Analysis
-
max time kernel
398s -
max time network
1712s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2023 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.co.uk
Resource
win7-20230220-en
General
-
Target
http://google.co.uk
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 2116 MEMZ.exe 1732 MEMZ.exe 2132 MEMZ.exe 1864 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 2712 MEMZ.exe -
Loads dropped DLL 1 IoCs
Processes:
MEMZ.exepid process 2116 MEMZ.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 2032 chrome.exe 2032 chrome.exe 1864 MEMZ.exe 1732 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 2132 MEMZ.exe 1864 MEMZ.exe 2260 MEMZ.exe 1732 MEMZ.exe 2280 MEMZ.exe 2132 MEMZ.exe 2260 MEMZ.exe 1864 MEMZ.exe 1732 MEMZ.exe 2280 MEMZ.exe 2132 MEMZ.exe 1864 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 1732 MEMZ.exe 2132 MEMZ.exe 2260 MEMZ.exe 1864 MEMZ.exe 2280 MEMZ.exe 1732 MEMZ.exe 2132 MEMZ.exe 1864 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 1732 MEMZ.exe 2132 MEMZ.exe 2032 chrome.exe 2032 chrome.exe 2260 MEMZ.exe 1864 MEMZ.exe 2280 MEMZ.exe 2132 MEMZ.exe 1732 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 1864 MEMZ.exe 2132 MEMZ.exe 1732 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 1864 MEMZ.exe 2132 MEMZ.exe 1732 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 1864 MEMZ.exe 2132 MEMZ.exe 1732 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 1864 MEMZ.exe 2132 MEMZ.exe 1732 MEMZ.exe 2260 MEMZ.exe 2280 MEMZ.exe 1864 MEMZ.exe 2132 MEMZ.exe 1732 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1976 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exeSndVol.exetaskmgr.exepid process 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2884 SndVol.exe 2884 SndVol.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exeSndVol.exetaskmgr.exepid process 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2884 SndVol.exe 2884 SndVol.exe 2884 SndVol.exe 2884 SndVol.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MEMZ.exepid process 2712 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2032 wrote to memory of 2020 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2020 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2020 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1516 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2028 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2028 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2028 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1136 2032 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://google.co.uk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefabc9758,0x7fefabc9768,0x7fefabc97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1548 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1648 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2228 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3272 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1188 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3736 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4204 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4420 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4568 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2336 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4316 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2268 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2752 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2776 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5288 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5344 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /main3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
-
C:\Windows\SysWOW64\taskmgr.exe"C:\Windows\System32\taskmgr.exe"4⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3564 --field-trial-handle=1344,i,16144335917316394989,3564679740894383292,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 45548694 158721⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5241⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5a3f862a6c36db93ad6c022ae1cbddbff
SHA126af251cb9e6022901c0e78ded92bf5cff677c08
SHA256671cf3706def540048bcb740922796e6360cad2ad8ad209392b24121889f3df7
SHA5121b97ba80b8d016bc128d4adf5aaa72d2e4c0b9faafb9fc59498bad224fec6674ceefc040a565eee106ad950e704a1dee96103e58bbf962b245edc659f6a1d030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5590cae64256e8e0a668f05d338e130f4
SHA1e8f2c94e718d80f69dd0ab7d6299b30415eb709f
SHA25629996e174f5b221db036d7994dcdfc1cd2aabd66f160b977882a69dc732e3b60
SHA5125d50c7b4989dffc506edcb92a79b7414083db5f2c996e61e22169116c3b0806a87e92be211b5d96cb8c0eeaae57915cb34f834e2b37e1a24e9a1a808235c8e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD53709e1a145a635db6fdd2822874328c4
SHA1ae032a1b5d428374e67b56cf15d87bdd444f6e60
SHA256e6f720ad84e8a1fba2cba40a01f42ba9de52732c5a81366d0cf676e140014cbd
SHA512d3855868ac95a09614d2295961f796b25bb5ee21d43205502d7f78ef2bfd80e2549c91fb062f999183d015b54325479370e9240f489b5fd179648e2dc168095c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD59d34bcd58ac51887b33e888ab89b96b9
SHA1563222d73c35b429af2f75587d9075c6143f0c31
SHA2569efd378a1817b2f044239c61fc5c6adc865e991df2c1c371ef46616b5b290873
SHA512c0313432992b213e3756812d8b4bd298802be539cec210ea9064f5b665d3f891f5e582b8991c6da2176191d1c5e5151c4ebfe952431fd7da51d734a2b063bbe3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1a33bf5d-b60b-451a-8e3b-d5a5178c2f4e.tmpFilesize
5KB
MD5e618ea78b30f8a944206614c0232969f
SHA162635bf48158dd49a215eac0ea86fe03c32a3f56
SHA25638a7884a96fca6ee00cfbe4ab642c6048c2c9e282b9bd8a152271d70b65f6e06
SHA512eb86e1302905acdcee81c99274ec24ace3a992c32dc5af4d8042042253208bd6bb49c2041c81b858147d4d4c03a20da1e9dee6dc512a4afe33895f6c2adf2250
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9983feb2-b94f-4fcc-9651-c6152bd598dc.tmpFilesize
5KB
MD51d64837751e01d7a0d41e4cebb9a4132
SHA1b64d21c27ca070d5ee0302c6fb42157fb2a92597
SHA2563867b5c9afb678382cf47711c58cfa9d795b01666ed64464c7623ae8cf61c3e3
SHA512b92440f1dcc8147e631a3547b7c6eed773ff37ea64e6cf63a9dc3106483e5f0d6b03b8cb8156610fa9313e4aad68f8255d24dec8b584ac5a8be0234ebf2500bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000008Filesize
37KB
MD547ae9b25af86702d77c7895ac6f6b57c
SHA1f56f78729b99247a975620a1103cac3ee9f313a5
SHA2569bde79a1b0866f68d6baa43f920e971b5feb35a8e0af7ffadc114366f8538224
SHA51272b5296e3dd1c5b4c42d8c3e4a56693819779167b9f02bc2d5f5a626b519a9cf10bee59846d614c929c42094b65d13039f6024f6cb1c023e740969aaefd060c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD545e088a407da7a187d07e100d2b21d3c
SHA1b83ea0b770aa8647dce038f652c0cb6f751afe57
SHA25678c4838fbda7d7cb0306c23c6efc41ab298d014797d6d53d097c5ede9b98457d
SHA51294df229a83dc78241213b24e146af7f34697fb9ad48a2726ccbebddb3b7856b1e7c280bed20e0ee28ad0d74ae141dfe81a1d0717d01754f63febbb6412cc987b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\1a289b79-c900-44af-9188-5ae65d47ce6a.tmpFilesize
8KB
MD5808cf798984b0fc93df9da5146d35d2b
SHA1a0eb8967a668718712b757d4da1dbbf7d8e38d2c
SHA2562552f1f53c984d4bf030bb446de2ca36a5ab63912fb56cf8d1f266e45ff6d1cf
SHA512de8fcb694a9965f8d5a72f222b1591f2781c9c6d75ebbd4456a2f898d5a48e29e9f712c3b2a1b2c81d0e6b6b3ece3269b85dd076d12f40c4023424fdd23cff12
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\9d807ede-ea0b-4442-b5e0-90ae025e1882.tmpFilesize
9KB
MD58d3862408fe825ba47b32c3acc9f5f21
SHA133061767abb83b69f724cc3b145f172fa37e7ef8
SHA2569884d52d250ebd8062709fd4c6b80eec462c20404b6b950a456170f9650d8e3e
SHA51223d397aa0190d6066c9c738faedd096aa2605f04bf31512bfabab75033ec2dafa922bbf110ea77cdc1ff77da9c8df7650719b5dc026c9b3de00013ad84ffb90d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
7KB
MD52ba0cb5bfda1f7962748e2e35b4e02aa
SHA1078537b0e31d34d0b697ee639e3719bcc840d49a
SHA25698a8c6541cece4910c983f6fcc2b784ef2d3c8bd5179b81565265ca8b051835c
SHA5125f75d7a133bce254c145fc4e043ad4ad70731dfa9eb5b1df0af60a97c014383422a36574d310657c92c8f6da7f62371c48802470b027c5aca348f9b50b8ef28a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
525B
MD5bdd0b6b6cd486acf4c7905017ab67eea
SHA1f851e5b363384991df5fe8877a071a7a4cf1a98d
SHA256c722011daae4f42782e6d54be2347479ea03bbf552fea89be4d01b8562e65033
SHA51203108b53969997f869fca78133f42a8b113aea180c9cb53ce45a03dfe5673cc390abcc75a2f0daddb73650203e78253703a456035482535bc613ed7a68e86208
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5c19d73a2a12c8f77d71d59b23b56a250
SHA135b54135063428ecfdf29f54985435210bc1b117
SHA2569cb9c8f4631196519a359a4370529f58ffabf791fb2c116b4f6951840906c71a
SHA51286b0b352e8ae54ebdb356cfa057e74d1375050d489f2f0476f8b5cf05934ad6e4c13fb328c41792be59bca3740cfb3c37dc610a8fb0ac45f9d48ad453dbc839f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5f7734a99278a45e3bf80798a4b1d8859
SHA137c7276d84e86cbf85dda3532876bf1af4616313
SHA25626c22230eb644b8389835c8ce48f9f060a862932edbd0f741ee7fa1f05b4d5ae
SHA5128618c1a49f9acf25cb9769e0917af2112af2ed4c21f0f7438aaeb3de9da9432e432e66d70d4dd1fa4728975d2dbcde66194f271559a194391d87da92d6ce20c5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5a9e3c6b7eb0661304a638e2cea71dc94
SHA1b460469e9754d044e0d9cffe954ca85721e6b5ef
SHA2562ee8c672a86ac51561363025fd88cf6d99595120bdda80a2e14fe88766a9a641
SHA51218d8fc7a0a7a91434d3993c85502d6097e6f9fd077dd1f2dc1673777a87471e1b79a088447c6914a715d4d7f6ed85df25d6c2f5b72ded1bef7d1470f22f79634
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
525B
MD5461f83949af02427d2e950260ab889ae
SHA15bae9c8ed5083e27c5008149b4190e2b2a1dc3c6
SHA256b3d4f36a7271f3327613cdee404efcc37c2a9bc94311eec15b729ac6b8b43fda
SHA5125e687f6b29aa8268bfdbbfa39b1bc9dcefa7c3b73556c81b0c3579d590ae014bd5f05afc9ca56663c1692b9767124ccc766cfbafe039dc6774b1b3df1710fd38
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
687B
MD5d9f0e4fb85f58b360c55738ac01112cc
SHA1612b8e268874c3babfbfbcbdbc562a211c7fb314
SHA256acc6d4f23fdc725b3b4b5de8699712da9e5f9c60ddc7e141134d1270406aa2f6
SHA512f04586f335e632c7fcd14da32add6b8f83032157fb36f8b1207cec75d6c9623555fe176bc8e54c134bb026d27614f4062e49c1875321ea04ca41b4727abe3cf5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD506654ef4aa2b4970112223b0c737a0ac
SHA1460c7126fcad2676ce60a8de0c1e6e72a7727de9
SHA25666ddf319bd2368709807a3eaa2f0d3f9d7344f7cd466156370b95a2e660a0768
SHA512aa94b973f55309217a4c3a8f09603220230c602c6e950ac084ccb6ef35414eaf20dc62ba145070bd3c9804fc683718029a03942d1baef277caf54e8699005337
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5f7ec20c92d303f703733d9b648e39cd5
SHA191abda57b5d6a0ef9e348d16ce6208ceb167f842
SHA256ee51df155273a1a8ab3f9610a4aabc6b16064b7fd0679331b086bce02e0b95c8
SHA512adb02e2390c53c36a3300a3de7904add81d6730819c2f6eb8d998c0f0ba0eead9809fc97c2c3b687844c25c58286c94c2ccdfb7c371f117bca3b2e40f398d8a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD51977909c889e7c534b623aaa3cba8485
SHA15753590b78df2dc7c9a3dadde4b0616a3730d497
SHA256e7e9909b6f426ada5daa31cfecd9f443982bbfd3c6758f83e3d4566779e90701
SHA512f4830067135e7d2d8d4ced98819608d89e7e5623bea056b72eaff0e39aef14f49efd2346927b0ffa1edeb7d5e72f63a214eec7a703e78e94a1cec915c1a85ad5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD5eada801d0aa09e7e31e5f58e56555bac
SHA136f80d63a96228ec9dbe7df073c80199c355a49a
SHA256f0e828d22880c09d31229107434a197378135db64ef5bd06717be7f036c9d051
SHA51285f22cc107105de753ac2537105e183aee001b5d5c95f5f549a3568e220d42eac440e313108605b7c24d7b0b1d39e8676c96098e464674abcd14304b8aafab70
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD58a21406c1e97b1a31cf1092a38ba3ca3
SHA108b0f05e5c4bf52b9e6894130570a4549883fbb2
SHA2560e26fc1337ddb05a1424a581d399966a6a8a5d3543a38aa16f21f2afb3e6c1a8
SHA512000e9c325ba5f7e4b173d514a9230ccfe90729777dcc45a96ed0cc2a68c1319cf62bd3a399ec53dc0531548a87d1f9298666b6f6d5b9e96110b8edc5ec739a93
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000004.dbtmpFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Temp\TarCA1B.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
C:\note.txtFilesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf
-
\??\pipe\crashpad_2032_QUTNWCYPBKUSJUVUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\Downloads\MEMZ.exeFilesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
memory/1976-960-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1976-959-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1976-985-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/2884-958-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB