Analysis
-
max time kernel
598s -
max time network
601s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 13:04
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
nanocore
1.2.2.0
december2nd.ddns.net:65024
december2n.duckdns.org:65024
2c009a56-c28c-48f4-8875-acf9e1222e9f
-
activate_away_mode
false
-
backup_connection_host
december2n.duckdns.org
- backup_dns_server
-
buffer_size
65535
-
build_time
2024-02-17T09:12:36.211032636Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
65024
-
default_group
NO GREE
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
2c009a56-c28c-48f4-8875-acf9e1222e9f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
december2nd.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 4008 powershell.exe 3308 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
63HiIJrDNvEfDcl.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 63HiIJrDNvEfDcl.exe -
Executes dropped EXE 3 IoCs
Processes:
63HiIJrDNvEfDcl.exe63HiIJrDNvEfDcl.exe63HiIJrDNvEfDcl.exepid process 4948 63HiIJrDNvEfDcl.exe 3564 63HiIJrDNvEfDcl.exe 208 63HiIJrDNvEfDcl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Service = "C:\\Program Files (x86)\\DDP Service\\ddpsv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
63HiIJrDNvEfDcl.exedescription pid process target process PID 4948 set thread context of 3176 4948 63HiIJrDNvEfDcl.exe RegSvcs.exe -
Drops file in Program Files directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Program Files (x86)\DDP Service\ddpsv.exe RegSvcs.exe File opened for modification C:\Program Files (x86)\DDP Service\ddpsv.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2212 schtasks.exe 4044 schtasks.exe 2376 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600791121035717" chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
chrome.exechrome.exe63HiIJrDNvEfDcl.exepowershell.exepowershell.exeRegSvcs.exe63HiIJrDNvEfDcl.exepid process 4356 chrome.exe 4356 chrome.exe 2848 chrome.exe 2848 chrome.exe 4948 63HiIJrDNvEfDcl.exe 4948 63HiIJrDNvEfDcl.exe 4948 63HiIJrDNvEfDcl.exe 4948 63HiIJrDNvEfDcl.exe 4948 63HiIJrDNvEfDcl.exe 4948 63HiIJrDNvEfDcl.exe 4948 63HiIJrDNvEfDcl.exe 3308 powershell.exe 3308 powershell.exe 4008 powershell.exe 4008 powershell.exe 4948 63HiIJrDNvEfDcl.exe 3308 powershell.exe 4008 powershell.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 3176 RegSvcs.exe 208 63HiIJrDNvEfDcl.exe 208 63HiIJrDNvEfDcl.exe 208 63HiIJrDNvEfDcl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 3176 RegSvcs.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exe7zG.exedescription pid process Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeRestorePrivilege 2900 7zG.exe Token: 35 2900 7zG.exe Token: SeSecurityPrivilege 2900 7zG.exe Token: SeSecurityPrivilege 2900 7zG.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
Processes:
chrome.exe7zG.exe7zG.exe7zG.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 2900 7zG.exe 4356 chrome.exe 4356 chrome.exe 4016 7zG.exe 1944 7zG.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SendNotifyMessage 36 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
OpenWith.exepid process 3564 OpenWith.exe 3564 OpenWith.exe 3564 OpenWith.exe 3564 OpenWith.exe 3564 OpenWith.exe 3564 OpenWith.exe 3564 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4356 wrote to memory of 396 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 396 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1204 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4032 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4032 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3756 4356 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.ly/Dol171⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0c0fab58,0x7ffb0c0fab68,0x7ffb0c0fab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1632 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5076 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5044 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5228 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5044 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2432 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3292 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4376 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1160 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4284 --field-trial-handle=1836,i,2874449111321721696,8065507534511244947,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4460,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:81⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\nje91q\" -spe -an -ai#7zMap9122:74:7zEvent319421⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\nje91q\" -spe -an -ai#7zMap15135:74:7zEvent233471⤵
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\nje91q\" -spe -an -ai#7zMap8164:74:7zEvent5161⤵
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4508,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=1392 /prefetch:81⤵
-
C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exe"C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vrwJUPrQkQA.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vrwJUPrQkQA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C49.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9F37.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA080.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exe"C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exe"1⤵
- Executes dropped EXE
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵
-
C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exe"C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000011Filesize
199KB
MD5585ac11a4e8628c13c32de68f89f98d6
SHA1bcea01f9deb8d6711088cb5c344ebd57997839db
SHA256d692f27c385520c3b4078c35d78cdf154c424d09421dece6de73708659c7e2a6
SHA51276d2ed3f41df567fe4d04060d9871684244764fc59b81cd574a521bb013a6d61955a6aedf390a1701e3bfc24f82d92fd062ca9e461086f762a3087c142211c19
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-indexFilesize
1KB
MD5718378d8d58deec1587d6ddbffb9617d
SHA174c4e4774fd0cee9a9113a1d2992816d6ce5b6b8
SHA2562ab0bc004443f0d1366ad4ec33d08221d61a7e7bbe38aadc35506082b911494d
SHA5125b7bbdebad1a25f77a199ab475d7742c6aed157a8bf555897ba1e50f66e27bf997fa7c2192c4f427c74bff2f68a3265206fed1f0c44fc05714072fe17ef9fdd4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
552B
MD51ba870dfe5f388050ed8b19ff806eea0
SHA168c8aa93c117e4aad3b3d9779b6a9824cffea9e7
SHA256e466e2491a74248ecbd641ac2ab1ed90eeab9c4319106ad769a50f36e1cebc0b
SHA51235935d20b4ee0236c023f6b7cef5639b9137392fe9f667ac786bb8026291085d51175d2857bde652a1417f8e6eb02f032a980cc5eb7572e6cfe9e3959f359c75
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD52f2a908b0543716e7a0018b8d69b72e9
SHA15781227a291d7eecdf41c1e92a0e34dd36250e84
SHA2567ebb048a26eb0a5e888c5c51d9369d08b13e119d306fdaf6928949e528b89f1c
SHA5123b9c1e1bcb6ba9d3462a62991634a01268200f7ab7e0f5d326049cde54dc62dfe9e6c7f4e1a2ee22f76d72740a414b4881846c1c4302fc340796ce8df6d377db
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD51738df39aae18019d1b86318401c1516
SHA15246dfa468731a702ae7de2b59f5749d1f23fe48
SHA2569759c3b67ed0bb781e3cfb8001bcce3170bb4e4954b412fb5431df5648b65580
SHA512632b9bcb2aec68a9eb6e4ee443c04bc85410946fa44357da50eb53e387e658d73ceb467df90e5f00141333e60d030027ced93830954585ecdffd74ca31ffa0ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD594ab9390d0b60e64e594f5384b5dcc28
SHA16a408a895aa1d5005d7f77cf42f03a79b8446c53
SHA25643093a253df7a2c358f29434d79f2169cb89baa0b1b696c097c26d3c1bf2d701
SHA512716df14183f9312b77da06c46b85f52b6d241cfb5369385a1bdaa93ff7a6cd51a14e597920df6956d475d933ee23a433e68d679a22c2b884800f51d1bbe105f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
5KB
MD5973d33cda45006eda4bf9f924e1572ca
SHA12a1d9d74e90892bd548b6503719eddbc62cb86b3
SHA256944e468e4d8b3ec12ca90b99c22cafd659a76437b2db296f7d07dca368a32dbe
SHA51212711eaf27494c4bb71e76a49a413f5ae8e0155f0b29f9f8de5a5316ad57d9df33047ebf5d85322764bc5e0b00c3e56ec28245bf2f86a8226e318e42dc646713
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD5bd261b2657bf0e5bb0e78677de818a7c
SHA1e22376ac1ffc26cd7cb40b71bdeffd91b9f16bae
SHA256d893eaca5a09d82799709bc88bca36e2da2f27823bdfc9c583f90e2dd17f9a96
SHA512c11000e50ea2ca79a653e42d820d903af1d4ffb46853cea28fe248dbe51626b5f755035949352a8db1aeae0226c9ef93edcf2623e08f29dc36d7948f60707ddf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD54933c064048f61e2d0b5d8e9a95d859a
SHA19ea6a5f765312c4e29e3aab59a8484f632c64693
SHA2566b1a2e66561bca87a737a86a8591abe6ffa047804604894c376473c0fe1f3925
SHA5126b19aabd084f4ba5433ec55ef05b082e62d43afdd216ddb6a0c8bdc8df2e56087582ca558e911ce7569e5e487f2d0eb933a34dd9df9593f1b31931680189ecfd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD564e680658811a4827ff2e924b70d41e6
SHA1a88120de5791da7d194ac26829ed0ecb6cd49fab
SHA25691edf2665ef6c2968b4dc69da224b8347574764d0d33b204a467b74fcdf11f8c
SHA512c77c7756f96a10f7b17ffb052b374c078c03a65ad9cd8fcf412c705091a42d05535e2ad3bb7dcbe0a434be6048e37ea89a47f4bdd183058212b2a4a1eed461bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
523B
MD5ffc299cb3d30ec486dc260b9c38de0ee
SHA15a5a9577e694e94659ae00fc359246ef83b6b2e2
SHA2569fe15a73378386ea9608ab5bf10c49f60660721d39b91cc129d308e20c9e37ae
SHA512540d75759cab2e12ef6060925be3fd4c00e8bed6a4db675f0443d64b4da3b6aec1265fc50bafa3eb7fe18134d3b6761a0dc12e1fa66fedf5dd3d0fb4b40e23a0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5d0d129a34a72aa3b55e6ee256eff4536
SHA1b1e67581d848b2e26a5d26f95e041846af26a5d3
SHA25698a070baee7b9852e4f536861f50ede31727b8d19c2e9a1253cc15412715d91b
SHA51265a729adcf1c220a4e533e8bc33330390ae66ecaa91bdc705e58d7d4983046c04f43ea9e168f012c002176e49f184725f4fa4c12e41b109b6cc103c0b41cb07c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD53b2f03cfac29a020534d0e8a57ea0e36
SHA1b2d9d7af3970dae07859d42e3ea1807232cc891d
SHA256ab9e103e6eacd4940e73b8ec05578420ee5b9fccb85008d5af75efbc9df335c2
SHA512d109ad0a5391462c5523967ecd2b4f4c212f9c5664bc5eb5cb05ceb925e7753857d9a6712324a46bf2d3838fc11dd4c1e1fc381dc84a48a20a2f41182cf4688c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD54d8a60e8698d9cabc6ede18acd8e06ca
SHA1d32261b454458891d7390cb4d921b7647c2a3ab2
SHA2567657a04f40103117b4b13ff57478fab5ff0858b81638698d239d73221821e1b6
SHA512083c4efc5ef4849646182e4c39ae84faad22f88f08d552e1eb3b70baed5e24cab599663b482877ea0e7ff96522f9abe4d631bf923e8c166105faa6f67b864ab2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD54913582b52dcc0b77393705c004cd4f0
SHA139632501804a394897bc631b93b4dbd151fc9819
SHA256ecbdcf6213258d45d29da050dc227de16f0e7a2c23511615ee0b4a43473d5963
SHA512128116d550fdfaecf9f606a627b963c5f759e84d063398632566e65bfe9ac2c82642f5c69d9a7c72176bd30b2a4c64de1960d9fdd281b43aafc67febac4235c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD577aa793b992d3e5e6eafea6450de190d
SHA17cd0cb8f16907713fa48a7dff084e6ac5a40ed88
SHA25689bdb63189d1aa1d2d356f8a1bd8a0254c746c671a9e6d6eed0b4a9c4b21e56f
SHA512575c4c5e042c13b673d7f791831477f5124011cc7a867f9f13d954c836d52f56f66b6a8b601c25a453a4c41574e66e6947372a9d7536eb9e5a7a771d13cdf339
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD525949483a1beeb4099dec78b75a68a32
SHA165d9a9b600ec640e6cea8de30992a9c85ac47933
SHA2565a6b48cef6ede550d4d8276dfffa32088c6761d02ebd0b47ea52e67d60f14268
SHA512664c6309cbd1ff77f2102f0483a521ab806a56fbb7c57e793837006086b50d377856379c46557d41827f17bed455721b9dfed823e1b32d1e8d752d3878213194
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
72B
MD5989cc35410c54ffa2aff5be1726d8afa
SHA17a17863a24f6a3004481bbd554b233f6b2de2805
SHA25685131b44c1725f0a0f0bd008c77b1f08195aa41b043a0bbe08b3bd993e9e9f8a
SHA5128bc49add16fa4b81e6dff5768807a1beb800665b8c7d6f4a063ae01ab7cb0e33e3909b2c2591a810540c25f8be09c658ed5ad39d469b1b2b5c4eb6ab2becdc6d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a0ea7.TMPFilesize
48B
MD556782896c7cf0fd5a0d6ff0b59abfc0a
SHA176280a51fb9e171fcfa0be58a1cc5f9e90fe0520
SHA256ddf757e4828e5fc9d0fcdb6cf55ecce2ef6cd80b4786f6f724c54ae1b3abc6ff
SHA512b0998141d78dc38029699cb76e86c1f4ce78c2ff264113c28d7b3e57e83b1323f17d3a250556f8f64dd9ed4af61f35478febbc9562c2361203f3efde382ba0af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\dc44f0cf-8dbf-4751-bcea-ec7b2e13738c.tmpFilesize
7KB
MD5e24fbc729e90727aababc30a8d7a576c
SHA1edda61b4ea4501a5c530b59fd236837211580e36
SHA25634983f41eaf7f88d84ff68f5c6ba763c83d6d9aecf3351cca6fbf005ee6f08d6
SHA512c452a82364e0396f8c0a714cee46f680d1aa49582c65819ff4eb6e4bd29fa91b4a1cd73fead0dde991dcc4627cbdcbc68fc65c5137e428e4a48e4f13bdd9bc3a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD5c47046c001511110f3b7b925d2422abe
SHA1975422e8a3f50e18e501f2c94288f1742654e862
SHA256060f2bda953c9020cd91768fcdfa8577b8511d340c55d8bd9ae1883b7d94f636
SHA51259663abf4ee00ed74eda6d2099cb796fa7eac68e12cf15b3ea8fd590b35b14d6858d75ecc641d99eab3cddd4ae856e3058cddb87476f25264b9720989038623f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD59fcbc4816cf21bdd5291d02aa83706b0
SHA17d8c84e348bf4d55799ad9846e2c4e52328cfc74
SHA25621d1438f3b10f928f394e92f73a3a639c985d378e5d75974b243d6065bedb999
SHA5128070668f2bee2eaaa312522062e507e8e46a432a2784fabf0f9a691f75149d3c0dbc4fc89ee28dd17df2f70fff113eae7ed4dfd75a65d79d419984a103fdfaa4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
255KB
MD5fd5f39b963d88c9a7c651d3a1f735d34
SHA135dc677dcc93c6432092bb55cab9c2377e1a04fa
SHA256c6d370dcd0b837d0eeb3cb26b63efe7b44cd69025d38de83ecbe8e060586ecce
SHA5123bd36825692f92b9a79aa62fad3deaea0969e42053c342bec05e7b407a7f14438401da6298ad30994ea0809570e2be2c6c6aea7dbec7293a10bd78ebe56e4d74
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
103KB
MD55c75178989e97ee8422e991fe1a4d698
SHA16fb94238c356d173a7d1806b3257ff773fae9a72
SHA256e77068dec4f2ba81d1f37c2ab2c9d25b22f2136fd488d6e7b0c16dc139b5fa9e
SHA512d5a872e7dd440a9657f6e71ec33db16fd7ba409e0cb272de582120bf7e449640770e192f6dd61b02631b35b935e7b68979f614090858d7055698194dd4367add
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
99KB
MD504952c28ac57f48d0ba07e8b0a10dde9
SHA11b2178caaabcf4d5872ff213ac78b76b16898b1e
SHA256ce8ff85e29653426af03c5838f67c807061e3dfbd3fc9b223864b372ec211cd4
SHA512aa4612cba3cdcd7d9b8ba14c79f1b06b99254528a48a04d80bbdc26107d99f5a883acde4699be3ce570befbd841e5cc5d3217fe8fe7851749485899212ef022d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5a4874.TMPFilesize
98KB
MD57af8ca7fb19c35e6b24770c5b3d4d941
SHA1195b8574afc0a866e96ac3667a6d0fdf956ed808
SHA256fc86d5cd405bd9fc98a6ea43c996d36531b0b0e9d1b60a8360cda17a455d5d79
SHA5128785ee7e8bc940571d13eb2700d56292080e154f77d0c8fe231ff7e75b77f5136b65a000d9f7c2a0c503eb3939dbcfc2e9f30d7cd05588247247c96569e2147e
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\63HiIJrDNvEfDcl.exe.logFilesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD54269aa3fa3432ca0bfb704965f4db18f
SHA1c89ae7d377fb10b91898022bde68b23d20ed72ed
SHA256e776c2f5ce460c35e96b42794f67ee2c7b151daf27579181c5ef69f744b3f4a5
SHA512c5e4d4516655065a169a0976dc5703daaefd8676ad8c3b5191aefdc32fb6de085ca920ecb8992a3eff80b1b0c9762311bc560f45ecc1e8fe592813e30afbae40
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fdlp5sit.lbp.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp9C49.tmpFilesize
1KB
MD555a3b1d108f0c9c405e75a74ceda3b42
SHA1fe020275ba5c61e05d3201d1bc925f809915c99d
SHA25688977ecf46d706f852cd9d68ce17d8762baaa334a5958eb5524a4ef5b95593a7
SHA51222f6ea526c8e5327c7387131048aa2dff92db64d7b570f1cec852fb5d289a553670ef681a46f158fe0aa44ed2d6d391500fd3549749587e52982a26294f21729
-
C:\Users\Admin\AppData\Local\Temp\tmp9F37.tmpFilesize
1KB
MD58cad1b41587ced0f1e74396794f31d58
SHA111054bf74fcf5e8e412768035e4dae43aa7b710f
SHA2563086d914f6b23268f8a12cb1a05516cd5465c2577e1d1e449f1b45c8e5e8f83c
SHA51299c2ef89029de51a866df932841684b7fc912df21e10e2dd0d09e400203bbdc6cba6319a31780b7bf8b286d2cea8ea3fc7d084348bf2f002ab4f5a34218ccbef
-
C:\Users\Admin\AppData\Local\Temp\tmpA080.tmpFilesize
1KB
MD593d357e6194c8eb8d0616a9f592cc4bf
SHA15cc3a3d95d82cb88f65cb6dc6c188595fa272808
SHA256a18de0ef2102d2546c7afd07ad1d7a071a0e59aff0868cf3937a145f24feb713
SHA5124df079387f6a76e0deb96ab4c11f6cffa62a8b42dc4970e885dab10351fade2d9e933663c141b76409657f85f1bf9dbb533d92dce52dc62598aafc4793743f7f
-
C:\Users\Admin\Downloads\nje91q.rarFilesize
632KB
MD5f85c33dc9b710080b0691cb9170a0924
SHA1a5ffe397ce816453a59992da2d545aefb53cdd23
SHA25614f41e52e85831bb42d9122b038fe76e86bc084e10636d086a4bd9f7f26abc97
SHA512ed126ca04306853ba28e298fe890829932406cc376c2460e5def5695b59bf79b9981222333d8a168af4c753603f6813a7533776324aa33f402369fc9ae928a76
-
C:\Users\Admin\Downloads\nje91q\63HiIJrDNvEfDcl.exeFilesize
660KB
MD5e47509572ea188a78326872fda99fe64
SHA161445d5ea22042336963a7a1060e6049c5d52fc1
SHA256ef2c040076c60b1c9dbe49868b75a036073d4e3d4d9d20d911e0166ffe1317f5
SHA51298b9c9822008bff777797b4346df430fdb97516539b423984b709db878353cf4b8d20d53a1110507abafe94920468387f381e32f056493244f41ddbd37129c90
-
\??\pipe\crashpad_4356_FGRFXJGWWPUUQVCCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/3176-622-0x00000000054E0000-0x00000000054FE000-memory.dmpFilesize
120KB
-
memory/3176-609-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/3176-621-0x00000000054B0000-0x00000000054BC000-memory.dmpFilesize
48KB
-
memory/3176-623-0x00000000057E0000-0x00000000057EA000-memory.dmpFilesize
40KB
-
memory/3176-620-0x00000000054A0000-0x00000000054AA000-memory.dmpFilesize
40KB
-
memory/3308-648-0x0000000006E60000-0x0000000006E7A000-memory.dmpFilesize
104KB
-
memory/3308-612-0x0000000006090000-0x00000000060DC000-memory.dmpFilesize
304KB
-
memory/3308-664-0x0000000007180000-0x0000000007188000-memory.dmpFilesize
32KB
-
memory/3308-599-0x0000000005490000-0x00000000057E4000-memory.dmpFilesize
3.3MB
-
memory/3308-649-0x0000000006ED0000-0x0000000006EDA000-memory.dmpFilesize
40KB
-
memory/3308-584-0x0000000002260000-0x0000000002296000-memory.dmpFilesize
216KB
-
memory/3308-611-0x0000000005B20000-0x0000000005B3E000-memory.dmpFilesize
120KB
-
memory/3308-631-0x00000000713F0000-0x000000007143C000-memory.dmpFilesize
304KB
-
memory/3308-647-0x00000000074A0000-0x0000000007B1A000-memory.dmpFilesize
6.5MB
-
memory/3308-662-0x00000000070A0000-0x00000000070B4000-memory.dmpFilesize
80KB
-
memory/3308-661-0x0000000007090000-0x000000000709E000-memory.dmpFilesize
56KB
-
memory/3308-659-0x00000000070E0000-0x0000000007176000-memory.dmpFilesize
600KB
-
memory/3308-660-0x0000000007060000-0x0000000007071000-memory.dmpFilesize
68KB
-
memory/3308-585-0x0000000004DF0000-0x0000000005418000-memory.dmpFilesize
6.2MB
-
memory/4008-587-0x0000000004D10000-0x0000000004D32000-memory.dmpFilesize
136KB
-
memory/4008-624-0x0000000006C60000-0x0000000006C92000-memory.dmpFilesize
200KB
-
memory/4008-636-0x0000000006C20000-0x0000000006C3E000-memory.dmpFilesize
120KB
-
memory/4008-625-0x00000000713F0000-0x000000007143C000-memory.dmpFilesize
304KB
-
memory/4008-646-0x0000000006EA0000-0x0000000006F43000-memory.dmpFilesize
652KB
-
memory/4008-588-0x0000000004DB0000-0x0000000004E16000-memory.dmpFilesize
408KB
-
memory/4008-663-0x0000000007320000-0x000000000733A000-memory.dmpFilesize
104KB
-
memory/4008-589-0x0000000005460000-0x00000000054C6000-memory.dmpFilesize
408KB
-
memory/4948-573-0x0000000005980000-0x000000000599E000-memory.dmpFilesize
120KB
-
memory/4948-570-0x0000000005630000-0x00000000056C2000-memory.dmpFilesize
584KB
-
memory/4948-571-0x00000000056D0000-0x00000000056DA000-memory.dmpFilesize
40KB
-
memory/4948-577-0x0000000006C90000-0x0000000006D0C000-memory.dmpFilesize
496KB
-
memory/4948-572-0x00000000059B0000-0x0000000005A4C000-memory.dmpFilesize
624KB
-
memory/4948-575-0x00000000059A0000-0x00000000059B0000-memory.dmpFilesize
64KB
-
memory/4948-576-0x0000000005B70000-0x0000000005B86000-memory.dmpFilesize
88KB
-
memory/4948-569-0x0000000005CF0000-0x0000000006294000-memory.dmpFilesize
5.6MB
-
memory/4948-568-0x0000000000B90000-0x0000000000C3C000-memory.dmpFilesize
688KB