdbc049e72f47934b972cc8cebd15791145a215be5f9bfacfaab0a1576ce7ea946d1bc4e0efff25f0bd22a75e27d3cf8551253ee0c1b8423f9c09e5686f4f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
142KB
MD52b940ee4c1bb2a3523de4c87906ea89f
SHA1c520dd2b03ff21d747379f6bd4916317d9684e86
SHA256ce9d7fc28f84aa6b5cce04bb2535533236abd1ccfe4c5231ecc8c31399ceb7cf
SHA512c94670ec27c9627d28015ed37c56b2736ca5a7d73a02520f6f9296d07bcb0ed039129330b1b1fc8fd84d4e337ab9cbc64f60f3ace9c16c1b931bbc9312e931f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
142KB
MD5d61a76b55c751232be59fabba45100bf
SHA1d1a57bae18a623a3187d2e6ef45f9cf119728820
SHA2560c775e9ce56059204fc2a8402198e8b0bf79192bf2bcb10fa6c4af55a6433d0e
SHA51213cd8b2f2584bb886c03b1b58eac401320b99548daa81866ab010f452ec5b582e0a5828a43d5e6d85b0b61e5a383332e2bcafe13b6198080ccc4af128086f3bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
111KB
MD5224c6d80ac1060cae5e36eef46ac114d
SHA1f77a9ba20ab765ccc7ce8457bc28709a6ab42414
SHA2568c63848d82d60ea05acb054883572ddc950c70b34446b2caafd1a1b1d4d9eeab
SHA512dcf33578c82777d29bcdf3e0940c0268546343a462d89bf599b29aaddb704a80fb84ddcbb71809538f38b2ad8abb08b9c3cb7db913b048f2f8ea92683139fbd0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
116KB
MD5dae93835cf4d7476a93ebad657e03705
SHA1fd3a9fa907aebd5a170110e0dc46b36a8f589ff6
SHA256bc6774aa01eda8d54e398ea0c9dd9993f9e20e0cbf911ebec14288bc5f3d5067
SHA512fcea4002b0c20f346bbaccb336de69f7b67e094923dd4ffe5d942277dd967408a29865f959733920f15f29345a3033e211b1bfaeca7db2a4403e99a27d9654df
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
122KB
MD5a30b60e78abe6af3f3796395fb764075
SHA1280016cb333992509b189e14d9536ab20aec2020
SHA2560baebfe434ae9d58eab066774e7b58e0da415e4cf734b91c4ef2cafda1df7b6d
SHA5122c03a957fef47f73900eb9d2600c73756adad6650e07ac1bf78eed1d5c1f96cda2fd012c08c2e19d8fa7794e1eac58e298c18ca05552f81b3f1ba87390e4a873
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
111KB
MD550135e001c730dfba36149533c4a8170
SHA1d51964bcc5e993b7acc0276a780de5360952ceff
SHA25698fffb6917d620ce83a3502c777eb7f694cbbb5e555d489ce1a103094240ae9e
SHA512d5d22503cddff430cf325ad01ba1ff09ba724397f53d9b2cd0ebf2ba1bb1c677edd75947dcd1c742bf8c32c365551bb9df767dc030e1ae41ad8d36eee5185246
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe576ec7.TMPFilesize
99KB
MD584449f46fd3ff0bde810bbdca261035a
SHA18da83a2f068a00beafc89a0fed2b55aebb6a7927
SHA256ff14c6f9a8d3d78518e4719c581e61623c2749df57491fce8f786f91c370ff78
SHA512f5fc25f83833c65d1c20d92745607a1edaa04363419a547f865b5164e8e3ae150092a6599dca93c092fb02f04fa44106bf2a30c625fb0a4c6ac2d94ad0136928
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6K3GJRJ1\l10n[1]Filesize
4KB
MD51fd5111b757493a27e697d57b351bb56
SHA19ca81a74fa5c960f4e8b3ad8a0e1ec9f55237711
SHA25685bbec802e8624e7081abeae4f30bd98d9a9df6574bd01fe5251047e8fdaf59f
SHA51280f532e4671d685fa8360ef47a09efcb3342bcfcf929170275465f9800bfbfffc35728a1ba496d4c04a1fdefb2776af02262c3774f83fea289585a5296d560b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6K3GJRJ1\masthead_left[1]Filesize
4KB
MD5b663555027df2f807752987f002e52e7
SHA1aef83d89f9c712a1cbf6f1cd98869822b73d08a6
SHA2560ce32c034dfb7a635a7f6e8152666def16d860b6c631369013a0f34af9d17879
SHA512b104ed3327fed172501c5aa990357b44e3b31bb75373fb8a4ea6470ee6a72e345c9dc4bcf46a1983c81adb567979e6e8e6517d943eb204c3f7fac559cd17c451
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\layout[1]Filesize
2KB
MD5cc86b13a186fa96dfc6480a8024d2275
SHA1d892a7f06dc12a0f2996cc094e0730fe14caf51a
SHA256fab91ced243da62ec1d938503fa989462374df470be38707fbf59f73715af058
SHA5120e3e4c9755aa8377e00fc9998faab0cd839dfa9f88ce4f4a46d8b5aaf7a33e59e26dbf55e9e7d1f8ef325d43302c68c44216adb565913d30818c159a182120fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\masthead_fill[1]Filesize
1KB
MD591a7b390315635f033459904671c196d
SHA1b996e96492a01e1b26eb62c17212e19f22b865f3
SHA256155d2a08198237a22ed23dbb6babbd87a0d4f96ffdc73e0119ab14e5dd3b7e00
SHA512b3c8b6f86ecf45408ac6b6387ee2c1545115ba79771714c4dd4bbe98f41f7034eae0257ec43c880c2ee88c44e8fc48c775c5bb4fd48666a9a27a8f8ac6bcfdcb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\runtime[1]Filesize
41KB
MD56ec53f9a37577beb8cc538f35da0cc41
SHA1fbd4d0d3480999741ae882ff3e4c965e2d9aafd4
SHA2562d5dc895f7197ec80f500968d62fc936c490d83948e07e1aeaf1a7ebc7d30a6a
SHA5125b70533d479a0e43300058cdbf887e4161b9e6bd4d72cea216bb5f03cbeb7ca2ea04e4f9f435b957db4bfeb7725e8c677c4087390e4fc52dec502c3a300acb4e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\common[1]Filesize
1KB
MD5f5bb484d82e7842a602337e34d11a8f6
SHA109ea1dee4b7c969771e97991c8f5826de637716f
SHA256219108bfef63f97562c4532681b03675c9e698c5ae495205853dbcbfd93faf1a
SHA512a23cc05b94842e1f3a53c2ea8a0b78061649e0a97fcd51c8673b2bcb6de80162c841e9fdde212d3dfd453933df2362dcb237fe629f802bafaa144e33ca78b978
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UUIKWEAJ\host[2]Filesize
1KB
MD5a752a4469ac0d91dd2cb1b766ba157de
SHA1724ae6b6d6063306cc53b6ad07be6f88eaffbab3
SHA2561e67043252582aea0e042f5a7be4a849b7cd01b133a489c3b2e67c10ade086f3
SHA512abc2899705a23f15862acf3d407b700bb91c545722c02c7429745ab7f722507285c62614dcb87ea846f88fc0779345cb2e22dc3ad5f8113f6907821505be2c02
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WPCK8CWE\rtutils[1]Filesize
244B
MD5c0a4cebb2c15be8262bf11de37606e07
SHA1cafc2ccb797df31eecd3ae7abd396567de8e736d
SHA2567da9aa32aa10b69f34b9d3602a3b8a15eb7c03957512714392f12458726ac5f1
SHA512cc68f4bc22601430a77258c1d7e18d6366b6bf8f707d31933698b2008092ba5348c33fa8b03e18c4c707abf20ce3cbcb755226dc6489d2b19833809c98a11c74
-
C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-8763065052000.dllFilesize
9KB
MD5697d496ac9f5aaab8ae025322358c61e
SHA12043eac8cdcc2e24b854af1eacd77a5f2a395a27
SHA256a7273a4cf48ab3413f2c186cc95a3367a73ce99f8d45329383219d4cc27003aa
SHA512b6702cd49a3af9f97f697565136f140692af9f8b271e672f2e91c920a23212b778583786f2377078117113647926338614a92c4a2423318b7a21ba2fe3a89838
-
C:\Users\Admin\AppData\Local\Temp\imageio4892437617327892315.tmpFilesize
12KB
MD58ee50698797304540fc85117d67fe39a
SHA12762547e578d3d4ca469b30a94c7535e57c5c72e
SHA25690f1e2bcc7b6c2e9b5acbf3211ecb0b58f9e36b4f3db56acfc07f2a3577b644a
SHA512d0497ee7a43d35c06ea7c8052311f0c4c9d25b17329f93ba67344871d7441a77dcc381a2474656f8ef4a0f1b5bdebc906c6ec46713d04dc9ca82aa470c8a4a25
-
C:\Users\Admin\AppData\Local\Temp\imageio770002015574912988.tmpFilesize
1KB
MD54bc22d05b225a34a3ddb4f17d2469b77
SHA111a7a273129b3deb9cd2c77ef1834b5643469d3d
SHA256face76c9c4fad9476a1d80483d41772c805808a1383012b1c22065e30d32ede6
SHA512e00b03ba7550af9676c56c1ae39c00ccbae42a06011b37e3faec174ee1eda3dd16a223194824ba3f11e7d8bea78e74991af31b51a9066c3941864e13c91c45df
-
C:\Users\Admin\AppData\Local\Temp\jds240781593.tmp\JavaSetup8u361.exeFilesize
1.9MB
MD5442dcacd62016db76c61af770301626f
SHA11ef7a54bb0fb6395b271d88e4d87e7ac3b76e58a
SHA2568aa49738b3efd4a2e2b3d71991c209db46e082e1739de43147041f9af2a7fff7
SHA5123c21efe1f3422107bddc48d0edd842924dfdf6682b1e81ace83aa992ba49e224d45fd0fc6a73be9de6806effe71d8a1908f550c8b1cf520df4972c252b721bf9
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
267KB
MD5f33e466250251ab748de8b575491e4d7
SHA1ca9cea8ee547e1a3287c8d0acace976c8c297197
SHA25611672ab21ff4fa93ceafa8f486645d7512d0588f8617b0862d1169eeb7bb494a
SHA512f5d1a26a74ec9698f3188c513b7bb962bd6d54be5cf6d5c27779809bb8a75fc47abaffc2cb97b2a4937a8f20c916578618e1935f0e416ec049518e4cea3ffb35
-
C:\Users\Admin\Downloads\Unconfirmed 225987.crdownloadFilesize
1.2MB
MD532c7e3347f8e532e675d154eb07f4ccf
SHA15ca004745e2cdab497a7d6ef29c7efb25dc4046d
SHA256107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
SHA512c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
C:\Users\Admin\Downloads\Unconfirmed 305917.crdownloadFilesize
6.1MB
MD5ce4d0bc85481fc8e8ba10ab0106c9a5f
SHA1cc64084e73d6423baf7ccbdd9f3760dd56f2fce5
SHA2561c7b7be3b6c81d863f58d031d7d98d82f9cbacb0aa68a22ac179a607b03cf793
SHA5121880e39654359ddf05769b9104cb2493b39c20c927f0681cb0ea73110e23fa302381ef29f8107d544f5f8868e026af79716435e5c8f7900886784b70484ca919
-
C:\Users\Admin\Downloads\Unconfirmed 950250.crdownloadFilesize
2.2MB
MD5d3809baddaf7b1e7d94484160043328b
SHA1e1979f5248d3b20858b11386ce22b1ccb0a9bfb5
SHA256e28f198ca200445ab45dd4e94d49993ad1a9a21548908ca9c09ade6419c2e079
SHA51296350ef6c81a1bc7d3c6b29c2a66ffaa1cf4f86172d3f52d39bcbf3886da41208b75cfe16bbf4ea23e04b2e0616637083eeacdefb8c0edc3ce6d0f2f89f881c6
-
C:\Windows\Installer\MSI797A.tmpFilesize
198KB
MD5c7018628101e1bb69437b4ab2f6b7465
SHA1e185b2a7685490f74e11e794bf8e54bd9b21e295
SHA2568c33499755edda822c1ed58354f0353134707f143ea0290758510781e515c8d8
SHA512374f90ca6ae78e784967f314715cd282ea49332de1c1a59b3ed27389799f84eaae8ed9950a0b67ccc383c1ff872984114c2d43538cc39b50e9646e958dbf95f4
-
C:\Windows\Installer\MSID546.tmpFilesize
602KB
MD5dbaf31f37c583df88814c6edbfe7f884
SHA1dc3b941933ebe79301b8a2949316c8bb47e27ccd
SHA25632ce5f4ea52b3c172a91df18d15bc75b57fc229ede28f408d13d74f50786eeca
SHA5126303a7bcb88819898cb170a872e10986889382053a91f369c2a77efd0c5970310ef0512ac3ed46d38004e4381c7e191943ff266d7d9a45694923462e869773cb
-
C:\Windows\Installer\e5ac778.msiFilesize
53.5MB
MD5c760bc95af603fec0c41cafd82498a5d
SHA16bed421c5268fcd02f3d9439a314fffd84b29235
SHA256c93f2de2ed4d5420671f5d5ba858b841683183aba9248f9890c4b277c39d2995
SHA512cc9324416d98cd4ca1ec6e607e684336964d74da5f29f3d56d82b56ac0fe225c1420fbe08f9a559bf80307ea740e9140154f136aa9d3bc473baf60d736b7fd52
-
C:\Windows\Installer\e5ac781.msiFilesize
1016KB
MD5459a51b2e65d53e4e568215e77317cc5
SHA1f2308f14d1033f79a1d10b392520cb2459b0e737
SHA2569da5f7bb7d99c3b8d5c9100a0573e928f48452319989ab026af5fcff1119a5d9
SHA5127e3b8cb97c4c61eb147473d62dc163205ecd85235e6c711b39c4a76b06e8cee7d70f2594e0710df90e1b949c4bdb442a759912afeb72c6b4f0a34750daf17886
-
\??\pipe\crashpad_1112_JKSJZAAUOMCEWHQNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2420-160-0x00007FFD43B70000-0x00007FFD43B71000-memory.dmpFilesize
4KB
-
memory/2420-161-0x00007FFD43430000-0x00007FFD43431000-memory.dmpFilesize
4KB
-
memory/3520-136-0x00007FFD43600000-0x00007FFD43601000-memory.dmpFilesize
4KB
-
memory/6108-905-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-907-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-908-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-906-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-909-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-899-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-898-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-910-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-911-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB
-
memory/6108-897-0x0000025CDC8B0000-0x0000025CDC8B1000-memory.dmpFilesize
4KB