Analysis Overview
SHA256
60ca507ef4ba7dbbb7ef6ea4b975b9b09a24d7d0c91d38d0876331203f962d98
Threat Level: Likely malicious
The file CW.eXe was found to be: Likely malicious.
Malicious Activity Summary
Possible privilege escalation attempt
Executes dropped EXE
Modifies file permissions
Loads dropped DLL
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
Enumerates system info in registry
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-07 12:27
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-07 12:27
Reported
2024-06-07 12:28
Platform
win7-20240221-en
Max time kernel
67s
Max time network
74s
Command Line
Signatures
Possible privilege escalation attempt
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CW.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
Modifies file permissions
Enumerates physical storage devices
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\takeown.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CW.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CW.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\CW.exe
"C:\Users\Admin\AppData\Local\Temp\CW.exe"
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe
"C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\CW.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C hosts.exe /i
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C COPY /Y a32_original a64_original
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C COPY /Y a32_original b64_original
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C COPY /Y a32_patched a64_patched
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C COPY /Y a32_patched b64_patched
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\System32\slmgr.vbs t1.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\System32\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\Sysnative\slmgr.vbs t2a.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\Sysnative\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\SysWOW64\slmgr.vbs t2b.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\SysWOW64\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y a64_patched "C:\Windows\Sysnative\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2a.txt C:\Windows\Sysnative\slmgr.vbs
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\slmgr.vbs" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\slmgr.vbs" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y b64_patched "C:\Windows\SysWOW64\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2b.txt C:\Windows\SysWOW64\slmgr.vbs
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\slmgr.vbs" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\slmgr.vbs" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\System32\slmgr.vbs"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\System32\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\System32\slmgr.vbs" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\System32\slmgr.vbs" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\Sysnative\slmgr.vbs"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\Sysnative\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\slmgr.vbs" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\slmgr.vbs" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\SysWOW64\slmgr.vbs"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\SysWOW64\slmgr.vbs"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\slmgr.vbs" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\slmgr.vbs" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C COPY /Y a64_patched b64_patched
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\System32\sppcomapi.dll t1.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\System32\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\Sysnative\sppcomapi.dll t2a.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\Sysnative\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\SysWOW64\sppcomapi.dll t2b.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\SysWOW64\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y a64_patched "C:\Windows\Sysnative\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2a.txt C:\Windows\Sysnative\sppcomapi.dll
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\sppcomapi.dll" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\sppcomapi.dll" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y b64_patched "C:\Windows\SysWOW64\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2b.txt C:\Windows\SysWOW64\sppcomapi.dll
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\sppcomapi.dll" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\sppcomapi.dll" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\System32\sppcomapi.dll"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\System32\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\System32\sppcomapi.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\System32\sppcomapi.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\Sysnative\sppcomapi.dll"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\Sysnative\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\sppcomapi.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\sppcomapi.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\SysWOW64\sppcomapi.dll"
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "56097518110792187-1581356242-121060830-2127029997-271069979-1511651881998304744"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\SysWOW64\sppcomapi.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\sppcomapi.dll" /deny "SYSTEM":F
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-155791121717569916421561604748-113430500814166758271423756786-15567319421874486880"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\sppcomapi.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\System32\systemcpl.dll t1.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\System32\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\Sysnative\systemcpl.dll t2a.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\Sysnative\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\SysWOW64\systemcpl.dll t2b.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\SysWOW64\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y a64_patched "C:\Windows\Sysnative\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2a.txt C:\Windows\Sysnative\systemcpl.dll
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\systemcpl.dll" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\systemcpl.dll" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y b64_patched "C:\Windows\SysWOW64\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2b.txt C:\Windows\SysWOW64\systemcpl.dll
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\systemcpl.dll" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\systemcpl.dll" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\System32\systemcpl.dll"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\System32\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\System32\systemcpl.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\System32\systemcpl.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\Sysnative\systemcpl.dll"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\Sysnative\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\systemcpl.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\systemcpl.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\SysWOW64\systemcpl.dll"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\SysWOW64\systemcpl.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\systemcpl.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\systemcpl.dll" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\System32\user32.dll t1.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\System32\user32.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\Sysnative\user32.dll t2a.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\Sysnative\user32.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\SysWOW64\user32.dll t2b.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\SysWOW64\user32.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y a64_patched "C:\Windows\Sysnative\user32.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2a.txt C:\Windows\Sysnative\user32.dll
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\user32.dll" /grant "Admin":RX
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "2444715301267366741-1488338057-4890633421476550816-303044981588883419-258094065"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\user32.dll" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y b64_patched "C:\Windows\SysWOW64\user32.dll"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2b.txt C:\Windows\SysWOW64\user32.dll
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\user32.dll" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\user32.dll" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C COPY /Y a64_patched b64_patched
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\System32\winver.exe t1.txt
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-1665614092-1817746531-1764862642-194752862-1373404540-18155806281770648153165516802"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\System32\winver.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\Sysnative\winver.exe t2a.txt
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "12858922341910224229-1268684157-8180715861862570739146877292117224230481828093250"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\Sysnative\winver.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r C:\Windows\SysWOW64\winver.exe t2b.txt
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C banish.exe "C:\Windows\SysWOW64\winver.exe"
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-396396115-162287995-1145153847-6623757551624041157-2050642316693791991704813228"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y a64_patched "C:\Windows\Sysnative\winver.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2a.txt C:\Windows\Sysnative\winver.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\winver.exe" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\winver.exe" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C move /y b64_patched "C:\Windows\SysWOW64\winver.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C touch.exe /h /q /c /m /a /r t2b.txt C:\Windows\SysWOW64\winver.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\winver.exe" /grant "Admin":RX
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\winver.exe" /grant "Admin":RX
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\System32\winver.exe"
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-17571223711734726390-1883186532348284788-15724134611189563824125800811626322255"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\System32\winver.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\System32\winver.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\System32\winver.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\Sysnative\winver.exe"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\Sysnative\winver.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\winver.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\winver.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\SysWOW64\winver.exe"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\SysWOW64\winver.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\winver.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\winver.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\System32\sfc.exe"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\System32\sfc.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\System32\sfc.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\System32\sfc.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\Sysnative\sfc.exe"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\Sysnative\sfc.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\Sysnative\sfc.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\Sysnative\sfc.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C takeown /f "C:\Windows\SysWOW64\sfc.exe"
C:\Windows\SysWOW64\takeown.exe
takeown /f "C:\Windows\SysWOW64\sfc.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C icacls "C:\Windows\SysWOW64\sfc.exe" /deny "SYSTEM":F
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Windows\SysWOW64\sfc.exe" /deny "SYSTEM":F
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6aa9758,0x7fef6aa9768,0x7fef6aa9778
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6aa9758,0x7fef6aa9768,0x7fef6aa9778
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1224,i,12695260287799414294,13908397357605959554,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1232,i,13758739506942471224,7402932166815246657,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1224,i,12695260287799414294,13908397357605959554,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1456 --field-trial-handle=1232,i,13758739506942471224,7402932166815246657,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1224,i,12695260287799414294,13908397357605959554,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1224,i,12695260287799414294,13908397357605959554,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1224,i,12695260287799414294,13908397357605959554,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1152 --field-trial-handle=1224,i,12695260287799414294,13908397357605959554,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2984 --field-trial-handle=1224,i,12695260287799414294,13908397357605959554,131072 /prefetch:1
Network
Files
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\mainicon.ico
| MD5 | 31aca1a1047efbc8d2a6e22101b2227b |
| SHA1 | 7f0500f0dd7b33f13efcef891700d17306762e02 |
| SHA256 | a9eaafa2c8e36bb80f58d5930694676d76dab647b8f709f3142649bb8018fbfa |
| SHA512 | 190dd9471fdc93e9eeb8dede79f3b9f1a67c3ff62e5733f51ddf03130790ae0e409da92d46c8e616c35bcd5dbc9d2139c95452843f8a8a4ba8b4d70d1e43427a |
\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe
| MD5 | 6ed1ff22271e42f1b1b794fcf013c792 |
| SHA1 | bedfc9238562d8f060aa8ba2dd611fb0bd69028c |
| SHA256 | 3d64730cc54b77e11ab31a232434b09ca14fc393f3194eb8c622e62aa41d21f9 |
| SHA512 | 0ddc4a0e772e45e5e87f2c1dacd559bb20a2a991f24af8415f714cb04fd9307ae9eb43bbc1acf551d3bc066f9c15d0a660568eaab391ad8378b30afe9a62b3e3 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\autorun.cdd
| MD5 | 1c42c49a03f8416736f243907b1c8c0a |
| SHA1 | 64a6bc73c97b85c35813d7c3386753e0c8fd7e63 |
| SHA256 | 6f9a4a22186afb4efd48689fe9dad4a1cf1cfd6f2706d3411c8f5d83607e0ba9 |
| SHA512 | 6385706f690fa75267af441fc614a3971e4a7e5dab08de76e6a2773f5a4284bfb13e9c08595fc9b3dc39672f74ec1af26c79581df0cf9eb45b8ddb2785f22026 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Plugins\IRDissolveTransition.tns
| MD5 | 6a9b0ab9341ac4204aafc7fac9872962 |
| SHA1 | dc6ceafcb39b7329552d0883f2c3284dddbb0ddc |
| SHA256 | 6315b5d1869c3b4cbcbead77ad63da3a60d86ede287eccef338f74178ec181f2 |
| SHA512 | 76bacf1de5ac883bb47ae8d3299d5f399ae84bcd19eadc3fd8ee01ae2605bbbbddd6aacf7fdec490b8e6baf362ae05dbf972a5710c2bc732e8542a1c5d04bca6 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\chew.enc
| MD5 | 12a32fa128964e6a70b7ead729bfd933 |
| SHA1 | af5ae624d8f1aba5b1c651d6435fdaaadb475d3f |
| SHA256 | a7bec382f29d784338e0130bf180a2387454be59ce8bf198f43fe9655cc473d7 |
| SHA512 | a335e01ca8ada8b7ae15dd9405409266a01a8e597f556c8cb316c35366a0a4e3f8cadd048108f0cb713d51ccb08d0845298fc56858f9300c21f5422c1fb8ee01 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\main-screen.jpg
| MD5 | 16ace5798f3499d9685197740cd00735 |
| SHA1 | 5a5d4765b3d2046cd1d4fcc714e77d188b8e52ab |
| SHA256 | 0c88a592cb5448d2131a15f208580365cf383a2445ed60ca55987f42ecc4ce11 |
| SHA512 | f5e7f3bdba6aa633bb28991c5dc9ce0e9a010ca133165417ff81c48d6cacd87d89b93533176311a60823d8d98c13bd4134ce1bcd0f90f644092779cf47aa14e0 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Buttons\button.btn
| MD5 | 9ecb9fcfdcb46a87ec244cfe23659e0e |
| SHA1 | b389705b9cc52e7e12a0f7f68a4f6922ea9db107 |
| SHA256 | 3ff2c5e7c1b7471d41d64bd39b2d8e2df3761408c0b235ce8ccbb3d39417466f |
| SHA512 | 12a61f1cdff7faf5fe40fd83d2cbb4ef17554be2b2ead82162d685a3b492f7149bfb82b8c65a5d20e061a287140c5350923c0adab9fc7e47a7c98f3fdead8498 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Buttons\Home2.Btn
| MD5 | 1c85362b0780dfb2f580e567ad57643a |
| SHA1 | c1ca2efb091d5540c8d300a00420fb3060874e61 |
| SHA256 | 70919d158d55ba3a9c38bbe91c79bc69452e67fe7862aa00fe77df56a7dde4e7 |
| SHA512 | 57d643adeb7ae8409312a0b8ac1b4774d51543f31ee4f1ea27a57fb34521d21d3590e23d8470d03967aff137117c8ace46b8a20adc6e65c1a411f70dbfd85690 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\genuine-chew.jpg
| MD5 | 2e2ac2c68ef9ed0e14108208dc6880bb |
| SHA1 | 15bed281564c4ae5d59c8e8d7691b63ba253448b |
| SHA256 | 510acf5a6ce7e9570a591a48951161341de4f1da13e0117ab4aa6832e5bddb97 |
| SHA512 | ee40b725211ec3001154c7484de7ce78df7a885fef6ba09585cad7281b4b08acb60459856d8c3b1684adceef643995f2cf708212183ca2ddb7f231713306590c |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Buttons\Cik11.Btn
| MD5 | eb199b1cb2087cadf5dd4d7b06db4f62 |
| SHA1 | 2033bed8c8de0805e8fdbebadfd710e42fbe1a68 |
| SHA256 | b99136b165304979e84e98930ea5fee03508b8967acf6b82844b96863d916b15 |
| SHA512 | a133b9d14143b0d67f876b19f22fcf7d72352872352d7c5dd8a9ae05551e9350c5ede194416a0802816dd4c82418679c52b3ae578bf0f63e446ea868f8a9d387 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Audio\High1.ogg
| MD5 | fc2a595f574b1ead82a6dcf06492c985 |
| SHA1 | 400626784368fb9825a954ab8e14238054a277d1 |
| SHA256 | ee9a4903a8df90eff4c5b65a8073e564a3581cf73772a72eb82396e69932e769 |
| SHA512 | 06506e70170a85a2d697550bfb555a19e210e93b972a38a482448cf8eca335605583d04f74f5fdd2911203c58aaca2f55b946c2dfe754ecf17c6b1763b7e37db |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Audio\Click1.ogg
| MD5 | 93270c4fa492e4e4edee872a2b961dde |
| SHA1 | 7b3c079d55d00aa5390662f0a2059e60546ed003 |
| SHA256 | 25d49cbbd65d48ad462455f1143f73ee997df8f747e7d2213daab18e321c028b |
| SHA512 | 3d12721eb229d9227efc51c8e93d5f3ff6cabc305b643b764fcd6da76c031db4c8218b76b1f6158891995f23ce323c13826f59477924361cfb0dee2b9f94fb42 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\wait-install.jpg
| MD5 | e9e643548d3f92376e0becea1b79d731 |
| SHA1 | a273f8456c05003220494d8cf49f631408b07cdf |
| SHA256 | 68e008a39348d54344d4c4213fea395f710b078c6a5fa5fd493c08acd8ed0c78 |
| SHA512 | c4d7f083bec2b5341f866511e4f7d258c3bd6d4f4f5404bf7e2b68ffbe5d0b33ad0d5de4db2c0fd2201ebbbd45927ad1af132431f184e9c0277982659db863a2 |
C:\Users\Admin\AppData\Local\Temp\tRkf2d52.UA3
| MD5 | 5fa434ec8af8916370b765dec86852bd |
| SHA1 | 4e926f229b73d58f743101cbd7b2dd4793200eb5 |
| SHA256 | 9d93b830e5fddb9ae865ad13d542e604a13b07687163841251cb083f0ffe2786 |
| SHA512 | 229715259889d0caf20bfd11aa89a3c6dd1951f6b1d836445b114765db3c8381fe42930f06e5da5c08b035e11c92fd1abf3f21d92ee8cae957024ab17776ce28 |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | ab6d9eff87e10aba6e3a05c06a69788d |
| SHA1 | 80634778fbe8666c80408ae2f11124884a3eeb56 |
| SHA256 | f904e7c681420cd9af688fed942c10ddeceb6bb9ec9aea0309c59211672a624e |
| SHA512 | 7477d43ae329188f47a47fd9dbcbe8e9c44cfed82d6a2e3c622d0a7f2b885eb3981f621b34a45fec146bbf912f0347311a49974720fb8690c2159e1bc4584a6e |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | 1f10fe4a2a04bbfa953653dad216402b |
| SHA1 | 4bd2575d84834ceaa8aea9e3872af33a79045015 |
| SHA256 | 9f56fe2732fbd5d2d619aa6a6938834de9cb5ef86c5142252ed99c793328663b |
| SHA512 | e8a2e17d8c41b521873190eabbffe0db059bec27b09e5c0e02a7c6e44feca8a94b1cec3f344ec9335b50737ba15e698e79f9962d52764402d3b5c79a94561844 |
C:\Users\Admin\AppData\Local\Temp\tRkf2d52.UA3
| MD5 | c62541ea284394bc8871f79909d942de |
| SHA1 | 9c49d85729858642a55076ead707a176ea15bd83 |
| SHA256 | 09263c0a61ff954db51c16ad92775766158b8e33bbb105f5162eca0c29e24834 |
| SHA512 | 2a053a9e09ae13764f1e11cce12b539e7a0c76d3e0b242394d6ded9c5ed7c13273d2181e0fa6c10cef4459d487132e6ceb6c8f4c8421bcbfbdf26599b1e98c46 |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | a2eb6b34ef2cd1f3b1b68ccb947cb25a |
| SHA1 | 04a415953be88e72dac4f0b357961f47dcc5415a |
| SHA256 | bb665c81e1724faf0ed459b2d8e4f1a1ee9f8c0868c8c3fdd1fd47549084ef0e |
| SHA512 | 420a5c24f691a8c8f1b8f152c0ea288c8075bbfb3a7de5b1f9aabff25d6c35b63f6ef03c6de0e4273ff8b068bc86b40374e0581d900538fc34d687673a856aea |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a32_original
| MD5 | 38482a5013d8ab40df0fb15eae022c57 |
| SHA1 | 5a4a7f261307721656c11b5cc097cde1cf791073 |
| SHA256 | ac5c46b97345465a96e9ae1edaff44b191a39bf3d03dc1128090b8ffa92a16f8 |
| SHA512 | 29c1348014ac448fb9c1a72bfd0ab16cdd62b628dc64827b02965b96ba851e9265c4426007181d2aa08f8fb7853142cc01fc6e4d89bec8fc25f3d340d3857331 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a32_patched
| MD5 | ad42973557017119b0e5f176c745909b |
| SHA1 | 6f8911725ac86efa8eb4b08c5147a4ef365c12f7 |
| SHA256 | 5c59f39702c8b1749453641b78b9aafcd6b38b11bc0b7b4b2e8ce7e5f6a5b4da |
| SHA512 | fefa5a762166d416a0f2e1557e4d7097efedc30fc7a77b11d6178b00c8a5c6ea6767371e320c20722e48f077ee10c59a472e95f0519afd65d247aeb88422061c |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | 2770c5d37eb5bcedf92d9d1421153d3c |
| SHA1 | b22d7ac076ee289d6ab90d22c909779f6078320b |
| SHA256 | 6e7e38abaaaf7ac178aae90ff3e93dec6ed62beb4eb3fc48a6ca2647585a764c |
| SHA512 | 084a2285cf5edbb46aea853901330b807ca7eda1b2d679b2df31b230839b5086692353e40e180ceea03966982197c03bb7d48e76d1285879a8b518f93dd04f07 |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | eb5e6dea505d156f3361543f1935e5f7 |
| SHA1 | 7437ac3a419e48d3c093f9ec933745bdbe852de1 |
| SHA256 | f97a968fffe2d26441b7477dec4f8c311252a70c8d74e605d1a0043b8cc063b5 |
| SHA512 | 3a7c040ed698b15e5cba6caff70a2ed6d81786b8445131d0e6bd2f1cd4dbc0889d2490431364bdc5774dff8748ef20a5ac0eaaa389f27f5a10e0f565e63a8ce2 |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | 7c51b4f1c30ca5a550cf2bec27673639 |
| SHA1 | f9dcb2f614a1d02b31cb772aef4444854b7d41b1 |
| SHA256 | b7a816db731b37bde5adbf88a3acd568f61c0f640599fac5c150f3882de3085e |
| SHA512 | c58a11c5c92d70e039f3bd8902ebb639a3d558e7c681b0786d4074222eb98e34cef50a6e70f89134830545314b00a67d74e5a5ba3f3a965cc23018f85b4dde96 |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | dc5cbae22d4fff9c8c03c6918390b983 |
| SHA1 | 257b339e94036c7a35ff6a703f551bf672e16998 |
| SHA256 | 37f4d9d5eaaf37e8b35fec1fc42c59ab79071f6b777e7da3cc06ae9d1ffbc2b1 |
| SHA512 | bb37952d179f47b19ebcb54c361a369d9e78cb2e3dbb22864fdef03f517f810e255ad6d22ba956959c0ea624cbbe7f250d099687a15a04bba75dd4e958d28bfd |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | 8d86e0c6b4e2506e3effe0701428ab28 |
| SHA1 | 30486e6b91bdb0133ad6fedd1d56c14eb836e02c |
| SHA256 | df9260f43f0108a685773d89208f8fa9c8c7564953c993e8104afce55cfac2bc |
| SHA512 | f1dba24dbeb65d7541247a70abb741523af16f6822b380440af35b05ce0be67b4586ad76d521045c1a24c78d216a2a4c2dfc13d15625ebe54c033084f6d465b7 |
C:\Users\Admin\AppData\Local\Temp\tRkf2d52.UA3
| MD5 | a1358365f7bc1b2fe75dd56f9d75ada1 |
| SHA1 | 4d347882e283fed7297758ee820d403335fc7839 |
| SHA256 | d6300d721484277e73cb695965b3980348dd3a005c5aa7b0dd711649c2afbf50 |
| SHA512 | 5c153b51d851cc08c376004cb253960cbe707c5a239478b9ed343e87d25af952d5bbff0b3506b27682499d87c73cfbd2af0016db98359d39ca32e6250886a83e |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\b64_original
| MD5 | b5d219bff6f911b6a8d77cee467d8384 |
| SHA1 | 4ab378126674875646c9dcbd361d3c1d95019c79 |
| SHA256 | 8aa58bc72593b3678f77d92d4f6ae9beae6a704c78f773ec6927728afaba30e0 |
| SHA512 | 7e597df4c8dfb01de5945b0b250f5a8c25a85b30ef5201ea5e2f1016013c50464ac544f74cb5fec43ab5c3e20bd0ae6f4054d20418a677a80ba682614922ba95 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a64_patched
| MD5 | 96119226320b3b2a80e87fdb9d446ba0 |
| SHA1 | 6fb6e603542ada336451c0f8af79e791f65b51ee |
| SHA256 | 041f6d11a1c631b9868c52ca4b8636dc9ca443b3a786bcf13c3477bdcb8a0551 |
| SHA512 | dbf894aab1b2fd826059bf685327688f1b8059dfb523d9fc25acd69ff3ed507d4d080bdacb6bfaa85e5a4de8bcb1bd7d2326f048cb9cd716f169ad1f20d1bf3c |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\t1.txt
| MD5 | 500cf1681dda5a94296d684421ce1329 |
| SHA1 | 8d117d0dfb98c5b9a18eece31d52be17dc4faddf |
| SHA256 | c5e2e7fa58c4734d9fe7d7a3d2519f49f915a8c9b74f66d883d6f945e8dc88e0 |
| SHA512 | 4d827e96d0d6333690c9777144525a929cbf68273d3ce67b7f1d53a2eb2cc20feca9cb073d12d0575eae0631b8cd03856044cd6f987799b8780844b3246b773b |
C:\Users\Admin\AppData\Local\Temp\chew-wga.log
| MD5 | 6d3b472992d43d60fcb7d4d8a67522d9 |
| SHA1 | e7fef7336963ace9148aa743b338b04ed10a3df9 |
| SHA256 | 69cd55afc5793cbb5d5b6551330864e21a43555d0de9874d7a68b5f0a7cc3cd7 |
| SHA512 | eb08104a34de66562e60abb589f036a1f2052e8d639e0bd33ffa111e195411c4699734edd156451fa3a4cf97d2c521efbe4cf82f133e3d4f2948e345498988fe |
C:\Users\Admin\AppData\Local\Temp\tRkf2d52.UA3
| MD5 | 1d9250f82ec5c5df4758eb30ee12a80a |
| SHA1 | 32faf2f750fbf1fff8d26675b41574a4912a1f6c |
| SHA256 | 085952fdefba04d9bab4c3058ad4882194bf8e5241f805992e529c46008ba400 |
| SHA512 | 773971e6738fc0ee24711cbc2b92e7a5914be9727fd0302ba1eeab9ac5a63ada4aa6d05215a60c3da9d77338943f9ad19aabcf822518d7f1bdd033548d9d543c |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a32_patched
| MD5 | 4ee1f86f0380ee6f57c5283d945861ea |
| SHA1 | 3a2fb4421b35cd7fe7e133da4160e4b1995ff55d |
| SHA256 | 8c64b02a9fd13c870085f72f70524f119e5b3192a9fe2112b0dd4a565b942416 |
| SHA512 | f43f70827ec03517e0cc177fc709876612ba0a4055a83893ff6f920d72222ad9c23e1cb962666eef844e9c919d9dc7c6dc295a6938297aae3e24e8f353ec0506 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a64_patched
| MD5 | 6e62eaf8a35ae3801ce0554fb140a84a |
| SHA1 | ba1f56c430a222e753cd1f5322136f8726247cf3 |
| SHA256 | b9fa2d3bf26702806fc394521e57c9d65825ee40923a663af5e8b568646d1f11 |
| SHA512 | 6628fc3f5b6ec82d54b1dcd1f2dfc32744d57e9a88a6ffeb571730016eb52675db208b9d350c251df1e235e0da23893b7b2697bde03ca38e1aec3498544400d3 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\b64_patched
| MD5 | 82e679d6a609830a09b2fb6511b543d5 |
| SHA1 | 6072ac3deb1cadb02977533bb31aee96815e6a2c |
| SHA256 | 44b83f38059ad417a580050266adb572bff501ad959df42b8d9cd318c5029870 |
| SHA512 | 08ed010b16a9e8e34ddf336f8129cb73aa4e474dd336777a2d5172875e71b0d8f8ab54fda4638b7e2f668c4c11db024c824a81b499fed513fd8f1a73ca261d43 |
C:\Users\Admin\AppData\Local\Temp\tRkf2d52.UA3
| MD5 | 2a6cdfcac99775cf627baa0c492822b1 |
| SHA1 | 31f342298c7c5d2670b1e4245aba10d9d9a03722 |
| SHA256 | 2650008d81826d69558bed947b98e7e2767eefcaa136b7b3fabf9fb7897532f0 |
| SHA512 | 556bd12254469941b09ee58f9e8643b1cf37d8f0c1699a7960ac93c9fedd835f6a8d51d530a90f2f3db2677aa2887c63b19b8a5f2be751c7e4a5e95452d24708 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a32_patched
| MD5 | 8626f0c30d4e3564ffdd25c90f4426f1 |
| SHA1 | a42a6b0af9f6b6cc92ade441f13d8eb54405b75a |
| SHA256 | 48095e57661edf47e44f8315dbe6372757449493a84e0166d69051299e1873f6 |
| SHA512 | d949f703875e8403eed0dc6eea573b8ef61f43d7d06a9cc2edd4d74f2e019eaaad40c8d7040db0f0870da124a7fa4471c0258b8af704e9900eac93e5eac27a0b |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\b64_patched
| MD5 | 2c9cc9f492ca596b1b9fc1ae5e916356 |
| SHA1 | 553a6b184f2c4f77a2483daf9ea027e4e35a1516 |
| SHA256 | 267377ea0e565b378ee37cf862654cc8717a8d54fccee7ae8110e95981d2c418 |
| SHA512 | fb2704402a338e9784ea6754ecb8efeb4334e834682d7af5ecc8a632d1dfd434bb2237398620d46573c28332cb0b62004e3a4cb8ff79da6c6e71c8c0cb63405a |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a64_patched
| MD5 | e573bd9ab55c8e333c202b9e255f972e |
| SHA1 | 460bde795885134b48465dc73797db695af33e1f |
| SHA256 | 79bec0da770265d1a525330b2e732e055edde617bcc2848c2742492f9dbc881e |
| SHA512 | bcae097591cbc66e20771ef69e6544e5f951e0821b8d2a4779e524c542e5ad1d75ff683a15a76f5577e1e1389f4058cd36da7d0c785c504b2305cc144dc7b4bf |
C:\Users\Admin\AppData\Local\Temp\tRkf2d52.UA3
| MD5 | 12bd808641c2e93c05d209f95e8d7cd4 |
| SHA1 | 2c25caff2c87866672420af1a68109fe371f65a1 |
| SHA256 | 5f97e448aa07b1377fcb74f35ba821a0e9dc5655b9b29bb1a6040a89e308663d |
| SHA512 | 863ad404d10028ac19c7021ddb6896987e8d37bba72cb07204c09b41220cc1711ca49da82f01241697e0c11f021d45a48be87e8fd8079520db2d97ea006a49f5 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\a64_patched
| MD5 | b6d47606cc11ba2c58f12fe01983f77c |
| SHA1 | a7046870240beb9555991020981d398af7ac56e8 |
| SHA256 | e6746e6f90d311bb769394ea1247f04f669184a08ecb2a8b237aa5185414dc1b |
| SHA512 | 729962ac9d8cc2bdfc8f1d2f66e9aeddaef819d9d6b6e4aa235196045558c0ff0ffa0925e7e0a1ebf608ee886d58e1dea91fda82456da25ee1fde65547fbee11 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\install-error.jpg
| MD5 | 68ec09592f71a542470246c5522d4636 |
| SHA1 | 61d2c3b7621c0c77fd91f7e6dacecd25bd49d69e |
| SHA256 | d15a87cb382ddf6efea8cad0ac82fd3ee72db4f775ba4d22ca7bea9cdba20960 |
| SHA512 | d7d0da635faad6a2e56eadbaa1d83fb466e450bb69b37b67a08980da63393493b8fa6b48bcb6fbb1ce4512f7af17f4e5dd58654b3e8f9af79ca649b60cc62f5d |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\c0.enc
| MD5 | 97b53e8a8394f391b866fe0764681537 |
| SHA1 | a3e2117b6d1c4e6dae48363212768889a0a3a3e3 |
| SHA256 | ff9a5928782f0496d8d350bc047ba2f4d61c87492c303c9b805ee3686eae064e |
| SHA512 | 53315dfb3f9c27aed07564bee8e5441c276162d117fd438d96961dd02e39488930dcff9cf9d3e34fd92d36e3a18c44386a00e261a756a534a543cf62fc979af0 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\c5.enc
| MD5 | a39e341d6a68ea661b9eb5e7707edf37 |
| SHA1 | 521d8bd813225a750324e215fb73146ffcb3f1f4 |
| SHA256 | 02c7096dd821d2fdffd7263e7adf62efc4a41584ee3c35d409999a317457ad5e |
| SHA512 | 0212e53116f0e1ec18a4acd1e89cee39fb56ccfe1aed3e0366e716a43b2dfc4a3b0108672f41570eab2b17763c7b1e7ff3d8bffc7cb259d60d6f719e2a70bf70 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\c4.enc
| MD5 | 9edf4f042ffb616d2d139b3e36000cf2 |
| SHA1 | 79c988f96a635803951dbed0bdc257206380bc8f |
| SHA256 | 4ab24958c0986641bdfbbfd5df57a0f8f354e6a8f88f33b09bd6d9d9ae934df3 |
| SHA512 | 2a42391ffc1bcc8622a56f7564958270986493eaa8d679e5dd96a333bd2a4b210f3bfba975cada8dc5bec4bee37c0a061d741abc47451eff81704d6870cce347 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\c2.enc
| MD5 | b3e970d171604bdef71809e63df44ff2 |
| SHA1 | a32858da162478b94e0cf1ff0dd4a821d859e69f |
| SHA256 | b64bbed7e4d8a544261555a37ec2df1445ca4c38f0f49e9618f16f80d48ddf4b |
| SHA512 | 8b937a81fcbb99619f11bb13b888459c8bc68981bc01301aeeec204216592a3eea9de7619212c79e002580d41b4d2fbe1741e649940ac0b26d5e44ad600118cb |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\c3.enc
| MD5 | 823903ea3ea1ce97ebed801e6306f08d |
| SHA1 | e4bdee37c87fa4f89136f04de807c0ab68610b6b |
| SHA256 | 743e073e703800d853028da31eb19e69922bddffa00d4c207e31c173754d9e83 |
| SHA512 | d930d773902d2681760afec5ee979f6f38976635087a4f7d0e99e791b8880cc822cdb858510dc42f013693363336605ea962e95dcc9caae3620955a6cd2a9349 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\c1.enc
| MD5 | 5d280b2b82ebdbb4bad1b316f4b9b7cc |
| SHA1 | 7ca1173bf828c1bd78fb151bac7de7c2d9d867ed |
| SHA256 | 6eca38bc2c7d230d3e3b79ec49be46e553d6abd287c7c9b05571658460d2b6cd |
| SHA512 | 6a2b67aec6c274010de351ebef717eb64867b4b75859025eb489e2f95be8fff732314ffece5dae0e496cbf870f5cf25931748b0e832bfea41c83220841de5460 |
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Scripts\b64_original
| MD5 | 66dd0b0d1cd1ec6c5964b158374ebe7f |
| SHA1 | 3fe75a3ba8602ef073f37b167115125cd4a2b0e3 |
| SHA256 | 7ab75618ece4118dfeb518f490ddcbb8db904857f9eecb50f672f001ce1e53d2 |
| SHA512 | d6f92c672278a0eff3db661bdacee42adb4a301033937202c0709f3893540e9d23123fe916a53fd418161b469b81fb4b336b0fb7fa0133dc5839b72ed25145f9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
| MD5 | ecd8ebd0d441c0b49b641fbcd5444d17 |
| SHA1 | 75760164655f0e440880cfb868a10a01b67b6c90 |
| SHA256 | f46d8cdf1812d342e3b49ee242fdba78935d597ccdf86989d165e28696cf62b7 |
| SHA512 | 99913f343bc9df93bcd6d789c4ddb2378e7f49778836e844bee55de79a98c39a9793331a22c2e6b6f171fd3289c77586a4e32b9d9bbcefd68a0029f6d11d2256 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations
| MD5 | f732dbed9289177d15e236d0f8f2ddd3 |
| SHA1 | 53f822af51b014bc3d4b575865d9c3ef0e4debde |
| SHA256 | 2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93 |
| SHA512 | b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4 |
\??\pipe\crashpad_2472_PXFOSHBPAITKYKSD
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
| MD5 | 18e723571b00fb1694a3bad6c78e4054 |
| SHA1 | afcc0ef32d46fe59e0483f9a3c891d3034d12f32 |
| SHA256 | 8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa |
| SHA512 | 43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\e2d14c00-eeda-4b41-abed-ef188996cc93.tmp
| MD5 | ed41a0e8eccb79860b8733ee64f52cab |
| SHA1 | c0b331ad2cb7ec69265ae3b21179ae9218751980 |
| SHA256 | c19fa9c4031b624c44b55397a814020bfbe5454e3b44dc14b89a0a7235f8d571 |
| SHA512 | a3449739203e5be2d3881ff4d011e1d141bf6301a0377fcd2e2fa51c2b6148b217c2d998f47e017b5b2c9aaf46a1d6f09a59482be64beb7ca4b69fbac77173e0 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
| MD5 | f50f89a0a91564d0b8a211f8921aa7de |
| SHA1 | 112403a17dd69d5b9018b8cede023cb3b54eab7d |
| SHA256 | b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec |
| SHA512 | bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58 |