Analysis
-
max time kernel
220s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 13:54
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
vidar
4.2
28c8b36afa809659e21c14e7f6231b80
https://t.me/rechnungsbetrag
https://t.me/prescilliouns
https://steamcommunity.com/profiles/76561199511129510
-
profile_id_v2
28c8b36afa809659e21c14e7f6231b80
-
user_agent
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.38 Safari/537.36 Brave/75
Extracted
amadey
3.83
62.182.156.152/so57Nst/index.php
Extracted
systembc
5.42.65.67:4298
localhost.exchange:4298
Signatures
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/436-1218-0x0000000000400000-0x0000000000B8C000-memory.dmp family_sectoprat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
YoutubeAdvert.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ YoutubeAdvert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 262 4304 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exeYoutubeAdvert.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion YoutubeAdvert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion YoutubeAdvert.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
winrar-x64-622.exeSetup+.exe18975929432132070515.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation winrar-x64-622.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Setup+.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 18975929432132070515.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
Processes:
winrar-x64-622.exeuninstall.exeWinRAR.exeSetup+.exe18975929432132070515.exeoneetx.exeoneetx.exeYoutubeAdvert.exeoneetx.exepid process 5836 winrar-x64-622.exe 1868 uninstall.exe 4132 WinRAR.exe 4628 Setup+.exe 6108 18975929432132070515.exe 2620 oneetx.exe 2156 oneetx.exe 436 YoutubeAdvert.exe 2032 oneetx.exe -
Loads dropped DLL 8 IoCs
Processes:
Setup+.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 3168 4628 Setup+.exe 4628 Setup+.exe 1368 rundll32.exe 4304 rundll32.exe 2512 rundll32.exe 3196 rundll32.exe 4916 rundll32.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
Processes:
uninstall.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
uninstall.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000006061\64.dll themida C:\Users\Admin\AppData\Local\Temp\1000006061\64.dll themida C:\Users\Admin\AppData\Local\Temp\1000006061\64.dll themida behavioral1/memory/4304-1198-0x00007FFF15EC0000-0x00007FFF1624D000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\1000011051\YoutubeAdvert.exe themida behavioral1/memory/436-1218-0x0000000000400000-0x0000000000B8C000-memory.dmp themida behavioral1/memory/4304-1234-0x00007FFF15EC0000-0x00007FFF1624D000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
oneetx.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\64.dll = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\1000006061\\64.dll, rundll" oneetx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YoutubeAdvert.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000011051\\YoutubeAdvert.exe" oneetx.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exeYoutubeAdvert.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YoutubeAdvert.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
rundll32.exeYoutubeAdvert.exepid process 4304 rundll32.exe 436 YoutubeAdvert.exe -
Drops file in Program Files directory 60 IoCs
Processes:
winrar-x64-622.exeuninstall.exedescription ioc process File opened for modification C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Descript.ion winrar-x64-622.exe File created C:\Program Files\WinRAR\Uninstall.lst winrar-x64-622.exe File created C:\Program Files\WinRAR\Default.SFX winrar-x64-622.exe File created C:\Program Files\WinRAR\WinCon64.SFX winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-622.exe File created C:\Program Files\WinRAR\zipnew.dat uninstall.exe File opened for modification C:\Program Files\WinRAR\ReadMe.txt winrar-x64-622.exe File created C:\Program Files\WinRAR\License.txt winrar-x64-622.exe File created C:\Program Files\WinRAR\Order.htm winrar-x64-622.exe File created C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-622.exe File created C:\Program Files\WinRAR\WinRAR.chm winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\License.txt winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Rar.txt winrar-x64-622.exe File created C:\Program Files\WinRAR\RarFiles.lst winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\UnRAR.exe winrar-x64-622.exe File created C:\Program Files\WinRAR\RarExt32.dll winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Uninstall.exe winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarExt.dll winrar-x64-622.exe File created C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Zip64.SFX winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\7zxa.dll winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarExt32.dll winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR winrar-x64-622.exe File created C:\Program Files\WinRAR\Rar.exe winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\WinCon.SFX winrar-x64-622.exe File created C:\Program Files\WinRAR\Zip.SFX winrar-x64-622.exe File created C:\Program Files\WinRAR\Zip64.SFX winrar-x64-622.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\WinRAR.chm winrar-x64-622.exe File created C:\Program Files\WinRAR\rarnew.dat uninstall.exe File created C:\Program Files\WinRAR\__tmp_rar_sfx_access_check_240615062 winrar-x64-622.exe File created C:\Program Files\WinRAR\ReadMe.txt winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Order.htm winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarFiles.lst winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\WinCon64.SFX winrar-x64-622.exe File created C:\Program Files\WinRAR\Descript.ion winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Resources.pri winrar-x64-622.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-622.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Rar.exe winrar-x64-622.exe File created C:\Program Files\WinRAR\WinRAR.exe winrar-x64-622.exe File created C:\Program Files\WinRAR\Default64.SFX winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Zip.SFX winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-622.exe File created C:\Program Files\WinRAR\Uninstall.exe winrar-x64-622.exe File created C:\Program Files\WinRAR\UnRAR.exe winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Default64.SFX winrar-x64-622.exe File created C:\Program Files\WinRAR\WinCon.SFX winrar-x64-622.exe File created C:\Program Files\WinRAR\Rar.txt winrar-x64-622.exe File created C:\Program Files\WinRAR\7zxa.dll winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\WinRAR.exe winrar-x64-622.exe File created C:\Program Files\WinRAR\RarExt.dll winrar-x64-622.exe File created C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-622.exe File created C:\Program Files\WinRAR\Resources.pri winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Default.SFX winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\Uninstall.lst winrar-x64-622.exe File opened for modification C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-622.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5600 4628 WerFault.exe Setup+.exe 4880 3196 WerFault.exe rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Setup+.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup+.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup+.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133311381116433281" chrome.exe -
Modifies registry class 64 IoCs
Processes:
uninstall.exeWinRAR.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r26\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP archive" uninstall.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r16\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r22\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r05 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r07\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r13 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz2 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rar\ShellNew\FileName = "C:\\Program Files\\WinRAR\\rarnew.dat" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Program Files\\WinRAR\\WinRAR.exe\" \"%1\"" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r09\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r25\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zipx\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r19\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tlz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.7z uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Program Files\\WinRAR\\WinRAR.exe,0" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r08 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r15\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext32.dll" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r20\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bz2\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r02 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lzh\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lha\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.taz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r00 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r25 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew\FileName = "C:\\Program Files\\WinRAR\\zipnew.dat" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r24 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r29 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tar uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.uu uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r10\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r12\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
chrome.exeSetup+.exechrome.exeYoutubeAdvert.exepid process 5096 chrome.exe 5096 chrome.exe 4628 Setup+.exe 4628 Setup+.exe 4628 Setup+.exe 4628 Setup+.exe 1104 chrome.exe 1104 chrome.exe 436 YoutubeAdvert.exe 436 YoutubeAdvert.exe 436 YoutubeAdvert.exe 436 YoutubeAdvert.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WinRAR.exepid process 4132 WinRAR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
Processes:
chrome.exepid process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe Token: SeShutdownPrivilege 5096 chrome.exe Token: SeCreatePagefilePrivilege 5096 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of SendNotifyMessage 42 IoCs
Processes:
chrome.exepid process 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe 5096 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
winrar-x64-622.exeuninstall.exeWinRAR.exepid process 5836 winrar-x64-622.exe 5836 winrar-x64-622.exe 5836 winrar-x64-622.exe 1868 uninstall.exe 4132 WinRAR.exe 4132 WinRAR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5096 wrote to memory of 3332 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 3332 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4620 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 1176 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 1176 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe PID 5096 wrote to memory of 4996 5096 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://serialkey360.com/ntlite/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fff1d469758,0x7fff1d469768,0x7fff1d4697782⤵PID:3332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:22⤵PID:4620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:1176
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:4996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:1612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3240 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:4952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:1040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4984 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:1904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:3136
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5444 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:2868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:1336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5628 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:3412
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:3944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5460 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:3900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5632 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:3696
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3832 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6104 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:5312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5896 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:5852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5740 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:5956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4576 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:5996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:5024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=6072 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:5228
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=948 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:5300
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:5644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5136 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:5688
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6148 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:2172
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:5412
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6472 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:3852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6436 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=6572 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:1792
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=5960 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:12⤵PID:6004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6864 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:5596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6840 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:2332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6808 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:5980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6812 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:1880
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6824 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:3304
-
C:\Users\Admin\Downloads\winrar-x64-622.exe"C:\Users\Admin\Downloads\winrar-x64-622.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5836 -
C:\Program Files\WinRAR\uninstall.exe"C:\Program Files\WinRAR\uninstall.exe" /setup3⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6852 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:82⤵PID:232
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\Downloads\Setup_2024_Passwords_Full.rar"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 --field-trial-handle=1880,i,7336657343184845092,4804127068523651294,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:3288
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3868
-
C:\Users\Admin\Desktop\Setup+.exe"C:\Users\Admin\Desktop\Setup+.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4628 -
C:\ProgramData\18975929432132070515.exe"C:\ProgramData\18975929432132070515.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:6108 -
C:\Users\Admin\AppData\Local\Temp\9b11736588\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\9b11736588\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2620 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\9b11736588\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\9b11736588" /P "Admin:N"&&CACLS "..\9b11736588" /P "Admin:R" /E&&Exit4⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3888
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:5868
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1988
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9b11736588" /P "Admin:N"5⤵PID:4388
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9b11736588" /P "Admin:R" /E5⤵PID:3436
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000006061\64.dll, rundll4⤵
- Loads dropped DLL
PID:1368 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000006061\64.dll, rundll5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\1000011051\YoutubeAdvert.exe"C:\Users\Admin\AppData\Local\Temp\1000011051\YoutubeAdvert.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:436 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main4⤵
- Loads dropped DLL
PID:2512 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\cred64.dll, Main5⤵
- Loads dropped DLL
PID:3196 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3196 -s 6446⤵
- Program crash
PID:4880 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80c6bf70bf3f8f\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 22322⤵
- Program crash
PID:5600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4628 -ip 46281⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\9b11736588\oneetx.exeC:\Users\Admin\AppData\Local\Temp\9b11736588\oneetx.exe1⤵
- Executes dropped EXE
PID:2156
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 3196 -ip 31961⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\9b11736588\oneetx.exeC:\Users\Admin\AppData\Local\Temp\9b11736588\oneetx.exe1⤵
- Executes dropped EXE
PID:2032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD518eeb70635ccbe518da5598ff203db53
SHA1f0be58b64f84eac86b5e05685e55ebaef380b538
SHA25627b85e1a4ff7df5235d05b41f9d60d054516b16779803d8649a86a1e815b105b
SHA5120b2a295b069722d75a15369b15bb88f13fbda56269d2db92c612b19578fc8dadf4f142ebb7ee94a83f87b2ddd6b715972df88b6bb0281853d40b1ce61957d3bd
-
Filesize
664KB
MD5608f972a89e2d43b4c55e4e72483cfd5
SHA11b58762a3ae9ba9647d879819d1364e787cb3730
SHA256dd989631b1b4f5450766ad42aec9a0e16718a0d23bc694fa238a4d54b02be417
SHA5123c410d19aaa780e4fe25b331f85bdd8ccd0a9f585d538afdf216dfcd5c3a6ee911924bcca9078af689c4610f23a31e5a89c7c84144356e8dedceac7fb020960a
-
Filesize
437KB
MD536297a3a577f3dcc095c11e5d76ede24
SHA1ace587f83fb852d3cc9509386d7682f11235b797
SHA256f7070f4bb071cd497bf3067291657a9a23aab1ca9d0ab3f94721ef13139ce11b
SHA512f7a3937f9ffb5ebaac95bddc4163436decdd6512f33675e3709227a1a7762588a071143140ed6bb2a143b006931e5c8b49486647800f0de2e5c355e480f57631
-
Filesize
437KB
MD536297a3a577f3dcc095c11e5d76ede24
SHA1ace587f83fb852d3cc9509386d7682f11235b797
SHA256f7070f4bb071cd497bf3067291657a9a23aab1ca9d0ab3f94721ef13139ce11b
SHA512f7a3937f9ffb5ebaac95bddc4163436decdd6512f33675e3709227a1a7762588a071143140ed6bb2a143b006931e5c8b49486647800f0de2e5c355e480f57631
-
Filesize
103KB
MD5eaeee5f6ee0a3f0fe6f471a75aca13b8
SHA158cd77ef76371e349e4bf9891d98120074bd850c
SHA256f723976575d08f1001b564532b0a849888135059e7c9343c453eead387d7ae4c
SHA5123fc5994eefce000722679cf03b3e8f6d4a5e5ebfd9d0cc8f362e98b929d1c71e35313a183bfe3ab5adbd9ce52188ade167b8695a58ebd6476189b41627512604
-
Filesize
317KB
MD511d4425b6fc8eb1a37066220cac1887a
SHA17d1ee2a5594073f906d49b61431267d29d41300e
SHA256326d091a39ced3317d9665ed647686462203b42f23b787a3ed4b4ad3e028cc1e
SHA512236f7b514560d01656ffdee317d39e58a29f260acfd62f6b6659e7e2f2fca2ac8e6becac5067bab5a6ceaeaece6f942633548baeae26655d04ac3143a752be98
-
Filesize
2.5MB
MD504fbad3541e29251a425003b772726e1
SHA1f6916b7b7a42d1de8ef5fa16e16409e6d55ace97
SHA2560244b889e1928a51b8552ab394f28b6419c00542a1bbc2366e661526790ec0a7
SHA5123e85cf46dd5a7cadc300488e6dadea7f271404fb571e46f07698b3e4eaac6225f52823371d33d41b6bbd7e6668cd60f29a13e6c94b9e9cb7e66090af6383d8b2
-
Filesize
2.5MB
MD504fbad3541e29251a425003b772726e1
SHA1f6916b7b7a42d1de8ef5fa16e16409e6d55ace97
SHA2560244b889e1928a51b8552ab394f28b6419c00542a1bbc2366e661526790ec0a7
SHA5123e85cf46dd5a7cadc300488e6dadea7f271404fb571e46f07698b3e4eaac6225f52823371d33d41b6bbd7e6668cd60f29a13e6c94b9e9cb7e66090af6383d8b2
-
Filesize
437KB
MD536297a3a577f3dcc095c11e5d76ede24
SHA1ace587f83fb852d3cc9509386d7682f11235b797
SHA256f7070f4bb071cd497bf3067291657a9a23aab1ca9d0ab3f94721ef13139ce11b
SHA512f7a3937f9ffb5ebaac95bddc4163436decdd6512f33675e3709227a1a7762588a071143140ed6bb2a143b006931e5c8b49486647800f0de2e5c355e480f57631
-
Filesize
3.7MB
MD5325cedfb3e4d23ddf1062ad55b6f6b6e
SHA1bd30d64d8dd8f4862461da3137686951870a466f
SHA25638d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
SHA51217daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
Filesize
3.7MB
MD5325cedfb3e4d23ddf1062ad55b6f6b6e
SHA1bd30d64d8dd8f4862461da3137686951870a466f
SHA25638d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
SHA51217daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
Filesize
3.7MB
MD5325cedfb3e4d23ddf1062ad55b6f6b6e
SHA1bd30d64d8dd8f4862461da3137686951870a466f
SHA25638d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
SHA51217daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD54a2f1c5c8d5bba1475e57fb9a4fd5e83
SHA1f3c222e64d397afcbf8e1e66f64da7542518211b
SHA2564b5667992661fd49d5ee0b35dc334345cb613c0dc9447e2dc8d7f60c12808a43
SHA51239c7a18c99ed25a914dfa0b3611131ce47545cf45a4ffa8e3a9c9dcfe2441842c423bcc1301791a6a2846d4588873fbf70bec213dc5fe5a3738e83113a5152dd
-
Filesize
1KB
MD5654c3f3ea3f4ce91bff6bde09c5eaf1b
SHA1a86ee886b4a9dd0e12900f51e6b80947f71c9a40
SHA256057904271d86434f4b163364470966fc7cb8e9ce85946673f8658e42ba236bb5
SHA5122db8d05ec0469012163ca68a5ad476a522db2257f57ce8ce06ce7d9c20efaad1d7e7c65e0bde86ae83b44906605fdf69e08d381c20edeaf8dafb4c416643656d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
148KB
MD5e9427310c61050cda1b128445ce57cc2
SHA140943cfaf6862af4f896b5ddd976d1f894027dc6
SHA256e483d29dbf38d446669cc90ce76d2cefce7b860876d5fc65ddd46441d5adeec3
SHA5127127183f4c236abded4450a183bfa69dd1f456a889ace901eb103e4c1a3d3b7a1b3a0ae77ee5da7fa85f205d7212099b18ce0996c1e0b1988871c650304eb36b
-
Filesize
20KB
MD595c65d4953ad4919911329d2e510db75
SHA1dd3200f365f6c78b816f5bcf67721a28f1519a14
SHA256e36058f34f613ebbf8f7d84c068d92999c0b78b0ffb23a4916ab8c0126934560
SHA512e165bc3bdab8dd7d650789b4e1e6be0678c662819edadf90aadd17ee9e8a65f5ba22388cdec18c7ba3b853f1b2c73b41bd69415f6bf92fbe3109cd50d967db75
-
Filesize
5KB
MD5c55ab6d1e30518cef45c4439d3f3476a
SHA1fc1984e6f16b0cf8d204bbe092fd45c05040951d
SHA25614336c3bba81bfeaa0494659abbccc9a73cf1b4eae15ed1df1b05cecef92f43d
SHA512ead02f14b306a579e80ce15031992b8e771987e58434216981b434902039fc02bbf1a14028190911aed7bdec3a272cee02ca29c4f2a07b1cee0819db5f7a9121
-
Filesize
5KB
MD593edef0aee3c84fc3e15722a101d3bf3
SHA15a77b4c3a07a4c2e4c3ed962160592e0e7b1bfbe
SHA256f67df8c722be21cc50a7950d435d7cd94b27625b06c3788b5a8cbdfd94565d55
SHA512d600e35dee29bb5625859b3ce3a681b44ff0561cb4c48fe88813e089f40834e5e0eefa18a781b3cffe60da170d5be87548125a1d845cce45a033022988190a78
-
Filesize
1KB
MD5c44a6829ee4322832e81918dcac17287
SHA199cbb6c3df91de4b9dce0fce97759772ad30dcb3
SHA2561a7916be7f57e8cd4a21593c61f74eca80021184215213390e4b9f1887f475e3
SHA51216a5a756071b4a4ce4469ee9dcda71b5f3a2d855278259e72176aed293c1410e24990d1140294bb03bcbc682ce7a4fa13c783caadf1a15ef5f9230c9a29ca6b3
-
Filesize
1KB
MD55764bb0a52ea86660747d315ab6faa7a
SHA1c02bfda1cd1749843bd497e4d6a4254ad8441a23
SHA256392a118d970f87501a41f32549fad4a1a5c08e45bb1bd44ff61ade2a215cebb4
SHA5121ccba4d17b27324450af38ac06553d29457f31e7fb3fc74395337b6530eb551ace8b63f40be6b9ae631385b6d1a016d2dd3b3c236fe3e000075dfd94d81ed1bb
-
Filesize
1KB
MD501449c3ebebbac38506ae0b9a60a9dc3
SHA11a171b33992b281745108c8203492deb8dfdbb6e
SHA25687eee9d7f237d3e37dca512283ee6967d8b898198b95f39722d74dad30bcb936
SHA512d04073ac03069985dc26d2e68c3691521fa8d32ae773e77d747923e960653cb899a626bb263aaea9dbc78b731aef0f4245dd07497e796078d0a4f49c2031cb54
-
Filesize
707B
MD580a5ab6c767bd5e80887052d03198377
SHA1eb36aa0f6a94058d2a142d31673c29d15c52fb25
SHA25650abd3d7537c193706a964340ed7898b31662b494e44a09f78146d309c6fedb5
SHA512659ba8346d9eacc2a5cb69f9a8b493e18bf17b216baf96c4260e61ffcbb503461dde71ce2196b6c9199cac3f17577dbfe38b4cb53b33a169354c3dead4479c06
-
Filesize
539B
MD5a72210d5780faa506a443a66213d738b
SHA16f20008b9e73c032b7d7e298e9d4b4fe3bfd0396
SHA25601b00fdacc4aee8b5756814fcb0012b07ffd4b245cf1b96c59983e39ac216f64
SHA512424911d7e83ca15d79c6cdd38227de0e95cc57f39fa6f6b10c19b5f57dcb994106bfc30d3fb7adcaa427d7aec96d58f3d70d250939352362f2c87ea9de9fc58e
-
Filesize
7KB
MD58a0260eb2d4fd05ed60b5303e0219d3c
SHA14904de2f08baceb738cab1cc414324be06af1e25
SHA256e47c9da9d517fcd491cbc287f71109334eb10ad2da7e969de72ea2adb039f8ad
SHA512d719a6cd92940d079c57852236a97f526ffc6b2fc3bfd0a9df407506eb54b3aea376def0f8b2693ab3c50b94f96753b768e0ea7202010810d969203e5918d170
-
Filesize
7KB
MD525b5c6a25715e4b0f3d12ad2f3d60ab8
SHA14a6eebb664bea56bb0ebc5f637d6989de013abd8
SHA256997a0142a7065ebf3b674ac72be61a74bff708f4ba0ea4408f09ee401c3ec465
SHA5120be74006f9e8c3e2489517d6ada9ee396940db1e982a08af17027672af2cb36aa85092c89b9704de6a91a21fda4ea5a4e8d8b8b31fd2a0ce52cc570368b500ec
-
Filesize
7KB
MD5601ef0b6a593865ea2d89cd54a7993b7
SHA13768bb4578935800af149210fd8b805ef4faa94e
SHA256300c750d55cc60fe119bf859423a9ab92e7fe5d491b33336a070557f08abb7b3
SHA51287503f950907be20f89ac2ba8d945b7aefe8d0510988b28276bb6fa58f08b4b9d0c9496f28b1ace632e7084f33836c002c2c3c97206c29fddd00f86b42e6624f
-
Filesize
6KB
MD58140de191c60348906bc2ae98de287fa
SHA150675071bbc8e09633de24ae812b4da910310f67
SHA256ccdb012b513c7e11b7f8f24088e34f61e593125871ceea6777953489b2c40606
SHA51217181f6c55f8f7a4f6b4c9621f767175502f24f623acac384fbe83a637d6917b005171983d884d47fd1c19806fc64aeb42dbb1e1951242daa895e165ff08e7c3
-
Filesize
6KB
MD5ad7fc1f572df465e7ed0f78dc939c6b6
SHA1a040a84b5bf3454652d87a8277c50927a2bdab86
SHA256d9ca281db96d19a3114f3922b2818e065b4ac37497fee7c4120b82ce3910c287
SHA512bdd1e5cbbbd18c0de982a84010a515b347c79656a0d625aa3848c8ddfbca517d3b47fd495cd9cd6daef8585d55812d146ec449fed74b030a91cfefff386d2dea
-
Filesize
15KB
MD59ba9c0fbd730217c0864ff2366a43a5e
SHA1cdc678b9f1f74158aa9aba8397adfb4dea7e09c8
SHA2568f70ca6e6ef28308dc617132970fe1ad7f877575296bf7ffaa5cf726e7dcbc38
SHA512ba97c662a27c67d9c73eb007406c6862eff387dd8e1d97977426722f16dc6672db876f7578c02278705577b91a5b7ac1655c751e398552cc5abf837d254b4c15
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe569dea.TMP
Filesize120B
MD5336936517ccd078e5bc5ae6055ff7a9e
SHA19e11aa190cf5e2569597087d69240b9fcc9a77a4
SHA25652d9fbd226106677f0573948a1ad9161c21295e1c81f55240597780de9235f05
SHA512e07da329363a212db7a23a941f801b31d970d268a09e87cbddcbad9d7e796012a9f1da75741dd56ef3eb80114a9f62f9060ae093b864ec47ad02b970c272893e
-
Filesize
92KB
MD59ad26aa770e5e81a062b580c65deefd4
SHA1bb48442370fffca0e1dc9d5d1ed4805e69ee2ad8
SHA2563f7df349457b1250070ac9dd3c8037a57686856841d295997e2e8ae3c42fe70b
SHA512dc46cc3f608d0275cc700bc16c54af9cf0c85e0ce66876332ae5905335c6c94bf05966c3601fe1e195812e093f59ccdbd2560a6d0b8df4f57c5c013e38faa2bf
-
Filesize
159KB
MD5770b029938c56083ad51c33d33618f5d
SHA111dc8ae2cfe0134a175f1d4f91dea5d05c0e029d
SHA256f7230eb4d54a3effaacf97011a633712f3b33f04d884991a0d75733e127ece59
SHA5120f71ee198f4a9f8c9e62e466f6a1a60afc8ac2f4c4b8f2af8fe04aa1048040a0ed0c13ed400051e82a5c0621dd9049b42828b3870133f7646cec1f90c8454283
-
Filesize
159KB
MD5770b029938c56083ad51c33d33618f5d
SHA111dc8ae2cfe0134a175f1d4f91dea5d05c0e029d
SHA256f7230eb4d54a3effaacf97011a633712f3b33f04d884991a0d75733e127ece59
SHA5120f71ee198f4a9f8c9e62e466f6a1a60afc8ac2f4c4b8f2af8fe04aa1048040a0ed0c13ed400051e82a5c0621dd9049b42828b3870133f7646cec1f90c8454283
-
Filesize
159KB
MD506774e21137c0173df08f4f67f011675
SHA1dd9a9803f8623821b5b404e098009a055540e67f
SHA2563b18595b7231e800851f70acfb53181a801fc7aa46b78fe0d6ecf108ba96f916
SHA51278fec9e1a9c292fb492ba28a0fb855483c35d2d9005baf52bedd7e02c226e7dccb553c630cb0aec0bba997d2d337d92f09001ccd663ce239ff0bba335050755f
-
Filesize
159KB
MD597acb1fcdaf6324c65df62dd782104a2
SHA18a18336d144decf9c936f438ee623d21628a1838
SHA25622656c2c11dbe621729f49c1db6cfe936edeed0048b99aea344905e90dfad247
SHA5120f31dcbdee01ef078674ca7d7f0d10f1c0e7cf84a8a52ee00a5b9201db85cd38887c1c9e1f0eb8ab34378e2566adf8abc353e32d9a57d2bb42f1d7ba6a6b6119
-
Filesize
107KB
MD52e398d4acdda474cac18e81739fd4c97
SHA19b6378ef3944867f1c95374cb05efdcf8c5bb21a
SHA2565e1d2da516fbc4598bd6ed878d9aec41a6628e15d3f67878769f6400c5987b64
SHA51270fa94269c341ae4c901f65a033839f024591d3c7a8a2cf07849f88be85045d73148c4e355a440f3685f0bdeeb12f0bf74770cb05ddab45c394f0092bb16e21d
-
Filesize
114KB
MD550716288ce32b205c941a38cf31b9ad4
SHA11353f802897a81d40346890f6efbd9163d4395f7
SHA2568db3a258c94ec1a57aa043c6bdfc4a2e8dfdcd9417789b214042fd060337e83a
SHA5127afc82475e308e9db7a0a586cec7737c059027c4330035004355ac638b1ef28ea7773662f41589a49a492884ea76e2f0f97ea5dfa25d45ab89f2bfb6ef3df90f
-
Filesize
101KB
MD5decca15ac24f7f8b4ea34572457d423f
SHA11bf02c058518689858c666f7afab0be603393165
SHA256de971311d998c9f35dd38e6650478632bd0a012315c9fca132cc103a76dbc295
SHA5128725cddc7f0f94cee91d019812c619be6d99eeb651a44fd07932902f2dc7142c255318dab039281907ab7da74e8ae453da9ed28d6772892033f6a97f26b79707
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3.5MB
MD5f40e1a15f93696510e5faef3a216f18f
SHA16d353491cc7f32bcf9211c7dc1a5b7149e4ebf9a
SHA256f8d015ac4faff5d7a5da0e95f3cc9e9eb18417cd749b3b4625b5312910a25b7b
SHA5125b20529fc6ee3731382d48cf2db7dce8bae0ba753314e8bed07ba993c1ae891134385df7f4ffd7ee62e0b1b6618bfb209b27fac3fdbe88a60b1375747fefe2b2
-
Filesize
3.5MB
MD5f40e1a15f93696510e5faef3a216f18f
SHA16d353491cc7f32bcf9211c7dc1a5b7149e4ebf9a
SHA256f8d015ac4faff5d7a5da0e95f3cc9e9eb18417cd749b3b4625b5312910a25b7b
SHA5125b20529fc6ee3731382d48cf2db7dce8bae0ba753314e8bed07ba993c1ae891134385df7f4ffd7ee62e0b1b6618bfb209b27fac3fdbe88a60b1375747fefe2b2
-
Filesize
3.5MB
MD5f40e1a15f93696510e5faef3a216f18f
SHA16d353491cc7f32bcf9211c7dc1a5b7149e4ebf9a
SHA256f8d015ac4faff5d7a5da0e95f3cc9e9eb18417cd749b3b4625b5312910a25b7b
SHA5125b20529fc6ee3731382d48cf2db7dce8bae0ba753314e8bed07ba993c1ae891134385df7f4ffd7ee62e0b1b6618bfb209b27fac3fdbe88a60b1375747fefe2b2
-
Filesize
3.3MB
MD54509256a05f0d4090c11f2d424a33529
SHA1a0812e84e6c423b55c771ad05695cff5e20b37e7
SHA25648fe1f7de453f1c52b9c1e8f16017e2a39f7cf45ba57748809196f9fd3fcb63e
SHA512c9ffceb1bb74b7953216af6a6799959386185b9b29d17013956706192b614e581fef2643f84ecfd2844f9ae0ea696aef72bc45198384c74100272581fc08fd1d
-
Filesize
157KB
MD5d0b5d8439dd3e0fb139e669139098c63
SHA1070cf6fa4f89aa167f5f7ebd494addc8da6dcbd7
SHA25673e7c6d727a67028d37c5643d38220931f6cf2b0a63c9bf8141a30d225f2a275
SHA512ae2281f4f72258c184442cee688ae4a92370bdddda80195b787f4ef950450484832cc498c1c4741d3f16a25eb0a1f0ccdbd41920cd28cdf05ec251ddffa12cbd
-
Filesize
3.7MB
MD5325cedfb3e4d23ddf1062ad55b6f6b6e
SHA1bd30d64d8dd8f4862461da3137686951870a466f
SHA25638d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
SHA51217daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
Filesize
3.7MB
MD5325cedfb3e4d23ddf1062ad55b6f6b6e
SHA1bd30d64d8dd8f4862461da3137686951870a466f
SHA25638d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
SHA51217daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
Filesize
3.7MB
MD5325cedfb3e4d23ddf1062ad55b6f6b6e
SHA1bd30d64d8dd8f4862461da3137686951870a466f
SHA25638d7fbdc314f881b461c766742a26d3df72c553d25c8f1c20da1adcdbea1afef
SHA51217daf234fdaedca6b4a5b6e7a8b34f0ae5ffefc1c4c11edb40f87498d25b09377b0898b3ad648ed093a6b35ce6b227a3f9f69e37e752931f2722f61c23f066ab
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5096_2141073264\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5096_2141073264\bd9e43ea-b468-4756-91b6-4c63b4f9d4d8.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
89KB
MD577a6fdd6c731f7da07ffc412c9f17347
SHA10017710c7fc14022277ebf151964c79ebdf0106e
SHA2569f564eb9675e6159111b6d0b1ddf6389dc3d93cefd314443bf5a2b7e73c59946
SHA5127fe1897b462fc03faf0b220c8c7876e59ac326811a39d271b914bb609274bb8bdc5da252bf9228cc15262c14642207f5ebd665efa40cfcb5d48a20c05308c3f2
-
Filesize
1.0MB
MD5e6ab640c5271a1c4dda09a46e63aeb81
SHA1aac907437f84098fec291732b5ac05c49217b0f1
SHA2566d9865345877c9d57b7589392d8870ab7a225287606b9e2019860737cd5da4fe
SHA512dc70893e9efbe63fb5b40b89650c8fbd03d35f4a41b09bc0a4f5e3973ee4f50f7d7bbd11bacf6d7c857eff078342dfb971e86f1254d6915c16697c3c89c34714
-
Filesize
1.4MB
MD591d49295ad6153d860ae8433bfedf622
SHA13d777d88c6b2dd5290ce9339882eb9666e379cc2
SHA2566860b15b3ed3c9ec9966a09a70dbbd2c079aeee8d262adb0ed47c7745be457ca
SHA51200a7abada8903277b6574d4bf8236d5c11f5789975b82511f5ed21711d988a4e1f3def005e978ef9eb37ea4f2e37e70102d704b40631e33901c32aad57bcbb69
-
Filesize
1.4MB
MD591d49295ad6153d860ae8433bfedf622
SHA13d777d88c6b2dd5290ce9339882eb9666e379cc2
SHA2566860b15b3ed3c9ec9966a09a70dbbd2c079aeee8d262adb0ed47c7745be457ca
SHA51200a7abada8903277b6574d4bf8236d5c11f5789975b82511f5ed21711d988a4e1f3def005e978ef9eb37ea4f2e37e70102d704b40631e33901c32aad57bcbb69
-
Filesize
9.6MB
MD59f033c981d9ae936fcca0a3c0f2f7978
SHA135ccf676c9485cc8e6211f1e553132fe2e8aee4c
SHA25684b6af8fcc4516fd22a789fcd04621b1421bdcee5c9b478cf8aa9933364d1405
SHA5128b8e04a2867be73b755934ac1c8174165394ff3b64cd459793c7217415a55d8f5f6ad0e7567467544562d9e67dd634a0c4271c7a907885c1ac88851e0195026f
-
Filesize
9.6MB
MD59f033c981d9ae936fcca0a3c0f2f7978
SHA135ccf676c9485cc8e6211f1e553132fe2e8aee4c
SHA25684b6af8fcc4516fd22a789fcd04621b1421bdcee5c9b478cf8aa9933364d1405
SHA5128b8e04a2867be73b755934ac1c8174165394ff3b64cd459793c7217415a55d8f5f6ad0e7567467544562d9e67dd634a0c4271c7a907885c1ac88851e0195026f
-
Filesize
3.4MB
MD58a3faa499854ea7ff1a7ea5dbfdfccfb
SHA1e0c4e5f7e08207319637c963c439e60735939dec
SHA256e5e9f54a55ad4b936adaed4cca5b4d29bd6f308f1a0136a7e3c0f5fb234e7fff
SHA5124c7474353dd64e1a1568b93e17be3f2f0eaf24b7d520339c033f46a517b0e048e88bda1b5d5bcfe62353930d8d76a7037ec6200882df8afc310322a5d5fceb25
-
Filesize
3.4MB
MD58a3faa499854ea7ff1a7ea5dbfdfccfb
SHA1e0c4e5f7e08207319637c963c439e60735939dec
SHA256e5e9f54a55ad4b936adaed4cca5b4d29bd6f308f1a0136a7e3c0f5fb234e7fff
SHA5124c7474353dd64e1a1568b93e17be3f2f0eaf24b7d520339c033f46a517b0e048e88bda1b5d5bcfe62353930d8d76a7037ec6200882df8afc310322a5d5fceb25
-
Filesize
3.4MB
MD58a3faa499854ea7ff1a7ea5dbfdfccfb
SHA1e0c4e5f7e08207319637c963c439e60735939dec
SHA256e5e9f54a55ad4b936adaed4cca5b4d29bd6f308f1a0136a7e3c0f5fb234e7fff
SHA5124c7474353dd64e1a1568b93e17be3f2f0eaf24b7d520339c033f46a517b0e048e88bda1b5d5bcfe62353930d8d76a7037ec6200882df8afc310322a5d5fceb25
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e